• Title/Summary/Keyword: session key

Search Result 326, Processing Time 0.024 seconds

A Proposal of the Authentication Protocol for Wireless Mobile Communication Systems Using Keyed Hash Function

  • Park, Young-Ho
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.6 no.1
    • /
    • pp.56-60
    • /
    • 2001
  • An authentication protocol for wireless mobile communication systems is proposed. The protocol employs the keyed hash function to provide mutual authentication and session key distribution. This makes the low computation power of mobile stations. To provide the security architecture with minimal assumption about the security of intermediate transport networks, this protocol has no assumptions about the security of the intermediate, fixed networks.

  • PDF

A Secure and Fast Session Key Distribution Mechanism in Diameter Mobile IP Environment (Diameter Mobile IP 환경에서 안전하고 빠른 세션키 분배 메커니즘)

  • Song, Ji-Eun;Cho, Gi-Hwan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05c
    • /
    • pp.2109-2112
    • /
    • 2003
  • Diameter-MIPV4 프로토콜은 기존 Mobile IP(MIP)의 취약한 키 분배 문제를 해결하고 이동노드에 대해 인증 및 권한 검증, 과금 서비스 등을 지원함으로써 보다 개선된 보안 메커니즘을 제안하고 있다. 그러나 흠 망의 Diameter 서버에 의해 인증 및 등록이 수행된 후 공중망을 통해서 이동노드에게 세션키를 분배하는 것은 많은 보안상 공격에 노출될 수 있으며 원격지 도메인간의 빈번한 등록 메시지 교환은 통신 지연을 야기 시킬 수 있다. 본 논문에서는 안전한 세션키 분배를 위해서, 이동 노드의 등록 수행 과정 중 홈 망과 방문 망 사이에 IPsec(IP security) 터널을 구축함으로써 공중망에서의 세션키 유출 위협을 감소시켰다. 또한 네트워크의 계층성과 Micro-Mobility MIP 메커니즘을 이용하여 동일 도메인 내에서의 핸드오프 시 이동 노드의 인증 및 등록, 세션키 분배를 지역화 함으로써 통신 지연 문제를 효율적으로 개선하였다.

  • PDF

Design of Safe AP Certification Mechanism on Wireless LAN (무선 LAN 상에서 안전한 AP 인증 메커니즘 설계)

  • Kim, Jeom-Goo
    • Convergence Security Journal
    • /
    • v.11 no.1
    • /
    • pp.33-38
    • /
    • 2011
  • Current IEEE 802.11 standard is very vulnerable that between the AP and STA authentication and security mechanisms is widely known. Therefore, IEEE has proposed security architecture RSN (Robust Security Network) for 802.11. RSN is used the access control, authentication, and key management based on the IEEE 802.1X standard. In this paper, IEEE 802.1X or 802.11 a combination of several models proposed for the vulnerability, and session hijacking or MiM (Man-in the-Middle) attacks to respond, the authentication mechanism Was designed to the access control between the STA and the AP.

Security Analysis and Enhancement on Smart card-based Remote User Authentication Scheme Using Hash Function (효율적인 스마트카드 기반 원격 사용자 인증 스킴의 취약점 분석 및 개선 방안)

  • Kim, Youngil;Won, Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1027-1036
    • /
    • 2014
  • In 2012, Sonwanshi et al. suggested an efficient smar card based remote user authentication scheme using hash function. In this paper, we point out that their scheme is vulnerable to offline password guessing attack, sever impersonation attack, insider attack, and replay attack and it has weakness for session key vulnerability and privacy problem. Furthermore, we propose an improved scheme which resolves security flaws and show that the scheme is more secure and efficient than others.

A Study on Smart-Card Based User Authentication (스마트카드 기반의 사용자 인증 기법에 관한 연구)

  • Lee, Jaeyoung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.2
    • /
    • pp.27-33
    • /
    • 2018
  • User authentication scheme is a method for controlling unauthorized users' access to securely share the services and resources provided by the server and for verifying users with access rights. Initial user authentication scheme was based on passwords. Nowadays, various authentication schemes such as ID based, smart-card based, and attribute based are being researched. The study of Lee et al. suggested a user authentication scheme that provides forward secrecy and protects anonymity of users. However, it is vulnerable to attacks by outsiders and attackers who have acquired smart-cards. In this paper, we propose a modified smart-card authentication scheme to complement the weakness of the previous studies. The proposed user authentication scheme provides the security for the ID guessing attack and the password guessing attacks of the attacker who obtained the login request message and the user's smart-card.

TAGUCHI OPTIMIZATION OF DISPLACEMENTS DURING THE DESIGN PHASE OF A CONSTRUCTION PROJECT

  • E.S. N. Telis;G. J. Besseris
    • International conference on construction engineering and project management
    • /
    • 2007.03a
    • /
    • pp.721-728
    • /
    • 2007
  • The prediction of quality characteristics during the design phase of a construction project was fragmented, because no particular method exists. One of the most important key responses is the total displacements (horizontal and vertical). A brainstorming session produces the quality parameters i.e. the control factors which here are identified as: the steel joint, the pile's length, the excavation depth and angle, the distance between the piles, the anchor stretch and length to name just some of the most engaging in the design. The purpose of this study is to optimise these parameters to minimize the total displacements following a methodology based on Taguchi method. For this reason, a 2-level, L8 orthogonal array has been employed to organize the experimentation. Data is obtained from a real-life excavation project designed on the Plaxis v.8 CAE package. Taguchi analysis is performed in the statistical package Minitab.

  • PDF

Privacy-Preserving NFC-Based Authentication Protocol for Mobile Payment System

  • Ali M. Allam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.5
    • /
    • pp.1471-1483
    • /
    • 2023
  • One of the fastest-growing mobile services accessible today is mobile payments. For the safety of this service, the Near Field Communication (NFC) technology is used. However, NFC standard protocol has prioritized transmission rate over authentication feature due to the proximity of communicated devices. Unfortunately, an adversary can exploit this vulnerability with an antenna that can eavesdrop or alter the exchanged messages between NFC-enabled devices. Many researchers have proposed authentication methods for NFC connections to mitigate this challenge. However, the security and privacy of payment transactions remain insufficient. We offer a privacy-preserving, anonymity-based, safe, and efficient authentication protocol to protect users from tracking and replay attacks to guarantee secure transactions. To improve transaction security and, more importantly, to make our protocol lightweight while ensuring privacy, the proposed protocol employs a secure offline session key generation mechanism. Formal security verification is performed to assess the proposed protocol's security strength. When comparing the performance of current protocols, the suggested protocol outperforms the others.

An Authentication and Session Key Distribution Mechanism Secure Against DoS Attacks in the 802.11 WLAN (IEEE 802.11 무선랜 DoS 공격에 안전한 인증 및 세션키 분배 메커니즘)

  • Byung-Duk Woo;Chang-Seop Park
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.1413-1416
    • /
    • 2008
  • 최근 들어 IEEE 802.11 WLAN 서비스에 대한 수요의 증가와 함께 WLAN 환경에서 실시간 멀티미디어 서비스를 이용하려는 사용자의 관심이 날로 증가하고 있다. 그러나 IEEE 802.11i 의 보안 정책은 MS 의 이동이 빈번하게 발생하는 WLAN 환경에서 끊김 없는 실시간 멀티미디어 서비스를 제공하기에는 핸드오프 지연 시간이 너무 길다. 본 논문은 DoS 공격에 취약한 기존 802.11i 에서의 4-way Handshake 를 대체하는 신속하고 효율적인 인증 및 세션키 분배 메커니즘을 제안한다.

Hyper-encryption Scheme for Data Confidentiality in Wireless Broadband (WiBro) Networks

  • Hamid, Abdul;Hong, Choong-Seon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1096-1097
    • /
    • 2007
  • We address the data confidentiality for wireless broadband (WiBro) networks. In WiBro, as the channel is wireless in nature, it suffers from passive and active attack. Passive attack, for example is to decrypt traffic based on statistical analysis and active attack is to modify traffic or inject new traffic from unauthorized mobile stations. Due to high mobility, frequent session key distribution is a bottleneck for the mobile stations. In aspect of WiBro, there is a communication between mobile station to base station, and also in mobile station to mobile station. It is expected to ensure data confidentiality while maintaining minimum overhead for the resource constrained mobile stations. In this paper, we proposed a security framework based on the concept of hyper-encryption to provide data confidentiality for wireless broadband networks.

A Study on the Applicability of Concept Mapping in the Planning of Network Outcomes Measurement (네트워크 성과측정 기획을 위한 개념도 연구법(Concept Mapping) 적용가능성)

  • Kim, Ji-Young
    • Korean Journal of Social Welfare
    • /
    • v.59 no.3
    • /
    • pp.281-304
    • /
    • 2007
  • The purpose of this study is to verify the applicability of concept mapping in the process of planning of network outcomes in social welfare. Planning and evaluation of network outcomes involve many stakeholders. Recognizing the value and range of individuals' perspectives in the creation of a common framework is one of the biggest methodological challenges for planning of network outcomes. Concept mapping is a kind of methodology that creates a stakeholder-authored visual geography of ideas from a group. It uses both a quantitative and qualitative approach, including brainstorming, structuring the statement, specific analysis and data interpretation methods to produce maps that can then be used to guide planning and evaluation efforts on the issues that matter to the group. 13 network managers who work in the social welfare centers in Busan are core participants. The 50 statements on network outcomes from brainstorming session fell into six distinct clusters. After the interpretation session these clusters were rated according to the seven rating scales. This paper explores applicability of concept mapping in the process of planning of network outcomes in social welfare. Concept mapping helps stakeholders with different value and ideas about network outcomes to consensus on common conceptual framework. In addition, a multidimensional conceptualization of network outcomes was made. It will assist in designing future outcomes evaluation and guide the evaluators through a selection of key activities and outcomes.

  • PDF