• Title/Summary/Keyword: Drop attack

Search Result 54, Processing Time 0.022 seconds

Monitoring-Based Secure Data Aggregation Protocol against a Compromised Aggregator in Wireless Sensor Networks (무선 센서 네트워크에서 Compromised Aggregator에 대응을 위한 모니터링 기반 시큐어 데이터 병합 프로토콜)

  • Anuparp, Boonsongsrikul;Lhee, Kyung-Suk;Park, Seung-Kyu
    • The KIPS Transactions:PartC
    • /
    • v.18C no.5
    • /
    • pp.303-316
    • /
    • 2011
  • Data aggregation is important in wireless sensor networks. However, it also introduces many security problems, one of which is that a compromised node may inject false data or drop a message during data aggregation. Most existing solutions rely on encryption, which however requires high computation and communication cost. But they can only detect the occurrence of an attack without finding the attacking node. This makes sensor nodes waste their energy in sending false data if attacks occur repeatedly. Even an existing work can identify the location of a false data injection attack but it has a limitation that at most 50% of total sensor nodes can participate in data transmission. Therefore, a novel approach is required such that it can identify an attacker and also increase the number of nodes which participate in data transmission. In this paper, we propose a monitoring-based secure data aggregation protocol to prevent against a compromised aggregator which injects false data or drops a message. The proposed protocol consists of aggregation tree construction and secure data aggregation. In secure data aggregation, we use integration of abnormal data detection with monitoring and a minimal cryptographic technique. The simulation results show the proposed protocol increases the number of participating nodes in data transmission to 95% of the total nodes. The proposed protocol also can identify the location of a compromised node which injects false data or drops a message. A communication overhead for tracing back a location of a compromised node is O(n) where n is the total number of nodes and the cost is the same or better than other existing solutions.

Regional Path Re-selection Period Determination Method for the Energy Efficient Network Management in Sensor Networks applied SEF (통계적 여과 기법이 적용된 센서 네트워크에서 에너지 효율적인 네트워크 관리를 위한 영역별 경로 재설정 주기 결정 기법)

  • Park, Hyuk;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.20 no.3
    • /
    • pp.69-78
    • /
    • 2011
  • A large-scale sensor network usually operates in open and unattended environments, hence individual sensor node is vulnerable to various attacks. Therefore, malicious attackers can physically capture sensor nodes and inject false reports into the network easily through compromised nodes. These false reports are forwarded to the base station. The false report injection attack causes not only false alarms, but also the depletion of the restricted energy resources in a battery powered network. The statistical en-route filtering (SEF) mechanism was proposed to detect and drop false reports en route. In SEF, the choice of routing paths largely affect the energy consumption rate and the detecting power of the false report. To sustain the secure routing path, when and how to execute the path re-selection is greatly need by reason of the frequent network topology change and the nodes's limitations. In this paper, the regional path re-selection period determination method is proposed for efficient usage of the limited energy resource. A fuzzy logic system is exploited in order to dynamically determine the path re-selection period and compose the routing path. The simulation results show that up to 50% of the energy is saved by applying the proposed method.

Control Method for the Number of Travel Hops for the ACK Packets in Selective Forwarding Detection Scheme (선택적 전달 공격 탐지기법에서의 인증 메시지 전달 홉 수 제어기법)

  • Lee, Sang-Jin;Kim, Jong-Hyun;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.2
    • /
    • pp.73-80
    • /
    • 2010
  • A wireless sensor network which is deployed in hostile environment can be easily compromised by attackers. The selective forwarding attack can jam the packet or drop a sensitive packet such as the movement of the enemy on data flow path through the compromised node. Xiao, Yu and Gao proposed the checkpoint-based multi-hop acknowledgement scheme(CHEMAS). In CHEMAS, each path node enable to be the checkpoint node according to the pre-defined probability and then can detect the area where the selective forwarding attacks is generated through the checkpoint nodes. In this scheme, the number of hops is very important because this parameter may trade off between energy conservation and detection capacity. In this paper, we used the fuzzy rule system to determine adaptive threshold value which is the number of hops for the ACK packets. In every period, the base station determines threshold value while using fuzzy logic. The energy level, the number of compromised node, and the distance to each node from base station are used to determine threshold value in fuzzy logic.

Aerial Application using a Small RF Controlled Helicopter (IV) - CFD Simulation of Rotor Lift - (소형 무인헬기를 이용한 항공방제기술 (IV) -로터양력의 CFD시뮬레이션 -)

  • Seok T.S.;Koo Y.M.;Sohn C.H.
    • Journal of Biosystems Engineering
    • /
    • v.31 no.4 s.117
    • /
    • pp.342-348
    • /
    • 2006
  • Aerial application using an unmanned agricultural helicopter became necessary for both labor saving and timely spraying. In the previous paper, a rotor system was developed and lift capability was evaluated. The experimental results were compared with simulated predictions using the CFD-ACE program. From the simulation, the relative velocity on the top surface of the blade airfoil increased, resulting in the pressure drop. The CFD analyses were revealed that a drag resistance on the leading edge of the airfoil, a wake at the trailing edge, and a positive pressure underneath the bottom surface were observed. As the results of the simulation, total lifts of 56.8, 74.4 and $95.0kg_f$ were obtained at the 6, 8 and $10^{\circ}$ of AAT (angle of attack), respectively. The simulation results agreed reasonably up to $10^{\circ}$ of AAT. However, at a greater AAT $(<12^{\circ})$ the simulated total lift continuously increased to $105kg_f$, comparing with a decreasing experimental total lift due to the lack of engine power. At a stiff angle of $18^{\circ}$ AAT, a wake was observed at the trailing edge of the airfoil. A rated operating condition determined from the previous paper was also verified through the simulation.

Method Decoder for Low-Cost RFID Tags

  • Juels, Ari
    • 한국정보컨버전스학회:학술대회논문집
    • /
    • 2008.06a
    • /
    • pp.47-52
    • /
    • 2008
  • A radio-frequency identification(RFID) tag is a small, inexpensive microchip that emits an identifier in response to a query from a nearby reader. The price of these tags promises to drop to the range of $0.05 per unit in the next several years, offering a viable and powerful replacement for barcodes. The challenge in providing security for low-cost RFID tags is that they are computationally weak devices, unable to perform even basic symmetric-key cryptographic operations. Security researchers often therefore assume that good privacy protection in RFID tags is unattainable. In this paper, we explore a notion of minimalist cryptography suitable for RFID tags. We consider the type of security obtainable in RFID devices with a small amount of rewritable memory, but very limited computing capability. Our aim is to show that standard cryptography is not necessary as a starting point for improving security of very weak RFID devices. Our contribution is threefold: 1. We propose a new formal security model for authentication and privacy in RFID tags. This model takes into account the natural computational limitations and the likely attack scenarios for RFID tags in real-world settings. It represents a useful divergence from standard cryptographic security modeling, and thus a new view of practical formalization of minimal security requirements for low-cost RFID-tag security. 2. We describe protocol that provably achieves the properties of authentication and privacy in RFID tags in our proposed model, and in a good practical sense. Our proposed protocol involves no computationally intensive cryptographic operations, and relatively little storage. 3. Of particular practical interest, we describe some reduced-functionality variants of our protocol. We show, for instance, how static pseudonyms may considerably enhance security against eavesdropping in low-cost RFID tags. Our most basic static-pseudonym proposals require virtually no increase in existing RFID tag resources.

  • PDF

Solar concentrator optimization against wind effect

  • Sayyed Hossein Mostafavi;Amir Torabi;Behzad Ghasemi
    • Wind and Structures
    • /
    • v.38 no.2
    • /
    • pp.109-118
    • /
    • 2024
  • A solar concentrator is a reflective surface in the shape of a parabola that collects solar rays in a focal area. This concentrator follows the path of the sun during the day with the help of a tracking system. One of the most important issues in the design and construction of these reflectors is the force exerted by the wind. This force can sometimes disrupt the stability of the concentrator and overturn the entire system. One of the ways to estimate the force is to use the numerical solution of the air flow in three dimensions around the dish. Ansys Fluent simulation software has been used for modeling several angles of attack between 0 and 180 with respect to the horizon. From the comparison of the velocity vector lines on the dish at angles of 90 to - 90 degrees, it was found that the flow lines are more concentrated inside the dish and there is a tendency for the flow to escape around in the radial direction, which indicates the presence of more pressure distribution inside the dish. It was observed that the pressure on the concave surface was higher than the convex one. Then, the effect of adding a hole with various diameter of 200, 300, 400, 500, and 600 mm on the dish was investigated. By increasing the diameter up to the optimized size of 400 mm, a decrease in the maximum pressure value in the pressure distribution was shown inside the dish. This pressure drop decreased the drag coefficient. The effect of the hole on the dish was also investigated for the 30-degree angled dish, and it was found that the results of the 90-degree case should be considered as the basis of the design.

Strength toss of F-Fiber Obtained from Recycling FRP Ship in a Basic Solution (폐 FRP 선박에서 분리하여 얻은 F섬유의 염기성 용액에서의 강도저하)

  • Lee, Seung-Hee;Kim, Yong-Seop;Yoon, Koo-Young
    • Journal of the Korean Society for Marine Environment & Energy
    • /
    • v.11 no.1
    • /
    • pp.42-45
    • /
    • 2008
  • It has been reported that FRP (fiber reinforced plastic) can be recycled by separating into layers instead of crushing into powder. F-fiber obtained from roving layer separated from FRP, has bigger tensile strength than the bundle of glass fibers of which FRP was made (more than 90%). SEM image of F-fiber shows the presence of some resin. Under the proposition of usage of F-fiber in the concrete material, tensile strength is examined after soaking in a basic solution (NaOH+KOH). The reaction mechanism of strength loss may be considered as an attack of hydroxide ion ($OH^-$) on a chemical bond of Si-O-Si of glass fiber. The simulation graph of the strength loss data implies certain reaction mechanism. While in the early stage kinetically controlled reaction results in a fast drop of tensile strength, after 30 days dispersion rate of hydroxide ion plays a major role in strength loss. This result is similar to the one for the AR glass. An extrapolation of the graph would make an assumption about the lift time of F-fiber possible.

  • PDF

A Study on urinary Incontinence of Adult Women : Preliminary Study (성인여성의 요실금에 관한 기초 연구)

  • 최영희;홍재엽;김문실;김애정;김정아;백성희
    • Journal of Korean Academy of Nursing
    • /
    • v.28 no.1
    • /
    • pp.171-183
    • /
    • 1998
  • The purpose of this study was to identify the incidence of urinary incontinence in adult women and to identify factors related to life style and sexual intercourse that were related to incontinence. The sample consisted of 1,065 women living in Seoul or one of five provinces. Data for this study were collected from January 16 to June 23 using structured questionnaires. The Urinary Symptom Questionnaire developed by Jackson and a demographic questionnaire were used to collect the data. The data were analyzed using frequency, percentage with an SPSS/PC$^{+}$ program. The major finding are as follows : 1. The distribution of age of subjects was as follows : 20-29(10.1%), 20-39(17.8%), 40-49(27.3%). 50-59(22.3%), 60-69(12.9%), 70-79(6.1%). 80-89(2.8%), more than 90(0.6%). The frequency of normal delivery, 0(155%), 1-2(36.0%), 3-4(29.2%), 5-6(13.0%). more than 7(6.3%). The rate of subjects with menopause was 40.8%. 2. It was reported that 50.7% of the subjects experienced urinary incontinence with stress, mixed. and urgency incontinence being 49.8%, 43.4%, 6.8% respectively. 3. The lower urinary symptoms and incidence with urinary incontinence were as follows : Daily frequency. 22.3%, nocturia. 40.8%, urgency, 71.2%, bladder pain 47.8%, unexplainned incontinence, 32.4%, noctural incontinence, 16.1%, and frequency of incontinence, 37.7%. In term of quantity of incontinence, drop/pants damp, 29.5%, dribble/pants wet, 20.5%, flood or soaking through to outer clothing, 1.7%, and flood or running down legs or onto floor, 0.2%. 4. The symptoms related to sexual intercourse and incidence of urinary incontinence were as follows : dry vagina, 39.1%, sex life trouble, 10.8%, pain during sexual intercourse, 27.4%, and urine leakage during sexual intercourse. 8.8%. 5. Life style problems related to urinary incontinence were as follows : fluid intake restriction, 20.0%, affected daily task, 24.5%. avoidance of placess and situations, 35.0%, interference in physical activities, 30.6%, interference in relationships with other people. 19.0%. interference in relationships with husband/companion, 8.1%, and time after attack of urinary symptoms, 76.9%. In term of the feeling about the rest of their lifves the women reported : perfectly happy, 11.3%. pleased, 16.9%. mostly satisfied, 20.2%, mixed feelings, 21.0%, mostly dissatisfied, 21.0%, very unhappy 8.5%, and desperate. 1.0%. In conclusion. this study was a preliminary study to provide nursing practices guidelines for incontinence in adult women. Nurse working with adult women should develop and provide adequate care for these women.n.

  • PDF

Analysis of a Gas Mask Using CFD Simulation (CFD모사기법을 이용한 가스 여과기 성능 해석)

  • Jeon, Rakyoung;Kwon, Kihyun;Yoon, Soonmin;Park, Myungkyu;Lee, Changha;Oh, Min
    • Korean Chemical Engineering Research
    • /
    • v.57 no.4
    • /
    • pp.475-483
    • /
    • 2019
  • Special chemical warfare agents are lethal gases that attack the human respiratory system. One of such gases are blood agents that react with the irons present in the electron transfer system of the human body. This reaction stops internal respiration and eventually causes death. The molecular sizes of these agents are smaller than the pores of an activated carbon, making chemical adsorption the only alternative method for removing them. In this study, we carried out a Computational Fluid Dynamics simulation by passing a blood agent: cyanogen chloride gas through an SG-1 gas mask canister developed by SG Safety Corporation. The adsorption bed consisted of a Silver-Zinc-Molybdenum-Triethylenediamine activated carbon impregnated with copper, silver, zinc and molybdenum ions. The kinetic analysis of the chemical adsorption was performed in accordance with the test procedure for the gas mask canister and was validated by the kinetic data obtained from experimental results. We predicted the dynamic behaviors of the main variables such as the pressure drop inside the canister and the amount of gas adsorbed by chemisorption. By using a granular packed bed instead of the Ergun equation that is used to model porous materials in Computational Fluid Dynamics, applicable results of the activated carbon were obtained. Dynamic simulations and flow analyses of the chemical adsorption with varying gas flow rates were also executed.

Dynamic Threshold Determination Method for Energy Efficient SEF using Fuzzy Logic in Wireless Sensor Networks (무선 센서 네트워크에서 통계적 여과 기법의 에너지 효율 향상을 위한 퍼지논리를 적용한 동적 경계값 결정 기법)

  • Choi, Hyeon-Myeong;Lee, Sun-Ho;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.1
    • /
    • pp.53-61
    • /
    • 2010
  • In wireless sensor networks(WSNs) individual sensor nodes are subject to security compromises. An adversary can physically capture sensor nodes and obtain the security information. And the adversary injects false reports into the network using compromised nodes. If undetected, these false reports are forwarded to the base station. False reports injection attacks can not only result in false alarms but also depletion of the limited amount of energy in battery powered sensor nodes. To combat these false reports injection attacks, several filtering schemes have been proposed. The statistical en-routing filtering(SEF) scheme can detect and drop false reports during the forwarding process. In SEF, The number of the message authentication codes(threshold) is important for detecting false reports and saving energy. In this paper, we propose a dynamic threshold determination method for energy efficient SEF using fuzzy-logic in wireless sensor networks. The proposed method consider false reports rate and the number of compromised partitions. If low rate of false reports in the networks, the threshold should low. If high rate of false reports in networks, the threshold should high. We evaluated the proposed method’s performance via simulation.