• Title/Summary/Keyword: 허위 정보

Search Result 139, Processing Time 0.024 seconds

Determination Method of Security Threshold using Fuzzy Logic for Statistical Filtering based Sensor Networks (통계적 여과 기법기반의 센서 네트워크를 위한 퍼지로직을 사용한 보안 경계 값 결정 기법)

  • Kim, Sang-Ryul;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.2
    • /
    • pp.27-35
    • /
    • 2007
  • When sensor networks are deployed in open environments, all the sensor nodes are vulnerable to physical threat. An attacker can physically capture a sensor node and obtain the security information including the keys used for data authentication. An attacker can easily inject false reports into the sensor network through the compromised node. False report can lead to not only false alarms but also the depletion of limited energy resource in battery powered sensor networks. To overcome this threat, Fan Ye et al. proposed that statistical on-route filtering scheme(SEF) can do verify the false report during the forwarding process. In this scheme, the choice of a security threshold value is important since it trades off detection power and energy, where security threshold value is the number of message authentication code for verification of false report. In this paper, we propose a fuzzy rule-based system for security threshold determination that can conserve energy, while it provides sufficient detection power in the SEF based sensor networks. The fuzzy logic determines a security threshold by considering the probability of a node having non-compromised keys, the number of compromised partitions, and the remaining energy of nodes. The fuzzy based threshold value can conserve energy, while it provides sufficient detection power.

  • PDF

A Design of Estimate-information Filtering System using Artificial Intelligent Technology (인공지능 기술을 활용한 부동산 허위매물 필터링 시스템)

  • Moon, Jeong-Kyung
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.115-120
    • /
    • 2021
  • An O2O-based real estate brokerage web sites or apps are increasing explosively. As a result, the environment has been changed from the existing offline-based real estate brokerage environment to the online-based environment, and consumers are getting very good feelings in terms of time, cost, and convenience. However, behind the convenience of online-based real estate brokerage services, users often suffer time and money damage due to false information or malicious false information. Therefore, in this study, in order to reduce the damage to consumers that may occur in the O2O-based real estate brokerage service, we designed a false property information filtering system that can determine the authenticity of registered property information using artificial intelligence technology. Through the proposed research method, it was shown that not only the authenticity of the property information registered in the online real estate service can be determined, but also the temporal and financial damage of consumers can be reduced.

Design of User Privacy Model for Strong Reliability in SNS Environment (SNS 환경에서 신뢰성이 강한 사용자 프라이버시 모델 설계)

  • Jeong, Yoon-Su;Kim, Yong-Tae
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.237-242
    • /
    • 2013
  • SNS is emerging as an academic and social interest, as Facebook and Twitter are developed explosively. But, SNS has a problem of exposing user's privacy because it is originated by exchanging user's personal information and opinion. This paper proposes SNS user privacy protecting model using data separation and false data information instead of blocking which is using to protect user's personal privacy. The proposed model do not let the third party extract precise information after collecting user's context information by adding false information to separated context information. Also, it gets user's agreement beforehand if SNS service provider uses user's information not to be used illegally by the third party.

A Legal Study on the Game Industry Promontion Act Bill for Establishing The Game User Committee (게임산업법(안)상 게임물이용자위원회에 관한 법적 검토 연구)

  • Park, Se-Hun;Kyen, Seung-yup
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.01a
    • /
    • pp.173-174
    • /
    • 2022
  • 최근 확률형 아이템이 이용자들에게 투입 비용보다 높은 가치의 아이템을 획득할 수 있을 것이라는 막연한 기대감을 갖게 만들어, 게임 이용자의 사행성을 조장하고 과소비를 부추긴다는 우려가 제기되고 있다. 특히 복잡한 확률구조와 관련하여 허위로 표시하는 등 거짓 또는 과장 광고가 만연하여 게임 업계의 자율규제가 실효성을 잃고 게임제작업자가 허위로 확률을 고지하여 이용자들을 기만하는 사례 등이 사회적으로 문제가 되고 있다. 이에 국민의힘 하태경 의원이 일정 규모 이상 게임제작업자는 게임물이용자위원회를 두도록 하는 게임산업진흥에 관한 법률 일부개정(안)을 2021년 3월 24일 대표발의하였는데, 이 법안이 게임산업을 과도하게 규제한다는 비판이 제기되고 있는바, 해당 법안을 분석하여 입법취지에 부합하는 개선방안을 제시하고자 한다.

  • PDF

Monitoring-Based Secure Data Aggregation Protocol against a Compromised Aggregator in Wireless Sensor Networks (무선 센서 네트워크에서 Compromised Aggregator에 대응을 위한 모니터링 기반 시큐어 데이터 병합 프로토콜)

  • Anuparp, Boonsongsrikul;Lhee, Kyung-Suk;Park, Seung-Kyu
    • The KIPS Transactions:PartC
    • /
    • v.18C no.5
    • /
    • pp.303-316
    • /
    • 2011
  • Data aggregation is important in wireless sensor networks. However, it also introduces many security problems, one of which is that a compromised node may inject false data or drop a message during data aggregation. Most existing solutions rely on encryption, which however requires high computation and communication cost. But they can only detect the occurrence of an attack without finding the attacking node. This makes sensor nodes waste their energy in sending false data if attacks occur repeatedly. Even an existing work can identify the location of a false data injection attack but it has a limitation that at most 50% of total sensor nodes can participate in data transmission. Therefore, a novel approach is required such that it can identify an attacker and also increase the number of nodes which participate in data transmission. In this paper, we propose a monitoring-based secure data aggregation protocol to prevent against a compromised aggregator which injects false data or drops a message. The proposed protocol consists of aggregation tree construction and secure data aggregation. In secure data aggregation, we use integration of abnormal data detection with monitoring and a minimal cryptographic technique. The simulation results show the proposed protocol increases the number of participating nodes in data transmission to 95% of the total nodes. The proposed protocol also can identify the location of a compromised node which injects false data or drops a message. A communication overhead for tracing back a location of a compromised node is O(n) where n is the total number of nodes and the cost is the same or better than other existing solutions.

Static Filtering Probability Control Method Based on Reliability of Cluster in Sensor Networks (센서 네트워크에서 클러스터 신뢰도 기반 정적 여과 확률 조절 기법)

  • Hur, Suh-Mahn;Seo, Hee-Suk;Lee, Dong-Young;Kim, Tae-Kyung
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.1
    • /
    • pp.161-171
    • /
    • 2010
  • Sensor Networks are often deployed in unattended environments, thus leaving these networks vulnerable to false data injection attacks in which an adversary injects forged reports into the network through compromised nodes. Such attacks by compromised sensors can cause not only false alarms but also the depletion of the finite amount of energy in a battery powered network. Ye et al. proposed the Statistical En-route Filtering scheme to overcome this threat. In statistical en-route filtering scheme, all the intermediate nodes perform verification as event reports created by center of stimulus node are forwarded to the base station. This paper applies a probabilistic verification method to the Static Statistical En-route Filtering for energy efficiency. It is expected that the farther from the base station an event source is, the higher energy efficiency is achieved.

Network analysis on the diffusion of negative issue related with the government's COVID-19 measures in a crisis situation (위기상황에서 정부의 코로나 19 대책 관련 부정적 이슈의 확산 네트워크 분석)

  • Hong, Juhyun;Cha, Heewon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.2
    • /
    • pp.109-116
    • /
    • 2022
  • This study conducted YouTube network analysis on YouTube video related with prevention of COVID-19 and COVID-19 vaccine to explores how government's policy is spread via social media in the condition of COVID-19. As a result of network analysis on the Mask chaos, A surge in confirmed cases, supply of vaccine, the influence of media like YTN and KBS is large, their view count is high. Government highlights to inform correct information actively to face negative massage and misinformation. The media has to fact check on the misinformation and disinformation.

A Study on the insurance crime using a false hospitalization (허위입원을 이용한 보험범죄에 대한 연구)

  • Park, Hyung Sik;Park, Ho Jeong
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.79-87
    • /
    • 2015
  • In order to clearly recognize illegality of insurance crime, declaring the provisions on insurance crime is preferable. An insurance fraud differentiated from Configuration Requirements of general fraud should be established And differentiation in accordance with the act type of insurance crime the degree of organizational involvement is required. Also the introduction of civil sanctions and creation of additional punishment provision about Organized insurance fraud are required. To notice duplicate insurance when sign up life insurance, the revision of the provisions is required. To limit unnecessary long-term hospitalization, hospitalization standard is required. Introduction of private investigator is required as a method for endowing with investigation to the staff of insurance companies. By providing information sharing laws between relevant agencies including insurance companies and law enforcement agencies, the foundation of information database, and the introduction of SNA Techniques in the IFAS,, you can detect Organized collusion crime.

Fuzzy based Verification Node Decision Method for Dynamic Environment in Probabilistic Voting-based Filtering Scheme (확률적 투표기반 여과기법에서 가변적 환경을 위한 퍼지 기반 검증 노드 결정 기법)

  • Lee, Jae-Kwan;Nam, Su-Man;Cho, Tae-Ho
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2013.07a
    • /
    • pp.11-13
    • /
    • 2013
  • 무선 센서 네트워크는 개방된 환경에서 무작위로 배치되어 악의적인 공격자들에게 쉽게 노출된다. 센서 노드는 한정된 에너지 자원과 손쉽게 훼손된다는 단점을 통해 허위 보고서와 투표 삽입 공격이 발생한다. Li와 Wu는 두 공격을 대응하기 위해 확률적 투표기반 여과기법을 제안하였다. 확률적 투표기반 여과기법은 고정적인 검증 경로를 결정하기 때문에 특정 노드의 에너지 자원고갈 위험이 있다. 본 논문에서는 센서 네트워크에서 보고서 여과 확률 향상을 위하여 퍼지 시스템을 기반으로 다음 노드 선택을 약 6% 효율적인 경로 선택 방법을 제안한다. 제안 기법은 전달 경로 상의 노드 중 상태정보가 높은 노드를 검증 노드로 선택하고, 선택된 검증 노드는 허용 범위 경계 값을 기준으로 공격 유형을 판별하고 여과한다. 실험결과를 통해 제안기법은 기존기법과 비교하였을 때 에너지 효율이 향상되었다.

  • PDF