• Title/Summary/Keyword: mitm

Search Result 42, Processing Time 0.029 seconds

Mutual Authentication Protocol Using a Low Power in the Ubiquitous Computing Environment

  • Cho Young-bok;Kim Dong-myung;Lee Sang-ho
    • Proceedings of the KSRS Conference
    • /
    • 2004.10a
    • /
    • pp.91-94
    • /
    • 2004
  • Ubiquitous sensor network is to manage and collect information autonomously by communicating user around device. Security requirements in Ubiquitous based on sensor network are as follows: a location of sensor, a restriction of performance by low electric power, communication by broadcasting, etc. We propose new mutual authentication protocol using a low power of sensor node. This protocol solved a low power problem by reducing calculation overload of sensor node using two steps, RM(Register Manager) and AM(Authentication Manager). Many operations performing the sensor node itself have a big overload in low power node. Our protocol reduces the operation number from sensor node. Also it is mutual authentication protocol in Ubiquitous network, which satisfies mutual authentication, session key establishment, user and device authentication, MITM attack, confidentiality, integrity, and is safe the security enemy with solving low electric power problem.

  • PDF

A Study on method for network authentication (중간자 공격에 대한 공인인증서 네트워크 보안 강화 연구)

  • Kim, Jee-Yeon;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.486-489
    • /
    • 2014
  • 최근 전자 금융 사기로 인한 피해자들이 증가하면서 전자 금융 안전성 확보를 위해 추가 대책 마련이 시급한 상황이다. 이에 본 논문은 현재 사용되고 있는 공인 인증서의 네트워크 보안측면에서 보안방식을 살펴보고 취약점 분석을 통하여 현 네트워크 시스템의 보안을 강화시킬 수 있는 방안을 도출 하고자 한다. 이를 위해 먼저 관련연구를 통해 공인인증서 시스템의 인증원리와 공개키 기반구조, 중간자 공격(Man In The Middle Attack, MITM)에 대해서 알아보고 이를 토대로 현 네트워크 시스템의 취약점 및 문제점을 분석한다. 분석한 문제점에 대해 새로운 프로토콜을 적용하여 공인인증서의 안전성을 강화시키는 방법을 제안한다.

Vulnerability Analysis of Printer Management System in Public Institutions (공공기관 프린터 관리 시스템의 취약점 분석)

  • Ji, Woojoong;Lee, Kyungmoon;Lee, Byoungcheon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.655-663
    • /
    • 2018
  • As digitalization accelerates, the use of digital information is increasing in public institutions such as schools and libraries, and the demand for print services is also increasing. Among many services, printing service on public PCs should charge fee to printer users, but it is a very difficult task for administrators. Print management solutions have been developed and are now widely used to automate these demanding tasks. In this paper, we analyze the vulnerability of printer management solutions used in public institutions. However, the security awareness of public PC administrators and printer management solution developers seem to be lacking.

ARP Modification for Prevention of IP Spoofing

  • Kang, Jung-Ha;Lee, Yang Sun;Kim, Jae Young;Kim, Eun-Gi
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.3
    • /
    • pp.154-160
    • /
    • 2014
  • The address resolution protocol (ARP) provides dynamic mapping between two different forms of addresses: the 32-bit Internet protocol (IP) address of the network layer and the 48-bit medium access control (MAC) address of the data link layer. A host computer finds the MAC address of the default gateway or the other hosts on the same subnet by using ARP and can then send IP packets. However, ARP can be used for network attacks, which are one of the most prevalent types of network attacks today. In this study, a new ARP algorithm that can prevent IP spoofing attacks is proposed. The proposed ARP algorithm is a broadcast ARP reply and an ARP notification. The broadcast ARP reply was used for checking whether the ARP information was forged. The broadcast ARP notification was used for preventing a normal host's ARP table from being poisoned. The proposed algorithm is backward compatible with the current ARP protocol and dynamically prevents any ARP spoofing attacks. In this study, the proposed ARP algorithm was implemented on the Linux operating system; here, we present the test results with respect to the prevention of ARP spoofing attacks.

A SECURITY ARCHITECTURE FOR THE INTERNET OF THINGS

  • Behrens, Reinhard;Ahmed, Ali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.6092-6115
    • /
    • 2017
  • This paper demonstrates a case for an end-to-end pure Application Security Layer for reliable and confidential communications within an Internet of Things (IoT) constrained environment. To provide a secure key exchange and to setup a secure data connection, Transport Layer Security (TLS) is used, which provides native protection against replay attacks. TLS along with digital signature can be used to achieve non-repudiation within app-to-app communications. This paper studies the use of TLS over the JavaScript Object Notation (JSON) via a The Constrained Application Protocol (CoAP) RESTful service to verify the hypothesis that in this way one can provide end-to-end communication flexibility and potentially retain identity information for repudiation. As a proof of concept, a prototype has been developed to simulate an IoT software client with the capability of hosting a CoAP RESTful service. The prototype studies data requests via a network client establishing a TLS over JSON session using a hosted CoAP RESTful service. To prove reputability and integrity of TLS JSON messages, JSON messages was intercepted and verified against simulated MITM attacks. The experimental results confirm that TLS over JSON works as hypothesised.

Enhanced Transaction Signing-based Authentication Scheme for Secure Internet Banking (안전한 인터넷 뱅킹을 위한 트랜잭션 서명기법에 관한 연구)

  • Lim, Hyung-Jin;Lee, Jeong-Gun;Kim, Moon-Seong
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.73-79
    • /
    • 2008
  • Nowadays, all over the world's banks use internet banking through various authentication methods. Although there are strong authentication methods using OTP (One Time Password), there still has vulnerability from sophisticated attacks such as MITM (Man In The Middle). This letter proposes signing-based authentication protocol that copes with attacks, such as MITB (Man In The Browser), and provides non-repudiation function. The protocol shows generic method to prevent the sophisticated attacks through connecting advantages from OTP and PKI (Public Key Infrastructure) certificate, and that can be deployed to various extended form in internet banking.

  • PDF

An Efficient Searching of Vulnerabilities Based on a DNS System Model using Ptolemy (톨레미를 이용한 DNS 시스템 모델 기반의 효율적 취약성 탐지)

  • Shin, Seung-Hun;Park, Seung-Kyu;Jung, Ki-Hyun
    • The KIPS Transactions:PartD
    • /
    • v.16D no.6
    • /
    • pp.921-926
    • /
    • 2009
  • Vulnerabilities in software can result in many social and economic problems once it has already been deployed and put to use. Thus, the vulnerabilities should be seriously taken into consideration from the beginning step of software development. A modeling and simulation method for software can be adopted as a testing tool for establishing vulnerability inspection strategies. For verification of usability of this strategy, in this paper, we modeled the behavior of a DNS system using Ptolemy and the simulation was performed. The result shows that a well-known vulnerability of DNS server could be effectively found, which confirms that the modeling and simulation can be used for vulnerability testing.

Design of Unproved Diffie-Hellman Key Agreement Protocol Based on Distance Bounding for Peer-to-peer Wireless Networks (향상된 경계 결정 기반의 Diffie-Hellman 키 일치 프로토콜)

  • Park, Sern-Young;Kim, Ju-Young;Song, Hong-Yeop
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.1C
    • /
    • pp.117-123
    • /
    • 2008
  • We propose an improved Diffie-Hellman(DH) key agreement protocol over a radio link in peer-to-peer networks. The proposed protocol ensures a secure establishment of the shared key between two parties through distance bounding(DB). Proposed protocol is much improved in the sense that we now reduce the number of messages exchanged by two, the number of parameters maintained by four, and 2(7682(k/64)-64) of XOR operations, where k is the length of the random sequence used in the protocol. Also, it ensures a secure reusability of DH public parameters. Start after striking space key 2 times.

Analysis and Prevention of Contents Exposure in Music Streaming (음악 스트리밍 서비스에서 음원과 메타데이터 노출 분석력 및 방지 방안)

  • Jung, Woo-sik;Nam, Hyun-gyu;Lee, Young-seok
    • KNOM Review
    • /
    • v.21 no.2
    • /
    • pp.10-17
    • /
    • 2018
  • With the popularization of smart devices and the development of wireless Internet, the consumption method of music contents is changing to streaming rather than downloading. In this paper, we analyze the meta data of the music source exposed on the network traffic for the 19 music streaming services in Korea and abroad. We propose a preventive measure. As a result of analysis, we found that all of the 19 services were exposed to the metadata of the music. We propose a music and metadata protection method such as certificate fixing method to prevent exposure of such music and metadata.

IPv6 and IPv4/IPv6 Translation Security Vulnerability (IPv6 및 IPv4/IPv6 전환기법에 대한 보안 취약점 조사)

  • Kim, Juho;Lee, Jaehwoon;Park, Neungsoo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.862-865
    • /
    • 2011
  • 현재 IPv4 주소가 고갈됨으로써 IPv6 를 사용할 수 밖에 없는 상황에 놓여지게 되었다. 그리고 IPv6 주소체계를 이용하다 보니 이에 따른 보안취약점들이 발견되었다. IPv6 보안취약점에는 확장헤더, ICMPv6, NDP, 다양한주소에 따른 취약점들이 있다. 이것뿐만 아니라 IPv4 와 IPv6 네트워크 간에 통신이 가능한 6to4, ISATAP, Tunnel Broker, Teredo 와 같은 기술이 나오게 되었고, 이러한 것들 또한 보안취약점이 발견되었다. 6to4 보안취약점에는 분산반사 스푸핑 트래픽 공격이 있고, Teredo 에는 로컬 peer 발견 절차에 다른 캐쉬 오버플로우 공격이 있다. 그리고 ISATAP 에는 라우터를 가장한 MITM 공격이 있고, Tunnel Broker 에는 Tunnel Borker 와 Tunnel Server 를 위장하여 공격하는 방법이 있다. 이렇게 IPv6 주소체계로 바뀌면서 생기는 새로운 보안취약점들에 대응하기 위해 현재 존재하는 라우터 같은 네트워크장비들도 보안취약점에 대응할 수 있는 변화가 필요하다.