The search functionality is under construction.

Author Search Result

[Author] Chang-Seop PARK(4hit)

1-4hit
  • Key De-Synchronization Attack against Yüksel-Nielson's Key Distribution Protocol for ZigBee Wireless Sensor Networks

    Chang-Seop PARK  

     
    LETTER-Cryptography and Information Security

      Vol:
    E97-A No:3
      Page(s):
    877-880

    Security plays an important role in several ZigBee applications such as Smart Energy and medical sensor applications. For a secure communication among ZigBee devices, a secret key should be shared among any two ZigBee devices using the Key Distribution protocol. Recently, Yüksel and Nielson proposed a new Key Distribution protocol for ZigBee addressing the security weaknesses of the original ZigBee Key Distribution protocol. In this letter, it is shown that their protocol is not secure against a key de-synchronization attack, and a security-enhanced Key Distribution protocol is newly proposed and analyzed in terms of security.

  • Security-Enhanced Fast Mobile IPv6 Handover

    Chang-Seop PARK  

     
    LETTER-Internet

      Vol:
    E93-B No:1
      Page(s):
    178-181

    Motivated by the fact that the existing FMIPv6 security scheme has several weaknesses in terms of security and efficiency, we propose a security-enhanced fast mobile IPv6 in this letter. Based on the concept of a secret key-based CGA (Cryptographically Generated Address), we show how to establish a new security association between the MN and AR (Access Router) whenever a handover occurs. We also show that the proposed scheme is robust against several types of security attacks feasible with the existing scheme. Our scheme is more efficient in that it requires fewer public key operations.

  • A Key Management Scheme for Secure Mobile IP Registration Based on AAA Protocol

    Hyun-Sun KANG  Chang-Seop PARK  

     
    PAPER-Mobile Information Network and Personal Communications

      Vol:
    E89-A No:6
      Page(s):
    1842-1846

    We introduce a new hierarchical key management scheme which can be applied for secure Mobile IP registration protocol. Contrary to the previous schemes, AAA protocol used for registration key distribution is separated from the base registration protocol, so that the registration key distribution can be simplified and the delay caused by the AAA protocol can be avoided. Also proposed is the non-repudiation service based on a hash chain, which is useful for secure auditing.

  • Authenticated IGMP for Controlling Access to Multicast Distribution Tree

    Chang-Seop PARK  Hyun-Sun KANG  

     
    PAPER-Network

      Vol:
    E92-B No:3
      Page(s):
    838-849

    A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP (Content Provider), NSP (Network Service Provider), and group members.