• Title/Summary/Keyword: safe message

Search Result 102, Processing Time 0.018 seconds

ECbA(Elliptic Curve based Authentication) System on the wireless network environment (무선 네트워크 환경에서의 ECbA(Elliptic Curve based Authentication)시스템 설계)

  • Jeong, Eun-Hee;Yang, Seung-Hae;Kim, Hak-Chun;Lee, Byung-Kwan
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.1 no.1
    • /
    • pp.67-74
    • /
    • 2008
  • As wireless network market is increasing rapidly, the biggest issue is to transfer safe data and to authenticate users. This paper proposes ECbA(Elliptic Curve based Authentication) which consists of the mutual authentication mechanism that users can ascertain the identity of an authentication server and the user authentication mechanism that an authentication server can make sure users' identity, by using Elliptic Curve algorithms. The proposed ECbA system diminishes the message quantity and the execution time by using the small elliptic curve algorithm with the small key length in authentication. In addition, as this paper reduces the authentication steps of existing EAP_TLS into 6 authentication steps, the communication cost and mutual authentication time can be saved. As this paper distributes new keys, whenever authenticating users by using key exchange mechanism, it provides safe encryption communication and prevents DoS attack by controlling the users authentication request by authentication server.

  • PDF

Design Standard for Lane Operation in Bridges and Tunnels (교량 및 터널구간 차로운영 설계기준)

  • You, Ho-In;Oh, Young-Tae;Lee, Choul-Ki;Chung, Woo-Hyun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.6 no.3
    • /
    • pp.33-44
    • /
    • 2007
  • Prohibition of lane changes in bridges and tunnels have been many problems in throughputs of expressways caused by heavy vehicles and slow-moving traffics. Nevertheless, those are constructed actively by the general trends, which are preservation of environment and ecosystem are more important, because mountainous districts are about 70% across the whole extent of Korea. In this paper, the proper design standards for permission of lane changes in bridges and tunnels classified into structure, safe, and driver's conveniences are suggested as follows. 1. Right shoulder should have more than 2.5m in bridges and tunnels. 2. Sufficient equipments of guidance like as directional signs, fingerposts, variable message signs, and markings should be established to smooth and safe lane changes of drivers. 3. Snow melting systems should be established in bridges worried about freezing. 4. Tunnels must be not only satisfied standards for prevention of disasters (2004.11) and lighting rules (KSA 3703), but also established anti-freezing facilities in entrance and exit. 5. The drivers should have honed on their car lights.

  • PDF

Group Key Generation and Exchange Scheme using a Trapdoor Collision Hash in M2M Communications Environment (M2M 통신 환경에서 트랩도어 충돌 해쉬를 이용한 그룹키 생성 및 교환 기법)

  • Kim, Sung-Soo;Jun, Moon-Seog;Choi, Do-Hyeon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.5
    • /
    • pp.9-17
    • /
    • 2015
  • The development of wireless communication technology and change in the ICT market has led to the development of the M2M service and technology. Under these circumstances, the M2M environment has been the focus of communication environment construction between machines without control or direct intervention of human being. With characteristics of wireless communication environment, the possibility of being exposed to numerous security threats and safe communication security technology have becoming an issue an important requirements for problems such as data exposure, forgery, modulation, deletion, and privacy. This research analyzes requirements of trapdoor collision hash, generates keys between groups under the M2M environment by using the specificity of trapdoor, and suggests technology to exchange keys with session keys. Further, it also suggests techniques to confirm authentication of device and gateway in accordance with group key generation. The techniques herein suggested are confirmed as safe methods in that they have attack resistance such as Masquerade Attack, Man-in-the-Middle Attack, and Replay Attack in the group communication block by using the speciality of collision message and collision hash.

A Cluster-Header Selecting Method for more Secure and Energy-Efficient in Wireless Sensor Network (무선 센서 네트워크에서 안전하고 에너지 효율적인 클러스터 헤더 선출 기법)

  • Kim, Jin-Mook;Lee, Pung-Ho;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.107-118
    • /
    • 2007
  • Distributed wireless sensor network in various environment have characteristic that is surveillance of environment-element and offering usefully military information but there is shortcoming that have some secure risks. Therefore secure service must be required for this sensor network safety. More safe and effective techniques of node administration are required for safe communication between each node. This paper proposes effective cluster-header and clustering techniques in suitable administration techniques of group-key on sensor network. In this paper, first each node transmit residual electric power and authentication message to BS (Base-Station). BS reflects "Validity Authentication Rate" and residual electric power. And it selects node that is more than these regularity values by cluster header. After BS broadcasts information about cluster header in safety and it transmits making a list of information about cluster member node to cluster header. Also, Every rounds it reflects and accumulates "Validity Authentication Rate" of former round. Finally, BS can select more secure cluster header.

  • PDF

The proposal of a cryptographic method for the communication message security of GCS to support safe UAV operations (안정적인 UAV 운영을 위한 GCS의 통신메시지의 암호화 제안)

  • Kim, Byoung-Kug;Hong, Sung-Hwa;Kang, Jiheon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1353-1358
    • /
    • 2021
  • IoT (Internet of Things) emerges from various technologies such as communications, micro processors and embedded system and so on. The IoT has also been used to UAV (Unmanned Aerial Vehicle) system. In manned aircraft, a pilot and co-pilot should control FCS (Flight Control System) with FBW(Fly By Wire) system for flight operation. In contrast, the flight operation in UAV system is remotely and fully managed by GCS (Ground Control System) almost in real time. To make it possible the communication channel should be necessary between the UAV and the GCS. There are many protocols between two systems. Amongst them, MAVLink (Macro Air Vehicle Link) protocol is representatively used due to its open architecture. MAVLink does not define any securities itself, which results in high vulnerability from external attacks. This paper proposes the method to enhance data security in GCS network by applying cryptographic methods to the MAVLink messages in order to support safe UAV operations.

A New Arm Swing Walking Pattern-based Walking Safety System (새로운 팔 스윙 보행 패턴 기반 보행 안전 시스템)

  • Lee, Kyung-Min;Lin, Chi-Ho
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.19 no.6
    • /
    • pp.88-95
    • /
    • 2020
  • In this paper, we propose a new arm swing walking pattern-based walking safety system for safe walking of elderly pedestrians. The proposed system is a walking safety system for elderly pedestrians using haptic-based devices such as smart bands and smart watches, and arm swing-based walking patterns to solve the problem that it is difficult to recognize the fall situation of pedestrians with the existing walking patterns of lower limb movements. Use. The arm swing-based walking pattern recognizes the number of steps and the fall situation of pedestrians through the swing of the arm using the acceleration sensor of the device, and creates a database of the location of the fall situation to warn elderly pedestrians when walking near the expected fall location. It delivers a message to provide pedestrian safety to the elderly. This system is expected to improve the safe walking rights and environment of the elderly.

Analysis of Population Mobility Characteristics Based on Emergency Disaster Message Content: Focus on the 2022 Wildfires in Donghae City and Miryang City (긴급재난문자 송출 내용에 따른 유동인구 특성 분석: 2022년 동해시와 밀양시 산불 재난을 중심으로)

  • Dong Kyu Lee;Jae Seon Kim;Kyung Soo Pyo;Min Kim
    • Korean Journal of Remote Sensing
    • /
    • v.39 no.5_2
    • /
    • pp.799-810
    • /
    • 2023
  • This paper analyzed changes in population mobility characteristics based on emergency disaster messages related to wildfires that occurred in 2022, using mobile data. The primary wildfires under analysis are the ones that occurred in Donghae City and Miryang City. Donghae City sent a total of six evacuation messages in response to the wildfire incidents, and all of the message contents specified particular evacuation locations. As a result, it was analyzed that there was a significant impact on changes in population mobility characteristics. On the other hand, in the case of Miryang City, a total of five evacuation messages were sent during the wildfire period, but not all messages specified a clear evacuation location,such as "A safe place". As a result, it was observed that there was minimal change in population mobility due to the lack of clear evacuation locations specified in the messages. These analysis results suggest the need for institutional improvements such as the standardization and specification of emergency alert message content when wildfires or similar disasters occur in different regions.

A Study on Intensified scheme to WLAN Secure based on IEEE 802.1x Framework (IEEE 802.1x 프레임워크 기반에서의 무선랜 보안 강화 방안에 관한 연구)

  • Lee Joon;Hong Seong-pyo;Shin Myeong-sook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.1
    • /
    • pp.136-141
    • /
    • 2006
  • The IEEE 802.1x can be using various user authentication mechanisms: One-Time Password, Certificate-Based TLS, Challenge/Response and Keberos through EAP(Extended Authentication Protocol). But, IEEE 802.1x also has vulnerabilities about the DoS, the session hijacking and the Man in the Middle attack due to the absence of AP authentication. In this paper, we propose a WLAN secure system which can offer a safety secure communication and a user authentications by intensified the vulnerability of spoofing and DoS attacks. The suppose system offers a safe secure communication because it offers sending message of integrity service and also it prevents DoS attack at authentication initial phase.

The Design and Implementation of Messenger Authentication Protocol to Prevent Smartphone Phishing (스마트폰 피싱에 안전한 메신저 인증 프로토콜 설계 및 구현)

  • Yu, Byung-Seok;Yun, Sung-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.2 no.4
    • /
    • pp.9-14
    • /
    • 2011
  • Phishing is an attack to theft an user's identity by masquerading the user or the device. The number of phishing victims are sharply increased due to wide spread use of smart phones and messenger programs. Smart phones can operate various wi-fi based apps besides typical voice call and SMS functions. Generally, the messenger program such as Kakao Talk or Nate On is consisted of client and server functions. Thus, the authentication between the client and the server is essential to communicate securely. In this paper, we propose the messenger authentication protocol safe against smart phone phishing. To protect communications among clients, the proposed method provides message encryption and authentication functions.

Design of the protocol for reporting sensor data on passenger ship (여객선 센서 및 장비 정보 전송을 위한 ASM 설계)

  • Kim, Kil-Yong;Jo, Gi-Jong;Lee, Seo-Jeong
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2016.05a
    • /
    • pp.62-63
    • /
    • 2016
  • A variety of sensors and equipment are installed on passenger ships. Data collection from these sensors and associated equipment is required for the safe navigation and behavior analysis of ships, but when the ship sails out of the area where it is not possible to use the LTE communication, other types of networks have to be able to support to transmit these information. such as AIS, satellite communication and MF/HF. In this paper, we survey data protocol of onboard sensors and design ASM messages to transfer sensor data on board to the shore-side system.

  • PDF