• Title/Summary/Keyword: Attack Model

Search Result 1,005, Processing Time 0.027 seconds

Security Analysis of the Lightweight Cryptosystem TWINE in the Internet of Things

  • Li, Wei;Zhang, Wenwen;Gu, Dawu;Tao, Zhi;Zhou, Zhihong;Liu, Ya;Liu, Zhiqiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.2
    • /
    • pp.793-810
    • /
    • 2015
  • The TWINE is a new Generalized Feistel Structure (GFS) lightweight cryptosystem in the Internet of Things. It has 36 rounds and the key lengths support 80 bits and 128 bits, which are flexible to provide security for the RFID, smart cards and other highly-constrained devices. Due to the strong attacking ability, fast speed, simple implementation and other characteristics, the differential fault analysis has become an important method to evaluate the security of lightweight cryptosystems. On the basis of the 4-bit fault model and the differential analysis, we propose an effective differential fault attack on the TWINE cryptosystem. Mathematical analysis and simulating experiments show that the attack could recover its 80-bit and 128-bit secret keys by introducing 8 faulty ciphertexts and 18 faulty ciphertexts on average, respectively. The result in this study describes that the TWINE is vulnerable to differential fault analysis. It will be beneficial to the analysis of the same type of other iterated lightweight cryptosystems in the Internet of Things.

A Study of Aerodynamic Modelling for Fin Unfolding Motion Analysis (공력면 전개 모사를 위한 공력 모델링 연구)

  • Jung, Suk-Young;Yoon, Sung-Joon
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.36 no.5
    • /
    • pp.420-427
    • /
    • 2008
  • For simulation of a fin unfolding motion for the various aerodynamic conditions, equations and moments applying to the unfolding fin were modelled. Aerodynamic roll moment consists of the static roll moment and the damping moment, which were obtained through wind tunnel tests and numerical analyses respectively. Panel method was used to compute the roll damping coefficient with deflected fin, whose angle was equivalent to angle of attack due to the deployment motion. Roll damping coefficient is a function of angle of attack, sideslip angle, and deployment angle but not of angular velocity of deployment. Simulation with aerodynamic damping model gave more similar deployment time compared to fin deployment test results.

Security Analysis of AMI Using ACT (ACT를 이용한 AMI 보안 분석)

  • Wi, Miseon;Kim, Dong Seong;Park, Jong Sou
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.639-653
    • /
    • 2013
  • Smart grid is a network of computers and power infrastructure that monitor and manage energy usage efficiently. Recently, the smart grid demonstration projects around the world, including the United States, Europe, Japan, and the technology being developed. The protection of the many components of the grid against cyber-threats has always been critical, but the recent Smart grid has been threatened by a variety of cyber and physical attacks. We model and analyze advanced metering infrastructure(AMI) in smart grid. Using attack countermeasure tree(ACT) we show qualitative and probabilistic security analysis of AMI. We implement using SHARPE(Symbolic Hierarchical Automated Reliability and Performance Evaluator) tool and calculate probability, ROA, ROI, Structure Importance, Birnbaum Importance.

Flow Visualization Study on Vortices over a Stealth UCAV Configuration (스텔스 무인전투기 형상의 와류 거동에 대한 흐름가시화 연구)

  • Kang, Seung-Hee;Lee, Do-Kwan;Hyun, Jae-Soo
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.35 no.6
    • /
    • pp.467-473
    • /
    • 2007
  • Flow visualization study to qualitatively define the flow field over a stealth UCAV(Uninhabited Combat Air Vehicle) configuration in a water tunnel has been conducted to clarify the basic aerodynamic performance. The test was performed at freestream velocity of 12.7 cm/sec which was corresponding to a Reynolds number of $1.4{\times}10^4$ based on mean aerodynamic chord. The development and breakdown of vortices illuminated by using dye were compared to the previous force and moment data. It was shown that the effect of the vortices generated by the main-body and junction are dominant in the low angle-of-attack region. However, in the high angle-of-attack region, the vortex generated by the fore-body mainly influenced the aerodynamic performance of the model.

Study on the Flow Characteristics of Supersonic Air Intake at Mach 4 (마하4 초음속 공기 흡입구 유동 특성에 관한 연구)

  • ;;;;Shigeru , Aso
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.34 no.10
    • /
    • pp.61-70
    • /
    • 2006
  • A Supersonic air intake model was designed for the high performance ramjet and dual-mode scramjet engine to operate at Mach 4 flight condition. The air intake was tested in the blowdown-type wind tunnel of Kyushu University to identify the internal flow characteristics corresponding to the flight parameters such as the back pressure, angle of attack and angle of yaw. Flow visualization was achieved by the Schlieren and oil flow visualization techniques. The intake performance was analyzed quantitatively based on the surface pressure and total Pressure measurements. The experimental results were compared with the computational fluid dynamics results. The present study exhibits the fundamental but rarely found experimental results of the high Mach number supersonic air intake.

Meso-Scale Approach for Prediction of Mechanical Property and Degradation of Concrete

  • Ueda, Tamon
    • Corrosion Science and Technology
    • /
    • v.3 no.3
    • /
    • pp.87-97
    • /
    • 2004
  • This paper presents a new approach with meso scale structure models to express mechanical property, such as stress - strain relationships, of concrete. This approach is successful to represent both uniaxial tension and uniaxial compression stress - strain relationship, which is in macro scale. The meso scale approach is also applied to predict degraded mechanical properties of frost-damaged concrete. The degradation of mechanical properties with frost-damaged concrete was carefully observed. Strength and stiffness in both tension and compression decrease with freezing and thawing cycles (FTC), while stress-free crack opening in tension softening increases. First attempt shows that the numerical simulation can express the experimentally observed degradation by introducing changes in the meso scale structure in concrete, which are assumed based on observed damages in the concrete subjected to FTC. At the end applicability of the meso scale approach to prediction of the degradation by combined effects of salt attack and FTC is discussed. It is shown that clarification of effects of frost damage in concrete on corrosion progress and on crack development in the damaged cover concrete due to corrosion is one of the issues for which the meso scale approach is useful.

Research on the Issuing and Management Model of Certificates based on Clustering Using Threshold Cryptography in Mobile Ad Hoc Networking (이동 Ad Hoc 네트워킹에서 Threshold Cryptography를 적용한 클러스터 기반의 인증서 생성 및 관리 모델연구)

  • Park, Bae-Hyo;Lee, Jae-Il;Hahn, Gene-Beck;Nyang, Dae-Hun
    • Journal of Information Technology Services
    • /
    • v.3 no.2
    • /
    • pp.119-127
    • /
    • 2004
  • A mobile ad hoc network(MANET) is a network where a set of mobile devices communicate among themselves using wireless transmission without the support of a fixed network infrastructure. The use of wireless links makes MANET susceptible to attack. Eavesdroppers can access secret information, violating network confidentiality, and compromised nodes can launch attack from within a network. Therefore, the security for MANET depends on using the cryptographic key, which can make the network reliable. In addition, because MANET has a lot of mobile devices, the authentication scheme utilizing only the symmetric key cryptography can not support a wide range of device authentication. Thereby, PKI based device authentication technique in the Ad Hoc network is essential and the paper will utilize the concept of PKI. Especially, this paper is focused on the key management technique of PKI technologies that can offer the advantage of the key distribution, authentication, and non-reputation, and the issuing and managing technique of certificates based on clustering using Threshold Cryptography for secure communication in MANET.

Design of Intrusion Detection System Using the Circuit Patrol to protect against information leakage through Mobile access (모바일 접근에 의한 정보 누출을 막기 위한 Circuit Patrol 침입탐지 시스템 설계)

  • 장덕성
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.2
    • /
    • pp.46-52
    • /
    • 2002
  • Trend of wire internet has been transferred to wireless internet gradually due to the spread of mobile phone which made Possible Mobility and portability which wire internet could not afford. Not only front line of business part can access business information but also people can use government information for their daily life without limit of place. The frequent report of larceny and misuse of information has been issued to social sector that the need for IDS considering wire wireless internet. In this paper to design IDS to protect information first, searched wire internet intrusion type, intrusion detection method, and wireless intrusion type. In this paper, first, separate abnormal access at the point of system landing and detect intrusion attack with disguise through mobile wireless internet. Due to the intruder can access system normally with disguise, Circuit Patrol model has been suggested to monitor from intrusion attack.

  • PDF

Design and Implementation of Network Defense Simulator (네트워크 방어 시뮬레이터 설계 및 구현)

  • 이철원;윤주범;임을규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.4C
    • /
    • pp.441-447
    • /
    • 2004
  • Information security simulator is required for the study on the cyber intrusion and defense as information security has been increasingly popular Until now, the main purposes of information security simulation are security estimation of small network as well as performance analysis of information protection systems. However, network simulators that can simulate attacks in a huge network are in needs since large scale internet attacks are very common in these days. In this paper we proposed a simulator design and its implementation details. Our simulator is implemented by expanding the SSFNet program to the client-sewer architecture. A cyber attack scenario used in our simulator is composed by the advanced attack tree model. We analyzed the simulation results to show the correctness of our network defense simulator.

An Experimental Study on the Aerodynamic Performance of High-efficient, Small-scale, Vertical-axis Wind Turbine (고효율 소형 수직형 풍력터빈의 공력성능에 관한 실험적 연구)

  • Park, Jun-Yong;Lee, Myeong-Jae;Lee, Seung-Jin;Lee, Seung-Bae
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.33 no.8
    • /
    • pp.580-588
    • /
    • 2009
  • This paper summarizes the experimentally-measured performance of small-scale, vertical-axis wind turbine for the purpose of improving the aerodynamic efficiency and its controllability. The turbine is designed to have a Savonius-Type rotor with an inlet guide-vane and an side guide-vane so that it achieves a higher efficiency than any lift- or drag-based turbines. The main design factors for this high-efficient, vertical wind turbine are the number of blades (Z), and the aspect ratio of Height/Diameter (H/D) among many. The basic model has the diameter of 580mm, the height of 464mm, and the blade number of 10. The maximum power coefficient of 0.50 was experimentally measured for the above-mentioned specifications. The inlet-guide vane ensures the maximum efficiency when the angle of attack to the rotor blade lies between $15^{\circ}$ and $20^{\circ}$. This experimental results for the vertical-axis wind turbine can be applied to the preliminary design of turbine output curve based on the wind characteristics at the proposed site by controlling its aerodynamic performance given as a priori.