• Title/Summary/Keyword: Information Vulnerable Layer

Search Result 44, Processing Time 0.028 seconds

IPv6 Neighbor Discovery security treats and opposition (IPv6 Neighbor Discovery 보안 위협과 대응)

  • Park, Soo-Duck;Lee, Yong-Sig;Rhee, Byung-Ho
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.771-772
    • /
    • 2006
  • IPv6 nodes use the Neighbor Discovery Protocol (NDP) to discover other nodes on the link, to determine their link-layer addresses to find routers, and to maintain reachability information about the paths to active neighbors. If not secured, NDP is vulnerable to various attacks. This document specifies security mechanisms for NDP. Unlike those in the original NDP specifications, these mechanisms do not use IPsec.

  • PDF

Enhanced ANTSEC Framework with Cluster based Cooperative Caching in Mobile Ad Hoc Networks

  • Umamaheswari, Subbian;Radhamani, Govindaraju
    • Journal of Communications and Networks
    • /
    • v.17 no.1
    • /
    • pp.40-46
    • /
    • 2015
  • In a mobile ad hoc network (MANET), communication between mobile nodes occurs without centralized control. In this environment the mobility of a node is unpredictable; this is considered as a characteristic of wireless networks. Because of faulty or malicious nodes, the network is vulnerable to routing misbehavior. The resource constrained characteristics of MANETs leads to increased query delay at the time of data access. In this paper, AntHocNet+ Security (ANTSEC) framework is proposed that includes an enhanced cooperative caching scheme embedded with artificial immune system. This framework improves security by injecting immunity into the data packets, improves the packet delivery ratio and reduces end-to-end delay using cross layer design. The issues of node failure and node malfunction are addressed in the cache management.

Low-Temperature Processed Thin Film Barrier Films for Applications in Organic Electronics (유기전자소자 적용을 위한 저온 공정용 배리어 박막 연구)

  • Kim, Junmo;An, Myungchan;Jang, Youngchan;Bae, Hyeong Woo;Lee, Wonho;Lee, Donggu
    • Journal of Sensor Science and Technology
    • /
    • v.28 no.6
    • /
    • pp.402-406
    • /
    • 2019
  • Recently, semiconducting organic materials have been spotlighted as next-generation electronic materials based on their tunable electrical and optical properties, low-cost process, and flexibility. However, typical organic semiconductor materials are vulnerable to moisture and oxygen. Therefore, an encapsulation layer is essential for application of electronic devices. In this study, SiNx thin films deposited at process temperatures below 150 ℃ by plasma-enhanced chemical vapor deposition (PECVD) were characterized for application as an encapsulation layer on organic devices. A single structured SiNx thin film was optimized as an organic light-emitting diode (OLED) encapsulation layer at process temperature of 80 ℃. The optimized SiNx film exhibited excellent water vapor transmission rate (WVTR) of less than 5 × 10-5 g/㎡·day and transmittance of over 87.3% on the visible region with thickness of 1 ㎛. Application of the SiNx thin film on the top-emitting OLED showed that the PECVD process did not degrade the electrical properties of the device, and the OLED with SiNx exhibited improved operating lifetime

Defense Mechanism against Replay Attack on Remote Keyless Entry System (원격 키리스 엔트리시스템에 대한 재생공격 무력화 기법)

  • Kim, Young Min;Kim, Seong Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.247-250
    • /
    • 2019
  • The first-generation RKE(Remote Keyless Entry) system is very vulnerable to replay attacks and the encryption of the second-generation RKE system is known to be disabled by four to eight signal receptions and analysis. In order to enhance the security of the RKE system, we introduce a physical-layer security methods in the RKE system and propose a technique to disable the replay attack by reducing the quality of the signal received by an eavesdropper.

  • PDF

Vegetation Structure and Soil Condition of Acer okamotoanum Communities in Ulleung Island (울릉도 우산고로쇠나무 군락의 식생구조와 토양환경)

  • Kwon, Su-Duck;Kim, Jong-Kab;Moon, Hyun-Shik
    • Journal of agriculture & life science
    • /
    • v.44 no.5
    • /
    • pp.15-22
    • /
    • 2010
  • Vegetation structure and soil condition were analyzed to provide information for effective management of Acer okamotoanum community. Importance value of A. okamotoanum in upper layer was highest as 120.7, and that of Camellia japonica in middle and lower layer was highest as 61.8 and 15.7, while those of A. okamotoanum were 37.5 and 2.6, respectively. Taxus cuspidata var. latifolia which was designated as vulnerable species by Korea National Arboretum began its existence in lower layer. Species diversity and evenness were 0.674 and 0.706 in upper layer, 0.947 and 0.805 in middle layer, and 1.312 and 0.938 in lower layer, respectively. Soil pH of A. okamotoanum community was 5.79. The contents of organic matter, total N, and available $P_2O_5$ were 7.2%, 0.33%, and 51.1ppm, respectively.

A Study on Security Hole Attack According to the Establishment of Policies to Limit Particular IP Area (특정 IP 영역 제한정책 설정에 따른 보안 취약점 공격에 관한 연구)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.6
    • /
    • pp.625-630
    • /
    • 2010
  • With regard to the examples of establishing various sorts of information security, it can be seen that there are gradual, developmental procedures including Firewall and VPN (Virtual Private Network), IDS (Intrusion Detection System), or ESM(Enterprise Security Management). Each of the security solutions and equipments analyzes both defense and attack for information security with the criteria of classifying the problems of security policies by TCP/IP layers or resulted from attack patterns, attack types, or invasion through specialized security technology. The direction of this study is to examine latency time vulnerable to invasion which occurs when L2-stratum or lower grade equipments or policies are applied to the existing network through TCP/IP layer's L3-stratum or higher grade security policies or equipments and analyze security holes which may generate due to the IP preoccupation in the process of establishing policies to limit particular IP area regarding the policies for security equipments to figure out technological problems lying in it.

The Error concealment using Scalability in H.236v2 (H.263v2에서 계층부호화를 이용한 오류 은닉)

  • 한승균;장승기;서덕영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.7A
    • /
    • pp.1063-1075
    • /
    • 2000
  • This paper proposes an adaptive error concealment technique for compressed video. Since redundancy is extracted out during compression process, compressed video is vulnerable to errors which occur during transmission of video over error prone networks such as wireless channels and Internet. Error concealment is a process of reconstructing video out of damaged video bit stream. We proved that scalable encoding is very useful for error concealment. Analysis of experiments shows that some part of image is better concealed by using base layer information and other part of image is better concealed by using previous frame information. We developed a technique which enables to decide which methodology is more effective, adaptively, based on motion vectors and regional spatial activity. We used H.263v2 for scalable encoding, but, our approach could be applied to all DCT based video codec.

  • PDF

Experimental investigations of Breakdown Phenomena in Soils in the vicinity of Ground rod (봉형접지전극 주변에서 토중방전현상에 대한 실험적 고찰)

  • Lee, Bok-Hee;Kim, Byoung-Gun;Lee, Woo-Chul
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2005.05a
    • /
    • pp.279-282
    • /
    • 2005
  • Morden electronic equipments are becoming very important in information oriented society, but they are vulnerable to lightning surges. Soil resistivity in the vicinity of grounding electrodes my be affected by the current flowing from the grounding electrodes into the surrounding soil. Electrical conduction in soils depends on the grain size, compactness, and variability of the grain sizes. When a high current is injected into the soil, and the breakdown phenomenon occur. In the present work, Electrical behaviors related to discharge in soils were investigated. The breakdown voltages in soil were lower than that sparkover voltage in air. The breakdown voltage in the gravel layer is relatively low, and the breakdown was caused by the flashover through the surface of gravels

  • PDF

Fuzzy Expert System for Detecting Anti-Forensic Activities (안티 포렌식 행위 탐지를 위한 퍼지 전문가 시스템)

  • Kim, Se-Ryoung;Kim, Huy-Kang
    • Journal of Internet Computing and Services
    • /
    • v.12 no.5
    • /
    • pp.47-61
    • /
    • 2011
  • Recently, the importance of digital forensic has been magnified because of the dramatic increase of cyber crimes and the increasing complexity of the investigation of target systems such as PCs, servers, and database systems. Moreover, some systems have to be investigated with live forensic techniques. However, even though live forensic techniques have been improved, they are still vulnerable to anti-forensic activities when the target systems are remotely accessible by criminals or their accomplices. To solve this problem, we first suggest a layer-based model and the anti-forensic scenarios which can actually be applicable to each layer. Our suggested model, the Anti-Forensic Activites layer-based model, has 5 layers - the physical layer, network layer, OS layer, database application layer and data layer. Each layer has possible anti-forensic scenarios with detailed commands. Second, we propose a fuzzy expert system for effectively detecting anti-forensic activities. Some anti-forensic activities are hardly distinguished from normal activities. So, we use fuzzy logic for handling ambiguous data. We make rule sets with extracted commands and their arguments from pre-defined scenarios and the fuzzy expert system learns the rule sets. With this system, we can detect anti-forensic activities in real time when performing live forensic.

Implementation of an RFID Key Management System for DASH7

  • Vegendla, Aparna;Seo, Hwajeong;Lee, Donggeon;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.1
    • /
    • pp.19-25
    • /
    • 2014
  • The wireless sensor networking standard DASH7 operates in low-power communication with a better transmission quality in active RFID networks. The DASH7 security standard supports public key cryptography. At present, the DASH7 standard uses the message authentication code in the network layer for authentication and integrity. However, its security standard is still in an incubation stage with respect to the implementation of a crypto exchange over a DASH7 network. Effective key management is an important factor for privacy and security. If organizations are not careful about where and how keys are stored, they leave the encrypted data vulnerable to theft. In this regard, we present a key management system designed for efficient key management through public key infrastructure authentication as well as a non-repudiation feature for the DASH7 standard. We analyze the performance of the proposed system on a basis of various performance criteria such as latency and throughput.