Introduction of Information Security Research Division



Similar documents
Triathlon of Lightweight Block Ciphers for the Internet of Things

An Intelligent Middleware Platform and Framework for RFID Reverse Logistics

Embedded Java & Secure Element for high security in IoT systems

Strategy. 1 Humanism in the Digital World. Ministry of Information and Communication, Republic of Korea

Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Reducing Configuration Complexity with Next Gen IoT Networks

22 nd NISS Conference

A Model-based Methodology for Developing Secure VoIP Systems

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

The ebbits project: from the Internet of Things to Food Traceability

Banking. Extending Value to Customers. KONA Banking product matrix. is leading the next generation of payment solutions.

Business models in the Internet of Things. Miriam Cordero Head of Strategy - BT

Home Appliance Control and Monitoring System Model Based on Cloud Computing Technology

Development of Network Security Technology ETRI

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

IONA Security Platform

OMAP platform security features

Design for Management Information System Based on Internet of Things

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS

User-Centric Mobile Cloud Device - Global Evolution from Mobile Era to Personal Era

ACER ProShield. Table of Contents

NXP Semiconductors. Company Presentation February 2015

User Authentication Platform using Provisioning in Cloud Computing Environment

ITU-T X.805 based Vulnerability Analysis Method for Security Framework of End-to-End Network Services

Hvor går RFID forskning og utvikling?

Human Factors in Information Security

Spirent Abacus. SIP over TLS Test 编 号 版 本 修 改 时 间 说 明

Network Evolution, Cloud & Future Services. Opportunities & Challenges for Next-Decade Services

Chapter 1: Introduction

INTERNET OF THINGS 1

2.3GHz Portable Internet (WiBro) for Wireless Broadband Access

Home Gateway Enabling Evolution of Network Services

SoC: Security-on-chip!

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE

Cybersecurity Definitions and Academic Landscape

Strengthen RFID Tags Security Using New Data Structure

Wharf T&T Limited Report of Wireless LAN Technology Trial Version: 1.0 Date: 26 Jan Wharf T&T Limited. Version: 1.0 Date: 26 January 2004

IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw

3 Software Defined Radio Technologies

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

Integrating Biometrics into the Database and Application Server Infrastructure. Shirley Ann Stern Principal Product Manager Oracle Corporation

A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System

NanopowerCommunications: Enabling the Internet of Things OBJECTS TALK

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, Developed by: Smart Card Alliance Identity Council

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Biometric SSO Authentication Using Java Enterprise System

Home Network Security and PKI Role

Mobile Office Security Requirements for the Mobile Office

Wireless Mobile Internet Security. 2nd Edition

Authorize.net modules for oscommerce Online Merchant.

This method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger.

GSM and UMTS security

How to secure an LTE-network: Just applying the 3GPP security standards and that's it?

Lesson 6: 6 EXAMPLES OF EMBEDDED SYSTEMS. Chapter-1L06: "Embedded Systems - ", Raj Kamal, Publs.: McGraw-Hill Education

GENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET

All modules are assessed through examination (0%-100%) and/or coursework assessment (0%- 100%).

Network Security Administrator

ESE566 REPORT3. Design Methodologies for Core-based System-on-Chip HUA TANG OVIDIU CARNU

Development of Integrated Management System based on Mobile and Cloud service for preventing various dangerous situations

Security in the Evolved Packet System

Future Directions for Internet of Things Work

NXP and the Internet of Things ( IoT ) Andrew C. Russell VP Marketing Greater China

Enterprise Security Architecture Concepts and Practice

Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks

List of courses MEngg (Computer Systems)

CPS: Communications. Dr. Bheemarjuna Reddy Tamma IIT HYDERABAD

Global Asset Tracking & Identification System

E-TRACKING SYSETEM FOR MUNICIPAL SOLID WASTE MANAGEMENT USING RFID TECHNOLOGY

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

CSC Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

Bachelor of Information Technology (Network Security)

Security architecture Integrating security into the communicating vehicle. Norbert Bissmeyer, Fraunhofer SIT June 18 th 2015

Enabling the secure use of RFID

Key & Data Storage on Mobile Devices

EFFECTIVE QUERY RETRIEVAL SYSTEM IN MOBILE BUSINESS ENVIRONMENT

RFID. Radio Frequency IDentification: Concepts, Application Domains and Implementation LOGO SPEAKER S COMPANY

The Research and Application of College Student Attendance System based on RFID Technology

The Internet of Things: Opportunities & Challenges

Mobile Devices Security: Evolving Threat Profile of Mobile Networks

Enhancing Web Application Security

Contents. Preface. Acknowledgement. About the Author. Part I UMTS Networks

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1. Network Security. Canada France Meeting on Security, Dec 06-08

Introducing etoken. What is etoken?

A Study of Key management Protocol for Secure Communication in Personal Cloud Environment

True Identity solution

Transcription:

Introduction of Information Security Research Division 2005. 5. 13. Kyo-il Chung, Ph. D. Information Security Infrastructure Research Group

Contents Overview - Secure u-it KOREA - Organization of ETRI Information Security Research Division - Network Security Research Group - Information Security Infrastructure Research Group

Secure u-it KOREA Embedded S/W IT Soc Digital Contents Next Generation Mobile Communications u-it KOREA Telematics Digital TV Security Intelligent Service Robot Home Network Next Generation PC

Organization of ETRI Established in 1976 Korea s s largest government funded research facility in the fields of IT & Comm. R&D Fields : Semiconductors, Mobile Communications, Networks, Security, etc.

Organization of ISRD Information Security Research Division Project Administration Team Network Security Research Group Network Security Architecture Team Security Gateway System Team Secure OS Research Team Active Security Research Team Privacy Protection Research Team P2P Security Research Team Home Network Security Research Team Information Security Infrastructure Research Group Cryptography Research Team Digital ID Security Research Team RFID/USN Security Research Team Biometrics Technology Research Team Biometrics Chipset Research Team Bio Sensor Research Team Wireless Security Application Research Team

R&D Themes of Network Security Research Group Next Generation Security System Tech. Security Gateway System Secure Router System Security Management System Harmful Contents Detection and Filtering Tech. Network Security Tech. for P2P Overlay Networks over Wired/Wireless IPV6 Infrastructures Authentication and Authorization Tech. for Home Networks

Research Areas of Information Security Infrastructure Group (1) Cryptographic Algorithm and Protocol Next Generation Cryptographic Algorithm Design & Analysis High-speed Cryptographic Processor Design Privacy Enhancing Technology Digital ID Security Internet ID Management Technology Autonomous Identity Federation Bridging Technology RFID/USN Security Light-weight Crypto Algorithm for RFID & Sensor Network Low Power & High Speed Processor Security Mechanism for RFID/USN Environments

Research Areas of Information Security Infrastructure Group (2) User Identification Technology Using Biometrics Multi-modal Biometric & Searching Technology Biometric Chipset & Bio Sensor Technology Biometric Data Protection Development of Secure Platform for Wireless Network Inter-working Security Technology for USIM based WCDMA, WiBro & WLAN Security Platform

Cryptography Research

Digital ID Security Research Provider ID Service User ID Database e-government Discovery Service ID Federation Bridge Service ID Federation Bridge Server ID Information Providing Service Internet ID Server Private Information Preserving Service Single ID Management Service Internet SSO Service e-commerce Discovery Server User User A Privacy Controller User B

RFID/USN Security Research Active RFID Security Technology Low Power AES, Hash Module(20uW) Light-weight Security Module Supply Chain Application (e-seal Application) Active RFID Secure Tag Mobile RFID Security Technology Passive RFID Tag + Security Mechanism Front-end M/W Mobile RFID Reader(Phone) Data Filtering Reader Management Active Secure Reader (Portable) G/W RFID Security Middleware - Data Filtering - Analyzer Business Event - EPC IS I/F - Privacy, Authentication RFID System for Detecting Weakness - Data Collecting /Management - Detecting Abnormal RF Traffic Signal - Monitoring the Weakness RFID Security Server - Security EPC IS Server - Privacy Scheme - Security OTS Server - PML, XML Security Mobile RFID Application (Gallery, e-check)

Development of Biometric Chipset Biometric Process Standard based Application System such as Bio-API User Register/Auth. Service Application Layer Application Program Authentication Register Management Biometric Application Platform Bio-API API Bio-API Framework Biometric Process Interface Bio-API Layer Data Processing Layer Processing Biometric Data Biometric Data Processing Module (CBEFF) Biometric Chip Reader Interface Module Biometric acquiring Module (Fingerprint/Face /Iris/Vein Pattern) Extracting Module (face/) Single/Multi-modal Processing Within Biometric Data Apparatus for Chip Chip Reader Sensor for Acquiring Finger Face Print Sensor Device Layer Iris Sensor Vein Pattern

Secure Platform for Wireless Network Portable internet terminal USIM PKI WiBro USIM PKI Terminal interworking 3G terminal Triple-mode terminal WCDMA USIM 801.162/WiBro web Authen. proxy Roaming server 3G(IMT-2000)web Authen. proxy Roaming server P W L A N UAGS WLAN web Authen. proxy Roaming server WLAN terminal Authen. proxy Roaming server 2G CDMA 2G terminal SIM Security for Terminal-client PKI Triple-mode terminal USIM : Universal Subscriber Identity Module UAGS : USIM Access Gateway Subsystem Interworking between roaming server for Triple-mode terminal

Future R&D Plans in Information Security Infrastructure Group Powerful Initiative Information Security Privacy Preserving Tech. Next Generation Cryptography PETs Cryptographic Protocols High-level Service for Ubiquitous Environments Efficient Digital ID Management Wireless Network System RFID/USN Service Conversion of BT & IT Multi-modal Biometric Identification Tech. Biosensor

Thank You for your Attention!