• Title/Summary/Keyword: Clone attack

Search Result 8, Processing Time 0.024 seconds

A Convergence Technology of IPTV-RFID against Clone Attack (Clone 공격에 강한 IPTV-RFID 융합 기술)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.145-156
    • /
    • 2010
  • Now a days, the development of TV and internet like communicational technique makes IPTV service which combines internet with multimedia contents increase. But when a user gets service in specific place, the certification process and user's ID check in IPTV service is complicate so that there occurs communicational difficulty like increasing illegal users and service delay etc. This paper proposes communication security mechanism to prevent Clone attack which happens in wireless section by efficiently extracting illegal user. The proposed mechanism performs key distribution procedure, inter certification procedure, and key initiation procedure by putting security agent in RFID-USB for RFID tags users use to perform plug-and-plug function. Also, the proposed mechanism updates the hased token value by its ID and the random number which RFID-USB creates whenever a user accesses in the area of RFID-USB so that it protects reply attack and man-in-the-middle attack which happen often in the area of wireless section.

Policy Based Cloned CSD Detection Mechanism in Logistics (항만 물류 환경에서의 복제된 CSD 탐지를 위한 정책 기반 복제 탐지 매커니즘)

  • Hwang, Ah-Reum;Suh, Hwa-Jung;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.1
    • /
    • pp.98-106
    • /
    • 2012
  • CSD(Container Security Device) is a security device with sensors that can detect the abnormal behavior such as illegal opening of a container door. Since the CSD provides security and safety of the container, CSD should not only provide security services such as confidentiality and integrity but also cloning detection. If we can not detect the cloned CSD, an adversary can use the cloned CSD for many illegal purposes. In this paper, we propose a policy based cloned CSD detection mechanism. To evaluate proposed clone detection mechanism, we have implemented the proposed scheme and evaluated the results.

SEC Approach for Detecting Node Replication Attacks in Static Wireless Sensor Networks

  • Sujihelen, L.;Jayakumar, C.;Senthilsingh, C.
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.6
    • /
    • pp.2447-2455
    • /
    • 2018
  • Security is more important in many sensor applications. The node replication attack is a major issue on sensor networks. The replicated node can capture all node details. Node Replication attacks use its secret cryptographic key to successfully produce the networks with clone nodes and also it creates duplicate nodes to build up various attacks. The replication attacks will affect in routing, more energy consumption, packet loss, misbehavior detection, etc. In this paper, a Secure-Efficient Centralized approach is proposed for detecting a Node Replication Attacks in Wireless Sensor Networks for Static Networks. The proposed system easily detects the replication attacks in an effective manner. In this approach Secure Cluster Election is used to prevent from node replication attack and Secure Efficient Centralized Approach is used to detect if any replicated node present in the network. When comparing with the existing approach the detection ratio, energy consumption performs better.

Isolation and Expression Analysis of Brassica rapa WRKY 7

  • Kim, Seon-Seol;Ko, Yu-Jin;Jang, Ji-Young;Lee, Theresa;Lim, Myung-Ho;Park, Sang-Yeol;Bae, Shin-Chul;Yun, Choong-Hyo;Park, Beom-Seok;Hwang, Duk-Ju
    • The Plant Pathology Journal
    • /
    • v.24 no.4
    • /
    • pp.478-481
    • /
    • 2008
  • The cDNA clone of Brassica rapa WRKY7 (BrWRKY7) was obtained from EST collection in Brassica genomics team and its DNA sequence was determined. The cDNA clone is 1,037 bp long in nucleotides and encodes an open reading frame of 307 amino acids. Based on a phylogenetic tree, BrWRKY7 belongs to group IId. BrWRKY7 was induced by wound and SA. It was also induced by pathogen attack such as Xanthomonas campestris pv. campestris (Xcc), suggesting that this BrWRKY may play an essential role in defense response of chinese cabbages.

Model Inversion Attack: Analysis under Gray-box Scenario on Deep Learning based Face Recognition System

  • Khosravy, Mahdi;Nakamura, Kazuaki;Hirose, Yuki;Nitta, Naoko;Babaguchi, Noboru
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.3
    • /
    • pp.1100-1118
    • /
    • 2021
  • In a wide range of ML applications, the training data contains privacy-sensitive information that should be kept secure. Training the ML systems by privacy-sensitive data makes the ML model inherent to the data. As the structure of the model has been fine-tuned by training data, the model can be abused for accessing the data by the estimation in a reverse process called model inversion attack (MIA). Although, MIA has been applied to shallow neural network models of recognizers in literature and its threat in privacy violation has been approved, in the case of a deep learning (DL) model, its efficiency was under question. It was due to the complexity of a DL model structure, big number of DL model parameters, the huge size of training data, big number of registered users to a DL model and thereof big number of class labels. This research work first analyses the possibility of MIA on a deep learning model of a recognition system, namely a face recognizer. Second, despite the conventional MIA under the white box scenario of having partial access to the users' non-sensitive information in addition to the model structure, the MIA is implemented on a deep face recognition system by just having the model structure and parameters but not any user information. In this aspect, it is under a semi-white box scenario or in other words a gray-box scenario. The experimental results in targeting five registered users of a CNN-based face recognition system approve the possibility of regeneration of users' face images even for a deep model by MIA under a gray box scenario. Although, for some images the evaluation recognition score is low and the generated images are not easily recognizable, but for some other images the score is high and facial features of the targeted identities are observable. The objective and subjective evaluations demonstrate that privacy cyber-attack by MIA on a deep recognition system not only is feasible but also is a serious threat with increasing alert state in the future as there is considerable potential for integration more advanced ML techniques to MIA.

Protection Scheme to Clone Mobile Agent against External Replay Attack (이동 에이전트 복제가 가능한 외적 재실행 방지 기법)

  • Seyeong Kim;Younwoo Kim;Hyunsu Jang;Young Ik Eom
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.1529-1532
    • /
    • 2008
  • 이동 에이전트는 플랫폼 간을 이주하며 자기 복제를 통한 작업 분배가 가능하다. 이러한 점에 의해 최근 이동 에이전트는 분산 처리 기반 기술로 각광 받고 있다. 그러나 이러한 에이전트의 이주, 복제능력은 악의적인 플랫폼과 이동 에이전트의 공격에 대한 약점이 되고 있다. 그 중 재실행 공격은 에이전트의 반복 수행을 통해 에이전트를 공격하는 기법이다. 이에 대한 방지 기법으로 트립 마커를 이용하여 동적인 수행 결정이 가능한 연구가 있다. 그러나 이 기법은 이동 에이전트가 위치한 플랫폼에 따라 이동 에이전트의 복제가 제한 받는다는 단점이 있다. 본 논문에서는 이동 에이전트의 복제가 가능한 외적 재실행 방지 기법을 제안한다. 본 기법은 트립 마커 생성을 담당하는 트립 마커 서버를 두어 플랫폼에 상관없이 유연한 이동 에이전트의 복제가 가능하다. 또한 비대칭키 기법을 이용한 비밀 통신을 통해 재실행 공격으로부터 이동 에이전트를 방어한다.

Effects of PEGylated scFv Antibodies against Plasmodium vivax Duffy Binding Protein on the Biological Activity and Stability In Vitro

  • Kim, So-Hee;Lee, Yong-Seok;Hwang, Seung-Young;Bae, Gun-Won;Nho, Kwang;Kang, Se-Won;Kwak, Yee-Gyung;Moon, Chi-Sook;Han, Yeon-Soo;Kim, Tae-Yun;Kho, Weon-Gyu
    • Journal of Microbiology and Biotechnology
    • /
    • v.17 no.10
    • /
    • pp.1670-1674
    • /
    • 2007
  • Duffy binding protein (DBP) plays a critical role in Plasmodium vivax invasion of human red blood cells. We previously reported a single-chain antibody fragment (scFv) that was specific to P. vivax DBP (PvDBP). However, the stabilization and the half-life of scFvs have not been studied. Here, we investigated the effect of PEGylated scFvs on their biological activity and stability in vitro. SDS-PAGE analysis showed that three clones (SFDBII-12, -58, and -92) were formed as monomers (about 70 kDa) with PEGylation. Clone SFDBII-58 gave the highest yield of PEGylated scFv. Binding analysis using BIAcore between DBP and scFv showed that both SFDBII-12 and -58 were decreased approximately by two folds at the level of binding affinity to DBP after PEGylation. However, the SFDBII-92 clone still showed a relatively high level of binding affinity ($K_D=1.02{\times}10^{-7}\;M$). Binding inhibition assay showed that PEGylated scFv was still able to competitively bind the PvDBP and playa critical role in inhibiting the interactions between PvDBP protein expressed on the surface of Cos-7 cells and Duffy receptor on the surface of erythrocytes. When both scFvs and their PEGylated counterparts were exposed to trypsin, scFv was completely degraded only after 24 h, whereas 35% of PEGylated scFvs remained intact, maintaining their stability against the proteolytic attack of trypsin until 72 h. Taken together, these results suggest that the PEGylated scFvs retain their stability against proteolytic enzymes in vivo, with no significant loss in their binding affinity to target antigen, DBP.

Construction of Glomerular Epithelial Cells Expressing Both Immune Tolerance and GFP Genes and Application to Cell Therapy by Cell Transplantation

  • Ohga, Masahiro;Ogura, Mariko;Matsumura, Mastoshi;Wang, Pi-Chao
    • Biotechnology and Bioprocess Engineering:BBE
    • /
    • v.7 no.5
    • /
    • pp.303-310
    • /
    • 2002
  • Cell therapy applied to wound healing or tissue regeneration presents a revolutionary realm to which principles of gene engineering and delivery may be applied. One promising application is the transplantation of cells into the wounded tissue to help the tissue repair. However, when cells are transplanted from in vitro to in vivo, immune rejection occurs due to the immune response triggered by the activation of T-cell, and the transplanted cells are destroyed by the attack of activated T-cell and lose their function. Immune suppressant such as FK506 is commonly used to suppress immune rejection during transplantation. However, such kind of immune suppressants not only suppresses immune rejection in the periphery of transplanted cells but also suppresses whole immune response system against pathogenic infection. In order to solve this problem, we developed a method to protect the desired cells from immune rejection without impairing whole immune system during cell transplantation. Previously, we reported the success of constructing glomerular epithelial cells for removal of immune complex, in which complement receptor of type 1 (CR1) was over-expressed on the membrane of renal glomerular epithelial cells and could bind immune complex of DNA/anti-DNA-antibody to remove immune complex through phagocy-tosis [1]. Attempting to apply the CR1-expressing cells to cell therapy and evade immune rejection during cell transplantation, we constructed three plasmids containing genes encoding a soluble fusion protein of cytolytic T lymphocyte associated antigen-4 (CTLA4Ig) and an enhanced green fluorescent protein (EGFP). The plasmids were transfected to the above-mentioned glomerular epithelial cells to express both genes simultaneously. Using the clone cells for cell transplantation showed that mice with autoimmune disease prolonged their life significantly as compared with the control mice, and two injections of the cells at the beginning of two weeks resulted in remarkable survivability, whereas it requires half a year and 50 administrations of proteins purified from the same amount of cells to achieve the same effect.