• 제목/요약/키워드: Adversary

검색결과 184건 처리시간 0.026초

무선 센서 네트워크에서 동적 여과를 위한 퍼지 기반 확률 조절 기법 (Probability Adjustment Scheme for the Dynamic Filtering in Wireless Sensor Networks Using Fuzzy Logic)

  • 한만호;이해영;조대호
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 한국정보통신설비학회 2008년도 정보통신설비 학술대회
    • /
    • pp.159-162
    • /
    • 2008
  • Generally, sensor nodes can be easily compromised and seized by an adversary because sensor nodes are hostile environments after dissemination. An adversary may be various security attacks into the networks using compromised node. False data injection attack using compromised node, it may not only cause false alarms, but also the depletion of the severe amount of energy waste. Dynamic en-route scheme for Filtering False Data Injection (DEF) can detect and drop such forged report during the forwarding process. In this scheme, each forwarding nodes verify reports using a regular probability. In this paper, we propose verification probability adjustment scheme of forwarding nodes though a fuzzy rule-base system for the Dynamic en-route filtering scheme for Filtering False Data Injection in sensor networks. Verification probability determination of forwarding nodes use false traffic rate and distance form source to base station.

  • PDF

Approximation Algorithms for Scheduling Parallel Jobs with More Machines

  • Kim, Jae-Hoon
    • Journal of information and communication convergence engineering
    • /
    • 제9권4호
    • /
    • pp.471-474
    • /
    • 2011
  • In parallel job scheduling, each job can be executed simultaneously on multiple machines at a time. Thus in the input instance, a job $J_i$ requires the number $m_i$ of machines on which it shall be processed. The algorithm should determine not only the execution order of jobs but also the machines on which the jobs are executed. In this paper, when the jobs have deadlines, the problem is to maximize the total work of jobs which is completed by their deadlines. The problem is known to be strongly NP-hard [5] and we investigate the approximation algorithms for the problem. We consider a model in which the algorithm can have more machines than the adversary. With this advantage, the problem is how good solution the algorithm can produce against the optimal algorithm.

Instrumental Measurements of Hand Attributes on Microfiber Polyester/Cotton Blend Fabric Finished with Silicone Mixed Fluorochemical

  • Ahn, Young-Moo
    • 패션비즈니스
    • /
    • 제10권6호
    • /
    • pp.16-27
    • /
    • 2006
  • The purpose of this study was to examine the effects of chemical finishes on performance characteristics of microfiber blend fabrics. A 60% polyester microfiber /40% cotton blend woven fabric was finished by ten chemicals: three silicone softeners, one fluorochemical, and their mixtures. Performance characteristics examined were fabric hand attributes. Fabric hand was evaluated by instrumental measures using Kawabata KES-F system instruments. Silicone-only finishes did not change the bending properties significantly from those of the control fabric. The fluorochemical-only finish made the fabric stiffer and crisper. When the two chemicals were mixed they tended to offset this adversary effect. Most of the chemical finishes made the surface finer and smoother. Fluorochemical-only finish improved fabric strength. Likewise, dimethylpolysiloxane silicone improved fabric strength. Amino-functional hydrophilic and diamino-functional silicone softeners, on the other hand, reduced fabric strength. However, when mixed with the fluorochemical, the adversary effect was diminished.

A Cache Privacy Protection Mechanism based on Dynamic Address Mapping in Named Data Networking

  • Zhu, Yi;Kang, Haohao;Huang, Ruhui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권12호
    • /
    • pp.6123-6138
    • /
    • 2018
  • Named data networking (NDN) is a new network architecture designed for next generation Internet. Router-side content caching is one of the key features in NDN, which can reduce redundant transmission, accelerate content distribution and alleviate congestion. However, several security problems are introduced as well. One important security risk is cache privacy leakage. By measuring the content retrieve time, adversary can infer its neighbor users' hobby for privacy content. Focusing on this problem, we propose a cache privacy protection mechanism (named as CPPM-DAM) to identify legitimate user and adversary using Bloom filter. An optimization for storage cost is further provided to make this mechanism more practical. The simulation results of ndnSIM show that CPPM-DAM can effectively protect cache privacy.

Gu-Xue의 개선된 Secret Handshake 기법의 안전성 분석 (Security analysis on the Gu-Xue improved secret handshakes scheme)

  • 윤택영;박영호
    • 정보보호학회논문지
    • /
    • 제22권3호
    • /
    • pp.655-658
    • /
    • 2012
  • 최근 Gu와 Xue는 Huang와 Cao에 의해 제안되었던 기법을 수정하여 개선된 secret hankshake 기법을 제안하였다. Gu와 Xue의 기법은 Huang와 Cao의 기법이 가지고 있던 취약성을 개선하면서 기존의 기법들에 비해 효율적이라는 장점도 동시에 제공하고 있다. 본 논문에서는 Gu와 Xue에 의해 고려되었던 안전성 요구사항들을 살펴보고 공격자에 대한 정의가 현실적으로 제한되었음을 보인다. 현실성에 맞게 수정된 공격자 모델에서는 Gu와 Xue의 기법이 안전하지 않음을 보인다.

XML기반 Windows Event Log Forensic 도구 설계 및 구현 (XML-based Windows Event Log Forensic tool design and implementation)

  • 김종민;이동휘
    • 융합보안논문지
    • /
    • 제20권5호
    • /
    • pp.27-32
    • /
    • 2020
  • Windows Event Log에는 시스템의 전반적인 동작들을 정의하고 있는 Log이며, 해당 파일에는 사용자의 여러 행위 및 이상 징후를 탐지할 수 있는 데이터가 저장되어 있다. 하지만 행위마다 Event Log가 발생함으로써, 로그들을 분석할 때, 상당한 시간이 소요된다. 따라서 본 연구에서는 NSA에서 발표한 "Spotting the Adversary with Windows Event Log Monitoring"의 주요 Event Log 목록을 바탕으로 XML 기반한 Event Log 분석 도구를 설계 및 구현 하였다.

When Diplomats Go MAD: How the Crisis Framing of Ministries of Foreign Affairs Results in Mutually Assured Delegitimization

  • Manor, Ilan
    • Journal of Public Diplomacy
    • /
    • 제1권2호
    • /
    • pp.75-116
    • /
    • 2021
  • This study argues that scholars lack an adequate conceptualization of the strategic use of social media framing by Ministries of Foreign Affairs (MFAs) during crises. As a theoretical starting point, this article employs the concept of soft disempowerment to suggest that MFAs may use online framing to limit an adversary's range of possible actions during a crisis by depicting that adversary as violating norms and values deemed desirable by the international community. Next, the article introduces the concept of mutually assured delegitimization (MAD), which suggests that actors may call into question one another's adherence with certain norms and values during crises, which results in the mutual depletion of soft power resources. Importantly, this article proposes a novel, methodological approach for the analysis of individual tweets during crises. To illustrate its methodological and conceptual innovations, the study analyzes tweets published by the MFAs of the United States (US) and Russia during the Crimea crisis and demonstrates that both MFAs used Twitter to negatively frame each other by calling their morals into question, which resulted in MAD.

낮은 복잡도의 보안 네트워크 부호화 (New Secure Network Coding Scheme with Low Complexity)

  • 김영식
    • 한국통신학회논문지
    • /
    • 제38A권4호
    • /
    • pp.295-302
    • /
    • 2013
  • 네트워크 부호화는 중간 노드에서 데이터의 변환을 허용함으로써 전송률 높일 수 있는 방식이지만, 중간 노드에 대한 도청이나 데이터 변조에 취약해지는 문제가 발생한다. 이를 위해 정보이론적 관점에서 또는 암호학적 관점에서 도청 또는 데이터 변조에 저항할 수 있는 다양한 부호화 방식들이 제안되었다. 최근에 암호학적 관점에서 랜덤 네트워크 부호화에도 안전한 네트워크 부호화 방식이 제안되었지만, 안전한 해쉬 함수와 같은 암호학적 도구들의 사용은 센서 노드와 같은 낮은 연산능력을 보유한 장비에서는 적용이 어려운 문제를 지닌다. 이 논문에서는 선형 변환 및 간단한 테이블 룩업을 기반으로 랜덤 네트워크 부호화 사용할 때 n개의 패킷 중에서 공격자가 최대 n-1 개의 패킷을 도청하는 경우에도 n-1 개까지의 사용자 메시지를 동시에 안전하게 전송할 수 있는 안전한 네트워크 부호화 방식을 제안한다. 제안하는 방식은 암호학적으로 전부-또는-전무 변환(all-or-nothing transform) 형태를 가지면서도 정보이론적으로 완화된 조건에서 안전한 네트워크 부호화 방식임을 증명할 것이다.

Physical protection system vulnerability assessment of a small nuclear research reactor due to TNT-shaped charge impact on its reinforced concrete wall

  • Moo, Jee Hoon;Chirayath, Sunil S.;Cho, Sung Gook
    • Nuclear Engineering and Technology
    • /
    • 제54권6호
    • /
    • pp.2135-2146
    • /
    • 2022
  • A nuclear energy facility is one of the most critical facilities to be safely protected during and after operation because the physical destruction of its barriers by an external attack could release radioactivity into the environment and can cause harmful effects. The barrier walls of nuclear energy facilities should be sufficiently robust to protect essential facilities from external attack or sabotage. Physical protection system (PPS) vulnerability assessment of a typical small nuclear research reactor was carried out by simulating an external attack with a tri-nitro toluene (TNT) shaped charge and results are presented. The reinforced concrete (RC) barrier wall of the research reactor located at a distance of 50 m from a TNT-shaped charge was the target of external attack. For the purpose of the impact assessment of the RC barrier wall, a finite element method (FEM) is utilized to simulate the destruction condition. The study results showed that a hole-size of diameter 342 mm at the front side and 364 mm at the back side was created on the RC barrier wall as a result of a 143.35 kg TNT-shaped charge. This aperture would be large enough to let at least one person can pass through at a time. For the purpose of the PPS vulnerability assessment, an Estimate of Adversary Sequence Interruption (EASI) model was used, which enabled the determination of most vulnerable path to the target with a probability of interruption equal to 0.43. The study showed that the RC barrier wall is vulnerable to a TNT-shaped charge impact, which could in turn reduce the effectiveness of the PPS.

Cryptanalysis of an 'Efficient-Strong Authentiction Protocol (E-SAP) for Healthcare Applications Using Wireless Medical Sensor Networks'

  • Khan, Muhammad Khurram;Kumari, Saru;Singh, Pitam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권5호
    • /
    • pp.967-979
    • /
    • 2013
  • Now a day, Wireless Sensor Networks (WSNs) are being widely used in different areas one of which is healthcare services. A wireless medical sensor network senses patient's vital physiological signs through medical sensor-nodes deployed on patient's body area; and transmits these signals to devices of registered medical professionals. These sensor-nodes have low computational power and limited storage capacity. Moreover, the wireless nature of technology attracts malicious minds. Thus, proper user authentication is a prime concern before granting access to patient's sensitive and private data. Recently, P. Kumar et al. claimed to propose a strong authentication protocol for healthcare using Wireless Medical Sensor Networks (WMSN). However, we find that P. Kumar et al.'s scheme is flawed with a number of security pitfalls. Information stored inside smart card, if extracted, is enough to deceive a valid user. Adversary can not only access patient's physiological data on behalf of a valid user without knowing actual password, can also send fake/irrelevant information about patient by playing role of medical sensor-node. Besides, adversary can guess a user's password and is able to compute the session key shared between user and medical sensor-nodes. Thus, the scheme looses message confidentiality. Additionally, the scheme fails to resist insider attack and lacks user anonymity.