• Title/Summary/Keyword: remote authentication

Search Result 205, Processing Time 0.034 seconds

Group Key Management Method for Secure Device in Smart Home Environment (스마트홈 환경에서의 안전한 디바이스 관리를 위한 그룹키 관리 기법)

  • Ryu, Ho-Seok;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.479-487
    • /
    • 2015
  • According to IT development, smart home services is providing remote service, monitoring service and other various services through smart home devices based on network. But, smart home environment exists security threats such as data falsification, illegal authentication and invasion of privacy through a malicious device. Smart home is studying to prevent these security threats, but the studies of smart home environment security are still in early stage of development and the studies of group key management method is lacking in smart home. In this paper, we propose the group key management method for secure device in smart home.

Assessing Web Browser Security Vulnerabilities with respect to CVSS

  • Joh, HyunChul
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.2
    • /
    • pp.199-206
    • /
    • 2015
  • Since security vulnerabilities newly discovered in a popular Web browser immediately put a number of users at risk, urgent attention from developers is required to address those vulnerabilities. Analysis of characteristics in the Web browser vulnerabilities can be used to assess security risks and to determine the resources needed to develop patches quickly to handle vulnerabilities discovered. So far, being a new research area, the quantitative aspects of the Web browser vulnerabilities and risk assessments have not been fully investigated. However, due to the importance of Web browser software systems, further detailed studies are required related to the Web browser risk assessment, using rigorous analysis of actual data which can assist decision makers to maximize the returns on their security related efforts. In this paper, quantitative software vulnerability analysis has been presented for major Web browsers with respect to the Common Vulnerability Scoring System. Further, vulnerability discovery trends in the Web browsers are also investigated. The results show that, almost all the time, vulnerabilities are compromised from remote networks with no authentication required systems. It is also found that a vulnerability discovery model which was originally introduced for operating systems is also applicable to the Web browsers.

Remote Medical Authentication System on the Mobile Environment (무선 환경을 이용한 의료 인증 시스템)

  • Oh, Keun-Tak;Gu, Jae-Yung;Kim, Yung-Hoo;Lee, Yun-Bee;Lee, Sung-Tae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.1181-1184
    • /
    • 2005
  • 다양한 분야에서 무선 인터넷 서비스의 가능성이 거론되고 있는 요즘, 무선 인터넷을 통한 의료 정보 서비스 또한 관심을 모으고 있다. 모바일 기기를 이용한 의료정보 시스템은 기존 Desktop PC가 가지는 이동성의 제한이라는 단점을 극복하여 이동이 빈번한 의료 정보 사용자에게 정보 이용의 편의성과 신속성을 제공할 것으로 기대된다. 그러나 무선인터넷을 기반으로 하는 모바일 기기는 지속적인 하드웨어의 발전에도 불구하고 정보 처리의 효율성, 무선 네트워크의 불안전성, 보안등의 문제가 지적되고 있다. 의료 정보는 환자의 지극히 개인적인 정보를 취급하는 것으로 환자, 관계 의료진 이외의 사람에게 노출되는 것은 위험스러운 일이라 할 수 있다. 이러한 의료 정보가 진료의 편의성과 신속성, 업무의 효율성을 위하여 모바일 시스템으로 진화하는 경우, 무선 인터넷의 특성에 의한 보안 위협에 노출되게 된다. 따라서 본 논문에서는 모바일 원격 의료 정보 시스템을 구현하는 경우 발생할 수 있는 보안 위협에 대처할 수 있는 모바일 인증 시스템을 제안하고 구현하였다. 제안된 시스템은 모바일 원격 의료 정보 시스템의 환자 정보 보호를 위한 적절한 대안이 될 것으로 기대된다.

  • PDF

Design of Face Recognition based Embedded Home Security System

  • Sahani, Mrutyunjanya;Subudhi, Subhashree;Mohanty, Mihir Narayan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1751-1767
    • /
    • 2016
  • Home security has become the prime concern for everyone in present scenario. In this work an attempt has been made to develop a home security system which is accessible, affordable and yet effective.The proposed system is based on 'Remote Embedded Control System' (RECS) which works both on the web and gsm platform for authentication and monitoring. This system is therefore cost effective as it relies on existing network infrastructure. As PCA is most popular and efficient algorithm for face recognition, it has been usedin this work. Next to it an interface has been developed for communication purpose in the embedded security system through the ZigBee module. Based on this embedded system, automated control of door movement has been implemented through electromagnetic door lock technology. This helps the users to monitor the real-time activities through web services/SMS. The web service consists of either web browser command or e-mail provision. The system establishes the communication between the system and authenticated user. The e-mail received by the system from the authorized person will monitor and control the real-time operation and door lock. The entire control system is reinforced using ARM1176JZF-S microcontroller and tested for actual use in the home environment. The result shows the experimental verification of the proposed system.

A Study on Locker Management System (사물함 개폐 관리 시스템 연구)

  • Kim, Jin;Lee, Jae-Hak;Chi, Sang-Lim;Choi, Tae-Hwan;Lee, Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.1173-1175
    • /
    • 2017
  • This paper proposes a system for convenient remote control and management of the lockers with a smart phone. The key features of the proposed system are as follows. First, we connect the lockers to the server and then use the authentication procedure to open and close their lockers. Second, we create instant lockers to increase convenience for users who need to use casual necessities. Unlike traditional analog methods, we finally develop certification procedures. Particularly, log data are better secured than traditional ones. The performance assessment of the proposed system is simulated by producing a dummy model. We will show that the proposed system could effectively support opening and closing the lockers using smart phones.

Security Policy Framework for Home Network (홈 네트워크 보안 정책 프레임워크)

  • Kim, Geon-Woo;Kim, Do-Woo;Lee, Jun-Ho;Han, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.839-842
    • /
    • 2005
  • As various mobile technologies, sensor technologies, and remote control technologies are growing and quality of life is enhanced, researches and developments on home network are actively on going. Currently, some network service providers and construction corporations are going to provide home network service, but neither secure nor efficient, So, in this paper, we propose a security framework for providing various secure user authentication mechanisms and efficiently controlling services in home network. Namely, we are going to provide active home network security services with home gateway-based security policy, which locates on the gateway of each home.

  • PDF

A study on WBAN based Kerberos Authentication System using PIDS of OpenEMed (WBAN을 기반으로 한 OpenEMed의 PIDS를 이용한 Kerberos 인증)

  • Lee, Jae-Gwang;Kim, Young-Hyuk;Lim, Il-Kown;Lee, Jae-Pill;Lee, Jae-Kwang
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.734-737
    • /
    • 2012
  • 인체 무선망이란 USN(Ubiquitous Sensor Network)을 통해 환자의 생체 정보를 실시간으로 수집하는 환경이다. 이를 기반으로 원격지에서 생체 정보를 전달 받는 시스템이 u-RPMS(USN Remote Patient Monitoring System)이다. u-RPMS에서 실시간으로 환자의 정보들이 발생하는데 이때 실시간으로 발생한 정보들은 공유가 불가피하다. 환자의 생체 정보는 생명과 연결되기 때문에 공유할 때 안전이 중요하다. 하지만 u-RPMS에서는 무선 통신으로 동작하기 때문에 보안에 취약하며, 이를 보안하기 위해서 서버와 DB(Data Base) 사이에 인증 서버를 통해서 해결 할 것을 제시한다. 본 연구에서는 인체 무선망을 기반으로 해서 모듈화 된 오픈 소스 원격진료 플랫폼인 OpenEMed의 개인 확인 서비스(PIDS, Personal Identification Service)를 이용해 네트워크를 기반으로 한 Kerberos 인증을 제안한다.

A Study on Zero Trust Technology Trends (제로 트러스트 기술 동향에 관한 연구)

  • Miyeon Kim;DaeGyeom Kim;Jong-Min Jang;Sang-Jun Park;Souhwan Jung;Jungsoo Park
    • Smart Media Journal
    • /
    • v.12 no.2
    • /
    • pp.15-26
    • /
    • 2023
  • Due to the global COVID-19 pandemic, which has led to a shift towards remote work, the frequency of external access to important internal resources by companies has increased exponentially, exposing them to various security threats. In order to address these access security issues, ZTA (Zero Trust Architecture) has gained attention. ZTA operates on the principle of not trusting external or internal users, and manages access authentication and authorization strictly according to pre-established policies. This paper analyzes the definition of ZTA and key research trends, and summarizes different ZTA solutions for each company.

Security Design for Efficient Detection of Misbehavior Node in MANET (MANET에서 비정상 노드를 효율적으로 탐지하기 위한 보안 설계)

  • Hwang, Yoon-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.408-420
    • /
    • 2010
  • On a Mobile Ad hoc NETwork(MANET), it is difficult to detect and prevent misbehaviors nodes existing between end nodes, as communication between remote nodes is made through multiple hop routes due to lack of a fixed networked structure. Therefore, to maintain MANET's performance and security, a technique to identify misbehaving middle nodes and nodes that are compromise by such nodes is required. However, previously proposed techniques assumed that nodes comprising MANET are in a friendly and cooperative relationship, and suggested only methods to identify misbehaving nodes. When these methods are applied to a larger-scale MANET, large overhead is induced. As such, this paper suggests a system model called Secure Cluster-based MANET(SecCBM) to provide secure communication between components aperANET and to ensure eed. As such, this pand managems suapemisbehavior nodes. SecCBM consists apetwo stages. The first is the preventis pstage, whereemisbehavior nodes are identified when rANET is comprised by using a cluster-based hierarchical control structure through dynamic authentication. The second is the post-preventis pstage, whereemisbehavior nodes created during the course apecommunication amongst nodes comprising the network are dh, thed by using FC and MN tables. Through this, MANET's communication safety and efficiency were improved and the proposed method was confirmed to be suitable for MANET through simulation performance evaluation.

Interoperability Framework between GRID and PACS based on Web Services (웹서비스 기반의 Grid-PACS 상호운용성 프레임워크)

  • Lee, Bong-Hwan;Cho, Hyun-Sug
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.8
    • /
    • pp.1799-1808
    • /
    • 2010
  • Recently the increasing collaborative research requires the remote medical and clinical data sharing and access of external institutions. In this paper, an interoperability framework between Grid and PACS using Web services is proposed and implemented in order to provide flexible and efficient medical data management. The Digital Imaging and Communications in Medicine(DICOM) standard defines medical image data exchange and transfer between PACSs and image databases. However, medical data exchange between hospitals is limited within the trusted and static environments. Moreover, DICOM does not provide medical data management and the Grid middleware does not include standard toolkit to access DICOM data. To address this issue, a Web services-based Grid Service Mediator (WGSM) which provides PACS integration and medical image data management is developed. The WGSM consists of several service mediators such as compress mediator, GridFTP mediator, RFT mediator, MyProxy mediator, MDS mediator, and RLS mediator and others. The proposed Web services-based framework provides user authentication and secure data access between PACSs in collaborative environments. In particular, the WGSM allows ordinary users to access remote PACS data in a simple and efficient manner without any the knowledge about underlying Grid middleware.