• Title/Summary/Keyword: Transport Layer Security

Search Result 59, Processing Time 0.032 seconds

An End to End Security in the WAP environment : TLS(Transport Layer Security)-Plus Protocol (WAP환경에서 안전한 종단간 보안을 제공하는 TLS(Transport Layer Security)-Plus 프로토콜)

  • 최진규;이헌길
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.811-813
    • /
    • 2002
  • WAP은 WAP Forum에서 제정한 무선 환경에서의 데이터 통신을 위한 표준 프로토콜이다. WAP에서는 보안 통신을 위한 프로토콜로서 WTLS(Wireless Transport Layer Security)를 제안하고 있다. 이것은 TCP/IP 상의 TLS(Transport Layer Security)를 바탕으로 무선 환경에 맞게 최적화한 것이다. 그러나, WAP은 기본적으로 게이트웨이 모델에 따른 프로토콜이라는 점과 무선 구간에서의 전송 효율을 높이기 위한 인코딩 기능 때문에 게이트웨이에서 클라이언트와 서버 사이에 교환되는 정보가 노출되는 이른바 종단간의 보안 (End-to-End Security)문제가 존재한다. 이러한 이유로 유선에서와는 달리 안전한 종단간 보안을 제공하지 못하고 있다. 이에 본 논문에서는 기존 TLS와 WTLS를 합친 새로운 TLS(Transport Layer Security)-Plus 프로토콜을 제안하여 무선 환경에서 무선 단말기에 부담을 주지 않는 안전한 종단간 보안을 제공하려고 한다.

  • PDF

Development of Security System in the OSI Transport Layer (OSI 트랜스포트 계층에서의 보호시스템 개발)

  • Park, Young-Ho;Kim, Ki-Hyun;Moon, Sang-Jae;Gang, Shin-Gak
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.5 no.1
    • /
    • pp.65-84
    • /
    • 1995
  • The information security is needed to guarantee the safety and the confidence to users in open system. This paper analyzes transport layer security protocol and security association protocol, which are standards proposed by ISO/IEC, to provide a security service in the transport layer and particulars, not in the standard, are defined for development. And this paper suggests a development model and develps security system based upon the suggested model. The ONP of USL is used as the development environment.

(An HTTP-Based Application Layer Security Protocol for Wireless Internet Services) (무선 인터넷 서비스를 위한 HTTP 기반의 응용 계층 보안 프로토콜)

  • 이동근;김기조;임경식
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.377-386
    • /
    • 2003
  • In this paper, we present an application layer protocol to support secure wireless Internet services, called Application Layer Security(ALS). The drawbacks of the two traditional approaches to secure wireless applications motivated the development of ALS. One is that in the conventional application-specific security protocol such as Secure HyperText Transfer Protocol(S-HTTP), security mechanism is included in the application itself. This gives a disadvantage that the security services are available only to that particular application. The other is that a separate protocol layer is inserted between the application and transport layers, as in the Secure Sockets Layer(SSL)/Transport Layer Security(TLS). In this case, all channel data are encrypted regardless of the specific application's requirements, resulting in much waste of network resources. To overcome these problems, ALS is proposed to be implemented on top of HTTP so that it is independent of the various transport layer protocols, and provides a common security interface with security applications so that it greatly improves the portability of security applications. In addition, since ALS takes advantages of well-known TLS mechanism, it eliminates the danger of malicious attack and provides applications with various security services such as authentication, confidentiality integrity and digital signature, and partial encryption. We conclude this paper with an example of applying ALS to the solution of end-to-end security in a present commercial wireless protocol stack, Wireless Application Protocol.

API Server Transport Layer Security Packets Real-Time Decryption and Visualization System in Kubernetes (쿠버네티스 API server의 Transport Layer Security 패킷 실시간 복호화 및 시각화 시스템)

  • Kim, Tae-Hyun;Kim, Tae-Young;Choi, Me-Hee;Jin, Sunggeun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.16 no.3
    • /
    • pp.99-105
    • /
    • 2021
  • The cloud computing evolution has brought us increasing necessity to manage virtual resources. For this reason, Kubernetes has developed to realize autonomous resource management in a large scale. It provides cloud computing infrastructure to handle cluster creations and deletions in a secure virtual computing environment. In the paper, we provide a monitoring scheme in which users can observe securely encrypted protocols while each Kubernetes component exchanges their packets. Eventually, users can utilize the proposed scheme for debugging as well as monitoring.

Physical Layer Wireless Network Security Through Channel Coding (채널 부호화를 통한 물리계층 무선 네트워크 보안 기술)

  • Asaduzzaman, Asaduzzaman;Kong, Hyung-Yun;Kim, Gun-Seok;Kim, Nae-Soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.989-992
    • /
    • 2007
  • In this paper we introduce a new paradigm of physical layer security for wireless network. Existing security protocols like internet's transport layer security protocol has some security flaws that skilled hackers could exploit. Motivated from this point we introduce a new security protocol that works in physical layer which is much less vulnerable to hackers than any other higher layers. In our proposal, we incorporate the proposed security protocol within channel coding as channel coding is an essential part of wireless communication. We utilize the flexibility to choose a generator matrix (or generator polynomial) of a particular code that selects the code words as a core of our protocol. Each pair of wireless node will select a unique generator using their security key before they started to communicate with each other.

  • PDF

Design and Implementation of TCP Supporting Optional Encryption Functionalities (선택적인 암호화 기능을 지원하는 TCP의 설계 및 구현)

  • Seong, Jeong-Gi;Kim, Eun-Gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.190-195
    • /
    • 2018
  • Recently, Due to the ongoing increase in cyber attacks and the improved awareness of privacy protection, most Internet services encrypt the traffic by using security protocols. Existing security protocols usually have additional layer between transport layer and application layer, and they incur additional costs because of encrypting all the traffic transmitted. This results in unnecessary performance degradation because it also encrypts data that does not require confidentiality. In this paper, we propose TCP OENC(Optional Encryption) which enables users of the application layer to optionally encrypt only confidential data. TCP OENC operates by TCP option to allow the application layer to encrypt the TCP stream transmitted only on demand. And it ensures transparency between the TCP layer and the application layer. To verify this, we verified that TCP OENC optionally encrypts the stream of TCP session on the embedded board. And then analyzed the performance of the encrypted stream by measuring the elapsed time.

Protocol Analysis and Evaluation of the Transport Layer to Improve Security in a Public Cloud Environment (공공 클라우드 환경에서 보안성 향상을 위한 전송계층 프로토콜 분석·평가)

  • Bong, Jin Sook;Park, Sang Jin;Shin, Yongtae
    • Journal of KIISE
    • /
    • v.45 no.1
    • /
    • pp.76-85
    • /
    • 2018
  • Governments and public agencies try to use the cloud to carry out their work and provide public services. However, a public cloud is vulnerable to security side because it has a structure to support services using public networks (i.e, the internet). Thus, this paper finds the general security vulnerabilities of a network and compares and analyzes the characteristics of transport protocols (UDP, TCP, SCTP, and MPTCP) on the basis of their security vulnerabilities. This paper uses a reliability and security factor for the comparative analysis, evaluates the security exposure, and chooses a suitable protocol considering the security of the transport protocols in the cloud circumstance.

A Secure Communication Framework for the Detection System of Network Vulnerability Scan Attacks (네트워크 취약점 검색공격 탐지 시스템을 위한 안전한 통신 프레임워크 설계)

  • You, Il-Sun;Kim, Jong-Eun;Cho, Kyung-San
    • The KIPS Transactions:PartC
    • /
    • v.10C no.1
    • /
    • pp.1-10
    • /
    • 2003
  • In this paper, we propose a secure communication framework for interaction and information sharing between a server and agents in DS-NVSA(Detection System of Network Vulnerability Scan Attacks) proposed in〔1〕. For the scalability and interoperability with other detection systems, we design the proposed IDMEF and IAP that have been drafted by IDWG. We adapt IDMEF and IAP to the proposed framework and provide SKTLS(Symmetric Key based Transport Layer Security Protocol) for the network environment that cannot afford to support public-key infrastructure. Our framework provides the reusability of heterogeneous intrusion detection systems and enables the scope of intrusion detection to be extended. Also it can be used as a framework for ESM(Enterprise Security Management) system.

Development of Security Analysis Tool for SSL/TLS Handshake Protocol (SSL/TLS Handshake 프로토콜의 보안성 평가도구 개발)

  • 박지철;양종필;박영호;이경현
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2002.05d
    • /
    • pp.840-843
    • /
    • 2002
  • 본 논문에서는 전송계층에서의 안전한 통신을 위한 사실상의 표준으로서 자리를 잡고 있는 Secure Sockets Layer(SSL)와 Transport Layer Security(TLS)의 Handshake 프로토콜 취약성을 평가하기 위한 평가 도구를 제안한다. SSL/TLS Handshake 프로토콜 고유의 취약성과는 달리 구현 제품들에서의 문제점으로 인하여 보안성이 결여될 수 있다. 현재 SSL/TLS를 구현한 제품들이 다양하게 구현되어 있으나 구현과정에서 벤더나 프로그래머에 따라 SSL/TLS Handshake 프로토콜 고유의 취약성들이 다르게 표출될 수 있으므로 본 논문에서는 이들 구현제품들의 문제점으로 인한 보안성 결여를 평가하기 위한 도구를 개발한다.

  • PDF

A Study on the Security Module for Data Integrity of Mobile Client (모바일 클라이언트의 데이터 무결성 보장을 위한 보안모듈에 관한 연구)

  • Joo, Hae-Jong;Hong, Bong-Hwa
    • The Journal of Information Technology
    • /
    • v.10 no.3
    • /
    • pp.77-92
    • /
    • 2007
  • This study aims to suggest an implementation methodology of security module for data integrity of mobile internet terminal. This is based on the WTLS(Wileless Transport Layer Security) of WAP Protocol. This security module is expected to achieve central role in conversion of wireless internet environment and emphasis of encryption technology and safe and calculable wireless communication environment construction.

  • PDF