Earticle

현재 위치 Home

International Journal of Advanced Science and Technology

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(IJAST) [Science & Engineering Research Support Center, Republic of Korea(IJAST)]
  • pISSN
    2005-4238
  • 간기
    월간
  • 수록기간
    2008 ~ 2016
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
vol.12 (5건)
No
1

CryptoNET: Integrated Secure Workstation

Abdul Ghafoor Abbasi, Sead Muftic

보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology vol.12 2009.11 pp.1-10

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In most of the current applications security is usually provided individually. This means that various applications use their own security mechanisms and services, applied only to their own resources and functions. Furthermore, procedures to configure security parameters are usually inconvenient and complicated for non-technical users. As an alternative to this approach, we have designed and implemented Secure Workstation, which represents an integrated security environment and protects local IT resources, messages and operations across multiple applications. It comprises five components, i.e. four most commonly used PC applications: Secure Station Manager (equivalent to Windows Explorer), Secure E-Mail Client, Secure Documents System, and Secure Browser. These four components for their security extensions use functions and credentials of the fifth component, Generic Security Provider [5]. With this approach, we provide standard security services (authentication, confidentiality, and integrity and access control) and also additional, extended security services, such as transparent handling of certificates, use of smart cards, strong authentication protocol, SAML based single-singe-on, secure sessions, and other security functions, to all PC applications with the same set of security modules and parameters.

2

Dynamic Reconfiguration of Radio Mobile Multimedia Services Platforms of 3rd and 4th Generations

Asma Ben Letaifa, Sami Tabbane Mediatron

보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology vol.12 2009.11 pp.11-24

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Due to the characteristics of wireless mobile networks (e.g., node mobility, request fluctuation, poor quality of service), operators as well as service and content providers must cooperate to satisfy their customers. One of the solutions is the dynamic reconfiguration of service platforms, which is a real-time operation made on an initial configuration to improve the QoS parameters of the platform. Reconfiguration can be done by software means, and it can be material or logical, meaning that it may affect the physical or software components of the platform, the physical links, or also the transmitted information, without deteriorating the SLAs contracts signed between customers and operators. Several works have been already published in this direction but they fail in presenting a global view and a generic solution for the problem. This work is articulated in the form of a synthesis of the various solutions of reconfiguration which take place with coherence on the various levels of intervention. To this purpose, a model of a platform has been first developed; traffic and mobility models have been also injected to predict the movement and the demand pattern of the users. Moreover, several scenarios of reconfiguration were proposed for the change or the migration of software components, for the management network, the information routing, and the adaptation of the data. In a first part, we address the reconfiguration problem as a mono-objective optimization problem subjected to several constraints. We propose a mathematical model to deal with this situation. However, we found that finding rigorous solutions for this problem may have a huge computational cost. Hence, we also propose an alternative method introducing flow deviation and heuristics in the genetic algorithm. In the second part of our work, we deal with the behavioural aspect of the problem. It consists in considering the different metrics simultaneously and to seek a whole solution configuration representing various interesting compromises between the resources networks and the classes of services and users.

3

Robust Edge-Enhanced Fragment Based Normalized Correlation Tracking in Cluttered and Occluded Imagery

Muhammad Imran Khan, Javed Ahmed, Ahmad Ali, Asif Masood

보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology vol.12 2009.11 pp.25-34

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Correlation trackers are in use for the past four decades. Edge based correlation tracking algorithms have proved their strength for long term tracking, but these algorithms suffer from two major problems: clutter and slow occlusion. Thus, there is a requirement to improve the confidence measure regarding target and non-target object. In order to solve these problems, we present an “Edge Enhanced Fragment Based Normalized Correlation (EEFNC)” algorithm, in which we: (1) divide the target template into nine non-overlapping fragments after edge-enhancement, (2) correlate each fragment with the corresponding fragment of the template-size section in the search region, and (3) achieve the final similarity measure by averaging the correlation values obtained for every fragment. A fragment level template updating method is also proposed to make the template adaptive to the variation in the shape and appearance of the object in motion. We provide the experimental results which show that the proposed technique outperforms the recent Edge-Enhanced Normalized Correlation (EENC) tracking algorithm in occlusion and clutter.

4

Wi Fi Protected Access-Pre-Shared Key Hybrid Algorithm

Maricel O. Balitanas

보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology vol.12 2009.11 pp.35-44

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Potentially large number of cryptography solutions to attain security is widely known and recognized. Looking for a stronger scheme is the aim of most researchers to hide valuable information from each other. In this information age, many encryption algorithm exist to help keep information secure and these algorithms vary in complexity and ability to resist cracking. In this paper we present a hybrid crypto scheme that combines the acclaimed effective in symmetric type of algorithm, AES and the Elliptic Curve Cryptography in Asymmetric algorithm.

5

SEKEBAN (Secure and Efficient Key Exchange for wireless Body Area Network)

Mohammed Mana, Mohammed Feham, Boucif Amar Bensaber

보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology vol.12 2009.11 pp.45-60

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Recent technological advances in sensors, low-power microelectronics and miniaturization, and wireless networking enabled the design and proliferation of wireless sensor networks capable of autonomously monitoring and controlling environments. One of the most promising applications of sensor networks is for human health monitoring. A number of tiny wireless sensors, strategically placed on the human body, create a wireless body area network (WBAN) that can monitor various vital signs, providing real-time feedback to the user and medical personnel. The wireless body area networks promise to revolutionize health monitoring. Since the sensors collect personal medical data, security and privacy are important components in this kind of networks (WBAN). It is a challenge to implement traditional security infrastructures in these types of lightweight networks, since they are by design limited in both computational and communication resources. A key enabling technology for secure communications in WBANs has emerged to be biometrics. In this paper, we present an approach which exploits physiological signals (electrocardiogram (ECG)) to address security issues in WBAN: a Secure and Efficient Key Exchange for wireless Body Area Network (SEKEBAN). SEKEBAN manages the generation and distribution of symmetric cryptographic keys to constituent sensors in a WBAN and protect the privacy.

 
페이지 저장