• Title/Summary/Keyword: key establishment protocol

Search Result 60, Processing Time 0.024 seconds

Secure and Efficient Access Control Protocol in Digital Broadcasting System (디지털 방송에서 안전하고 효율적인 접근 제어 프로토콜)

  • Lee, Ji-Seon;Kim, Hyo
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.3
    • /
    • pp.32-43
    • /
    • 2010
  • IPTV is an emerging technology that combines both broadcasting and tele-communication technologies, and provides various multi-media contents to the service subscribers. In general, IPTV broadcasters transmit scrambled signals (multi-media contents) to the paying subscribers, and the users within the acknowledged network descramble the signals using the smart-card. That is, users are verified through communication between STB (Set-Top Box) and smart-card. In 2004, Jiang et al. proposed a secure protocol regarding the verification process. The method has been modified and enhanced by several following research works. However, all the methods that have been proposed so far required modular exponentiation operations which may raise the smart-card costs. In this paper, we propose a new efficient mutual authentication and session-key establishment protocol using only hash functions and exclusive-or operations, and show that the proposed protocol is still secure under various security attacks.

A Study on the Security Structure and Authenitication Procedure in ATM (ATM 망에서의 정보보호 구조 및 인증절차에 관한 연구)

  • Sin, Hyo-Yeong;Yu, Hwang-Bin
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.1
    • /
    • pp.107-114
    • /
    • 1999
  • Recently as services in ATM are diversified, the need for security has been increased, But when we added the security features in ATM, the Compatibility and transparency with existing systems must be considered after analyzing threats of security. This paper designs the security protocol in ATM protocol stack and defines the primitivies and processing procedure of messages which are need in the security layer. Also, this paper presents the authentication and key distribution procedure which can be adopted at call establishment. The presented authentication protocol can be used for point-to-point method as well as point-to-multipoint method. and the correctness of this protocol is verified using GNY logic.

  • PDF

Secure Key Predistribution Scheme using Authentication in Cluster-based Routing Method (클러스터 기반에서의 인증을 통한 안전한 키 관리 기법)

  • Kim, Jin-Su;Choi, Seong-Yong;Jung, Kyung-Yong;Ryu, Joong-Kyung;Rim, Kee-Wook;Lee, Jung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.9
    • /
    • pp.105-113
    • /
    • 2009
  • The previous key management methods are not appropriate for secure data communication in cluster-based routing scheme. Because cluster heads are elected in every round and communicate with the member nodes for authentication and share-key establishment phase in the cluster. In addition, there are not considered to mobility of nodes in previous key management mechanisms. In this paper, we propose the secure and effective key management mechanisim in the cluster-based routing scheme that if there are no share keys between cluster head and its nodes, we create the cluster key using authentication with base station or trust autentication and exchange the their information for a round.

Establishment of RTSP-based construction site remote management system (RTSP기반 건설현장 원격관리 시스템 구축)

  • Woo Yun-Hee;Yun, Hyo-Woon;Yoo, Moo-Young
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2023.11a
    • /
    • pp.165-166
    • /
    • 2023
  • Construction inspection and monitoring are key activities in construction projects. Automation of inspection tasks improves the limitations and inefficiencies of manual construction inspections, enabling systematic and consistent construction inspections. In this paper, an RTSP (Real-Time Streaming Protocol) system is used to remotely manage and supervise the construction site without having to visit the construction site by deploying a robot on site on behalf of four construction stakeholders (owner, supervisor, constructor, and designer). I would like to propose. The proposed system can contribute to identifying and monitoring the process process and work results at the construction site in real time.

  • PDF

Key Establishment Protocol in a Sensor Network Using PIKE (PIKE를 이용한 센서네트워크에서의 키 합의 프로토콜)

  • Yang Yeon-Hyeong;Lee Pil-Joong
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.71-74
    • /
    • 2006
  • 무선 센서 네트워크는 미래의 유비쿼터스 컴퓨팅에서 핵심적인 역할을 할 것으로 알려져 있으며, 그에 따라 센서 네트워크에서의 안전한 통신도 중요한 문제로 떠오르고 있다. 이러한 센서 네트워크에서의 안전한 통신을 위해서는 각 센서 노드 사이에서의 안전한 키 관리 프로토콜이 필수적이다. [1]에서는 기존에 제안된 key-predistribution 방식보다 효율적인 키 합의 프로토콜을 제안했다. 그런데, [1]에서 제안된 PIKE 프로토콜에서 각 센서 노드 사이의 통신에 대한 가정을 현실적으로 바꾸면 보다 효율적인 프로토콜을 얻을 수 있다. 네트워크의 전체 센서 노드의 수를 n이라고 했을 때, [1]에서 제안된 프로토콜에서 각 센서 노드의 메모리 소요량은 O($\sqrt{n^}$)이나, 본 논문에서는 키 합의 매개 노드의 수와 메모리 소요랑 사이의 trade-off 관계를 보이고 최적의 프로토콜을 구성하는 방법에 대해 논의한다.

  • PDF

Mobile IPv6 Session Key Distribution Method At Radius-based AAAv6 System

  • Lee Hae Dong;Choi Doo Ho;Kim Hyun Gon
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.581-584
    • /
    • 2004
  • Currently, there are many subscriber access networks: PSTN, ADSL, Cellular Network, IMT200 and so on. To these service providers that provide above network service, it is important that they authenticate and authorize legal subscribers and account for their usage. At present, There exist the several protocols that Support AAA(Authentication, Authorization and Accounting) service : RADIUS, Diameter, TACACS+. Nowadays, RADIUS has used for AAA service widely. It has been extended to support other access network environment. So, we extend RADIUS to support environment of Mobile IPv6. Mobile IPv6 uses IPsec as a security mechanism, basically. But, IPsec is a heavy security technology for small, portable, mobile device. Especially, it is serious at IKE, the subset of IPsec. IKE is a key distribution protocol that distributes the key to the endpoints of IPsec. In t:lis paper, we extend RADIUS to support environment of Mobile IPv6 and simplify the IKE phase of IPsec by AAA system distributing the keys by using its security communication channel. Namely, we propose the key distribution method for IPsec SA establishment between mobile node and home agent. The suggested method was anticipated to be effective at low-power, low computing deyice. Finally, end users feel the faster authentication.

  • PDF

Research on Secure IoT Lightweight Protocols (사물인터넷용 경량 프로토콜 비교 연구)

  • Sunghyuck Hong
    • Advanced Industrial SCIence
    • /
    • v.2 no.1
    • /
    • pp.1-7
    • /
    • 2023
  • The use of Internet of Things(IoT) in smart cities and smart homes is essential. The security of the sensor nodes, which are the core of the IoT, is weak and hacking attacks are severe enough to have a fatal impact on real life. This research is conducted to improve the security of the Internet of Things by developing a lightweight secure communication protocol for the Internet of Things, and to build a safe Internet of Things environment suitable for the era of the 4th Industrial Revolution. It contributes to building a safe and convenient smart city and smart home by proposing key management and identifier development to increase the confidentiality of communication and the establishment of an Internet authentication system.

Group Key Establishment Protocol for Efficient Distributed Storage Server Management in Cloud Computing (클라우드 컴퓨팅 환경에서 효율적인 분산 저장 서버 관리를 위한 그룹키 확립 프로토콜)

  • Kim, Su-Hyun;Hong, In-Sik;Lee, Im-Yeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.946-949
    • /
    • 2012
  • 클라우드 컴퓨팅환경에서 사용되는 분산 파일 시스템은 데이터를 저장하는 분산 저장 서버와 각 데이터의 메타데이터를 저장하는 마스터 서버로 구성되어 있다. 마스터 서버와 분산 저장 서버는 수시로 서버의 상태나 메타데이터의 정보를 교환하지만, 통신 시 암호화가 전혀 고려되지 않아, 제 3자에 의한 도청이나 위변조시 사용자의 데이터에 대한 가용성을 보장받지 못할 수 있다. 이에 대한 방지 대책으로 통신 과정을 암호화함으로써 해결할 수 있지만, 무한히 확장 가능한 분산 저장서버에 대해 단일 마스터 서버와의 통신과정을 암호화하게 된다면 수많은 키에 대한 관리 대책을 필요로 하게 된다. 하지만 이 때, 분산저장서버를 하나의 그룹으로 묶어 그룹키를 사용하여 통신과정을 암호화한다면 보다 효율적으로 해결할 수 있다. 따라서 본 논문에서는 분산 저장 서버와 마스터 서버 간 안전하고 효율적인 암호화 통신을 위한 그룹키 확립 프로토콜을 제안하였다.

Key Establishment Protocol for Fast Roaming Service in Mobile IPTV Environment (Mobile IPTV 환경에서 빠른 로밍 서비스를 위한 키 확립 프로토콜)

  • Moon, Jong Sik;Lee, Im-Yeong;Ahn, Jong-Keun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.675-676
    • /
    • 2009
  • 최근 디지털화의 가속 및 통신 인프라의 확충 등으로 인해 IP 네트워크로 연결되어 영상 및 음성 정보를 서로 공유할 수 있는 환경이 제공되고 통합 서비스에 대한 수요가 증가하면서 Mobile IPTV 서비스가 새로운 서비스 모델로 각광받고 있다. 그러나 IPTV에서 발생하는 보안위협 외에 무선 네트워크에서 발생할 수 있는 보안위협을 안고 있다. 또한 Mobile IPTV의 특성상 이동이 잦아 기존의 보안 기술로는 QoS 및 QoE를 제공하기에는 어려운 실정이다. 따라서 본 논문에서는 Mobile IPTV 환경에서 빠른 로밍 서비스를 위한 키 관리 프로토콜을 제안하여 안전성 및 효율성을 제공하고자 한다.

Clustered Tributaries-Deltas Architecture for Energy Efficient and Secure Wireless Sensor Network (무선 센서 네트워크에서 에너지 효율성과 보안성을 제공하기 위한 클러스터 기반의 Tributaries-Deltas)

  • Kim, Eun-Kyung;Seo, Jae-Won;Chae, Ki-Joon;Choi, Doo-Ho;Oh, Kyung-Hee
    • The KIPS Transactions:PartC
    • /
    • v.15C no.5
    • /
    • pp.329-342
    • /
    • 2008
  • The Sensor Networks have limitations in utilizing energies, developing energy-efficient routing protocol and secure routing protocol are important issues in Sensor Network. In the field of data management, Tributaries and Deltas(TD) which incorporates tree topology and multi-path topology effectively have been suggested to provide efficiency and robustness in data aggregation. And our research rendered hierarchical property to TD and proposed Clustering-based Tributaries-Deltas. Through this new structure, we integrated efficiency and robustness of TD structure and advantages of hierarchical Sensor Network. Clustering-based Tributaries-Deltas was proven to perform better than TD in two situations through our research. The first is when a Base Station (BS) notices received information as wrong and requests the network's sensing data retransmission and aggregation. And the second is when the BS is mobile agent with mobility. In addition, we proposed key establishment mechanism proper for the newly proposed structure which resulted in new Sensor Network structure with improved security and energy efficiency as well. We demonstrated that the new mechanism is more energy-efficient than previous one by analyzing consumed amount of energy, and realized the mechanism on TmoteSKY sensor board using TinyOS 2.0. Through this we proved that the new mechanism could be actually utilized in network design.