• Title/Summary/Keyword: information security system

Search Result 6,598, Processing Time 0.039 seconds

The design of AAA server for Wireless LAN with 802.1x

  • Ham, Young-Hwan;Chung, Byung-Ho
    • Proceedings of the IEEK Conference
    • /
    • 2002.07c
    • /
    • pp.1944-1947
    • /
    • 2002
  • The importance of security in WLAN(Wireless LAN) service is very critical, so IEEE organization has made the IEEE 802.1x standard. The IEEE 802.1x standard uses the EAP as authentication protocol which requires AAA(Authentication, authorization, and Accounting) server for authentication & accounting. for the reliable and scalable AAA service, the Diameter protocol has more advanced characteristics than existing radius protocol. So the Diameter protocol can be used for WLAN service provider who has large scale WLAN system and a large number of subscriber. This paper proposes the design of Diameter AAA server for the authentication and accounting of WLAN system which is adopting IEEE 802.1x standard.

  • PDF

A Design of MHS Access Control Policy for Preventing Cascade Vulnerability (캐스케이드 취약성 방지를 위한 MHS 접근통제 정책 설계)

  • 조인준;김학범;홍기융;김동규
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.7 no.3
    • /
    • pp.117-128
    • /
    • 1997
  • When computer systems with mandatory access control mechanism are interconnected each other for enforcing the MHS(Message Handling System) security on the multilevel secure distributed network environment, illegal information flow may occurs due to the unexpected cascade vulnerability problem. In this paper, new MHS security policy and security property functions are proposed for preventing the cascade vulnerability.

Reliable Group Handover Scheme based on IEEE802.11 (신뢰성을 보장하는 IEEE802.11 기반의 그룹핸드오버 기법)

  • Kim, Ki Young;Ko, Hoon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.1
    • /
    • pp.33-41
    • /
    • 2009
  • Network industry is complex combined with various fields of industry, such as communication, broadcast, construction, and home appliances. Moreover, it's fairly lucrative since the growth industry makes lots of added values, interacting with the others.The network industry, usually called 'Ubiquitous', connects some home appliances and makes an integrated system that you can use them with whenever and wherever. A demand for network security, however, has skyrocketed due to the relatively low safety. It's been expected that the market of home security is going to be grown up nearly 30 percent every year. Recently, analog surveilance cameras have been replaced with digital ones, and they will be providing stronger security services taking advantage of mutual interaction with related industies. In this paper, a mobile monitoring system for home security is proposed, which makes it possible to supervise all home appliances wherever you're, using the conventional wired/wireless network infra.

A Study on the Security Improvement for Mobile Payment Systems by the Fault Fishbone Analysis (결함 어골도 분석에 의한 모바일 결제 시스템의 보안성 개선에 관한 연구)

  • Seo, Jin-Ho;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.1
    • /
    • pp.26-33
    • /
    • 2018
  • As financial transactions using mobile devices have been activated, mobile payment services have appeared and many changes have been made to the existing financial service methods. Due to the simplified payment method of mobile payment service, security threats such as personal information leakage, phishing damage, and malicious code are increasing. Research that can solve this is needed. In this paper, we discuss the features and security factors of mobile payment system. In order to improve the security of mobile payment system, we propose a fault analysis method based on frequency of occurrence using Fault Fishbone Analysis(FFA) technique.

A Study on the Security Improvement of Enterprise Internal System Using Information Security Management System (정보보호관리체계를 활용한 기업 내부 시스템 보안성 향상방안에 관한 연구)

  • Shin, Yena;Choi, Jinyoung
    • Annual Conference of KIPS
    • /
    • 2009.11a
    • /
    • pp.627-628
    • /
    • 2009
  • 기업의 정보자산에 대한 위협이 날로 증대하고 있다. 따라서 기업의 중요한 정보를 보호 및 관리하는 정보보호관리체계 (Information Security Management System; ISMS)에 대한 필요성과 중요성이 더욱 증가하고 있다. 정보보호관리체계란 조직의 주요 정보자산을 보호하기 위해 정보보호관리 절차와 과정을 체계적으로 수립하여 지속적으로 관리 운영하기 위한 종합적인 체계를 의미한다. 본 논문에서는 국내 기업의 정보보호관리체계에 대한 문제점 및 필요성 등을 분석하여 기업 내부 시스템의 보안성 향상을 위한 효율적인 정보보호관리체계 수립방안을 제안한다.

Design and implementation of security and control system for home electronic appliances

  • Kim, Eung-Soo;Kim, Won-Jae;Jo, Jun-Mo
    • Journal of Sensor Science and Technology
    • /
    • v.15 no.2
    • /
    • pp.134-138
    • /
    • 2006
  • We have been designed and developed a security system including home automation with control of electronic appliances. The system can detect intruders using infrared sensors and monitor rooms or offices in real time by web camera. The password was needed to enter a house or office. The operation of home electronic appliances also can be easy and remotely controlled by Internet. The system was designed by VHDL. The size of the fabricated system is small and it showed good performance.

An Application of Blackboard Architecture for the Coordination among the Security Systems (보안 모델의 연동을 위한 블랙보드구조의 적용)

  • 서희석;조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.11 no.4
    • /
    • pp.91-105
    • /
    • 2002
  • The attackers on Internet-connected systems we are seeing today are more serious and technically complex than those in the past. So it is beyond the scope of amy one system to deal with the intrusions. That the multiple IDSes (Intrusion Detection System) coordinate by sharing attacker's information for the effective detection of the intrusion is the effective method for improving the intrusion detection performance. The system which uses BBA (BlackBoard Architecture) for the information sharing can be easily expanded by adding new agents and increasing the number of BB (BlackBoard) levels. Moreover the subdivided levels of blackboard enhance the sensitivity of the intrusion detection. For the simulation, security models are constructed based on the DEVS (Discrete EVent system Specification) formalism. The intrusion detection agent uses the ES (Expert System). The intrusion detection system detects the intrusions using the blackboard and the firewall responses these detection information.

  • PDF

A Study on a Plan for Improving a Smart Time and Attendance Management System by Applying NFC (근거리 통신 기법을 이용한 근태관리 시스템에 관한 연구)

  • Lee, Young Ho;Hwang, Hyun Seok;Kang, Min Gyu
    • Convergence Security Journal
    • /
    • v.14 no.1
    • /
    • pp.77-83
    • /
    • 2014
  • In times past, the awareness of security held good on the physical aspect, but it has been expanded to the aspect of information security and management security owing to the development of information and communication technology, therefore an effort is being made to meet multidimensional security needs. These realities are currently changing the viewpoint of consumers from manned guarding to machine-aided guarding. The change to the machine-aided guarding caused the profitability problem of manned guarding companies, and brought about a reverse side effect that prompt and correct countermeasure was inferior to that of manned-guarding. Therefore, this study proposes a 'smart time & attendance management system' that can be applied to various types of work and can minimize position information.

The Full-Duplex Device-to-Device Security Communication Under the Coverage of Unmanned Aerial Vehicle

  • Zeng, Qian;Zhang, Zhongshan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.4
    • /
    • pp.1941-1960
    • /
    • 2019
  • Unmanned aerial vehicles (UAVs), acting as mobile base stations (BSs), can be deployed in the typical fifth-generation mobile communications (5G) scenarios for the purpose of substantially enhancing the radio coverage. Meanwhile, UAV aided underlay device-to-device (D2D) communication mode can be activated for further improving the capacity of the 5G networks. However, this UAV aided D2D communication system is more vulnerable to eavesdropping attacks, resulting in security risks. In this paper, the D2D receivers work in full-duplex (FD) mode, which improves the security of the network by enabling these legitimate users to receive their useful information and transmit jamming signal to the eavesdropper simultaneously (with the same frequency band). The security communication under the UAV coverage is evaluated, showing that the system's (security) capacity can be substantially improved by taking advantage of the flexible radio coverage of UAVs. Furthermore, the closed-form expressions for the coverage probabilities are derived, showing that the cellular users (CUs)' secure coverage probability in downlink transmission is mainly impacted by the following three factors: its communication area, the relative position with UAV, and its eavesdroppers. In addition, it is observed that the D2D users or DUs' secure coverage probability is relevant to state of the UAV. The system's secure capacity can be substantially improved by adaptively changing the UAV's position as well as coverage.

A Hierarchical Bilateral-Diffusion Architecture for Color Image Encryption

  • Wu, Menglong;Li, Yan;Liu, Wenkai
    • Journal of Information Processing Systems
    • /
    • v.18 no.1
    • /
    • pp.59-74
    • /
    • 2022
  • During the last decade, the security of digital images has received considerable attention in various multimedia transmission schemes. However, many current cryptosystems tend to adopt a single-layer permutation or diffusion algorithm, resulting in inadequate security. A hierarchical bilateral diffusion architecture for color image encryption is proposed in response to this issue, based on a hyperchaotic system and DNA sequence operation. Primarily, two hyperchaotic systems are adopted and combined with cipher matrixes generation algorithm to overcome exhaustive attacks. Further, the proposed architecture involves designing pixelpermutation, pixel-diffusion, and DNA (deoxyribonucleic acid) based block-diffusion algorithm, considering system security and transmission efficiency. The pixel-permutation aims to reduce the correlation of adjacent pixels and provide excellent initial conditions for subsequent diffusion procedures, while the diffusion architecture confuses the image matrix in a bilateral direction with ultra-low power consumption. The proposed system achieves preferable number of pixel change rate (NPCR) and unified average changing intensity (UACI) of 99.61% and 33.46%, and a lower encryption time of 3.30 seconds, which performs better than some current image encryption algorithms. The simulated results and security analysis demonstrate that the proposed mechanism can resist various potential attacks with comparatively low computational time consumption.