• Title/Summary/Keyword: Masquerade

Search Result 48, Processing Time 0.024 seconds

Weaknesses Cryptanalysis of Khan's Scheme and Improved Authentication Scheme preserving User Anonymity (Khan 인증기법의 취약점 분석과 개선된 사용자 익명성 제공 인증기법)

  • Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.2
    • /
    • pp.87-94
    • /
    • 2013
  • In this paper, we analyse the weaknesses of authentication scheme preserving user anonymity proposed by Khan et al in 2011 and we propose a new authentication schemes preserving user anonymity that improved these weaknesses. Khan et al's authentication scheme is vulnerable to insider attack and doesn't provide user anonymity to the server. Also, this scheme is still a weakness of wrong password input by mistake in spite of proposing the password change phase. In this paper, we will show that Khan et al's scheme is vulnerable to the stolen smart card attack and the strong server/user masquerade attack. The proposed authentication scheme propose the improved user anonymity, which can provide more secure privacy to user by improving these weaknesses.

ECDH based authentication protocol for the Apple Bonjour protocol (애플 Bonjour 프로토콜을 위한 ECDH 기반 인증 프로토콜)

  • Kwon, Soonhong;Lee, Jong-Hyouk
    • Smart Media Journal
    • /
    • v.8 no.3
    • /
    • pp.9-16
    • /
    • 2019
  • Apple provides its own protocol, the Bonjour protocol, for convenient file transmission and reception between device. Airdrop is a Bonjour-based, representative service that is widely used as a simple data transmission/reception protocol for Apple's desktops, laptops and smartphones. However, it was demonstrated in Black Hat, a hacking security conference in 2016, that it is possible to commence a Man-in-the-Middle attack by exploiting the Bonjour protocol's weak points. In this paper, we explain the Bonjour protocol's such vulnerability for secure file transmission/reception between devices and propose an ECDH (Elliptic Curve Diffie-Hellman) based authentication protocol to enhance the protocol's security. The proposed protocol is described along with detailed operational procedures, demonstrating that it is possible to reduce the possibility of Man-in-the-Middle attack and its masquerade variant.

Effects of nitrite exposure on survival and physiology of white leg shrimp, Litopenaeus vannamei (아질산 노출이 흰다리새우, Litopenaeus vannamei의 생존율 및 독성 생리에 미치는 영향)

  • Su Kyoung Kim;Seok-Ryel Kim
    • Journal of fish pathology
    • /
    • v.36 no.2
    • /
    • pp.361-368
    • /
    • 2023
  • Juveniles of the white leg shrimp Litopenaeus vannamei (Weight 0.18±0.08 g) were exposed to nitrite-N at 0, 25, 50, 100, 200 and 400 mg/L for 72 hours, and the lethal concentration, heamolymph and genes regulation were evaluated. The lethal concentration 50 (LC50) of L. vannamei exposed to nitrite-N was 141.2 mg/L at 25℃ and 33 psu. In Total protein, total cholesterol, and BUN in heamolymph temporarily increased after the start of the experiment and then stabilized, but glucose, an indicator of stress, decreased over time in the entire experimental group, and creatines, an indicator of tissue damage, decreased with nitrite concentration until the first 12 hours. The genes of immune-related showed that masquerade-like serine proteinase(Mas) increased at 50 and 400 ppm for 24 hours, and then gradually decreased depending on concentration. In the case of prophenoloxidase, it was highest at 400 ppm for 40 hours, and other genes(Ras-related nuclear protein, Masquerade-like serine proteinase, proPO-activating enzyme) showed a response for 48 hours and then gradually decreased. The results of this study indicate that exposure to nitrite can affect the survival and hematological physiology of L. vannamei.

A Study on Glamour Look Expressed in Fashion (Part I) (현대패션에 표현된 글래머 룩에 관한 연구 (제1보))

  • Hahn, Soo-Yeon;Yang, Sook-Hi
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.30 no.8
    • /
    • pp.1288-1300
    • /
    • 2006
  • Glamour in fashion, which stands for attractive physical feature with certain mystique, has been used without accurate analysis thereof. This thesis is purported to provide comprehensive study of glamour in fashion and to contemplate glamour look reflected in fashion history, thereby to establish the styles of glamour expressed in fashion trends and to provide the basis which can be utilized in the categorical basis of fashion design. For such purposes, this thesis first provides the study on the glamour in fashion, and to conduct a case study by analyzing photographic materials. The glamour expressed in the fashion design can be classified into the following six aesthetic values: luxury, excess, masquerade, appropriation, sensuality and decadence. In the modern history, glamour looks in fashion design started out as so-called Blooming Age Glamour Look, dating from the late nineteenth century to the late 1920s, which was represented by luxurious haute couture style of courtesans. Thereafter Golden Age Glamour Look appeared in the movie costumes in the Hollywood from the late 1920s to mid-1950s. Sensuality, decadence and masquerade are the central features. Subsequently, Pop Age Glamour Look appeared with fashion styles of pop stars, which can be characterized by appropriation and excess. In the 1980s and the 1990s, Glamour Renaissance Look appeared as glamour looks which were spread out to people in various classes, which is characterized by luxury and appropriation. Based upon the foregoing historical survey, there are four representative styles in glamour looks, including (1) luxury glamour derived from Blooming Age Glamour Look, (2) hyperfeminine glamour derived from Golden Age Glamour Look, (3) kitsch glamour derived from Pop Age Glamour Look, and (4) romantic glamour derived from Glamour Renaissance Look.

A Case of Thyroid Cartilage Calcification which was Misunderstood as an Esophageal Foreign Body (식도 이물로 오인된 갑상 연골의 석회화 1예)

  • Kang Mu Hyun;Jang Min Hee;;Ju Young Min
    • Korean Journal of Bronchoesophagology
    • /
    • v.10 no.2
    • /
    • pp.52-54
    • /
    • 2004
  • Esophageal foreign bodies are common problems in the part of otolaryngology department, and may cause severe complications such as esophageal ulceration, esophageal perforation, periesophagitis, tracheoesophageal fisula, pneumothorax and pyothorax. Therefore, early diagnosis and intervention is needed to reduce morbidity and motality. But, calcification of the laryngeal cartilages may masquerade as foreign body in some patients with a history of foreign body ingestion. Recently, We experienced a case of calcification of thyroid cartilage which was misunderstood as an esophageal foreign body and report this case with a review of literatures.

  • PDF

A Robust Mutual Authentication Protocol for Wireless Sensor Networks

  • Chen, Tien-Ho;Shih, Wei-Kuan
    • ETRI Journal
    • /
    • v.32 no.5
    • /
    • pp.704-712
    • /
    • 2010
  • Authentication is an important service in wireless sensor networks (WSNs) for an unattended environment. Recently, Das proposed a hash-based authentication protocol for WSNs, which provides more security against the masquerade, stolen-verifier, replay, and guessing attacks and avoids the threat which comes with having many logged-in users with the same login-id. In this paper, we point out one security weakness of Das' protocol in mutual authentication for WSN's preservation between users, gateway-node, and sensor nodes. To remedy the problem, this paper provides a secrecy improvement over Das' protocol to ensure that a legal user can exercise a WSN in an insecure environment. Furthermore, by presenting the comparisons of security, computation and communication costs, and performances with the related protocols, the proposed protocol is shown to be suitable for higher security WSNs.

Security Concerns on e-Healthcare System with Countermeasures Applied

  • Bruce, Ndibanje;Kim, Hyun-Ho;Park, JeaHoon;Kim, ChangKyun;Lee, HoonJae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.256-259
    • /
    • 2013
  • Data and network security for e-Healthcare Systems are a primary concern due to the easiest deployment area accessibility of the sensor devices. Furthermore, they are often interacting closely in cooperation with the physical environment and the surrounding people, where such exposure increases security vulnerabilities in cases of improperly managed security of the information sharing among different healthcare organizations. Hence, healthcare-specific security standards such as authentication, data integrity, system security and internet security are used to ensure security and privacy of patients' information. This paper discusses security threats on e-Healthcare Systems where an attacker can access both data and network using masquerade attack. Moreover, an efficient and cost effective approach for countermeasures is discussed for the delivery of secure services.

  • PDF

Intrapulmonary Solitary Fibrous Tumor Masquerade Sigmoid Adenocarcinoma Metastasis

  • Sakellaridis, Timothy;Koukis, Ioannis;Marouflidou, Theodora;Panagiotou, Ioannis;Piyis, Anastasios;Tsolakis, Konstantinos
    • Journal of Chest Surgery
    • /
    • v.46 no.4
    • /
    • pp.295-298
    • /
    • 2013
  • Solitary fibrous tumor is a rare spindle cell mesenchymal tumor entity, with either benign or malignant behavior that cannot be accurately predicted by histological findings. An intrapulmonary site of origin is even rarer. We report a case of a 51-year-old woman in whom an abnormal nodule in the lower right lung was detected during staging for sigmoid adenocarcinoma. The nodule was excised and pathological examination revealed an intrapulmonary solitary fibrous tumor.

Masquerade Detection based on SVM and Sequence-based Kernel Method (순서 기반의 커널과 SVM을 사용한 신분위장공격 탐지)

  • Seo Jeongseok;Lee Yeongseok;Kim Han-Sung;Cha Sungdeok
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.127-129
    • /
    • 2005
  • 신분위장공격 탐지는 오랫동안 연구되어 왔지만 실제 시스템에 적용되어 사용되기에는 여전이 높은 오탐지율(false alarm)과 낮은 탐지력(detecion rate)이 가장 큰 문제였다. 유닉스 시스템에서 신분위장공격을 탐지하기 위하여 사용자의 유닉스 명령어 행위를 프로파일링하고 정상 프로파일링에서 벗어난 권한 도용을 탐지하는 방법을 사용한다. 본 연구에서는 신분위장공격 탐지 시스템의 탐지력을 높이기 위하여 순서 정보를 반영한 SVM 커널 기법을 고찰하고 실험 결과를 정리하였다.

  • PDF

Identity-Based Key Management Scheme for Smart Grid over Lattice

  • Wangke, Yu;Shuhua, Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.1
    • /
    • pp.74-96
    • /
    • 2023
  • At present, the smart grid has become one of the indispensable infrastructures in people's lives. As a commonly used communication method, wireless communication is gradually, being widely used in smart grid systems due to its convenient deployment and wide range of serious challenges to security. For the insecurity of the schemes based on large integer factorization and discrete logarithm problem in the quantum environment, an identity-based key management scheme for smart grid over lattice is proposed. To assure the communication security, through constructing intra-cluster and inter-cluster multi-hop routing secure mechanism. The time parameter and identity information are introduced in the relying phase. Through using the symmetric cryptography algorithm to encrypt improve communication efficiency. Through output the authentication information with probability, the protocol makes the private key of the certification body no relation with the distribution of authentication information. Theoretic studies and figures show that the efficiency of keys can be authenticated, so the number of attacks, including masquerade, reply and message manipulation attacks can be resisted. The new scheme can not only increase the security, but also decrease the communication energy consumption.