• 제목/요약/키워드: eavesdropping

검색결과 177건 처리시간 0.02초

랜덤 부분 ID를 이용한 저비용 RFID 상호인증 프로토콜 (Mutual Authentication Protocol Of The Low-cost RFID Using Random Partial ID)

  • 이영진;문형진;정윤수;이상호
    • 한국통신학회논문지
    • /
    • 제31권7C호
    • /
    • pp.755-761
    • /
    • 2006
  • 기존 RFID 기술은 리더와 태그사이에 물리적인 접촉 없이 인식 가능하고 태그의 정보가 전송과정에 무선특성에 따른 과도한 정보 노출과 사용자의 위치정보 추적과 같은 심각한 프라이버시 침해를 유발시킨다. 특히 읽기전용 태그에서의 보안문제는 단지 물리적 방법으로만 해결하고 있다. 이 논문에서는 간단한 XOR연산과 부분 ID를 이용하여 다양한 공격에 안전하며 읽기전용 태그에 적합한 저비용 인증 프로토콜을 제안한다. 제안 프로토콜은 재전송, 도청, 위장 및 위치 추적 등 공격에 안전하다.

On Sensor Network Routing for Cloaking Source Location Against Packet-Tracing

  • Tscha, Yeong-Hwan
    • 한국통신학회논문지
    • /
    • 제34권3B호
    • /
    • pp.213-224
    • /
    • 2009
  • Most of existing routing methods in wireless sensor networks to counter the local eavesdropping-based packet-tracing deal with a single asset and suffer from the packet-delivery latency as they prefer to take a separate path of many hops for each packet being sent. Recently, the author proposed a routing method, GSLP-w(GPSR-based Source-Location Privacy with crew size w), that enhances location privacy of the packet-originating node(i.e., active source) in the presence of multiple assets, yet taking a path of not too long. In this paper, we present a refined routing(i.e., next-hop selection) procedure of it and empirically study privacy strength and delivery latency with varying the crew size w(i.e., the number of packets being sent per path). It turns out that GSLP-w offers the best privacy strength when the number of packets being sent per path is randomly chosen from the range [$1,h_{s-b}/4$] and that further improvements on the privacy are achieved by increasing the random walk length TTLrw or the probability prw that goes into random walk(where, $h_{s-b}$ is the number of hops of the shortest path between packet-originating node s and sink b).

영상보안시스템에서의 데이터 보호를 위한 ECC(Elliptic Curve Cryptography) 연산알고리즘 비교분석 (A Comparative Analysis on ECC(Elliptic Curve Cryptography) Operation Algorit hm for Data Protection in Video security System)

  • 김종민;추현욱;이동휘
    • 융합보안논문지
    • /
    • 제19권5호
    • /
    • pp.37-45
    • /
    • 2019
  • 기술의 발전을 통해 기존 영상보안시스템들이 아날로드 방식의 CCTV에서 네트워크 기반 CCTV로 교체되어지고 있다. 이러한 기술 변화로 인해 네트워크를 이용한 도청 및 해킹에 대한 공격이 발생하게 되면 영상정보유출로 인해 개인 및 공공기관에 대한 피해는 막대하다 할 수 있다. 따라서 이러한 피해발생을 해결하기 위해 본 논문에서는 데이터 통신 과정에서 영상정보를 보호할 수 있는 ECC(Elliptic Curve Cryptography) scalar multiplication algorithm들을 비교 분석하여 영상시스템에서 최적화된 ECC scalar multiplication algorithm을 제안하고자 한다.

사물인터넷 보안 문제제기와 대안 (Security Vulnerability of Internet of Things and Its Solution)

  • 최희식;조양현
    • 디지털산업정보학회논문지
    • /
    • 제11권1호
    • /
    • pp.69-78
    • /
    • 2015
  • Internet of Things(IoT) is electronic devices and household appliances use wireless sensor network in environment of high speed wireless network and LTE mobile service. The combination of the development of Internet and wireless network led to development of new forms of service such as electronic devices and household appliances can connect to the Internet through various sensors and online servers such as a Home Network. Even though Internet of Things is useful, there are problems in Internet of Things. In environment of Internet of Things, information leakage could happens by illegal eavesdropping and spoofing. Also illegal devices of wireless communication interference can cause interfere in Internet of things service, physical damage and denial of service by modulation of data and sensor. In this thesis, it will analyze security threats and security vulnerability in environment of mobile services and smart household appliances, then it will suggest plan. To solve security issues, it is important that IT and RFID sensor related companies realize importance of security environment rather than focus on making profit. It is important to develop the standardized security model that applies to the Internet of Things by security-related packages, standard certification system and strong encrypted authentication.

A Black Hole Detection Protocol Design based on a Mutual Authentication Scheme on VANET

  • Lee, ByungKwan;Jeong, EunHee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권3호
    • /
    • pp.1467-1480
    • /
    • 2016
  • This paper proposes "A Black Hole Detection Protocol Design based on a Mutual Authentication Scheme on VANET." It consists of the Mutual Authentication Scheme (MAS) that processes a Mutual Authentication by transferring messages among a Gateway Node, a Sensor Node, and a User Node and the Black Hole Detection Protocol (BHDP) which detects a Non-Authentication Node by using the Session Key computed in the MAS and a Black Hole by using the Broadcasting Table. Therefore, the MAS can reduce the operation count of hash functions more than the existing scheme and protect a privacy from an eavesdropping attack and an information exposure by hashing a nonce and user's ID and password. In addition, the MAS prevents a replay attack by using the randomly generated nonce and the time stamp. The BHDP improves Packet Delivery ratio and Throughput more than the AODV with Black hole by 4.79% and 38.28Kbps. Also, it improves Packet Delivery ratio and Throughput more than the IDSAODV by 1.53% and 10.45Kbps. Hence it makes VANET more safe and reliable.

모바일 IPTV의 이동성에 대한 침해 분석 및 대응방안 (Analysis of Mobility and Security Requirements for Mobile IPTV)

  • 이선영
    • 한국콘텐츠학회논문지
    • /
    • 제10권5호
    • /
    • pp.37-44
    • /
    • 2010
  • 이동 중에 모바일 단말기를 통하여 IPTV 서비스를 제공하는 와이브로 모바일 IPTV에서 이동성(mobility)은 매우 중요한 요소이면서 보안에 있어서는 취약한 면을 가지고 있는 요소이다. 본 논문에서는 와이브로 모바일 IPTV의 안전한 서비스를 위하여 핸드오버 이외에 제한수신 시스템도 내부에 이동성을 보장하는 기술을 포함하고 있어야 함을 나타내었다. 모바일 IPTV 서비스 이용 중에 발생할 수 있는 보안 위협을 다운로드형 제한수신 시스템(DCAS)을 중심으로 분석하고, 이에 대한 대응 방법으로서 DCAS 호스트에 사용자 디바이스의 주소를 알리는 방법을 제안하였다. 제안 방법을 적용했을 때 사용자 인증 횟수가 감소하여 효율성이 향상됨을 보였다. 또, 한국정보통신기술협회에서 요구하고 있는 보안 요구 사항과의 비교를 통하여 제안 방법을 적용할 때 모바일 IPTV의 이동성이 보장될 수 있음을 보였다.

안전성과 성능을 개선한 RFID 상호인증 프로토콜 (RFID Mutual Authentication Protocol with Security and Performance Improvements)

  • 홍성혁;박종혁;여상수;하경재
    • 한국항행학회논문지
    • /
    • 제13권6호
    • /
    • pp.876-883
    • /
    • 2009
  • 2008년에 Kim-Jun은 도청, 스푸핑, 재전송 공격 등에 강한 일회성 난수를 이용한 RFID 상호인증 프로토콜을 제안하였지만 2009년 Yoon-Yoo는 재전송 공격에 취약한 것을 증명하고 재전송 공격을 막을 수 있는 프로토콜을 제안하였다. 그러나 Yoon-Yoo의 프로토콜은 통신상의 효율성과 전사적 공격(brute-force attack)에 취약한 문제가 있다. 본 논문에서는 Yoon-Yoo의 프로토콜의 취약점을 보이고, 안정성과 성능을 개선한 RFID 상호인증 프로토콜을 제안한다.

  • PDF

VoIP 시스템에서 SIP를 이용한 보안 인증기법에 관한 연구 (A Study on the Secure Authentication Method using SIP in the VoIP System)

  • 이영구;김정재;박찬길
    • 디지털산업정보학회논문지
    • /
    • 제7권1호
    • /
    • pp.31-39
    • /
    • 2011
  • VoIP service uses packet network of ip-based because that has eavesdropping, interception, illegal user as vulnerable elements. In addition, PSTN of existing telephone network is subordinate line but VoIP service using the ip packet provide mobility. so The user authentication and VoIP user's account service using VoIP has emerged as a problem. To solve the vulnerability of SIP, when you use VoIP services with SIP, this paper has made it possible to authenticate user's terminal by using proxy server and proxy server by using authentication server. In conclusion, sender and receiver are mutually authenticated. In the mutual authentication process, the new session key is distributed after exchanging for the key between sender and receiver. It is proposed to minimize of service delay while the additional authentication. The new session key is able to authenticate about abnormal messages on the phone. This paper has made it possible to solve the vulnerability of existing SIP authentication by using mutual authentication between user and proxy server and suggest efficient VoIP service which simplify authentication procedures through key distribution after authentication.

A New Fuzzy Key Generation Method Based on PHY-Layer Fingerprints in Mobile Cognitive Radio Networks

  • Gao, Ning;Jing, Xiaojun;Sun, Songlin;Mu, Junsheng;Lu, Xiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권7호
    • /
    • pp.3414-3434
    • /
    • 2016
  • Classical key generation is complicated to update and key distribution generally requires fixed infrastructures. In order to eliminate these restrictions researchers have focused much attention on physical-layer (PHY-layer) based key generation methods. In this paper, we present a PHY-layer fingerprints based fuzzy key generation scheme, which works to prevent primary user emulation (PUE) attacks and spectrum sensing data falsification (SSDF) attacks, with multi-node collaborative defense strategies. We also propose two algorithms, the EA algorithm and the TA algorithm, to defend against eavesdropping attacks and tampering attacks in mobile cognitive radio networks (CRNs). We give security analyses of these algorithms in both the spatial and temporal domains, and prove the upper bound of the entropy loss in theory. We present a simulation result based on a MIMO-OFDM communication system which shows that the channel response characteristics received by legitimates tend to be consistent and phase characteristics are much more robust for key generation in mobile CRNs. In addition, NIST statistical tests show that the generated key in our proposed approach is secure and reliable.

열차제어시스템 통신 안정성 및 평가 도구 연구 (A Study on Communication Safety and Evaluation Tool in Railway Communication System)

  • 김성운;서상보;송승미;조찬효;황종규;조현정
    • 한국철도학회:학술대회논문집
    • /
    • 한국철도학회 2008년도 춘계학술대회 논문집
    • /
    • pp.343-352
    • /
    • 2008
  • Safety-critical systems related to the railway communications are currently undergoing changes. Mechanical and electro-mechanical devices are being replaced by programmable electronics that are often controlled remotely via communication networks. Therefore designers and operators now not only have to contend with component failures and user errors, but also with the possibility that malicious entities are seeking to disrupt the services provided by theirs systems. Recognizing the safety-critical nature of the types of communications required in rail control operations, the communications infrastructure will be required to meet a number of safety requirements such as system faults, user errors and the robustness in the presence of malicious attackers who are willing to take determined action to interfere in the correct operation of a system. This paper discusses the safety strategies employed in the railway communications and proposes a security mechanism for Korean railway communication system. We present the developed communication safety evaluation tool based on the proposed security mechanism and also evaluate its protecting capability against the threats of masquerading, eavesdropping, and unauthorized message manipulation.

  • PDF