Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The KIPS Transactions:PartC
Journal Basic Information
Journal DOI :
Korea Information Processing Society
Editor in Chief :
Volume & Issues
Volume 19C, Issue 4 - Aug 2012
Volume 19C, Issue 3 - Jun 2012
Volume 19C, Issue 2 - Apr 2012
Volume 19C, Issue 1 - Feb 2012
Selecting the target year
User Authentication Method using Vibration Cue on Smartphone
Lee, Jong-Hyeok ; Choi, Ok-Kyung ; Kim, Kang-Seok ; Yeh, Hong-Jin ;
The KIPS Transactions:PartC, volume 19C, issue 3, 2012, Pages 167~172
DOI : 10.3745/KIPSTC.2012.19C.3.167
Mobile phone devices and memory card can be robbed and lost due to the carelessness that might be caused to leak personal information, and also company`s confidential information can be disclosed. Therefore, the importance of user authentication to protect personal information is increasing exponentially. However, there are the limitations that criminals could easily obtain and abuse information about individuals, because the input method of personal identification number or the input method of password might not be safe for Shoulder Surfing Attack(SSA). Although various biometric identification methods were suggested to obstruct the SSA, it is the fact that they also have some faults due to the inconvenience to use in mobile environments. In this study, more complemented service for the user authentication was proposed by applying Keystroke method in the mobile environments to make up for the faults of existing biometric identification method. Lastly, the effectiveness and validity of this study were confirmed through experimental evaluations.
On Message Length Efficiency of Two Security Schemes using Bloom Filter
Maeng, Young-Jae ; Kang, Jeon-Il ; Nyang, Dae-Hun ; Lee, Kyung-Hee ;
The KIPS Transactions:PartC, volume 19C, issue 3, 2012, Pages 173~178
DOI : 10.3745/KIPSTC.2012.19C.3.173
Recent two security schemes showed that a bloom filter can reduce a message length required for representing multiple MACs. The schemes, however, made message length comparison without considering security level. Since the MAC is intended for security, it is important to let multiple MACs and the bloom filter have the same level of security for making message length comparison. In this paper, we analyze the message length efficiency of bloom filter, compressed bloom filter and multiple MACs, letting them have the same security level.
Side-channel Attack on the Final Round SHA-3 Candidate Skein
Park, Ae-Sun ; Park, Jong-Yeon ; Han, Dong-Guk ; Yi, Ok-Yeon ;
The KIPS Transactions:PartC, volume 19C, issue 3, 2012, Pages 179~184
DOI : 10.3745/KIPSTC.2012.19C.3.179
Due to the absence of an alternative algorithm SHA-2, NIST (National Institute of Standards and Technology) is proceeding to development project of SHA-3. NIST announced five candidates of the final round at the end of 2010. Side-channel attack scenarios of five candidates for SHA-3 final round have been proposed. In this paper, we prove the possibility of the analysis against 32-bit modular addition by 8-bit blocks from our experiment on ARM chip board with a register size of 32-bit. In total we required 9700 power traces to successfully recover the 128-bit secret key for the attack against.
A Study on the Malicious Web Page Detection Systems using Real-Time Behavior Analysis
Kong, Ick-Sun ; Cho, Jae-Ik ; Son, Tae-Shik ; Moon, Jong-Sub ;
The KIPS Transactions:PartC, volume 19C, issue 3, 2012, Pages 185~190
DOI : 10.3745/KIPSTC.2012.19C.3.185
The recent trends in malwares show the most widely used for the distribution of malwares that the targeted computer is infected while the user is accessing to the website, without being aware of the fact that, in which the harmful codes are concealed. In this thesis, we propose a new malicious web page detection system based on a real time analysis of normal/abnormal behaviors in client-side. By means of this new approach, it is not only the limitation of conventional methods can be overcome, but also the risk of infection from malwares is mitigated.
Cost-Effective Inter-LMA Domain Distributed Mobility Control Scheme in PMIPv6 Networks
Jang, Soon-Ho ; Jeong, Jong-Pil ;
The KIPS Transactions:PartC, volume 19C, issue 3, 2012, Pages 191~208
DOI : 10.3745/KIPSTC.2012.19C.3.191
Proxy Mobile IPv6 (PMIPv6) is designed to provide network-based mobility management support to an MN without any involvement of the MN in the mobility related signalling, hence, the proxy mobility entity performs all related signalling on behalf of the MN. The new principal functional entities of PMIPv6 are the local mobility anchor (LMA) and the mobile access gateway (MAG). In PMIPv6, all the data traffic sent from the MN gets routed to the LMA through a tunnel between the LMA and the MAG, but it still has the single point of failure (SPOF) and bottleneck state of traffic. To solve these problems, various approaches directed towards PMIPv6 performance improvements such as route optimization proposed. But these approaches add additional signalling to support MN`s mobility, which incurs extra network overhead and still has difficult to apply to multiple-LMA networks. In this paper, we propose a improved route optimization in PMIPv6-based multiple-LMA networks. All LMA connected to the proxy internetworking gateway (PIG), which performs inter-domain distributed mobility control. And, each MAG keeps the information of all LMA in PMIPv6 domain, so it is possible to perform fast route optimization. Therefore, it supports route optimization without any additional signalling because the LMA receives the state information of route optimization from PIG.
Time Synchronization by Consecutive Broadcast for Wireless Sensor Networks
Bae, Shi-Kyu ;
The KIPS Transactions:PartC, volume 19C, issue 3, 2012, Pages 209~214
DOI : 10.3745/KIPSTC.2012.19C.3.209
Time synchronization is important role in a network, especially in Wireless Sensor Network (WSN) which is required for time-critical applications such as surveillance, tracking, data fusion and scheduling. Time synchronization in WSN should meet the other different requirements than the one in other networks because WSN has critical resource constraints, especially power consumption. This paper presents a new time synchronization scheme for WSN, which is energy efficient by reducing communication overhead. Simulation test shows this new scheme has better energy efficiency and performance of accuracy than existing schemes proposed previously.