• Title/Summary/Keyword: VPN security

Search Result 179, Processing Time 0.031 seconds

LTE 통신망을 이용한 교통신호제어시스템용 HW 기반 SSL VPN 성능 분석 연구

  • Lee, Jaehoon;Jang, Chankuk;Wi, Hansaem;Yi, Okyeon
    • Review of KIISC
    • /
    • v.27 no.2
    • /
    • pp.22-28
    • /
    • 2017
  • 본 논문에서는 교통신호제어기 표준규격(NPA-TSC-2010 R14)과 호환성을 유지하면서, 교통신호제어시스템과 상용 LTE 이동통신망을 적용 가능한 검증필암호모듈 기반의 SSL VPN을 개발하여, 정보보안의 성능과 교통신호제어기의 통신성능을 만족할 수 있다는 결과를 제시한다. 또한 '교통신호제어기 표준규격'의 기기 변경이 최소화될 수 있도록 SSL VPN 개발에 필요한 기술을 구현하여 실증결과를 제시함으로써, 이를 바탕으로 교통신호제어 시스템의 보안 표준규격으로 제정될 수 있도록 기술 및 절차적 결과를 제시하였다.

Performance Analysis of a Satellite Communication System based on IPsec VPN (IPsec VPN 기반 위성 통신 시스템 성능 분석)

  • Jeong, Won-Ho;Hwang, Lan-Mi;Kim, Ki-Hong;Park, Sang-Hyun;Yang, Sang-Woon;Lim, Jeong-Seok;Kim, Kyung-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.53-60
    • /
    • 2015
  • Satellite signal is excellent broadband, can provide the same information in a wide range, but there is a disadvantage that much less of the security level of the data. Therefore, supplementation of safety is a serious problem than anything in the satellite communication. In this paper, it was simulated by applying ARIA in encryption technique and by applying transport mode, tunnel mode in security header AH and ESP in order to examine the effect of IPsec VPN. In addition, we had compare with general services that do not apply encryption in order to analyze the impact of the encryption algorithm. Channel, by applying the Markov channel and adding AWGN, is constituted a satellite communication environment. In case of retransmission based error control scheme, we applied Type-II HARQ scheme and Type-III HARQ scheme which are performance is a good way in recently, and it is constituted by a turbo code and BPSK modulation scheme. we were analyzed performance in BER and Throughput in order to compare the simulation more effectively.

Efficient Session Management mechanism applied Key Recovery technique in IPSec (IPSec에서 키 복구 기술을 적용한 효율적인 연결 관리 메커니즘)

  • Kim, Jeong-Beom;Lee, Yun-Jeong;Park, Nam-Seop;Kim, Tae-Yun
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.775-782
    • /
    • 2001
  • Recently the use of Linux OS is increasing to tremendous figures. But due to the fact that Linux is distributed on an open-source policy, the need of security is an upcoming question which leads to widespread development of security on a Linux based environment. Cryptography, however, can cause various problems because of difficulty of key management. A lot of researchers have been concentrating on the key recovery technique to eliminate the reverse effect of using these kinds of security and to promote positive aspects of using it. In this thesis I am suggesting an mechanism based on the key recovery technique, as a method to save time in recovery and resetting a disconnection between two end-users through IPSec (IP Security) protocols in a VPN (Virtual Private Network) environment. The main idea of the newly suggested mechanism, KRFSH (Key Recovery Field Storage Header), is to store the information of the session in advance for the case of losing the session information essential to establish a tunnel connection between a SG and a host in the VPN environment, and so if necessary to use the pre-stored information for recovery. This mechanism is loaded on the IPSec based FreeS/WAN program (Linux environment), and so the VPN problem mentioned above is resolved.

  • PDF

Hardware Architecture Analyses of Performance of Crypto-processor for High-speed Network Security System (고속 네트워크보안 시스템설계를 위한 암호프로세서의 성능 분석)

  • 김정태;류대현;허창우
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.207-210
    • /
    • 2003
  • 고속의 수십기가급의 VPN을 구현할 수 있는 제품은 방화벽시스템(Firewall), 라우터, 인터넷 게이트웨이, 원격 접속 서버(Remote Access Server), Windows NT Server, VPN 전용 장치 그리고 VPN 소프트웨어 등을 들 수 있지만, 현재까지 어떤 제품 그리고 기술도 지배적인 방법으로 대두되지는 않고 있다. 국내외적으로 수십Giga급 이상의 VPN 보안장비와 관련된 체계화된 이론의 부족으로 인하여 관련된 연구는 많이 부족한 현실이며, 체계적이고 전문적인 연구를 수행하기 위해서는 많은 연구 활동이 필요하다. 결과적으로 향후 차세대 초고속 네트워크에서의 정보보호와 효과적인 네트워크 자원을 활용하기 위해서는 반드시 수십Giga급 이상의 VPN 보안장비에 패한 연구가 활발히 진행되리라 예상된다. 따라서 본 논문에서는 수십Giga급의 고속 정보보호시스템 구현 시 반드시 필요로 되는 암호화 칩의 성능을 비교 분석하고, 가능성을 제시한다.

  • PDF

Design of a Cryptographic Processor Dedicated to VPN (VPN에 특화된 암호가속 칩의 설계 및 제작)

  • Lee, Wan-Bok;Roh, Chang-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.852-855
    • /
    • 2005
  • This paper introduces a case study of designing a cryptographic processor dedicated to VPN/SSL system. The designed processor supports not only block cipher algorithm, including 3DES, AES, and SEED, but also 163 bit ECC public key crypto algorithm. Moreover, we adopted PCI Master interface in the design, which guarantees fast computation of cryptographic algorithm prevalent in general information security systems.

  • PDF

A study on a security model for the establishment of a non-face-to-face smart work working environment in a physical network separation environment of public institutions (공공기관 물리적 망분리 환경에서의 비대면 스마트워크 근무 환경구축을 위한 보안 모델 연구)

  • Park, Sang-Kil;Kim, Gi-Bong;Son, Gyeong-Ja;Lee, Won-Suk;Park, Jae-Pyo
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.10
    • /
    • pp.37-44
    • /
    • 2020
  • Due to the recent COVID 19 pandemic, public institutions are increasingly working from home. Working in public institutions is rapidly changing into a smart work environment where time and space constraints disappear. However, many public institutions currently lack a security model for an efficient smart work environment due to the physical network separation system that separates the Internet network and the business network. Therefore, in this paper, we describe the current limitations for implementing smart work in a physical network separation environment of public institutions, and propose a security model necessary for a work environment to supplement them. As a related study, explain SSL VPN and explain smart work business model through security model research of SDP (Software Defined Perimeter), RDP (Remote Desktop Protocol), and VDI (Virtual Desktop Infrastructure) to overcome the security limitations of SSL VPN. As a result, we intend to propose a security model for a smart work environment suitable for public institutions while complying with the physical network separation security guide.

A Study on utilizing Virtual Private Network in National Defense Information Communication Networks (국방정보통신망 VPN 활용에 관한 연구)

  • 전영남;남길현
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.468-472
    • /
    • 2002
  • 미래전에 능동적으로 대비하기 위해서는 제 전장 요소를 연결하여 지휘결심관련 정보를 신속하고 신뢰성 있게 유동시킬 수 있는 기반체계 구축과 구축된 체계를 안전하게 보호할 수 있는 네트워크 보안기술이 필수적으로 요구된다. 이에 본 논문에서는 미국의 국방정보통신망 기반체계인 DISN(Defense Information Systems Network) 구조와 보안체계를 살펴본 후, 확장성, 보안성, 생존성이 향상된 경제적인 국방정보통신망 구축을 위해 전용망 내부의 보안강화와 전용망 기반의 국방정보통신망과 연결하기 위한 인터넷기반 VPN의 안전성 보장을 위해 다양한 보안 메커니즘을 제공하는 IPSEC VPN의 국방정보통신망 활용 모델을 제안한다.

  • PDF

A Newly Telesecurity of VoIP using SIP protocol in VPN

  • Lee, Sung-Ki;Hwang, Doh-Yeun;Yi, Seung-Ryong;Yu, Seung-Sun;Kwak, Hoon-Sung
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1391-1394
    • /
    • 2005
  • The VoIP (Voice over IP) is being used world-widely and already put to practical use in many fields. However, it is needed to ensure the security of VoIP call in special situations. It is relatively difficult to eavesdrop commonly used PSTN network in that a 1:1 circuit connects it. However, it is difficult to ensure the security of a call on Internet because many users are connected to the Internet concurrently. This paper suggests a new model for Internet telephony to prevent eavesdrops, using VoIP (using SIP protocol) with the use the VPN protocol and establish the feasibility of its practical use comparing it with the conventional Internet telephony.

  • PDF

A Simulation Study for Resolving Communication Failure in IPSec Tunnel Mode with Adaptive PMTU Discovery Mechanism (적응적 PMTU 발견 메커니즘을 통한 IPSec 터널 모드에서의 통신 불능 현상 해소에 관한 시뮬레이션 연구)

  • 김은성;안성진;정진욱;이도훈;윤재우
    • Journal of the Korea Society for Simulation
    • /
    • v.11 no.1
    • /
    • pp.31-44
    • /
    • 2002
  • VPN which cuts down on expense and assures security and reliance, has increased its market shares quickly because the requirement of enterprise on security has increased. But Fragmentation may raise communication failure when VPN has been implemented using IPSec. In our paper, we have given careful consideration to various reasons Preventing us from communicating stable and have presented the existing solutions about them. Also we hate provided adaptive PMTU discovery mechanism to improve: the solutions. We have proven a prowess of this mechanism through simulation

  • PDF