• Title/Summary/Keyword: temporary ID

Search Result 15, Processing Time 0.028 seconds

Secure Authentication Scheme with Anonymity for Wireless Environments

  • Xiu, Anna;Li, Kun;Kim, Hyoung-Joong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.1033-1036
    • /
    • 2011
  • With the development of wireless networks and the use of mobile devices, mobile user's privacy issue is becoming more and more important. Privacy includes ID anonymity and unlinkability. Unlinkability requires that any two temporary IDs which have been used before should not be associated with each other. In other words, these temporary IDs should be generated in such a way that no direct relationship among them should be derived. The existing schemes only focus on ID anonymity of mobile users. In this paper, we proposed a scheme not only holding all the merits of previous works, but also achieving unlinkability which is guaranteed by using one-time-use temporary ID. And the mobile user can also updates its one-time-use temporary ID with the help of the visited foreign agent.

Dynamic ID randomization for user privacy in mobile network

  • Arijet Sarker;SangHyun Byun;Manohar Raavi;Jinoh Kim;Jonghyun Kim;Sang-Yoon Chang
    • ETRI Journal
    • /
    • v.44 no.6
    • /
    • pp.903-914
    • /
    • 2022
  • Mobile and telecommunication networking uses temporary and random identifiers (IDs) to protect user privacy. For greater intelligence and security o the communications between the core network and the mobile user, we design and build a dynamic randomization scheme for the temporary IDs for mobile networking, including 5G and 6G. Our work for ID randomization (ID-RZ) advances the existing state-of-the-art ID re-allocation approach in 5G in the following ways. First, ID-RZ for ID updates is based on computing, as opposed to incurring networking for the re-allocation-based updates, and is designed for lightweight and low-latency mobile systems. Second, ID-RZ changes IDs proactively (as opposed to updating based on explicit networking event triggers) and provides stronger security (by increasing the randomness and frequency of ID updates). We build on the standard cryptographic primitives for security (e.g., hash) and implement our dynamic randomization scheme in the 5G networking protocol to validate its design purposes, which include time efficiency (two to four orders of magnitude quicker than the re-allocation approach) and appropriateness for mobile applications.

Buckling Design of Temporary Bridges Subjected to Both Bending and Compression (압축과 휨을 동시에 받는 가교량 주요부재의 좌굴설계)

  • So Byoung-Hoon;Kyung Yong-Soo;Bang Jin-Hwan;Kim Moon-Young
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 2006.04a
    • /
    • pp.977-984
    • /
    • 2006
  • Generally main girders and steel piers of temporary bridges form the steel rahmen structure. In this study, the rational stability design procedure for main members of temporary bridges is presented using 3D system buckling analysis and second-order elastic analysis. 2 types of temporary bridges, which are possible to be designed and fabricated in reality, are chosen and the buckling design for them is performed considering load combinations of dead and live loads, thermal load, and wind load. Effective buckling length of steel piers, effects of live loads on effective length of main members, transition of ~id buckling modes, and effects of second-order analysis are investigated through case study of 2 temporary bridges.

  • PDF

A Design of Hadoop Security Protocol using One Time Key based on Hash-chain (해시 체인 기반 일회용 키를 이용한 하둡 보안 프로토콜 설계)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.4
    • /
    • pp.340-349
    • /
    • 2017
  • This paper is proposed Hadoop security protocol to protect a reply attack and impersonation attack. The proposed hadoop security protocol is consists of user authentication module, public key based data node authentication module, name node authentication module, and data node authentication module. The user authentication module is issued the temporary access ID from TGS after verifing user's identification on Authentication Server. The public key based data node authentication module generates secret key between name node and data node, and generates OTKL(One-Time Key List) using Hash-chain. The name node authentication module verifies user's identification using user's temporary access ID, and issues DT(Delegation Token) and BAT(Block Access Token) to user. The data node authentication module sends the encrypted data block to user after verifing user's identification using OwerID of BAT. Therefore the proposed hadoop security protocol dose not only prepare the exposure of data node's secret key by using OTKL, timestamp, owerID but also detect the reply attack and impersonation attack. Also, it enhances the data access of data node, and enforces data security by sending the encrypted data.

A Design of Protocol for Protection of Privacy Using Temporary ID in u-health Environment based on ZigBee (ZigBee 기반의 u-health 환경에서 임시 ID를 이용한 프라이버시 보호 프로토콜 설계)

  • Kim, Nak-Hyun;Lee, Keun-Wang;Jun, Mun-Seog
    • Proceedings of the KAIS Fall Conference
    • /
    • 2012.05b
    • /
    • pp.477-480
    • /
    • 2012
  • 본 논문에서는 ZigBee 기반의 u-health 환경에서 센서노드가 고유한 식별 값을 기반으로 통신을 하기 때문에 발생될 수 있는 프라이버시 침해의 가능성이 있으므로 임시 ID를 사용하여 통신하는 프로토콜을 설계하여 제안한다. u-health 환경은 인체에서 측정된 생체신호를 센서노드가 게이트웨이 디바이스로 전송하는 ZigBee 통신 구간이 가장 취약한 부분이다. 그리고 개인의 생체신호 데이터는 의료정보로 분류될 수 있는 민감한 정보로서 보호가 필요하여 본 논문에서 해당 구간의 취약점을 보완하는 프로토콜을 제안한다.

  • PDF

A Study on Authentication ID using Identifier in Ad-hoc Network (Ad-hoc 네트워크에서 식별자를 이용한 인증 아이디에 관한 연구)

  • Moon, Jong-Sik;Byeon, Sang-Gu;Lee, Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.8
    • /
    • pp.1202-1211
    • /
    • 2010
  • The connection between devices in Ad-hoc network a network based on trust. Because a temporary device frequently join or leave, the authentication and security technology should be prepared for malicious device of a third-party attacks. The authentication scheme with the existing certification and ID, and the security technology using symmetric key and the public key is used. Therefore, in this paper we proposed two devices not having shared information use to generate each other's authentication ID. The use of authentication ID can establish the mutual trust and, provide security and efficiency for communication uses to generate a symmetric key.

Enhancing Identity Privacy Using Identity-Based Encryption in Access Networks of 3GPP (3GPP 접속 망에서 ID 기반 암호를 이용한 신원 프라이버시 개선 연구)

  • Jung, Yonghyun;Lee, Dong Hoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.10
    • /
    • pp.361-372
    • /
    • 2016
  • Identity Privacy issues such as exposures of IMSIs(International Mobile Subscriber Identities) in access network have been consistently raised throughout GSM, UMTS, LTE in 3GPP. The 3GPP specification uses temporary identities instead of IMSI to ensure anonymity of the user. Even if temporary identities are disclosed, Identity Privacy may be maintained at a safe level by security policies such as no linkability and periodic update. But in case of IMSI, it cannot be changed even though it is exposed. There still exist some situations that IMSI is used in clear text for the authentication. Therefore, a protective mechanism for the identity confidentiality is needed. In this paper we propose a protocol based on IBE(Identity-based Encryption) to protect permanent identities in access network. By simplifying the scheme, this protocol has minimized the system impact on current 3GPP environment. And this scheme can be applied to all kind of permanent identities and 3GPP AKA(Authentication and Key Agreement) protocols in access network.

A License Administration Protocol Providing User Privacy in Digital Rights Management (디지털 저작권 관리에서 사용자의 프라이버시 보호를 제공하는 라이센스 관리 프로토콜)

  • 박복녕;김태윤
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.2
    • /
    • pp.189-198
    • /
    • 2003
  • As people are damaged increasingly by personal information leakage, awareness about user privacy infringement is increasing. However, the existing DRM system does not support the protection of user's personal information because it is not necessary for the protection of copyrights. This paper is suggesting a license administration protocol which is more powerful to protect personal information in DRM. To protect the exposure of users identifier, this protocol uses temporary ID and token to guarantee anonymity and it uses a session key by ECDH to cryptography and Public-Key Cryptosystem for a message so that it can protect the exposure of personal information and user's privacy.

Optimized Cell ID Codes for SSDT Power Control in W-CDMA System (W-CDMA 시스템의 최적의 SSDT 전력 제어용 셀 식별 부호)

  • Young-Joon Song;Bong-Hoe Kim;Hae Chung
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.13 no.8
    • /
    • pp.804-810
    • /
    • 2002
  • The code division multiple access(CDMA) system capacity is limited by the amount of interference of the system. To reduce the unnecessary interference, this paper proposes optimized cell identification codes for site selection diversity transmission(SSDT) power control in wideband code division multiple access system of third generation partnership project(3GPP). The main objective of SSDT power control is to transmit on the downlink from the primary cell, and thus reducing the interference caused by the multiple transmission. In order to select a primary cell, each cell is assigned a temporary identification(ID) and user equipment(UE) periodically informs a primary cell ID to the connecting cells during soft handover. The non-primary cells selected by UE do not transmit the dedicated physical data channel(DPDCH) to reduce the interference. A major issue with the SSDT technology is the impact of uplink symbol errors on its performance. These errors can corrupt the primary ID code and this may lead to wrong decoding in the base station receivers. The proposed SSDT cell ID codes are designed to minimize the problem and to be easily decoded using simple fast Hadamard transformation(FHT) decoder.

Design of P2P Secure Protocol Using Kerberos (Kerberos를 이용한 P2P 보안 프로토콜 설계)

  • 이규형;송영상;우찬일;신인철
    • Proceedings of the IEEK Conference
    • /
    • 2002.06c
    • /
    • pp.51-54
    • /
    • 2002
  • P2P implies direct exchange between peers. If you have something I want, 1 go directly to you and obtain il. There is one of the most advantages of formation of community in P2P. For a specified purpose through P2P, the Peers who make temporary a group delivery a request efficient and safe. And the resources can be jointed common, cooperation and communication. When P2P is developed more, we can expect more formation of online community and development. But to be a safe of personal ID and password in internet, it should be possible to make a key-exchange. In the paper, it suggest P2P security system suitable to personal security that Kerberos be transformed. The user who make community in P2P, have Kerberos Server, and using Physical Address of Ethernet card in personal computer, authenticate users.

  • PDF