• Title/Summary/Keyword: Ubiquitous Computing Security

Search Result 174, Processing Time 0.036 seconds

Policy-based Authentication Framework in Ubiquitous Computing Environment

  • Lee Ji-In;cho young bok;lee Sang Ho
    • Proceedings of the KSRS Conference
    • /
    • 2004.10a
    • /
    • pp.95-98
    • /
    • 2004
  • In this paper, we propose policy-based authentication framework which consists of policy server, CA and a policy language designed for ubiquitous environments. Using policies allows the security functionality to be modified without changing the implementation of the entities involved. Policy-based authentication framework needs to be very expressive but lightweight and easily extensible. We propose the feasibility of our policy language and policy-based authentication framework in ubiquitous-environment through a prototype and solve the problem that traditional framework have a simple registration and authentication to provide dynamic service.

  • PDF

Analyses of Embedded Network Gateway under Ubiquitous Surroundings (유비쿼터스 환경하에서의 암호화 모듈이 내장된 네트워크 게이트웨이의 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.755-758
    • /
    • 2008
  • As the commercial use of the Internet becomes com- mon and the demand for mobile computing through the Internet is emerging, it is necessary to construct a secure mobile environment. This paper proposes an approach with IP layer security and mobility support to meet this challenge. To evaluate our approach, we are developing a security and motility supported system.

  • PDF

Data management Scheme modeling for Heterogeneous system integration (이종 시스템 통합을 위한 데이터 관리 기법 모델링)

  • Kang, In-Seong;Lee, Hong-Chul
    • Proceedings of the KAIS Fall Conference
    • /
    • 2010.05a
    • /
    • pp.436-439
    • /
    • 2010
  • 본 논문에서는 Ubiquitous Computing 환경 하에서 이종 시스템 간의 통합을 위한 데이터 관리 기법 모델을 제안하였다. 이종 시스템 간의 통합이 이루어지면 방대한 양의 데이터를 모든 시스템이 공유해야 하기 때문에 무분별한 데이터의 중복과 저장으로 인해 프로세스의 데이터 처리 성능 및 데이터 무결성을 보장받지 못 하는 등의 문제점이 발생한다. 이를 보완하기 위해 Minimal cost Spanning tree의 원리를 적용하여 시스템 통합에 따른 데이터 처리 및 무결성 문제 해결을 위한 메커니즘을 제시하고자 한다.

  • PDF

Security APIs for Security Services in Ultra Light-weight Environment (초경량 환경의 보안 서비스 지원을 위한 보안 API)

  • Kim, Won-Young;Lee, Young-Seok;Lee, Jae-Wan;Seo, Chang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.3
    • /
    • pp.485-492
    • /
    • 2008
  • Computers used fer light-weight computing environments are considerably limited in resources and performance running in ubiquitous environment. Because of the limited resources, it is difficult to apply existing security technologies to the light-weight computers. In this paper, light-weight security software is implemented using RC-5 encryption and SHA-1 authentication algorithm which is appropriate for light-weight computing environments. The design of components based on security software of a light-weight computer application and the test-bed for security software are presented. The simulation verifies the correctness of the security software. The architecture of the light-weight and reconfigurable security software for light-weight computer applications is proposed. The proposed security software is small size and provides reconfigurable security library based on the light-weight component and the software manager that configures software platform is loaded with the library at the time it is needed.

Ontology Knowledge-Driven Context-awere U-Healthcare Service Application Service Framework using Secure Health Information Exchange (보안 헬스 정보 교환을 이용한 온톨로지 지식기반 상황인식 U-헬스케어 어플리케이션 서비스 프레임워크 설계)

  • Kim, Donghyun;Kim, Seoksoo;Choi, E-Jung
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.75-84
    • /
    • 2014
  • The advancement in ubiquitous healthcare specifically in preventive healthcare can lead to longer life expectancy especially for the elderly patients. To aid in preventing premature loss of lives as well as lengthening life span, this research aims to implement the use of mobile and wireless sensor technology to improve the quality of life and lengthen life expectancy. The threats to privacy and security have received increasing attention as ubiquitous healthcare applications over the Internet become more prevalent, mobile and universal. Therefore, we propose Context-aware Service of U-Healthcare Application based Knowledge using Ontology in secure health information exchange. This research also applies ontology in secure information exchange to support knowledge base, context modeling, and context reasoning by applying the general application areas for ontologies to the domain of context in ubiquitous computing environments. This paper also demonstrates how knowledge base, context technologies, and mobile web services can help enhance the quality of services in preventive ubiquitous healthcare to elderly patients.

Approach of safe RFID system based on Pre-Distribution on Ubiquitous computing environment (유비쿼터스 환경에서 Pre-Distribution을 기반으로 한 안전한 RFID 시스템)

  • Kim, Jin-Mook;Ryou, Hwang-Bin
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.6
    • /
    • pp.29-36
    • /
    • 2005
  • RFID(Radio Frequency Identification) will be used for recognizing things and offering distinctive information in Ubiquitous environment. But we are not ready to provide security service to RFID. Therefore we propose the approach of safe RFID system which provides the solution for eavesdrop, forgery, and modification based on Pre-Distribution protocol and RC5 security algorithm. First We distributes the secret key to the Tag with the Reader that is major subject on RFID system using Pre-Distribution protocol. Then we will provide to various security services and privacy protection using RC5 security algorithm. The proposed safe RFID system simulated on ATmega128 evaluate environment.

Authentication for Single/Multiple Domain using Attribute Certificates (유비쿼터스 컴퓨팅 환경에서 속성 인증서를 이용한 단일/멀티 도메인 인증)

  • Lee Deok-Gyu;Park Hee-Un;Lee In-Yeong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.291-300
    • /
    • 2005
  • The Ubiquitous computer environment is thing which invisible computer that is not shown linked mutually through network so that user may use computer always is been pervasive. Intend computing environment that can use easily as user wants and it is the smart environment that user provides context awareness that is wanting computing environment. This Ubiquitous computing contains much specially weak side in security. Masquerade attack of that crawl that is quoted to user or server among device that is around user by that discrete various computing devices exist everywhere among them become possible. Hereupon, in this paper, proposed method that have following characteristic. Present authentication model through transfer or device. Suggest two method that realize authentication through device in case of moved to method(MD: Multi Domain) and user ownself space(SD: Single Domain) that realize authentication through device in case of moved user's direct path who device differs.

Security Improvement of Authentication Method Using Transfer Agent in USN

  • Cho, Do-Eun
    • International Journal of Contents
    • /
    • v.7 no.4
    • /
    • pp.35-43
    • /
    • 2011
  • USN is a technology to detect human external environment. It is an important factor in buildinga ubiquitous computing environment. In this thesis, an authentication method was proposed to allow the sensor nodes, which have weak computing operation capability, to safely communicate with each other in USN and guarantee the anonymity of users for their privacy. In the proposed authentication method that takes into account the characteristics of sensor network, sensor nodes based on a symmetric key algorithm do not transfer keys directly, instead, they mix the random numbers received from AS to generate keys necessary for communications, having a master key and a pseudo-random number generator.In addition, in this thesis, TA was adopted to minimize the leakage of users' information, and a scheme through which virtual IDs received from AS are delivered to sensor nodes was applied to improve anonymity.

Home Network Security Requirements and Response for Ubiquitous Environment (유비쿼터스 환경에 적합한 홈네트워크 보안요구사항 및 대응 방안)

  • Ryu Woo-Kwon;Lee Hee-Jo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.947-950
    • /
    • 2006
  • 최근 들어 언제 어디서나 컴퓨팅이 가능한 유비쿼터스 컴퓨팅(Ubiquitous Computing) 사회가 되면서 개인의 컴퓨팅 환경 의존도가 증가되었고, 따라서 사이버공격으로 인한 개인생활의 위협도 증가할 수밖에 없게 되었다. 더욱이 향후에는 원격진료와 같이 개인의 생명과 직결된 유비쿼터스 서비스가 활성화될 것이므로 사이버공격으로 인해 재산뿐 아니라 생명까지 위험에 처하는 경우가 늘어나게 될 것이다. 이로 인해 유비쿼터스 환경에 적합한 홈네트워크 보안(Home Network Secutity)의 중요성이 부각되게 되었다. 본 논문에서는 안전한 U-홈네트워크(Ubiquitous-Home Network) 구축에 필요한 기술들을 유 무선 기준으로 구분하고, U-홈네트워크 환경에서 발생할 수 있는 다양한 침해유형을 분석하여, 이를 막아낼 수 있는 대응방안을 수립하고, 안전한 U-홈네트워크 구축을 위해 필요한 기존의 보안요구사항들을 살펴본 후에 U-홈네트워크에 적합한 추가적 보안사항을 제안하고자 한다.

  • PDF

Prevent Illegal Access Control for Secure Healthcare System (불법적인 접근 제어 방지를 위한 안전한 헬스케어 시스템)

  • Seo, Dae-Hee;Baek, Jang-Mi;Moon, Yong-Hyuk;Cho, Dong-Sub
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.59 no.3
    • /
    • pp.657-663
    • /
    • 2010
  • Today, rapid evolution of Internet makes various types of services in ubiquitous environment are intelligent and active. As a result, user's demand on high quality of life increases and health care service based on ubiquitous environment draws a lot of attention. However, user's private information used for health care service is illegally distributed and exposed, causing serious individual and social problems. Therefore, this thesis is intended to suggest a secure health care service to prevent unauthorized third party's access and to protect user's privacy in health care systems. The proposed scheme establishes a session key through communication channel between health care system and user based on explicit mutual authentication and provides secure communication and access control, improving security as one of the leading health care systems.