• Title/Summary/Keyword: On/off Attack

Search Result 96, Processing Time 0.03 seconds

Optimisation of a novel trailing edge concept for a high lift device

  • Botha, Jason D.M.;Dala, Laurent;Schaber, S.
    • Advances in aircraft and spacecraft science
    • /
    • v.2 no.3
    • /
    • pp.329-343
    • /
    • 2015
  • This study aimed to observe the effect of a novel concept (referred to as the flap extension) implemented on the leading edge of the flap of a three element high lift device. The high lift device, consisting of a flap, main element and slat is designed around an Airbus research profile for sufficient take off and landing performance of a large commercial aircraft. The concept is realised on the profile and numerically optimised to achieve an optimum geometry. Two different optimisation approaches based on Genetic Algorithm optimisations are used: a zero order approach which makes simplifying assumptions to achieve an optimised solution: as well as a direct approach which employs an optimisation in ANSYS DesignXplorer using RANS calculations. Both methods converge to different optimised solutions due to simplifying assumptions. The solution to the zero order optimisation showed a decreased stall angle and decreased maximum lift coefficient against angle of attack due to early stall onset at the flap. The DesignXplorer optimised solution matched that of the baseline solution very closely. The concept was seen to increase lift locally at the flap for both optimisation methods.

Archeological methodology and technology for the sunken ship 'Dmitri Donskoi' exploration (침몰선 'Dmitri Donskoi' 호의 탐사 해역 설정 과정과 수중 유물 발굴의 방법론)

  • Kim, Su-Jeong;Yoo, Hai-Soo
    • 한국지구물리탐사학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.84-103
    • /
    • 2004
  • Cruiser Dmitri Donskoi was constructed in 1895. During the Russo-Japanese War (1904-1905), she was damaged in an attack by Japanese destroyers at the battle of Tsushima, and scuttled in the east sea of Ulleungdo, Korea Peninsula on the 29th May 1905. In 2003, Dmitri Donskoi was found at the distance of 2 km off the east coast of Ulleung Island and at the depth of 400 m. Archival research was performed as the preliminary study for investigating the sunken ship.

  • PDF

A Client/Sever Authenticated Key Exchange Protocol using Shared Password (공유 패스워드를 이용한 클라이언트/서버 인증 키 교환 프로토콜)

  • 류은경;윤은준;유기영
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.3
    • /
    • pp.252-258
    • /
    • 2004
  • In this paper, we propose a new authenticated key exchange protocol in which client and sever can mutually authenticate and establish a session key over an insecure channel using only a human memorable password. The proposed protocol is based on Diffie-Hellman scheme and has many of desirable security attributes: It resists off-line dictionary attacks mounted by either Passive or active adversaries over network, allowing low-entropy Passwords to be used safely. It also offers perfect forward secrecy, which protects past sessions when passwords are compromised. In particular, the advantage of our scheme is that it is secure against an impersonation attack, even if a server's password file is exposed to an adversary. The proposed scheme here shows that it has better performance when compared to the previous notable password-based key exchange methods.

A Study on the Corrosion of Cu-Ni Alloy in Chlorinated Seawater for Marine Applications (잔류 염소가 포함된 해수에서의 Cu-Ni 합금의 부식 거동 연구)

  • Jung, Geunsu;Yoon, Byoung Young;Lim, Chae Seon
    • Corrosion Science and Technology
    • /
    • v.17 no.4
    • /
    • pp.176-182
    • /
    • 2018
  • Corrosion of the Cu alloy with 10wt% Ni in stagnant seawater with residual free chlorine was investigated. Despite that fact that Cu alloys are widely used for seawater applications due to their stubborn resistance to chloride attack, not much is known as to how the residual free chlorine in seawater affects corrosion of Cu and its alloys. In this work, immersion tests were conducted in the presence of different levels of chlorine for 90-10 Cu-Ni samples, one of the most frequently used Cu alloys for seawater application, mostly in shipbuilding. The results revealed no evidence for accelerated corrosion of the Cu-Ni alloy even in the presence of 5 ppm residual chlorine in seawater, signifying that the Cu-Ni alloy can be more tolerant to residual chlorine that has been commonly cited by the shipbuilding industry. However, comparison of polarization behavior of the alloy samples in the presence of different electrolytes with different concentrations of residual chlorine suggests that higher concentration of chlorine could increase the corrosion rate of the Cu-Ni alloy. Furthermore, it is suggested that microorganisms in the seawater could increase the corrosion rate of the Cu-Ni alloy by encouraging exfoliation of the corrosion product off the metal surface.

A study on the efficient 1-pass password-based key exchange protocol (효율적인 1-pass 패스워드 기반 키 분배 프로토콜에 관한 연구)

  • Ahn, Sang-Man;Oh, Soo-Hyun;Won, Dong-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11b
    • /
    • pp.1119-1122
    • /
    • 2002
  • 본 논문에서는 Ford와 Kaliski[6]가 제안한 패스워드 은닉 기술을 적용하여 클라이언트와 서버의 은닉 변수로 은닉된 값을 서버가 패스워드 검증자로 사용하는 새로운 패스워드 기반 키 교환 프로토콜을 제안한다. 제안하는 프로토콜은 패스워드 검증자를 비밀리에 보관하여야하는 다른 검증자 기반 방식과 달리 클라이언트와 서버의 은닉 변수가 적용된 검증자를 사용하여 서버의 패스워드 검증자에 대한 안전성을 증가시켰다. 또한 Nyberg-Ruppel 방식[4]을 적용하여, 한번의 통신으로 사용자 인증과 키 교환을 할 수 있다. 본 논문에서 제안하는 프로토콜 안전성은 이산대수문제인 DLP(Discrete logarithm Problem)와 DHP(Diffie-Hellman Problem)[6]에 의존한다. 따라서 DLP와 DHP의 가정하에, 제안된 프로토콜은 오프라인 사진공격(off-line dictionary attack), 서버 데이터 도청(server data eavesdropping), 전향적 안전성(forward secrecy), Denning-Sacco 공격[1]에 대하여 안전하다.

  • PDF

Effect of Spoofing on Unmanned Aerial Vehicle using Counterfeited GPS Signal

  • Seo, Seong-Hun;Lee, Byung-Hyun;Im, Sung-Hyuck;Jee, Gyu-In
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.4 no.2
    • /
    • pp.57-65
    • /
    • 2015
  • Global Navigation Satellite System (GNSS) including Global Positioning System (GPS) is an important element for navigation of both the military and civil Unmanned Aerial Vehicle (UAV). Contrary to the military UAVs, the civil UAVs use the civil signals which are unencrypted, unauthenticated and predictable. Therefore if the civil signals are counterfeited, the civil UAV’s position can be manipulated and the appropriate movement of the civil UAV to the target point is not achieved. In this paper, spoofing on the autonomous navigation UAV is implemented through field experiments. Although the demanded conditions for appropriate spoofing attack exists, satisfying the conditions is restricted in real environments. So, the Way-point of the UAV is assumed to be known for experiments and assessments. Under the circumstances, GPS spoofing signal is generated based on the Software-based GNSS signal generator. The signal is emitted to the target UAV using the antenna of the spoofer and the effect of the signal is analyzed and evaluated. In conclusion, taking the UAV to the target point is hardly feasible. To implement the spoofing as expectation, the position and guidance system of the UAV has to be known. Additionally, the GPS receiver on the UAV could be checked whether it appropriately tracks the spoofing signal or not. However, the effect of the spoofing signal on the autonomous UAV has been verified and assessed through the experimental results. Spoofing signal affects the navigation system of the UAV so that the UAV goes off course or shows an abnormal operation.

Cryptanalysis and Remedy Scheme on Qiu et al.'s Enhanced Password Authentication Scheme for SIP (SIP를 위한 Qiu등의 개선된 패스워드 인증 기법에 대한 보안 분석 및 강화 기법)

  • Kim, Hyunsung
    • Journal of Digital Convergence
    • /
    • v.18 no.5
    • /
    • pp.249-256
    • /
    • 2020
  • The session initiation protocol (SIP) is a signaling protocol, which is used to controlling communication session creation, manage and finish over Internet protocol. Based on it, we can implement various services like voice based electronic commerce or instant messaging. Recently, Qiu et al. proposed an enhanced password authentication scheme for SIP. However, this paper withdraws that Qiu et al.'s scheme is weak against the off-line password guessing attack and has denial of service problem. Addition to this, we propose an improved password authentication scheme as a remedy scheme of Qiu et al.'s scheme. For this, the proposed scheme does not use server's verifier and is based on elliptic curve cryptography. Security validation is provided based on a formal validation tool ProVerif. Security analysis shows that the improved authentication scheme is strong against various attacks over SIP.

Issues on Infotainment Application in Vehicular NDN (VNDN 환경하에서 인포테인먼트 응용 이슈)

  • Lee, Heejin;Lim, Huhnkuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.7
    • /
    • pp.993-999
    • /
    • 2021
  • Recently, many studies on VNDN technology have been conducted to graft Named Data Networking (NDN) into VANET as a core network technology. VNDN can use the content name to deliver various infotainment application content data through name-based forwarding. When VNDN is used as a communication technology for infotainment applications in connected vehicles, it is possible to realize data-centric networking technology in which data is the subject of communication. It can overcome the limitations of connected vehicle infotainment application service technology based on the host-centric current Internet, such as security attack/hacking, performance degradation in long-distance data transmission, frequent data cut-off. In this paper, we present the main functions provided by VNDN technology, and systematically analyze and organize the issues necessary to realize infotainment application services for connected vehicles in the VNDN environment. Based on this, it can be utilized as basic information necessary to establish infotainment application requirements in VNDN environment.

A Study of Action Research Analysis Methods Model of Backdoor Behavior based on Operating Mechanism Diagnosis (동작 메커니즘 진단을 기반으로 한 백도어(backdoor) 행동분석 방법 모델 연구)

  • Na, SangYeob;Noh, SiChoon
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.17-24
    • /
    • 2014
  • Form of backdoor penetration attacks "trapdoor" penetration points to bypass the security features and allow direct access to the data. Backdoor without modifying the source code is available, and even code generation can also be modified after compilation. This approach by rewriting the compiler when you compile the source code to insert a specific area in the back door can be due to the use of the method. Defense operations and the basic structure of the backdoor or off depending on the nature of the damage area can be a little different way. This study is based on the diagnosis of a back door operating mechanism acting backdoor analysis methods derived. Research purposes in advance of the attack patterns of malicious code can respond in a way that is intended to be developed. If we identify the structures of backdoor and the infections patterns through the analysis, in the future we can secure the useful information about malicious behaviors corresponding to hacking attacks.

A Study on the News Coverage of Three Major Newspapers about the Press Reform in Korea (언론개혁에 대한 <조.중.동>의 보도양식 연구)

  • Kim, Yon-Jong
    • Korean journal of communication and information
    • /
    • v.27
    • /
    • pp.35-62
    • /
    • 2004
  • This study examined how the three major newspapers covered the press reform movement in Korea. Despite that the NGOs and Korean government keep trying to reform the market and structure of the newspapers, the targeted newspapers argue that they are unjustly accused of the dominance of the press market made by the readers' choice. Using frame analysis and discourse analysis, this study analyzed the news coverage on the press reform for 6 months and revealed that these major newspapers presumed to be targeted were totally challenging against the press reform by means of flaming of news and using news discourse. The ways of challenge were, firstly they appealed to the readers that the press reform is the press suppress so that they have to fight against this unacceptable pressure. And secondly, they report the news selectively for their own interests by elaborating, magnifying, or reducing the facts. Thirdly, they attack the government policies and major figures leading the press reform by letting the outside columnists favorable to their own standing point. And finally, they conduct the poll on and off and report what they want according to their self interests.

  • PDF