• Title/Summary/Keyword: secure solution

Search Result 355, Processing Time 0.025 seconds

A Study on Security Solution for USB Flash Drive (USB 메모리를 위한 보안 솔루션에 관한 연구)

  • Lee, Sun-Ho;Lee, Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.1
    • /
    • pp.93-101
    • /
    • 2010
  • A USB flash drive is a portable storage device. For its promising moderate price, portability and high capacity USB flash drive users are increasing rapidly. Despite these advantages USB flash drives have critical problems as well. Such as personal information data leakage due to easy loss of the portable device. As these personal information leakage incidents increases various security measure solutions are produced and distributed. Despite these security measures and solutions it is not enough to perfectly protect personal data leakage. Hence the necessity of a more concrete, secure, user-friendly security measure solution is required. In this paper we provide you with portable USB flash drive security solution analysis and provide you with the latest secure, user-friendly security measure solutions.

Investigation of Secure Wireless Multihop Ad hoc Network (안전한 무선 Multihop Ad hoc 네트워크를 위한 연구)

  • Lee, Sang-Duck;Park, Jong-An;Han, Seung-Jo;Pyun, Jae-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.1
    • /
    • pp.118-126
    • /
    • 2007
  • An ad hoc network is a system of wireless mobile nodes that dynamically self-organize in arbitrary and temporary network topologies allowing people and devices to internetwork without any preexisting communication infrastructure. Although ad hoc network is attractive solution, there are still some major flaws that prevent commercial growth. Security is one of these main barriers; ad hoc networks are known to be particularly vulnerable to security attack. It is difficult to establish a centralized key distribution center and a trusted certification authority to provide cryptographic keys and digital certificates to nodes. To prevent attacks in ad hoc routing protocols, many algorithms have been used. In this paper, we have depicted a secure framework for multipath routing in wireless multihop network, which is comprehensive solution for secure data forwarding in wireless multihop networks. With the simulation results, the proposed scheme is compared with existing source routing scheme.

  • PDF

Secure Password-based Authentication Method for Mobile Banking Services

  • Choi, Dongmin;Tak, Dongkil;Chung, Ilyong
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.1
    • /
    • pp.41-50
    • /
    • 2016
  • Moblie device based financial services are vulnerable to social engineering attacks because of the display screen of mobile devices. In other words, in the case of shoulder surfing, attackers can easily look over a user's shoulder and expose his/her password. To resolve this problem, a colour-based secure keyboard solution has been proposed. However, it is inconvenient for genuine users to verify their password using this method. Furthermore, password colours can be exposed because of fixed keyboard colours. Therefore, we propose a secure mobile authentication method to provide advanced functionality and strong privacy. Our authentication method is robust to social engineering attacks, especially keylogger and shoulder surfing attacks. According to the evaluation results, our method offers increased security and improved usability compared with existing methods.

A Secure Protocol for High-Performance RFID Tag (고기능 RFID 태그를 위한 보안 프로토콜)

  • Park, Jin-Sung;Choi, Myung-Ryul
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.54 no.4
    • /
    • pp.217-223
    • /
    • 2005
  • In this paper, we have proposed a secure dynamic ID allocation protocol using mutual authentication on the RFID tag. Currently, there are many security protocols focused on the low-price RFID tag. The conventional low-price tags have limitation of computing power and rewritability of memory. The proposed secure dynamic ID allocation protocol targets to the high-performance RFID tags which have more powerful performance than conventional low-price tag by allocating a dynamic ID to RFID using mutual authentication based on symmetric encryption algorithm. This protocol can be used as a partial solution for ID tracing and forgery.

Empowering Blockchain For Secure Data Storing in Industrial IoT

  • Firdaus, Muhammad;Rhee, Kyung-Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.05a
    • /
    • pp.231-234
    • /
    • 2020
  • In the past few years, the industrial internet of things (IIoT) has received great attention in various industrial sectors which have potentially increased a high level of integrity, availability, and scalability. The increasing of IIoT is expected to create new smart industrial enterprises and build the next generation smart system. However existing IIoT systems rely on centralized servers that are vulnerable to a single point of failure and malicious attack, which exposes the data to security risks and storage. To address the above issues, blockchain is widely considered as a promising solution, which can build a secure and efficient environment for data storing, processing and sharing in IIoT. In this paper, we propose a decentralized, peer-to-peer platform for secure data storing in industrial IoT base on the ethereum blockchain. We exploit ethereum to ensure data security and reliability when smart devices store the data.

Study on grout-free smart ground anchor using electromagnetic induction

  • Hyun-Seok Lee;Jong-Kyu Park;Jung-Tae Kim
    • Structural Engineering and Mechanics
    • /
    • v.90 no.6
    • /
    • pp.531-542
    • /
    • 2024
  • This study proposes a ground anchor using electromagnetic induction and utilizes an extended structure using hinges and links and mounting and sensing using electromagnets. The aim is to secure the anchor force, excluding grout, and to secure various sensing capabilities, including ground behavior. We propose a design based on the drilling diameter of 150 mm, and the materials used were STS304 and Aluminum 6061-T6. Computerized analysis was performed to confirm structural safety and functional implementation. The pull-out experiment was conducted by simulating the bedrock environment on a model earthwork as an experiment to check whether anchor force was generated by the insertion and tension of the anchor. The environmental pollution of grout, the difficulty of removing strands, and the inability to check whether the anchor is seated, which were pointed out as disadvantages of the existing ground anchor, were solved. Therefore, this study suggest that it can be effectively utilized as a secure and monitored anchoring solution in eco-friendly construction practices, including the installation of landslide prevention barriers.

New Secure Network Coding Scheme with Low Complexity (낮은 복잡도의 보안 네트워크 부호화)

  • Kim, Young-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.4
    • /
    • pp.295-302
    • /
    • 2013
  • In the network coding, throughput can be increased by allowing the transformation of the received data at the intermediate nodes. However, the adversary can obtain more information at the intermediate nodes and make troubles for decoding of transmitted data at the sink nodes by modifying transmitted data at the compromised nodes. In order to resist the adversary activities, various information theoretic or cryptographic secure network coding schemes are proposed. Recently, a secure network coding based on the cryptographic hash function can be used at the random network coding. However, because of the computational resource requirement for cryptographic hash functions, networks with limited computational resources such as sensor nodes have difficulties to use the cryptographic solution. In this paper, we propose a new secure network coding scheme which uses linear transformations and table lookup and safely transmits n-1 packets at the random network coding under the assumption that the adversary can eavesdrop at most n-1 nodes. It is shown that the proposed scheme is an all-or-nothing transform (AONT) and weakly secure network coding in the information theory.

TriSec: A Secure Data Framework for Wireless Sensor Networks Using Authenticated Encryption

  • Kumar, Pardeep;Cho, Sang-Il;Lee, Dea-Seok;Lee, Young-Dong;Lee, Hoon-Jae
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.2
    • /
    • pp.129-135
    • /
    • 2010
  • Wireless sensor networks (WSNs) are an emerging technology and offers economically viable monitoring solution to many challenging applications. However, deploying new technology in hostile environment, without considering security in mind has often proved to be unreasonably unsecured. Apparently, security techniques face many critical challenges in WSNs like data security and secrecy due to its hostile deployment nature. In order to resolve security in WSNs, we propose a novel and efficient secure framework called TriSec: a secure data framework for wireless sensor networks to attain high level of security. TriSec provides data confidentiality, authentication and data integrity to sensor networks. TriSec supports node-to-node encryption using PingPong-128 stream cipher based-privacy. A new PingPong-MAC (PP-MAC) is incorporated with PingPong stream cipher to make TriSec framework more secure. PingPong-128 is fast keystream generation and it is very suitable for sensor network environment. We have implemented the proposed scheme on wireless sensor platform and our result shows their feasibility.

Study on the Leaching Characteristics of Simulated Nuclear Waste Glass with variable Composition (핵폐기용 모의글라스의 조성변화에 따른 용출특성에 관한 연구)

  • 한호현;이승한;류수착;류봉기
    • Journal of the Korean institute of surface engineering
    • /
    • v.28 no.5
    • /
    • pp.259-266
    • /
    • 1995
  • In order to manufacture an attractive waste glass for the permanent and secure disposal of high-level radioactive waste, the complex composition of the simulated nuclear waste glass PNL-7668 was simplified to a composition of sodium borosilicate glass. The substitutions of $Fe_2O_3$ and $Al_2O_3$ were added to examine on the leaching characteristics of simulated nuclear waste glass with variable composition. The leach tests for these glasses were performed according to 'MCC-1, Static Leach Test Procedure' in acid and basic solution. In this study, for the $Al_2O_3$-containing glasses, Na ion release from these glasses was higher in acid solution than in basic solution. As the content of $Fe_2O_3$ was increased in glasses, Na ion release was increased in acid solution, in spite of decrease of amount of total mass diminution.

  • PDF

Simulation of Changes in Nearby Thermal Environment According to Green Roof in Low-Rise Residential Area of Daegu (대구광역시 저층주거지역의 옥상녹화 조성에 따른 주변 열환경 변화 모의실험)

  • Kim, Dae-Wuk;Jung, Eung-Ho;Cha, Jae-Gyu
    • Journal of the Korean housing association
    • /
    • v.24 no.3
    • /
    • pp.45-53
    • /
    • 2013
  • It is important to secure green spaces to solve the urban heat island phenomenon, which is among problems resulted by high-density developments in metropolitan areas. However, it is hard to secure such green spaces in established urban areas so Green Rooftop development approaches have recently been highlighted and introduced as a solution to the situation. The present study conducts a simulation on residential areas in urbanized regions to quantitatively evaluate the effects of green rooftop developments through a comparison of changes in the air temperatures before and after relevant development projects. According to the evaluation results, when the green roof top development is conducted in the available areas, the temperature is reduced by 0.14 degree. The extension of green project to the entire building showed the reduction of the temperature by 0.29 degree. Based on these results, it can be concluded that the green rooftop development is a practically solution for reducing the air temperature of urbanized areas.