http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
FPGA를 이용한 Cdma2000 EV-DO 시큐리티 지원 하드웨어 설계 및 구현
권환우(Hawn-woo Kwon),이기만(Ki-man Lee),양종원(Jong-won Yang),서창호(Chang-ho Seo),하경주(Kyung-Ju Ha) 한국정보보호학회 2008 정보보호학회논문지 Vol.18 No.2
Cdma2000 1x EV-DO 에서의 보안 계층은 현재 3GPP2를 통해 표준화 규격(C.S0024-A v2.0)을 완성해 나가고 있는 중이며, 이에 따라 cdma2000 1x EV-DO 환경의 AT와 AN 간 전송되는 데이터에 대한 보안 기능을 적용하기 위하여 표준 문서에 명시된 보안 계층 구현요구에 맞는 하드웨어 보안 장치가 요구되고 있다. 본 논문에서는 FPGA 플랫폼을 통해 EV-DO 시큐리티 계층 프로토콜을 시뮬레이션 하여 EV-DO 시큐리티 지원 하드웨어장치를 설계 하였으며, 패킷 데이터에 대한 인증 및 서비스를 위하여 SHA-1 해쉬 알고리즘과 데이터 암호화를 위한 AES, SEED, ARIA 알고리즘을 탑재했으며, 키교환 프로토콜을 이용한 키 교환을 수행 한 후 데이터에 대한 인증 및 암호화 기능을 선택적으로 적용한 하드웨어를 구현 하였다. Security layer of the Cdma2000 1x EV-DO is currently completing standard (C.S0024-A v2.0). Accordingly, a hardware security devices, that allows to implementation requirement of the security layer described in standard document, is required to apply security function about data transferred between AT and AN of then Cdma2000 1x EV-DO environment. This paper represents design of hardware device providing EV-DO security with simulation of the security layer protocol via the FPGA platform. The SHA-1 hash algorithm for certification and service of packet data, and the AES, SEED, ARIA algorithms for data encryption are equip in this device. And paper represents implementation of hardware that applies optionally certification and encryption function after executing key-switch using key-switching algorithm.
Security and Privacy Mechanism using TCG/TPM to various WSN
이기만(Ki-man Lee),조내현(Nae-Hyun Cho),권환우(Hawn-woo Kwon),서창호(Chang-Ho Seo) 한국컴퓨터정보학회 2008 한국컴퓨터정보학회논문지 Vol.13 No.5
In this paper, To improve the effectiveness of security enforcement, the first contribution in this work is that we present a clustered heterogeneous WSN(Wireless Sensor Network) architecture, composed of not only resource constrained sensor nodes, but also a number of more powerful high-end devices acting as cluster heads. Compared to sensor nodes, a high-end cluster head has higher computation capability, larger storage, longer power supply, and longer radio transmission range, and it thus does not suffer from the resource scarceness problem as much as a sensor node does. A distinct feature of our heterogeneous architecture is that cluster heads are equipped with TC(trusted computing) technology, and in particular a TCG(Trusted Computing Group) compliant TPM (Trusted Platform Module) is embedded into each cluster head. According the TCG specifications, TPM is a tamper-resistant, self-contained secure coprocessor, capable of performing cryptographic functions. A TPM attached to a host establishes a trusted computing platform that provides sealed storage, and measures and reports the integrity state of the platform.