• Title/Summary/Keyword: Data Falsification

Search Result 40, Processing Time 0.022 seconds

A Peer-to-Peer Key Establishment Scheme without Pre-distributing Keys in Ad-Hoc Networks (Ad-Hoc 네트워크에서 선행 키 분배 없는 단 대 단 키 설정 방안)

  • 왕기철;방상원;정병호;조기환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7C
    • /
    • pp.1015-1023
    • /
    • 2004
  • In order to protect an exchanged data, it is indispensable to establish a peer-to-peer key between the two communicating nodes. Pre-distributing keys among the nodes is unrealistic in Ad-Hoc network environment because of the dynamic nature of its network topology and the equal authority of its nodes. This paper presents a peer-to-peer key establishment scheme without pre-distributing keys in Ad-Hoc networks. The proposed scheme is based on the Diffie-Hellman key exchange protocol. Main idea is to prevent the falsification of Diffe-Hellman values using some elements of a hash chain. As a result, it is as safe as the underlying hash function against a man-in-the-middle attack. Simulation results have shown that the proposed scheme dramatically reduces the number of messages, and has relatively higher scalability, as compared with the key pre-distribution based scheme.

Educational Needs Assessment on Research Ethics among Nursing Researchers (간호연구자의 연구윤리 교육요구도 조사)

  • Jeong, Ihn-Sook;Gu, Mee-Ock;Kim, Keum-Soon;Lee, Kwang-Ja;Yang, Soo
    • Journal of Korean Academy of Nursing
    • /
    • v.40 no.4
    • /
    • pp.515-523
    • /
    • 2010
  • Purpose: This study aimed to investigate the educational needs of research ethics among nursing researchers. Methods: Convenience sample of 161 nursing professors and 262 master or doctoral nursing students participated in the study. Data was collected with self-reported questionnaire from June to August 2009, and analyzed with descriptive statistics using SPSS WIN (version 14.0). Results: Among 161 nursing professors, about 31.7% has educated nursing ethics in the postgraduate course. The most common course was nursing research or methodology (62.7%), and median education time was 2 hr. Areas that showed difficulty in understanding was the conflict of interest and plagiarism for professors and falsification and fabrication for graduate students. Average knowledge on the research ethics was 75.4 points for professors and 61.6 points for students based on the 100 points. Conclusion: Educational needs of research ethics among nursing professors and students in the postgraduate course was high. We recommend both basic and advanced research ethics educational programs for the nursing researchers. The basic course should be at least 6 hr and include various cases and something to discuss.

A Study on Group Key Generation and Exchange using Hash Collision in M2M Communication Environment (M2M 통신 환경에서 해시 충돌을 이용한 그룹키 생성 및 교환 기법 연구)

  • Song, Jun-Ho;Kim, Sung-Soo;Jun, Moon-Seog
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.9-17
    • /
    • 2019
  • As the IoT environment becomes more popular, the safety of the M2M environment, which establishes the communication environment between objects and objects without human intervention, becomes important. Due to the nature of the wireless communication environment, there is a possibility of exposure to security threats in various aspects such as data exposure, falsification, tampering, deletion and privacy, and secure communication security technology is considered as an important requirement. In this paper, we propose a new method for group key generation and exchange using trap hash collision hash in existing 'M2M communication environment' using hash collision, And a mechanism for confirming the authentication of the device and the gateway after the group key is generated. The proposed method has attack resistance such as spoofing attack, meson attack, and retransmission attack in the group communication section by using the specificity of the collision message and collision hash, and is a technique for proving safety against vulnerability of hash collision.

A Study on Event Log Correlation Analysis for Control System Threat Analysis (제어시스템 위협분석을 위한 Event Log 상관분석에 관한 연구)

  • Kim, Jongmin;Kim, Minsu;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.35-40
    • /
    • 2017
  • The control system can have such threats as information leakage and falsification through various routes due to communications network fusion with public network. As the issues about security and the infringe cases by new attack methods are diversified recently, with the security system that makes information data database by simply blocking and checking it is difficult to cope with new types of threats. It is also difficult to respond security threats by insiders who have security access authority with the existing security equipment. To respond the threats by insiders, it is necessary to collect and analyze Event Log occurring in the internal system realtime. Therefore, this study could find out whether there is correlation of the elements among Event Logs through correlation analysis based on Event Logs that occur real time in the control system, and based on the analysis result, the study is expected to contribute to studies in this field.

Development of smart HACCP effectiveness analysis model (스마트 HACCP 효과 분석 모델 개발)

  • Lee, Han-Cheol;Kang, Ju-Yeong;Park, Eun-Ji;Park, Min-Ji;Oh, Do-Gyung;Kim, Chan-Yeong;Jeong, Eun-Sun;Kim, Jai-Moung;Ahn, Yeong-Soon;Kim, Jung-Beom
    • Food Science and Industry
    • /
    • v.54 no.3
    • /
    • pp.184-195
    • /
    • 2021
  • Smart HACCP is a system that can check the monitoring of critical control point (CCP) in real time to implement improvement measures immediately after departure from limit criteria and prevent falsification of data by digitizing handwritten records. In this study, we developed the analysis model for the effectiveness ofsmart HACCP to compare and analyze with existing HACCP. By introducing of smart HACCP system, the evaluation index value of HACCP effectiveness for HACCP-certificated companies on a small scale increased by 9.25 points, corresponding to 11.52% of increase rate. General HACCP-certificated companies showed 4.52 point and 5.00% of increase rate by introducing of smart HACCP system. Thus, it was confirmed that the introduction of smart HACCP system contributes to the improvement of food safety management and especially it would be more effective for HACCP-certificated companies on a small scale than general HACCP-certificated companies.

Design and Implement a Forgery-safe Blockchain-based Academic Credential Verification System (위변조에 안전한 블록체인 기반 학력 검증 시스템 설계 및 구현)

  • Jung-oh Park
    • Journal of Industrial Convergence
    • /
    • v.21 no.7
    • /
    • pp.41-49
    • /
    • 2023
  • In recent years, various educational institutions have used online certificate services to verify academic achievement related to graduation and grades. However, the certificate of the existing system has limitations in verifying and tracking whether it is true or not and detailed academic background. In this regard, cases of forgery/falsification of online/offline certificates continue to occur. This study proposes a blockchain-based verification method that is safe from forgery and alteration, focusing on university institutions. Necessary information such as detailed class categories for each department, attendance, and detailed grades was collected/analyzed to create a linkage relationship through blockchain. In addition, the system/network environment required for blockchain sharing was considered, and it was implemented as an extension module in the form of an independent web application. As a result of the block chain verification, it was proved that the safe trust verification of educational information and the relationship between detailed information can be traced. This study aims to contribute to the improvement of academic credential verification services and information security for Korean educational institutions in the future.

Distributed Trust Management for Fog Based IoT Environment (포그 기반 IoT 환경의 분산 신뢰 관리 시스템)

  • Oh, Jungmin;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.731-751
    • /
    • 2021
  • The Internet of Things is a huge group of devices communicating each other and the interconnection of objects in the network is a basic requirement. Choosing a reliable device is critical because malicious devices can compromise networks and services. However, it is difficult to create a trust management model due to the mobility and resource constraints of IoT devices. For the centralized approach, there are issues of single point of failure and resource expansion and for the distributed approach, it allows to expand network without additional equipment by interconnecting each other, but it has limitations in data exchange and storage with limited resources and is difficult to ensure consistency. Recently, trust management models using fog nodes and blockchain have been proposed. However, blockchain has problems of low throughput and delay. Therefore, in this paper, a trust management model for selecting reliable devices in a fog-based IoT environment is proposed by applying IOTA, a blockchain technology for the Internet of Things. In this model, Directed Acyclic Graph-based ledger structure manages trust data without falsification and improves the low throughput and scalability problems of blockchain.

Development and Evaluation of SWAT Topographic Feature Extraction Error(STOPFEE) Fix Module from Low Resolution DEM (저해상도 DEM 사용으로 인한 SWAT 지형 인자 추출 오류 개선 모듈 개발 및 평가)

  • Kim, Jong-gun;Park, Youn-shik;Kim, Nam-won;Chung, Il-moon;Jang, Won-seok;Park, Jun-ho;Moon, Jong-pil;Lim, Kyoung Jae
    • Journal of Korean Society on Water Environment
    • /
    • v.24 no.4
    • /
    • pp.488-498
    • /
    • 2008
  • Soil and Water Assessment Tool (SWAT) model have been widely used in simulating hydrology and water quality analysis at watershed scale. The SWAT model extracts topographic feature using the Digital Elevation Model (DEM) for hydrology and pollutant generation and transportation within watershed. Use of various DEM cell size in the SWAT leads to different results in extracting topographic feature for each subwatershed. So, it is recommended that model users use very detailed spatial resolution DEM for accurate hydrology analysis and water quality simulation. However, use of high resolution DEM is sometimes difficult to obtain and not efficient because of computer processing capacity and model execution time. Thus, the SWAT Topographic Feature Extraction Error (STOPFEE) Fix module, which can extract topographic feature of high resolution DEM from low resolution and updates SWAT topographic feature automatically, was developed and evaluated in this study. The analysis of average slope vs. DEM cell size revealed that average slope of watershed increases with decrease in DEM cell size, finer resolution of DEM. This falsification of topographic feature with low resolution DEM affects soil erosion and sediment behaviors in the watershed. The annual average sediment for Soyanggang-dam watershed with DEM cell size of 20 m was compared with DEM cell size of 100 m. There was 83.8% difference in simulated sediment without STOPFEE module and 4.4% difference with STOPFEE module applied although the same model input data were used in SWAT run. For Imha-dam watershed, there was 43.4% differences without STOPFEE module and 0.3% difference with STOPFEE module. Thus, the STOPFEE topographic database for Soyanggang-dam watershed was applied for Chungju-dam watershed because its topographic features are similar to Soyanggang-dam watershed. Without the STOPFEE module, there was 98.7% difference in simulated sediment for Chungju-dam watershed for DEM cell size of both 20 m and 100 m. However there was 20.7% difference in simulated sediment with STOPFEE topographic database for Soyanggang-dam watershed. The application results of STOPFEE for three watersheds showed that the STOPFEE module developed in this study is an effective tool to extract topographic feature of high resolution DEM from low resolution DEM. With the STOPFEE module, low-capacity computer can be also used for accurate hydrology and sediment modeling for bigger size watershed with the SWAT. It is deemed that the STOPFEE module database needs to be extended for various watersheds in Korea for wide application and accurate SWAT runs with lower resolution DEM.

Review of 2021 Major Medical Decisions (2021년 주요 의료판결 분석)

  • Park, Taeshin;Yoo, Hyunjung;Lee, Jeongmin;Cho, Woosun;Jeong, Heyseung
    • The Korean Society of Law and Medicine
    • /
    • v.23 no.2
    • /
    • pp.171-209
    • /
    • 2022
  • There were also many medical-related rulings in 2021, among which the rulings reviewed in this paper are as follows. The first relates to a case in which the medical record, which is the primary judgment data regarding the presence or absence of medical negligence, has been modified. The court judged whether there was negligence on the basis of the first written medical record without considering the contents of the medical record that was later modified. Next, the ruling on the case of asking for liability for damages for prescription of anti-obesity drugs recognized negligence related to prescription, but denied liability for property damage by denying a causal relationship, and recognized only alimony for violation of the duty of explanation. The a full-bench ruling on the scope of subrogation of the National Health Insurance Corporation, which subrogates the claims for compensation for medical expenses against the perpetrator of the patient, changed the existing precedent that had taken the 'deduction method after offsetting negligence' and judged it as 'the method of offsetting negligence after deduction'. In addition, in the ruling on whether or not there was negligence, the court was not bound by the medical record appraisal result. Lastly, in relation to the National Health Insurance Service's disposition of reimbursement for medical care benefit costs, we reviewed the ruling that discretion should be exercised even when a non-medical person makes a refund to a medical institution opened by a non-medical person. And we also reviewed the ruling that the scope of reimbursement for medical institutions jointly using facilities and manpower specifically should be determined.

The Standard of Judgement on Plagiarism in Research Ethics and the Guideline of Global Journals for KODISA (KODISA 연구윤리의 표절 판단기준과 글로벌 학술지 가이드라인)

  • Hwang, Hee-Joong;Kim, Dong-Ho;Youn, Myoung-Kil;Lee, Jung-Wan;Lee, Jong-Ho
    • Journal of Distribution Science
    • /
    • v.12 no.6
    • /
    • pp.15-20
    • /
    • 2014
  • Purpose - In general, researchers try to abide by the code of research ethics, but many of them are not fully aware of plagiarism, unintentionally committing the research misconduct when they write a research paper. This research aims to introduce researchers a clear and easy guideline at a conference, which helps researchers avoid accidental plagiarism by addressing the issue. This research is expected to contribute building a climate and encouraging creative research among scholars. Research design, data, methodology & Results - Plagiarism is considered a sort of research misconduct along with fabrication and falsification. It is defined as an improper usage of another author's ideas, language, process, or results without giving appropriate credit. Plagiarism has nothing to do with examining the truth or accessing value of research data, process, or results. Plagiarism is determined based on whether a research corresponds to widely-used research ethics, containing proper citations. Within academia, plagiarism goes beyond the legal boundary, encompassing any kind of intentional wrongful appropriation of a research, which was created by another researchers. In summary, the definition of plagiarism is to steal other people's creative idea, research model, hypotheses, methods, definition, variables, images, tables and graphs, and use them without reasonable attribution to their true sources. There are various types of plagiarism. Some people assort plagiarism into idea plagiarism, text plagiarism, mosaic plagiarism, and idea distortion. Others view that plagiarism includes uncredited usage of another person's work without appropriate citations, self-plagiarism (using a part of a researcher's own previous research without proper citations), duplicate publication (publishing a researcher's own previous work with a different title), unethical citation (using quoted parts of another person's research without proper citations as if the parts are being cited by the current author). When an author wants to cite a part that was previously drawn from another source the author is supposed to reveal that the part is re-cited. If it is hard to state all the sources the author is allowed to mention the original source only. Today, various disciplines are developing their own measures to address these plagiarism issues, especially duplicate publications, by requiring researchers to clearly reveal true sources when they refer to any other research. Conclusions - Research misconducts including plagiarism have broad and unclear boundaries which allow ambiguous definitions and diverse interpretations. It seems difficult for researchers to have clear understandings of ways to avoid plagiarism and how to cite other's works properly. However, if guidelines are developed to detect and avoid plagiarism considering characteristics of each discipline (For example, social science and natural sciences might be able to have different standards on plagiarism.) and shared among researchers they will likely have a consensus and understanding regarding the issue. Particularly, since duplicate publications has frequently appeared more than plagiarism, academic institutions will need to provide pre-warning and screening in evaluation processes in order to reduce mistakes of researchers and to prevent duplicate publications. What is critical for researchers is to clearly reveal the true sources based on the common citation rules and to only borrow necessary amounts of others' research.