• Title/Summary/Keyword: Full security

Search Result 298, Processing Time 0.026 seconds

Practical Schemes for Tunable Secure Network Coding

  • Liu, Guangjun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.3
    • /
    • pp.1193-1209
    • /
    • 2015
  • Network coding is promising to maximize network throughput and improve the resilience to random network failures in various networking systems. In this paper, the problem of providing efficient confidentiality for practical network coding system against a global eavesdropper (with full eavesdropping capabilities to the network) is considered. By exploiting a novel combination between the construction technique of systematic Maximum Distance Separable (MDS) erasure coding and traditional cryptographic approach, two efficient schemes are proposed that can achieve the maximum possible rate and minimum encryption overhead respectively on top of any communication network or underlying linear network code. Every generation is first subjected to an encoding by a particular matrix generated by two (or three) Vandermonde matrices, and then parts of coded vectors (or secret symbols) are encrypted before transmitting. The proposed schemes are characterized by tunable and measurable degrees of security and also shown to be of low overhead in computation and bandwidth.

A lightweight detection mechanism of control flow modification for IoT devices (IoT 기기를 위한 경량의 소프트웨어 제어 변조 탐지 기법)

  • Pak, Dohyun;Lee, JongHyup
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1449-1453
    • /
    • 2015
  • Constrained IoT devices cannot achieve full coverage of software attestation even though the integrity of software is critical. The limited modification attacks on control flow of software aim at the shadow area uncovered in software attestation processes. In this paper, we propose a light-weight protection system that detects modification by injecting markers to program code.

A Study on Efficient Business Model for Mobile Virtual Network Operator (MVNO 사업자의 경쟁력 강화를 위한 비즈니스 모델 연구)

  • Jang, Hee-Seon;Shin, Hyun-Cheul;Han, Sung-Su;Park, Gwang-Man
    • Convergence Security Journal
    • /
    • v.6 no.1
    • /
    • pp.65-74
    • /
    • 2006
  • In this paper, the definition of mobile virtual network operator (MVNO), business situations of operators, regulations, and main benefits are analyzed to discuss the introduction of MVNO system in Korea. In addition to, the analytical hierarchy process (AHP) is performed to study the efficient business model for MVNO under the government's regulation. The three alternatives such as self-regulation, partial-regulation and full refutation are considered for the main criteria of competitiveness activation, investment increment, and economics.

  • PDF

Cryptoanalysis of the Full version Randomized Addition-Subtraction Chains (완전한 형태의 랜덤한 덧셈-뺄셈 체인의 암호분석)

  • 한동국;장남수;정석원;박영호;김창한
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.07a
    • /
    • pp.307-311
    • /
    • 2003
  • Okeya-Sakurai는[12]에서 단순한 형태의 랜덤한 덧셈-뺄셈 체인의 대응방법[14]은 SPA공격에 취약함을 보였다. 그러나 그들의 분석 방법은 복잡한 형태[14]에는 적용되지 않는다. 본 논문에서는 Okeya-Sakurai의 공격 알고리듬에 두 가지 잠재된 문제가 있음을 보인다. 또한[12,15]와는 다른 강하고 견고한 새로운 공격 알고리듬을 제안한다. 본 논문에서 제안하는 공격 알고리듬을 사용하면 복잡한 형태의 랜덤한 덧셈-뺄셈 체인[14]또한 완벽하게 분석된다. 본 논문의 결과를 표준에서 제안된 163비트로 실험한 결과 단순한 형태에서는 20개의 AD수열로 대략 94%의 확률로 공격이 성공하며 30개의 AD수열로는 대략 99%의 확률로 공격이 성공한다. 또한, 복잡한 형태에서는 40개의 AD수열로 94%의 확률로 70개의 AD수열로는 99%로의 확률로 공격이 성공한다.

  • PDF

The Use Plan of the Effective Computer Simulation Program for Strengthening the Disaster Field Response Strategy

  • Ham, Seung Hee;Park, Namkwun;Yoo, Myong O
    • Journal of the Society of Disaster Information
    • /
    • v.12 no.2
    • /
    • pp.176-180
    • /
    • 2016
  • The full extent of damage depend greatly on the quick and rational decision making by the incident commander soon after the disaster. The decision that everybody should wait by the captain, not to enter into the ship by the first dispatched incident commander, broadcasting failure have brought about a huge loss of life at Sewol cruise ship incident. Thus this study reviews the training and education system supporting the rational crisis decision making performed by the incident commander to cut off the expansion of disaster which is caused by the failure of the incident situation awareness and the decision making described above.

A Study on BIM based Process Risk Management Model (BIM 기반의 프로젝트 단계별 리스크관리 모델에 관한 연구)

  • Jeon, Seung-Ho;Choi, Myung-Seok;Lee, Joo-Ho
    • Journal of Korean Society of societal Security
    • /
    • v.3 no.1
    • /
    • pp.61-66
    • /
    • 2010
  • Recently a construction industry introduces information technology that brings about many advantages in the early planning phase, design phase and construction phase. Nevertheless a BIM has a many benefits, it has limits which are not only usually using 3D modeling but also limit of making full use of practical affairs because of a lack of connecting varietals of progress of work. To solve these uppermost limits, this research is presenting unified systems to use in risk management which are efficient management of space and non-space information, space analysis.

  • PDF

Design and Implementation of the Linux Kernel Backdoor Intruder Tracing-Response System (리눅스 커널 백도어 침입자 추적대응시스템 설계 및 구현)

  • Jeon, Wan-Keun
    • Convergence Security Journal
    • /
    • v.5 no.2
    • /
    • pp.43-50
    • /
    • 2005
  • This paper is about the method that chases the Linux kernel backdoor intruder and copes with the kernel backdoor attack. We have a limit to trace the hacker with the current log analysing method because the hacker generally removes the log file and use the forge IP information. I propose the solution to solve the problem with the DeFor system. Through the restoration of the deleted log file, analysis of it and full HDD image, promptly quick response, it is possible to trace hacker spot and reduce hacking damage.

  • PDF

A Regional Certificate Revocation List Distribution Method based on the Local Vehicle Location Registration for Vehicular Communications

  • Hong, Hwi-Seung;Kim, Hyun-Gon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.1
    • /
    • pp.91-99
    • /
    • 2016
  • A certificate revocation list(CRL) should be distributed quickly to all the vehicles in the network to protect them from malicious users and malfunctioning equipments as well as to increase the overall security and safety of vehicular networks. However, a major challenge is how to distribute CRLs efficiently. In this paper, we propose a novel Regional CRL distribution method based on the vehicle location registration locally to manage vehicle mobility. The method makes Regional CRLs based on the vehicles' location and distributes them, which can reduce CRL size and distribution time efficiently. According to the simulation results, the proposed method's signaling performance of vehicle's registration is enhanced from 22% to 37% compared to the existing Regional CRL distribution method. It's CRL distribution time is also decreased from 37% to 67% compared to the existing Full CRL distribution method.

Digital Competence As A Component Of Professional And Information Culture Of A Teacher

  • Kharlamov, Mykhailo;Sinelnikov, Ivan;Lysenko, Vladyslav;Yakobenchuk, Nazar;Tkach, Anna;Honcharuk, Оlena
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.169-172
    • /
    • 2021
  • Based on the scientific and pedagogical analysis of the theory and experience of teaching computer science disciplines, the didactic mechanism for ensuring the continuity of the average (full) general and higher professional education of economists for practical implementation innovative technology of personal experience foundation. The pedagogical conditions for the formation of information competence, including laboratory, design, research work, the use of active teaching methods for acquiring management skills in production and activities of the enterprise. An indispensable requirement for the conditions for the implementation of basic of educational programs is the assessment of competencies. With this the goal was to develop criteria and levels of formation information competence of future economists and carried out complex diagnostics.

Past, Present and Future of Blockchain Technology (블록체인 세대별 기술 동향)

  • Park, J.S.;Park, J.Y.;Choi, S.M.;Oh, J.T.;Kim, K.Y.
    • Electronics and Telecommunications Trends
    • /
    • v.33 no.6
    • /
    • pp.139-153
    • /
    • 2018
  • The explosive interest in block chain, which was triggered by Bitcoin in 2009, is leading to substantial investment and the development of block chain technology. There is no dispute among experts that block chain will be the next generation of innovation. However, despite the high expectations for block chains, the related technology still has certain limitations. In addition to improving issues such as a low transaction throughput, inefficient agreement algorithms, and an inflexible governance structure, it is necessary to solve various problems for commercialization and full-scale spreading owing to the trilemma problem among the scalability, security, and decentralization. Under this situation, identification of the technology characteristics according to the generation is helpful for the development of the core technology requirements and commercialization blueprint in establishing an R&D direction. Therefore, in this article, the development of blockchain technology is divided into generations and analyzed in terms of the operational structure, consensus algorithm, governance, scalability, and security.