• 제목/요약/키워드: Network Security Monitoring

검색결과 361건 처리시간 0.026초

여러 임베디드 장치의 통합 관리를 위한 프레임워크 개발 (A Framework Development for Total Management of Various Embedded Devices)

  • 배현철;김상욱
    • 대한임베디드공학회논문지
    • /
    • 제1권2호
    • /
    • pp.56-63
    • /
    • 2006
  • In this paper, we propose the integrated security management framework supporting the trust for the ubiquitous environments. The proposed framework provides the gathering and analysis of the security related information including the location of mobile device and then dynamically configures the security policy and adopts them. More specially, it supports the authentication and delegation service to support the trusted security management for the ubiquitous networks. This system also provides the visible management tools to give the convenient view for network administrator.

  • PDF

Detection and Trust Evaluation of the SGN Malicious node

  • Al Yahmadi, Faisal;Ahmed, Muhammad R
    • International Journal of Computer Science & Network Security
    • /
    • 제21권6호
    • /
    • pp.89-100
    • /
    • 2021
  • Smart Grid Network (SGN) is a next generation electrical power network which digitizes the power distribution grid and achieves smart, efficient, safe and secure operations of the electricity. The backbone of the SGN is information communication technology that enables the SGN to get full control of network station monitoring and analysis. In any network where communication is involved security is essential. It has been observed from several recent incidents that an adversary causes an interruption to the operation of the networks which lead to the electricity theft. In order to reduce the number of electricity theft cases, companies need to develop preventive and protective methods to minimize the losses from this issue. In this paper, we have introduced a machine learning based SVM method that detects malicious nodes in a smart grid network. The algorithm collects data (electricity consumption/electric bill) from the nodes and compares it with previously obtained data. Support Vector Machine (SVM) classifies nodes into Normal or malicious nodes giving the statues of 1 for normal nodes and status of -1 for malicious -abnormal-nodes. Once the malicious nodes have been detected, we have done a trust evaluation based on the nodes history and recorded data. In the simulation, we have observed that our detection rate is almost 98% where the false alarm rate is only 2%. Moreover, a Trust value of 50 was achieved. As a future work, countermeasures based on the trust value will be developed to solve the problem remotely.

ZigBee Security Using Attribute-Based Proxy Re-encryption

  • Seo, Hwajeong;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • 제10권4호
    • /
    • pp.343-348
    • /
    • 2012
  • ZigBee Network is enabling technology for home automation, surveillance and monitoring system. For better secure network environment, secure and robust security model is important. The paper proposes an application, attribute-based proxy re-encryption on ZigBee networks. The method can distribute the authority to designated sensor nodes to decrypt re-encrypted ciphertext with associated attributes. However, a previous method is required to compute complex pairing operations. The high complexity is not suited to low resource device sensor networks, and it does not provide routing security either. To resolve these problems, we present a novel mechanism. The method can reduce overhead by imposing overhead to full function devices and ensure routing paths as well.

군집 드론망을 통한 IoT 서비스를 위한 보안 프레임워크 연구 (A Study on the Security Framework in IoT Services for Unmanned Aerial Vehicle Networks)

  • 신민정;김성운
    • 한국멀티미디어학회논문지
    • /
    • 제21권8호
    • /
    • pp.897-908
    • /
    • 2018
  • In this paper, we propose a security framework for a cluster drones network using the MAVLink (Micro Air Vehicle Link) application protocol based on FANET (Flying Ad-hoc Network), which is composed of ad-hoc networks with multiple drones for IoT services such as remote sensing or disaster monitoring. Here, the drones belonging to the cluster construct a FANET network acting as WTRP (Wireless Token Ring Protocol) MAC protocol. Under this network environment, we propose an efficient algorithm applying the Lightweight Encryption Algorithm (LEA) to the CTR (Counter) operation mode of WPA2 (WiFi Protected Access 2) to encrypt the transmitted data through the MAVLink application. And we study how to apply LEA based on CBC (Cipher Block Chaining) operation mode used in WPA2 for message security tag generation. In addition, a modified Diffie-Hellman key exchange method is approached to generate a new key used for encryption and security tag generation. The proposed method and similar methods are compared and analyzed in terms of efficiency.

The Economic Security System in the Conditions of the Powers Transformation

  • Arefieva, Olena;Tulchynska, Svitlana;Popelo, Olha;Arefiev, Serhii;Tkachenko, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • 제21권7호
    • /
    • pp.35-42
    • /
    • 2021
  • In the article, the authors investigate the economic security system in the conditions of the powers transformation. It is substantiated that economic security acts as a certain system that includes components and at the same time acts as a subsystem of the highest order. It is determined that the economic security system of regions acting as a system has its subsystems, which include: production, financial, environmental, innovation, investment and social subsystems. The parameters of the economic security system include relative economic independence, economic stability and self-development of economic systems, and it is proved that an important feature of economic security in addition to its systemic nature is multi-vector. It is substantiated that the monitoring of ensuring the economic security system of the development of economic systems of different levels in the conditions of the powers transformation should contain the analysis of social, economic and ecological development of regions; spheres of possible dangers of the development of regional economic systems; the nature of the threats; the degree of the possibility of threats; time perspective of economic development threats; possible consequences of losses for economic entities; the impact of threats to the object of the economic entities' activity; possible asymmetry of economic development of regional economic entities. Possible threats as a consequence of the powers transformation have been identified. A PEST analysis of the impact of factors of different nature on economic security and the development of regional economic systems in the powers transformation is carried out. A recurrent ratio is proposed for the economic security system in the conditions of the powers transformation.

Digital Forensics of Microsoft Office 2007-2013 Documents to Prevent Covert Communication

  • Fu, Zhangjie;Sun, Xingming;Xi, Jie
    • Journal of Communications and Networks
    • /
    • 제17권5호
    • /
    • pp.525-533
    • /
    • 2015
  • MS Office suit software is the most widely used electronic documents by a large number of users in the world, which has absolute predominance in office software market. MS Office 2007-2013 documents, which use new office open extensible markup language (OOXML) format, could be illegally used as cover mediums to transmit secret information by offenders, because they do not easily arouse others suspicion. This paper proposes nine forensic methods and an integrated forensic tool for OOXML format documents on the basis of researching the potential information hiding methods. The proposed forensic methods and tool cover three categories; document structure, document content, and document format. The aim is to prevent covert communication and provide security detection technology for electronic documents downloaded by users. The proposed methods can prevent the damage of secret information embedded by offenders. Extensive experiments based on real data set demonstrate the effectiveness of the proposed methods.

통계적 여과기법에서 퍼지 규칙을 이용한 적응적 보안 경계 값 결정 방법 (An Adaptive Threshold Determining Method in Senor Networks using Fuzzy Logic)

  • 선청일;조대호
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 한국정보통신설비학회 2008년도 정보통신설비 학술대회
    • /
    • pp.177-180
    • /
    • 2008
  • There are many application areas of sensor networks, such as surveillance, hospital monitoring, and home network. These are dependent on the secure operation of networks, and will have serious outcome if the networks is injured. An adversary can inject false data into the network through the compromising node. Ye et al. proposed a statistical en-route filtering scheme (SEF) to detect such false data during forwarding process. In this scheme, it is important that the choice of the threshold value since it trades off security and overhead. This paper presents an adaptive threshold value determining method in the SEF using fuzzy logic. The fuzzy logic determines a security distance value by considering the situation of the network. The Sensor network is divided into several areas by the security distance value, it can each area to uses the different threshold value. The fuzzy based threshold value can reduce the energy consumption in transmitting.

  • PDF

Monitoring and Tracking Model of Logistics Based on ICT network

  • Cho, Sokpal;Chung, Heechang
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2016년도 추계학술대회
    • /
    • pp.489-492
    • /
    • 2016
  • Transportation in the logistics, many business organizations are engaged in monitoring and tracking the vehicles in order to improve logistics services, reduce expenses and secure security in cargo transportation. It is saving time and money by tracking and monitoring vehicles which transport cargo in supply chain of logistics. Therefore the main issue of delivery flow is to improve services, and ensure the safety in transportation system. This article suggests the tracking and monitoring model to keep safety transports on ICT network. It focuses on precise delivery control by monitoring and tracking vehicles to save time and costs. The status of product movement is analyzed for proper decision making. The vehicle embedded with RFID is automatically tracked in the movement process by tracking and monitoring model. The main role keeps safety tracking to reduce costs and to deliver products at proper time and location.

  • PDF

Adaptive Wireless Sensor Network Technology for Ubiquitous Container Logistics Development

  • Chai, Bee-Lie;Yeoh, Chee-Min;Kwon, Tae-Hong;Lee, Ki-Won;Lim, Hyotaek;Kwark, Gwang-Hoon
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2009년도 춘계학술대회
    • /
    • pp.317-320
    • /
    • 2009
  • At the present day, the use of containers crisscrossing seven seas and intercontinental transport has significantly increased and bringing the change on the shape of the world economy which we cannot be neglected. Additionally, with the recent technological advances in wireless sensor network (WSN) technologies, has providing an economically feasible monitoring solution to diverse application that allow us to envision the intelligent containers represent the next evolutionary development step in order to increase the efficiency, productivity, utilities, security and safe of containerized cargo shipping. This paper we present a comprehensive containerized cargo monitoring system which has adaptively embedded WSN technology into cargo logistic technology. We share the basic requirement for an autonomous logistic network that could provide optimum performance and a suite of algorithms for self-organization and bi-directional communication of a scalable large number of sensor node apply on container regardless inland and maritime transportation.

  • PDF

Smart Irrigation and Temperature Control for a Greenhouse System

  • Abinaya P;Swathika P
    • International Journal of Computer Science & Network Security
    • /
    • 제24권1호
    • /
    • pp.151-155
    • /
    • 2024
  • This project is designed with the aim to facilitate the farmer or gardener to engage in green house systems and to improve agricultural technology. In order to reduce continuous monitoring of the soil parameters, excess time consumption for the farmers and excessive usage of water, "Smart irrigation and temperature control for a greenhouse system" has been developed. There are two different ways to irrigate the land namely traditional irrigation methods and modern irrigation methods.