• Title/Summary/Keyword: 허위통신

Search Result 47, Processing Time 0.026 seconds

An Approach of False Data Identification Protocol for Minimum Communication Cost in Wireless Sensor Network (무선 센서 네트워크에서 최소 통신비용 수행을 위한 허위 데이터 식별 프로토콜)

  • Boonsongsrikul, Anuparp;Park, Seung-Kyu;Shin, Seung-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.10
    • /
    • pp.121-129
    • /
    • 2011
  • In wireless sensor networks, a compromised sensor node can inject false data during data aggregation. Existing solutions of securing data aggregation require high communication cost in securing data aggregation. In this paper, we propose a monitoring-based secure data aggregation protocol that minimizes communication cost of identifying the location of false data injection attacks. The main idea is that when monitoring nodes find an injected false data, their reporting messages along with Message Authentication Codes (MACs) are summarized in a single message before sending it to the Base Station (BS). Then the BS identifies the attacking node. The simulation shows that energy consumption of the proposed protocol with short and normal concatenations of MACs are 45% and 36% lower than that of an existing protocol, respectively.

A Study on the Identification of fake Estimate Service using DID (분산신원증명 기술을 활용한 허위 부동산 매물정보 검출에 관한 연구)

  • Moon, Jeong-Kyung;Kim, Jin-Mook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.649-651
    • /
    • 2021
  • In recent years, O2O services for real estate sales are widely distributed in web platforms and apps. This allows sellers, buyers, and real estate brokers to quickly and conveniently conduct real estate sales and charter contracts. However, in the O2O-based real estate sales information system, it wastes time and money for real estate buyers due to the posting of fake information, partial correction of the sales information, and intentional non-posting of the sales information. Therefore, we propose a method of detecting the false or not of real estate property information that can occur on the web platform, and design and implement a proposal system for this. To this end, we propose a method of detecting personal identity and property information based on DID, a distributed identity authentication protocol. The false real estate sales information detection system proposed by us can determine the existence of real estate sales information, partially correct the false sales information, or prove whether or not intentionally unpublished in three steps.

  • PDF

Key Re-distribution Scheme of Dynamic Filtering Utilizing Attack Information for Improving Energy Efficiency in WSNs (무선 센서 네트워크에서 에너지 효율성 향상을 위해 공격정보를 활용한 동적 여과 기법의 키 재분배 기법)

  • Park, Dong-Jin;Cho, Tae-Ho
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.26 no.2
    • /
    • pp.113-119
    • /
    • 2016
  • Wireless sensor networks are vulnerable to an adversary due to scarce resources and wireless communication. An adversary can compromise a sensor node and launch a variety of attacks such as false report injection attacks. This attack may cause monetary damage resulting in energy drain by forwarding the false reports and false alarms at the base station. In order to address this problem, a number of en-route filtering schemes has been proposed. Notably, a dynamic en-route filtering scheme can save energy by filtering of the false report. In the key dissemination phase of the existing scheme, the nodes closer to the source node may not have matching keys to detect the false report. Therefore, continuous attacks may result in unnecessary energy wastage. In this paper, we propose a key re-distribution scheme to solve this issue. The proposed scheme early detects the false report injection attacks using initially assigned secret keys in the phase of the key pre-distribution. The experimental results demonstrate the validity of our scheme with energy efficiency of up to 26.63% and filtering capacity up to 15.92% as compared to the existing scheme.

Monitoring-Based Secure Data Aggregation Protocol against a Compromised Aggregator in Wireless Sensor Networks (무선 센서 네트워크에서 Compromised Aggregator에 대응을 위한 모니터링 기반 시큐어 데이터 병합 프로토콜)

  • Anuparp, Boonsongsrikul;Lhee, Kyung-Suk;Park, Seung-Kyu
    • The KIPS Transactions:PartC
    • /
    • v.18C no.5
    • /
    • pp.303-316
    • /
    • 2011
  • Data aggregation is important in wireless sensor networks. However, it also introduces many security problems, one of which is that a compromised node may inject false data or drop a message during data aggregation. Most existing solutions rely on encryption, which however requires high computation and communication cost. But they can only detect the occurrence of an attack without finding the attacking node. This makes sensor nodes waste their energy in sending false data if attacks occur repeatedly. Even an existing work can identify the location of a false data injection attack but it has a limitation that at most 50% of total sensor nodes can participate in data transmission. Therefore, a novel approach is required such that it can identify an attacker and also increase the number of nodes which participate in data transmission. In this paper, we propose a monitoring-based secure data aggregation protocol to prevent against a compromised aggregator which injects false data or drops a message. The proposed protocol consists of aggregation tree construction and secure data aggregation. In secure data aggregation, we use integration of abnormal data detection with monitoring and a minimal cryptographic technique. The simulation results show the proposed protocol increases the number of participating nodes in data transmission to 95% of the total nodes. The proposed protocol also can identify the location of a compromised node which injects false data or drops a message. A communication overhead for tracing back a location of a compromised node is O(n) where n is the total number of nodes and the cost is the same or better than other existing solutions.

Static Filtering Probability Control Method Based on Reliability of Cluster in Sensor Networks (센서 네트워크에서 클러스터 신뢰도 기반 정적 여과 확률 조절 기법)

  • Hur, Suh-Mahn;Seo, Hee-Suk;Lee, Dong-Young;Kim, Tae-Kyung
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.1
    • /
    • pp.161-171
    • /
    • 2010
  • Sensor Networks are often deployed in unattended environments, thus leaving these networks vulnerable to false data injection attacks in which an adversary injects forged reports into the network through compromised nodes. Such attacks by compromised sensors can cause not only false alarms but also the depletion of the finite amount of energy in a battery powered network. Ye et al. proposed the Statistical En-route Filtering scheme to overcome this threat. In statistical en-route filtering scheme, all the intermediate nodes perform verification as event reports created by center of stimulus node are forwarded to the base station. This paper applies a probabilistic verification method to the Static Statistical En-route Filtering for energy efficiency. It is expected that the farther from the base station an event source is, the higher energy efficiency is achieved.

Calibration System Suitability Evaluation and Test Limits Determination Method through Factor Analysis of Uncertainty (불확도 요인 분석을 통한 교정 시스템 적합성 평가 및 시험기준 결정 방안)

  • Kim, Hong-Tark;Kim, Boo-Il
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.6
    • /
    • pp.1139-1144
    • /
    • 2019
  • A calibration system for diagnosing and confirming the performance of precision measuring instruments minimizes the risk of misjudgment of calibration resulted by complying with international standard requirements in order to ensure the reliability of calibration results. This paper uses a proposed calibration system suitability assessment and a guard-band technique through an analysis of uncertainty factors when it is impossible to acquire and operate high-performance equipment at a calibration laboratory, and proposes an optimized test limit output model substituting performance standards. The proposed method provides an optimized test standard to meet the quantitative evaluation criteria of the calibration system and the probability of false acceptance risk required by international standards.

차량용 무선통신에서 효율적인 메시지 인증 및 개인 정보 보호 기술 동향

  • Park, Yeong-Hun;Seo, Seung-U
    • Information and Communications Magazine
    • /
    • v.29 no.2
    • /
    • pp.30-38
    • /
    • 2012
  • 차량용 무선 통신이 처음 제안된 이래 다양한 자동차 생산 기업에서 차량에 무선통신 설비를 설치하고자 하고 있으며, 여러 국가에서 차량 무선통신을 위한 인프라 설치를 논의하고 있다. 따라서 수 년 내에 실생활에서 차량용 무선 통신을 이용 가능할 것으로 전망된다. 차량용 무선 통신을 이용하여 차량의 상태를 전송할 수 있고, 각종 교통 정보를 전송 받을 수도 있기 때문에 교통이 보다 안전하고 원활해 질 것이다. 하지만, 차량용 무선 통신에서 전송되는 데이터는 차량의 위치나 상태와 같은 개인 정보를 많이 포함하고 있다. 따라서 전송되는 메시지들의 보안과 그 메시지의 송신자에 대한 익명성이 보장되어야 한다. 그러나 익명성만 보장된 경우, 허위 정보나 악성 코드가 전송되었을 때, 이를 보낸 차량이 어떤 것인지 판별할 수 없게 되는데, 이를 보완하기 위하여 전송되는 메시지의 송신자를 추적할 수 있는 장치가 펼요하다. 그리고 차량용 무선 통신에 참여하는 차량의 수가 늘어날수록 전송되는 데이터도 폭발적으로 증가하는데, 이들을 효율적으로 인증할 수 있는 시스템 역시 갖춰져야 한다. 본 고에서는 차량용 무선통신에서 전송되는 정보에 대하여, 송신자의 익명성 보장과 효율적인 일괄 메시지 인증, 그리고 송신자 추적을 제공하는 차량용 디지털 서명 기술을 소개하고자 한다.

Deficiencies of the GMDSS Distress Communication System and Methods to Improve (GMDSS 조난통신 제도의 문제점과 개선 방안)

  • KIM Byung-Ok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.4
    • /
    • pp.733-738
    • /
    • 2005
  • The distress communication system in the maritime mobile service had almost depended on the wireless telephony or telegraphy technique. The GMDSS (Global Maritime Distress and Safety System) which was introduced in 1992 brought a lot of changes in the maritime distress communication service such as the automatic transmission of distress signals and implementation of global search and rescue networks. However, there are some deficiencies in the GMDSS distress communication system such as a lack of compatibility in the maritime distress communication between CMDSS ships and Non-GMDSS ships, increasing deceptive or false distress alerts generated by GMDSS installations, lack of understanding about the CMDSS installations for the operators. In this paper, the problems of distress communication system in the maritime mobile service are analyzed and the methods to solve or minimize these problems are suggested.

Deficiencies of the GMDSS Distress Communication System and Methods to Improve (GMDSS 조난통신 제도의 문제점과 개선 방안)

  • Kim, Byung-Ok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.213-216
    • /
    • 2005
  • The distress communication system in the maritime mobile service had almost depended on the wireless telephony or telegraphy technique. The GMDSS (Global Maritime Distress and Safety System) which was introduced in 1992 brought a lot of changes in the maritime distress communication service such as the automatic transmission of distress signals and implementation of global search and rescue networks. However, there are some deficiencies in the GMDSS distress communication system such as a lack of compatibility in the maritime distress communication between GMDSS ships and Non-GMDSS ships, increasing deceptive or false distress alerts generated by GMDSS installations, lack of understanding about the GMDSS installations for the operators. In this paper, the problems of distress communication system in the maritime mobile service are analyzed and the methods to solve or minimize these problems are suggested.

  • PDF

Kakao Talk, Internet fake news identification service using Bi-LSTM and topic modeling (Bi-LSTM과 토픽모델링을 활용한 카카오톡, 인터넷 가짜뉴스 판별 서비스)

  • Shim, Kuk-Bo;Lee, Seung-Ho;Jeong, Jun-Ho;Lee, Ki-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.11a
    • /
    • pp.1082-1084
    • /
    • 2021
  • 현재 영어 기반의 기술 팩트체크 서비스는 다양하지만 한국 기반 팩트체크 서비스는 비기술적(언론인 등 전문가의 교차 검증을 통한 팩트체크)이 주를 이루고 있으며, 기술 팩트체크 서비스가 많이 시행되지 않고 있다. 본 논문에서는 기술적인 요소와 비기술적인 요소의 서비스를 함께 사용할 때 허위 정보를 가장 정확하게 식별할 수 있기 때문에 한국어 기반의 자연어 처리 기술을 이용한 팩트체킹 서비스를 제안한다.