• Title/Summary/Keyword: Legitimate Technology

Search Result 66, Processing Time 0.027 seconds

A Few Issues in the STS Education for Responsible Engineers (책임있는 엔지니어를 위한 STS 교육의 몇 가지 쟁점)

  • Yi, Sang-Wook
    • Journal of Engineering Education Research
    • /
    • v.15 no.1
    • /
    • pp.79-83
    • /
    • 2012
  • I argue that STS education for engineers, despite its prima facie usefulness in demystifying the conventional image of science and technology, should deal with a few challenges in order to cultivate 'responsible' engineers. The challenges come from the fact that there are more than one legitimate way of understanding 'responsible' in the engineering contexts depending on how wide the range of responsibility is intended and on how the relevant reference class is defined. In order to tackle these issues, I suggest that we should take into account more seriously the 'value-laden' nature of the engineering design.

Handling Malicious Flooding Attacks through Enhancement of Packet Processing Technique in Mobile Ad Hoc Networks

  • Kim, Hyo-Jin;Chitti, Ramachandra Bhargav;Song, Joo-Seok
    • Journal of Information Processing Systems
    • /
    • v.7 no.1
    • /
    • pp.137-150
    • /
    • 2011
  • Mobile ad hoc networks are expected to be widely used in the near future. However, they are susceptible to various security threats because of their inherent characteristics. Malicious flooding attacks are one of the fatal attacks on mobile ad hoc networks. These attacks can severely clog an entire network, as a result of clogging the victim node. If collaborative multiple attacks are conducted, it becomes more difficult to prevent. To defend against these attacks, we propose a novel defense mechanism in mobile ad hoc networks. The proposed scheme enhances the amount of legitimate packet processing at each node. The simulation results show that the proposed scheme also improves the end-to-end packet delivery ratio.

Hybrid Resource Allocation Scheme in Secure Intelligent Reflecting Surface-Assisted IoT

  • Su, Yumeng;Gao, Hongyuan;Zhang, Shibo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.10
    • /
    • pp.3256-3274
    • /
    • 2022
  • With the rapid development of information and communications technology, the construction of efficient, reliable, and safe Internet of Things (IoT) is an inevitable trend in order to meet high-quality demands for the forthcoming 6G communications. In this paper, we study a secure intelligent reflecting surface (IRS)-assisted IoT system where malicious eavesdropper trying to sniff out the desired information from the transmission links between the IRS and legitimate IoT devices. We discuss the system overall performance and propose a hybrid resource allocation scheme for maximizing the secrecy capacity and secrecy energy efficiency. In order to achieve the trade-off between transmission reliability, communication security, and energy efficiency, we develop a quantum-inspired marine predator algorithm (QMPA) for realizing rational configuration of system resources and prevent from eavesdropping. Simulation results demonstrate the superiority of the QMPA over other strategies. It is also indicated that proper IRS deployment and power allocation are beneficial for the enhancement of system overall capacity.

Cognitive Radio Based Jamming Resilient Multi-channel MAC Protocol for Wireless Network

  • Htike, Zaw;Hong, Choong Seon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.679-680
    • /
    • 2009
  • Radio jamming attack is the most effective and easiest Denial-of-Service (DOS) attack in wireless network. In this paper, we proposed a multi-channel MAC protocol to mitigate the jamming attacks by using cognitive radio. The Cognitive Radio (CR) technology supports real-time spectrum sensing and fast channel switching. By using CR technologies, the legitimate nodes can perform periodic spectrum sensing to identify jamming free channels and when the jamming attack is detected, it can switch to un-jammed channel with minimum channel switching delay. In our proposed protocol, these two CR technologies are exploited for thwarting the jamming attacks.

A Survey of Security Mechanisms with Direct Sequence Spread Spectrum Signals

  • Kang, Taeho;Li, Xiang;Yu, Chansu;Kim, Jong
    • Journal of Computing Science and Engineering
    • /
    • v.7 no.3
    • /
    • pp.187-197
    • /
    • 2013
  • Security has long been a challenging problem in wireless networks, mainly due to its broadcast nature of communication. This opens up simple yet effective measures to thwart useful communications between legitimate radios. Spread spectrum technologies, such as direct sequence spread spectrum (DSSS), have been developed as effective countermeasures against, for example, jamming attacks. This paper surveys previous research on securing a DSSS channel even further, using physical layer attributes-keyless DSSS mechanisms, and watermarked DSSS (WDSSS) schemes. The former has been motivated by the fact that it is still an open question to establish and share the secret spread sequence between the transmitter and the receiver without being noticed by adversaries. The basic idea of the latter is to exploit the redundancy inherent in DSSS's spreading process to embed watermark information. It can be considered a counter measure (authentication) for an intelligent attacker who obtains the spread sequence to generate fake messages. This paper also presents and evaluates an adaptive DSSS scheme that takes both jam resistance and communication efficiency into account.

The Full-Duplex Device-to-Device Security Communication Under the Coverage of Unmanned Aerial Vehicle

  • Zeng, Qian;Zhang, Zhongshan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.4
    • /
    • pp.1941-1960
    • /
    • 2019
  • Unmanned aerial vehicles (UAVs), acting as mobile base stations (BSs), can be deployed in the typical fifth-generation mobile communications (5G) scenarios for the purpose of substantially enhancing the radio coverage. Meanwhile, UAV aided underlay device-to-device (D2D) communication mode can be activated for further improving the capacity of the 5G networks. However, this UAV aided D2D communication system is more vulnerable to eavesdropping attacks, resulting in security risks. In this paper, the D2D receivers work in full-duplex (FD) mode, which improves the security of the network by enabling these legitimate users to receive their useful information and transmit jamming signal to the eavesdropper simultaneously (with the same frequency band). The security communication under the UAV coverage is evaluated, showing that the system's (security) capacity can be substantially improved by taking advantage of the flexible radio coverage of UAVs. Furthermore, the closed-form expressions for the coverage probabilities are derived, showing that the cellular users (CUs)' secure coverage probability in downlink transmission is mainly impacted by the following three factors: its communication area, the relative position with UAV, and its eavesdroppers. In addition, it is observed that the D2D users or DUs' secure coverage probability is relevant to state of the UAV. The system's secure capacity can be substantially improved by adaptively changing the UAV's position as well as coverage.

Elastic settlements of identical angular footings in close proximity

  • R. Sarvesha;V. Srinivasan;Anjan Patelb
    • Geomechanics and Engineering
    • /
    • v.32 no.2
    • /
    • pp.193-207
    • /
    • 2023
  • In general, the numerous classical approaches available in the literature can anticipate the settlement of shallow foundations. As long as the footings are not in close proximity to other subsurface buildings, the findings achieved using these methods are legitimate and acceptable. However, due to increased urbanisation and land scarcity, footings are frequently built close together. As a result, these footings' settlement behaviour differs from those of isolated footings. A simpler approach for assessing the settlement behaviour of two square or rectangular footings placed in close proximity is presented in this work. A Parametric study has been carried out to examine the interference effect on the settlement of these footings placed in close vicinity on the surface of a homogeneous, isotropic and elastic soil medium. The interaction factors are examined by varying the different aspect ratios (L/B), clear spacing ratio (S/B) and intensity of loading on the right footing with respect to the left footing. Further, variation of the settlement ratio (δ/B) with respect to embedment depth ratio Df/B is examined. For square and rectangular footings, the interference settlement profile is also investigated by varying the clear spacing ratio (S/B) and the degree of loading. The results were compared to 3D finite element analysis and experimental data that were available.

Study on Measures to Activate Technology Startup through National R&D Support Project

  • YUN, Jeong-Keun
    • The Journal of Economics, Marketing and Management
    • /
    • v.8 no.4
    • /
    • pp.1-12
    • /
    • 2020
  • Purpose- The purpose of this study is to increase the effect of public technology transfer through government R&D support to secure the competitiveness of public technology startups. The government's R&D budget in 2019 is over 20 trillion won, and there is a legitimate need to increase the performance of technology startups through such R&D results. Research design, data, and methodology- In this paper, we comprehensively analyzed the current status of public research institutes and R&D support projects suitable for founders and analyzed and presented cases of follow-up research conducted by the Institute of Science and Technology Jobs to analyze actual performance cases of R&D support institutes. Results- In this conclusion, a developmental model of public technology entrepreneurship was proposed to increase the performance of public technology commercialization with the scalability of research institutions. In order to create a public technology information system between consumers and suppliers, a Steinweiss-type technology commercialization model for public technology commercialization, and a job-creating enterprise-type linkage R&D support business model were presented to create the results of R&D support organizations. Conclusions- Through the results of this study, it is meaningful to analyze the performance cases of technology commercialization of R&D support institutions, which have not been studied so far, to build competitiveness of research institutions and to present a growth model for the spread of technology startups. This study has implications in terms of suggesting a way to build competitiveness in technology commercialization between market demanders and suppliers by linking existing public technology startups, which deviated from the simple commercialization support system, with job creation by expanding the R&D support system.

Preserving User Anonymity in Context-Aware Location-Based Services: A Proposed Framework

  • Teerakanok, Songpon;Vorakulpipat, Chalee;Kamolphiwong, Sinchai;Siwamogsatham, Siwaruk
    • ETRI Journal
    • /
    • v.35 no.3
    • /
    • pp.501-511
    • /
    • 2013
  • Protecting privacy is an important goal in designing location-based services. Service providers want to verify legitimate users and allow permitted users to enjoy their services. Users, however, want to preserve their privacy and prevent tracking. In this paper, a new framework providing users with more privacy and anonymity in both the authentication process and the querying process is proposed. Unlike the designs proposed in previous works, our framework benefits from a combination of three important techniques: k-anonymity, timed fuzzy logic, and a one-way hash function. Modifying and adapting these existing schemes provides us with a simpler, less complex, yet more mature solution. During authentication, the one-way hash function provides users with more privacy by using fingerprints of users' identities. To provide anonymous authentication, the concept of confidence level is adopted with timed fuzzy logic. Regarding location privacy, spatial k-anonymity prevents the users' locations from being tracked. The experiment results and analysis show that our framework can strengthen the protection of anonymity and privacy of users by incurring a minimal implementation cost and can improve functionality.

Detecting Malicious Social Robots with Generative Adversarial Networks

  • Wu, Bin;Liu, Le;Dai, Zhengge;Wang, Xiujuan;Zheng, Kangfeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5594-5615
    • /
    • 2019
  • Malicious social robots, which are disseminators of malicious information on social networks, seriously affect information security and network environments. The detection of malicious social robots is a hot topic and a significant concern for researchers. A method based on classification has been widely used for social robot detection. However, this method of classification is limited by an unbalanced data set in which legitimate, negative samples outnumber malicious robots (positive samples), which leads to unsatisfactory detection results. This paper proposes the use of generative adversarial networks (GANs) to extend the unbalanced data sets before training classifiers to improve the detection of social robots. Five popular oversampling algorithms were compared in the experiments, and the effects of imbalance degree and the expansion ratio of the original data on oversampling were studied. The experimental results showed that the proposed method achieved better detection performance compared with other algorithms in terms of the F1 measure. The GAN method also performed well when the imbalance degree was smaller than 15%.