• Title/Summary/Keyword: secure communications

Search Result 490, Processing Time 0.027 seconds

Secure and Lightweight Mutual Authentication Protocol in Mobile NFC-based Access Environment (모바일 NFC 출입환경에서 안전하고 경량화된 상호인증 프로토콜)

  • Kim, Su-Jin;Lee, Taekkyeun;Kim, Ki-Hyung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.764-767
    • /
    • 2013
  • Near Field Communication (NFC) 기능이 가능한 스마트폰을 통해 경제적인 효과 및 편의성을 증대시킬 수 있는 서비스들이 늘어나고 있다. 하지만 그에 따른 NFC 보안기술은 미흡한 실정이다. 그 중 출입인증서비스는 데이터를 보호하고 사용자에게 편리성을 제공해야하는 서비스이다. 본 연구에서는 모바일 NFC 출입서비스 시 발생 가능한 보안취약점과 관련연구에 대해 분석하고 이를 해결하기위한 경량화된 출입인증메커니즘을 제안하여 안전성을 증가시키고, 불필요한 연산을 줄여 향상된 속도를 제공하는 NFC 출입서비스를 제공하고자 한다.

Efficient Password-based Key Exchange Protocol for Two users Registered in a Server (동일 서버를 사용하는 두 사용자간 효율적인 패스워드 기반의 키 교환 프로토콜)

  • Shin Seong-chul;Lee Sung-woon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.127-133
    • /
    • 2005
  • This paper presents a password-based key exchange protocol to guarantee secure communications for two users registered in a sever. In this protocol, the server is only responsible for the legality of the users but does not how the session key agreed between them. The protocol can resist the various attacks including server compromise attack and provide the perfect forward secrecy. The proposed protocol is efficient in terms of computation cost because of not employing the sewer's public key.

Detection Mechanism on Vehicular Adhoc Networks (VANETs) A Comprehensive Survey

  • Shobana, Gopalakrishnan;Arockia, Xavier Annie R.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.294-303
    • /
    • 2021
  • VANET is an upcoming technology with an encouraging prospect as well as great challenges, specifically in its security. This paper intends to survey such probable attacks and the correlating detection mechanisms that are introduced in the literature. Accordingly, administering security and protecting the owner's privacy has become a primary argument in VANETs. To furnish stronger security and preserve privacy, one should recognize the various probable attacks on the network and the essence of their behavior. This paper presents a comprehensive survey on diversified attacks and the recommended unfolding by the various researchers which concentrate on security services and the corresponding countermeasures to make VANET communications more secure.

Secret Key and Tag Generation for IIoT Systems Based on Edge Computing

  • Koh, Giheon;Yu, Heungsik;Kim, Sungun
    • Journal of Multimedia Information System
    • /
    • v.8 no.1
    • /
    • pp.57-60
    • /
    • 2021
  • Industry 4.0 is continuous automation by applying the latest smart technologies to traditional manufacturing industries. It means that large-scale M2M (Machine-to-Machine) communication and IoT (Internet of Things) technologies are well integrated to build efficient production systems by analyzing and diagnosing various issues without human intervention. Edge computing is widely used for M2M services that handle real-time interactions between devices at industrial machinery tool sites. Here, secure data transmission is required while interacting. Thus, this paper focused on a method of creating and maintaining secret key and security tag used for message authentication between end-devices and edge-device.

A Low Power Wireless Communication-based Air Pollutants Measuring System (저전력 무선통신 기반 대기오염 측정시스템)

  • Kang, Jeong Gee;Lee, Bong Hwan
    • Journal of Information Technology Applications and Management
    • /
    • v.28 no.6
    • /
    • pp.87-95
    • /
    • 2021
  • Recently interest for air pollution is gradually increasing. However, according to the environmental assessment of air quality, the level of air pollution in the nation is quite serious, and air pollutants measuring facilities are also not enough. In this paper, a secure air pollutants sensor system based low power wireless communication is designed and implemented. The proposed system is composed of three parts: air pollutants measuring sensors module, LoRa-based data transmission module, and monitoring module. In the air pollutants measuring module, the MSP430 board with six big air pollutants measuring sensors are used. The air pollutants sensing data is transmitted to the control server in the monitoring system using LoRa transmission module. The received sensing data is stored in the database of the monitoring system, and visualized in real-time on the map of the sensor locations. The implemented air pollutant sensor system can be used for measuring the level of air quality conveniently in our daily lives.

Secure Physical Layer Key Generation in Untrusted Wireless Relay Communications and Networks (비신뢰 무선 릴레이 통신 네트워크의 안전한 물리계층 키 생성 기법)

  • So-Hyun Park;Il-Gu Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.158-161
    • /
    • 2024
  • 물리계층 키 생성 기법은 두 단말 간의 채널 상태 정보를 이용해 일시적인 대칭키를 생성하는 경량 키 생성 기술이다. 하지만, 두 단말 사이에 다이렉트 링크가 없는 릴레이 기반 통신 네트워크 환경에서는 물리계층 키 생성이 어렵고, 비신뢰 릴레이에 의한 키 유출 가능성이 존재한다. 본 연구는 비신뢰 릴레이 통신 네트워크 환경에서 비밀키 정보를 노출하지 않고 안전하게 키를 생성하고 공유하는 방법을 제안하고 보안성을 평가한다. 실험 결과에 따르면 종래 방식보다 제안하는 방식의 키 유출률(key leakage rate, KLR)이 87.5% 감소하였고, 릴레이 수가 증가할수록 KLR이 감소하여 제안하는 방식이 비신뢰 릴레이 환경에서 높은 보안성을 보장함을 확인하였다.

Dynamic Secure Link Adaptation Technique for Low-power IoT Communications (저전력 사물인터넷 통신을 위한 동적 보안 링크 적응 기법)

  • Chae-Yeon Park;Sun-Jin lee;Il-Gu Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.167-168
    • /
    • 2024
  • 본 연구에서는 물리계층 보안을 위한 키 길이를 IoT 무선 채널 상태에 따라 조정하는 링크 적응 방법을 제안한다. 시뮬레이션 결과에 따르면 제안 방식은 종래 방식 대비 평균 78.52% 개선된 처리율과 약 2배 개선된 보안성을 보인다.

Design and Implementation of XML based Global Peer-to-Peer Engine (XML기반 전역 Peer-to-Peer 엔진 설계 및 구현)

  • Kwon Tae-suk;Lee Il-su;Lee Sung-young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.1B
    • /
    • pp.73-85
    • /
    • 2004
  • SIn this paper, we introduce our experience for designing and implementing new concept of a global XML-based Peer-to-Peer (P2P) engine to support various P2P applications, and interconnection among PC, Web and mobile computing environments. The proposed P2P engine can support to heterogeneous data exchanges and web interconnection by facilitating with the text-base XML while message exchange are necessary. It is also to provide multi-level security functions as well as to apply different types of security algorithms. The system consist of four modules; a message dispatcher to scheduling and filtering the message, a SecureNet to providing security services and data transmission, a Discovery Manager to constructing peer-to-peer networking, and a Repository Manager to processing data management including XML documents. As a feasibility test, we implement various P2P services such as chatting as a communication service, white-board as an authoring tool set during collaborative working, and a file system as a file sharing service. We also compared the proposed system to a Gnutella in order to measure performance of the systems.

Implementation of Embedded Biometrics Technologies : A Case of a Security Token for Fingerprints (임베디드 생체 인식 기술 구현 : 지문 보안 토큰 사례)

  • 김영진;문대성;반성범;정용화;정교일
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.40 no.6
    • /
    • pp.39-46
    • /
    • 2003
  • Biometric technologies using biometric information like fingerprints features are in wide use for the secure user authentication in many services including log-in of computer systems, entrance ID and E-commercial security. Nowadays, biometric technologies are ported into small embedded systems like security tokens or smart cards due to the merit of being secure and automatic in comparison with the previous method in user authentication such as using a PIN. In this paper, the security token developed as an embedded system and tile user authentication system implemented and tested using fingerprints information are described. Communications between the security token and tile host are tested and verified with USB. And, execution time and runtime memory on tile security token board was measured and performance improvement was described. In addition, requisites for the transit from the security token to the match-on-card was mentioned.

A Secure WPA-PSK Protocol Resistant to Dictionary Attack on Smartphone Communication Using Wi-Fi Channel (Wi-Fi를 이용한 스마트폰에서 사전 공격에 안전한 WPA-PSK 프로토콜)

  • Park, Geun-Duk;Park, Jeong-Soo;Ha, Jae-Cheol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.4
    • /
    • pp.1839-1848
    • /
    • 2012
  • Recently, smartphone communications using Wi-Fi channel are increasing rapidly to provide diverse internet services. The WPA security protocol was used for data protection between user and wireless AP. However, WPA-PSK protocol was known to be weak to the dictionary attack. In this paper, we proposed a secure WPA-PSK protocol to resist the dictionary attack. Since the proposed method was designed to generate a strong encryption key which is combined the Diffie-Hellman key agreement scheme with secrecy property of PSK(Pre-Shared Key), we can protect the Wi-Fi channel from Man-In-The-Middle attack and Rogue AP impersonation attack.