{"title":"SMS Encryption for Mobile Communication","authors":"D. Lisonek, M. Drahanský","doi":"10.1109/SECTECH.2008.48","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.48","url":null,"abstract":"This paper deals with an SMS encryption for mobile communication. The transmission of an SMS in GSM network is not secure, therefore it is desirable to secure SMS by additional encryption. In the following text, there are compared differences in the use of symmetric and asymmetric cryptography for SMS transfer securing. In the next part, there is the description of design and implementation of the application for mobile phones, which encrypts and signs SMS using an asymmetric RSA cipher. At the end, there are described attacks on secured SMS and future extension of the application.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125071694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CBR (Case-Based Reasoning) Evaluation Modeling for Security Risk Analysis in Information Security System","authors":"Young-Hwan Bang, Jung-gwon Kim, Ilsung Hwang","doi":"10.1109/SECTECH.2008.42","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.42","url":null,"abstract":"Information society is rapidity developing in the various fields of banking, trade, medical service, energy, and education using information system. Evaluation for security risk analysis should be done before security management for information system and security risk analysis is the best method to safely prevent it from occurrence, solving weaknesses of information security service. In this paper, modeling it did the CBR (case-based reasoning) evaluation function it will be able to establish the evaluation plan of optimum. CBR evaluation functions manage a security risk analysis evaluation at project unit. It evaluates the evaluation instance for beginning of history degree of existing. It seeks the evaluation instance which is similar and result security risk analysis evaluation of optimum about under using planning.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121170421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Detecting Face and Hands for Motion-Based Game Using Web Camera","authors":"Young Jae Lee, Daeho Lee","doi":"10.1109/SECTECH.2008.14","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.14","url":null,"abstract":"In this paper, we present a new approach of detecting face and hands for the purpose of motion-based game production. In the process, the Web camera has been used to effectively capture and trace the images of the gamer¿s movements. Based on the analyzing algorithm, information on face, eye and hand location and movements has been searched by means of various methods such as color difference, movement information, notch filter and face detection algorithm. With this information found, interaction with object in virtual space has been materialized and movement modeling on action and reaction in collision has been proposed. Most of all, the first person motion-based game which was produced with the proposed algorithm was able to show the validity and robust performance of the proposed algorithm. The proposed method can be applied as the basic algorithm for the production of motion-based game.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116274961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis and Improvement of Two Password Authentication Schemes Using Smart Cards","authors":"Jing Xu, W. Zhu, Deng-guo Feng","doi":"10.1109/SECTECH.2008.40","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.40","url":null,"abstract":"Password authentication has been adopted as one of the most commonly used solutions in a network environment to protect resources from unauthorized access. Recently, Shieh et al. and Yoon et al. respectively proposed a smart card based password authentication scheme. We show that these two schemes are both subject to forgery attacks provided that the information stored in the smart card is disclosed by the adversary. We also propose an improved scheme which is immune to the presented attacks.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115581889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Ant Colony Based Protocol to Support Multimedia Communication in Ad Hoc Wireless Networks","authors":"M. Sivajothi, E. R. Naganathan","doi":"10.1109/SECTECH.2008.49","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.49","url":null,"abstract":"Multimedia data communication in mobile ad hoc networks involves link un-stability and link-failures. So the existing design of routing protocols failed to achieve a stable QOS. In this paper, we developed an ant colony-based routing protocol for multimedia communications in mobile ad hoc networks. The routing protocol first establishes multiple paths between the source and destination of a data session in a reactive manner. Using ant agents, stable and failure-free paths are determined among the multiple paths, and the multimedia data is send over these paths. During the communication session, these paths are continuously monitored and improved in a proactive manner. By simulation experiments, we show that the performance of the proposed protocol outperforms the standard AODV routing algorithm in terms of end-to-end delay, delivery ratio and jitter.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121850368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Distributed System Security","authors":"Y. Bai","doi":"10.1109/SECTECH.2008.22","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.22","url":null,"abstract":"Authorization plays an essential role to ensure the security of a wide variety of computing and IT systems such as data management systems, e-trading systems, database transaction systems, etc. This paper aims to propose a high level formal language for specifying and evaluating distributed authorizations with delegation, develop a new method for credential chain discovery, and implement a system prototype for representing and reasoning about access control policies in distributed environments. By applying the new methodology and technology developed from this work, we will be able to design highly secure computing and IT systems in many different complex problem domains.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133030076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Seung-Goo Ji, Chaetae Im, Mijoo Kim, Hyuncheol Jeong
{"title":"Botnet Detection and Response Architecture for Offering Secure Internet Services","authors":"Seung-Goo Ji, Chaetae Im, Mijoo Kim, Hyuncheol Jeong","doi":"10.1109/SECTECH.2008.53","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.53","url":null,"abstract":"Countermeasures against botnet, which has been recognized as the Internet¿s biggest threat, are urgently needed to create a safe Internet environment. However, the current technology lags behind the evolution of botnet, and, unlike in the past, mutual cooperation among ISPs and countries is essential. As botnet is distributed internationally rather than in a particular ISP domain, international cooperation is needed. As such, this paper proposes a framework for the systematic detection and prevention of botnet, as well as a procedure and method for cooperation.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125928784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis and Study of Security Mechanisms inside Linux Kernel","authors":"Gaoshou Zhai, Yaodong Li","doi":"10.1109/SECTECH.2008.17","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.17","url":null,"abstract":"It's very important to analyze and study security mechanisms provided by an operating system. Currently, Linux is becoming one of the most popular operating systems because of its excellent performance and open source philosophy. Since lots of individuals and enterprises are switching to Linux, access control mechanism of Linux has been improved from time to time for new security requirements. For instance, SELinux sub-system can enforce a policy based Mandatory Access Control (MAC) and provide flexible security policy configuration. However, there are still some defects in current Linux access control mechanism. In this paper, available Linux security mechanisms are analyzed at first, while permission division principle is summarized. Then a new MAC mechanism is devised based on some popular information security models such as RBAC, DTE and etc and it is characteristic of cross-layered permission assignment. Finally, a corresponding prototype system is implemented and further research directions are summarized.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134543452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Haiguang Chen, G. Gu, Xinhua Chen, Chongming Zhang
{"title":"Task and Trust for Wireless Sensor Networks","authors":"Haiguang Chen, G. Gu, Xinhua Chen, Chongming Zhang","doi":"10.1109/SECTECH.2008.39","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.39","url":null,"abstract":"The traditional approach of providing security in sensor network was cryptography and authentication. However, the conventional approach of security based on cryptography and authentication alone is not sufficient for the unique characteristics and novel misbehaviors encountered in wireless sensor networks. In this paper, we use a general tool which borrowed from other domains such as economics, statistics and data analysis. With this approach, we propose a task and trust framework for sensor networks where nodes maintain reputation for other nodes of several different tasks and use it to evaluate their trustworthiness. We will show that this framework provides a scalable, diverse and a generalized approach to recognize all types of misbehavior resulting from malicious or faulty sensor nodes. Our framework has more simple trust computation than ATSN and more suitable for scarce power resource sensor nodes. The simulation results and analysis show that our framework can detect the malicious nodes fast if having abnormal result while executing some task.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132351110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Tradeoffs among Verification Accuracy, Memory Consumption, and Execution Time in the GH-Based Fuzzy Fingerprint Vault","authors":"Sungju Lee, Daesung Moon, W. Choi, Yongwha Chung","doi":"10.1109/SECTECH.2008.25","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.25","url":null,"abstract":"The fuzzy fingerprint vault solution has been proposed as a way to protect the registered fingerprint template, and the geometric hashing solution has been applied to implement it. Although this Geometric Hashing-based fuzzy fingerprint vault solution can solve the auto-alignment problem and provide higher security, it requires more memory space due to the large size of the hash table. To solve this problem, we make the GH-based fuzzy fingerprint vault to be configurable, and study the tradeoffs among the verification accuracy, the memory consumption, and the execution time of it. The experimental results show that the configurable approach can either maximize the verification accuracy or minimize the memory consumption and/or the execution time by setting a performance parameter properly.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130981159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}