• Title/Summary/Keyword: rapid authentication

Search Result 102, Processing Time 0.028 seconds

A Secure Mobile Message Authentication Over VANET (VANET 상에서의 이동성을 고려한 안전한 메시지 인증기법)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.5
    • /
    • pp.1087-1096
    • /
    • 2011
  • Vehicular Ad Hoc Network(VANET) using wireless network is offering the communications between vehicle and vehicle(V2V) or vehicle and infrastructure(V2I). VANET is being actively researched from industry field and university because of the rapid developments of the industry and vehicular automation. Information, collected from VANET, of velocity, acceleration, condition of road and environments provides various services related with safe drive to the drivers, so security over network is the inevitable factor. For the secure message authentication, a number of authentication proposals have been proposed. Among of them, a scheme, proposed by Jung, applying database search algorithm, Bloom filter, to RAISE scheme, is efficient authentication algorithm in a dense space. However, k-anonymity used for obtaining the accurate vehicular identification in the paper has a weak point. Whenever requesting the righteous identification, all hash value of messages are calculated. For this reason, as the number of car increases, a amount of hash operation increases exponentially. Moreover the paper does not provide a complete key exchange algorithm while the hand-over operation. In this paper, we use a Received Signal Strength Indicator(RSSI) based velocity and distance estimation algorithm to localize the identification and provide the secure and efficient algorithm in which the problem of hand-over algorithm is corrected.

PCR Analysis for Halal Authentication of Cosmetics Containing Carrot, Oyster Mushroom, and Pine Needle Extracts (당근, 느타리버섯 및 솔잎 추출물이 첨가된 화장품의 할랄인증을 위한 PCR 분석)

  • Jang, Chan Song;Kim, Tae Hyeon;Kim, Yu Song;Lee, Beom Zoo;Hong, Kwang Won
    • Food Engineering Progress
    • /
    • v.22 no.4
    • /
    • pp.309-314
    • /
    • 2018
  • In recent years, interest in halal authentication from the domestic food and cosmetics field has been growing for advances into the overseas halal market. For halal authentication, the product must not contain haram ingredients derived from pig, dog, human, GMO, etc. In this study, the presence of haram ingredients in plant extracts (carrot, oyster mushroom, and pine needle) treated with papain and bromelain and cosmetics (mask pack and cream) containing these extracts were analyzed by PCR to confirm whether these cosmetics were suitable for halal authentication. Detection limits of the PCR method that specifically detected template DNA of human, pig, dog, and GMO were $1.29{\times}10^3$, $1.14{\times}10^3$, $1.24{\times}10^2$ and $2.02{\times}10^3copies/tube$, respectively. PCR was not inhibited by the plant extracts or cosmetic ingredients. Results of PCR for the plant extracts or cosmetics containing these extracts were all negative. This PCR method could be used to rapidly identify the presence of haram ingredients in raw materials or final products during the manufacturing process of food and cosmetics.

Overview on Smart Sensor Technology for Biometrics in IoT Era (사물인터넷 시대의 생체인식 스마트 센서 기술과 연구 동향)

  • Kim, Kwang-Seok;Kim, Dae Up
    • Journal of the Microelectronics and Packaging Society
    • /
    • v.23 no.2
    • /
    • pp.29-35
    • /
    • 2016
  • With the pace of rapid innovation in technology of IoT (Internet of Things) and smart devices, biometric technology becomes one of the most progressive industries. Recent trends in biometrics show most are focused on embedding biometric sensors in mobile devices for user authentication. Multifactor biometrics such as fingerprint, retina, voice, etc. are considering as identification system to provide users with services more secured and convenient. Here we, therefore, demonstrate some major technologies and market trends of mobile biometric technology with its concerns and issues.

Comments on an Improved RFID Security Protocol for ISO/IEC WD 29167-6

  • Kang, You Sung;Choi, Dooho;Park, Dong-Jo
    • ETRI Journal
    • /
    • v.35 no.1
    • /
    • pp.170-172
    • /
    • 2013
  • With the rapid progress of RFID security technologies, the international standard group ISO/IEC JTC 1/SC 31 is developing a few security technologies for RFID systems. One of the initial proposals is ISO/IEC working draft (WD) 29167-6. Recently, Song and others stated that Protocol 1 of ISO/IEC WD 29167-6 is vulnerable to a malicious adversary. However, their analysis comes from a misunderstanding regarding a communication parameter called Handle. In this letter, we point out that an adversary cannot obtain any sensitive information from intervening in Protocol 1.

Hybrid Cryptosystem Design with Authentication (인증기능을 가진 혼합형 암호시스템 설계)

  • 이선근;김영일;고영욱;송재호;김환용
    • Proceedings of the IEEK Conference
    • /
    • 2002.06b
    • /
    • pp.341-344
    • /
    • 2002
  • The importance of protection for information is increasing by the rapid development of information communication and network. Asymmetric crypto-system is the mainstream in encryption system rather than symmetric cryptosystem by above reasons. But asymmetric cryptosystem is restricted in applying to application fields by the reason it takes more times to process than symmetric cryptosystem. In this paper, the proposed cryptosystem uses an algorithm that combines block cipherment with stream ciphcrment. Proposed cryptosystem has a high stability in aspect of secret rate by means of transition of key sequence according to the information of plaintext while asymmetric /symmetric cryptosystern conducts encipherment/decipherment using a fixed key Consequently, it is very difficult to crack although unauthenticator acquires the key information. So, the proposed encryption system which has a certification function of asymmetric cryptosystcm and a processing time equivalent to symmetric cryptosystcm will be highly useful to authorize data or exchange important information.

  • PDF

A Study on the Development Of Standard Management System for the Work Efficiency Improvement of the Auto Part Supplier (자동차 부품업체의 업무 효율성 향상을 위한 표준관리시스템 구축에 관한 연구)

  • Lee, Hee-Nahm;Park, Je-Won
    • Journal of the Korea Safety Management & Science
    • /
    • v.12 no.4
    • /
    • pp.223-228
    • /
    • 2010
  • Recently, the various information according to the company management is originated in the change of the rapid company environment. And the necessity of the administration,that is systematic and efficient toward the various document of a form, is gradually increased. At the same time, the efficient management ability of the various standard document obtained the specialized quality authentication system including the ISO/TS16949, ISO14001, quality 5 star, and etc., it maintains occupies the very important part as to the company management. This research suggests the standard business process of the auto part supplier for the efficient management of the standard document. In addition, by building and managing the standard management system will be able to expect the more efficient document management and the product reliability insurance.

Design and Implementation of A Context-Aware Authentication Security Service Based on u-Hospital Environments (u-병원 환경 기반에서 상황인식 인증 보안 서비스 설계 및 구현)

  • Jeong, Chang-Won;Choi, Jae-Hyeong;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.13 no.2
    • /
    • pp.51-57
    • /
    • 2012
  • The warming up of the recent competition in the smart phone industry followed by rapid increase of open platforms and app stores have led the mobile terminals to adopt the general purpose operating system. The mobile device utilizing this OS is vulnerable to mobile malignant code which is highly transferable. As a result, the scale of mobile attack and harm increase. However, compared to the malicious code and virus which keep increasing, the elements for security to prevent are insufficient. Therefore, this paper describe about the Context Aware Service that eliminates the potentially risky elements on the smart phone service, which could threaten the usability of the service including invasion of personal information. The proposed system prevents from disclosure of personal information by giving the procedure of information, and realizes the service that is able to change the sequence of identifying the users' information to prepare for emergency.

Two layered Secure Password Generation with Random Number Generator (난수 발생기를 이용한 이중화 구조의 안전한 비밀번호 생성 기법)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.4
    • /
    • pp.867-875
    • /
    • 2014
  • Rapid development of internet service is enabling internet banking services in anywhere and anytime. However, service access through internet can be exposed to adversary easily. To prevent, current service providers execute authentication process with user's identification and password. However, majority of users use short and simple password and do not periodically change their password. As a result of this, user's password could be exposed to attacker's brute force attack. In this paper, we presented enhanced password system which guarantee higher security even though users do not change their current password. The method uses additional secret information to replace real password periodically without replacement of real password.

Discrimination of Korean ginseng (Panax ginseng Meyer) cultivar Chunpoong and American ginseng (Panax quinquefolius) using the auxin repressed protein gene

  • Kim, Jong-Hak;Kim, Min-Kyeoung;Wang, Hongtao;Lee, Hee-Nyeong;Jin, Chi-Gyu;Kwon, Woo-Saeng;Yang, Deok-Chun
    • Journal of Ginseng Research
    • /
    • v.40 no.4
    • /
    • pp.395-399
    • /
    • 2016
  • Background: Korean ginseng (Panax ginseng) is one of the most important medicinal plants in the Orient. Among nine cultivars of P. ginseng, Chunpoong commands a much greater market value and has been planted widely in Korea. Chunpoong has superior quality "Chunsam" ($1^{st}$ grade ginseng) when made into red ginseng. Methods: A rapid and reliable method for discriminating the Chunpoong cultivar was developed by exploiting a single nucleotide polymorphism (SNP) in the auxin repressed protein gene of nine Korean ginseng cultivars using specific primers. Results: An SNP was detected between Chunpoong and other cultivars, and modified allele-specific primers were designed from this SNP site to specifically identify the Chunpoong cultivar and P. quinquefolius via multiplex polymerase chain reaction (PCR). Conclusion: These results suggest that great impact to prevent authentication of precise Chunpoong and other cultivars using the auxin repressed protein gene. We therefore present an effective method for the authentication of the Chunpoong cultivar of P. ginseng and P. quinquefolius.

3D Medical Image Data Watermarking Applied to Healthcare Information Management System (헬스케어 정보 관리 시스템의 3D 의료영상 데이터 다중 워터마킹 기법)

  • Lee, Suk-Hwan;Kwon, Ki-Ryong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.11A
    • /
    • pp.870-881
    • /
    • 2009
  • The rapid development of healthcare information management for 3D medical digital library, 3D PACS and 3D medical diagnosis has addressed security issues with medical IT technology. This paper presents multiple 3D medical image data for protection, authentication, indexing and diagnosis information hiding applied to healthcare information management. The proposed scheme based on POCS watermarking embeds the robust watermark for doctor's digital signature and information retrieval indexing key to the distribution of vertex curvedness and embeds the fragile watermark for diagnosis information and authentication reference message to the distance difference of vertex. The multiple embedding process designs three convex sets for robustness, fragileness and invisibility and projects 3D medical image data onto three convex sets alternatively and iteratively. Experimental results confirmed that the proposed scheme has the robustness and fragileness to various 3D geometric and mesh modifiers at once.