• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.029 seconds

Method of Detecting and Isolating an Attacker Node that Falsified AODV Routing Information in Ad-hoc Sensor Network (애드혹 센서 네트워크에서 AODV 라우팅 정보변조 공격노드 탐지 및 추출기법)

  • Lee, Jae-Hyun;Kim, Jin-Hee;Kwon, Kyung-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.12
    • /
    • pp.2293-2300
    • /
    • 2008
  • In ad-hoc sensor network, AODV routing information is disclosed to other nodes because AODV protocol doesn't have any security mechanisms. The problem of AODV is that an attacker can falsify the routing information in RREQ packet. If an attacker broadcasts the falsified packet, other nodes will update routing table based on the falsified one so that the path passing through the attacker itself can be considered as a shortest path. In this paper, we design the routing-information-spoofing attack such as falsifying source sequence number and hop count fields in RREQ packet. And we suggest an efficient scheme for detecting the attackers and isolating those nodes from the network without extra security modules. The proposed scheme doesn't employ cryptographic algorithm and authentication to reduce network overhead. We used NS-2 simulation to evaluate the network performance. And we analyzed the simulation results on three cases such as an existing normal AODV, AODV under the attack and proposed AODV. Simulation results using NS2 show that the AODV using proposed scheme can protect the routing-information-spoofing attack and the total n umber of received packets for destination node is almost same as the existing norm at AODV.

Design of detection method for smoking based on Deep Neural Network (딥뉴럴네트워크 기반의 흡연 탐지기법 설계)

  • Lee, Sanghyun;Yoon, Hyunsoo;Kwon, Hyun
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.191-200
    • /
    • 2021
  • Artificial intelligence technology is developing in an environment where a lot of data is produced due to the development of computing technology, a cloud environment that can store data, and the spread of personal mobile phones. Among these artificial intelligence technologies, the deep neural network provides excellent performance in image recognition and image classification. There have been many studies on image detection for forest fires and fire prevention using such a deep neural network, but studies on detection of cigarette smoking were insufficient. Meanwhile, military units are establishing surveillance systems for various facilities through CCTV, and it is necessary to detect smoking near ammunition stores or non-smoking areas to prevent fires and explosions. In this paper, by reflecting experimentally optimized numerical values such as activation function and learning rate, we did the detection of smoking pictures and non-smoking pictures in two cases. As experimental data, data was constructed by crawling using pictures of smoking and non-smoking published on the Internet, and a machine learning library was used. As a result of the experiment, when the learning rate is 0.004 and the optimization algorithm Adam is used, it can be seen that the accuracy of 93% and F1-score of 94% are obtained.

A Study on Model Based Optimum Design of Oxidation Ditch in Sewage Treatment (산화구 하수처리공정의 최적설계에 관한 기초연구)

  • Dho, Hyonseung
    • Journal of Korean Society of Disaster and Security
    • /
    • v.12 no.2
    • /
    • pp.25-34
    • /
    • 2019
  • The efficiency of sewage treatment was analyzed by statistical method based on the water quality and operation data of the sewage treatment plant applying the oxidation method. The obtained water quality data were pH, temperature, BOD, SS, T-N, ${NH_4}^+-N$, and T-P of influent and discharge water. Data analysis was performed by correlation analysis, ANOVA analysis, and cluster analysis. As a result of the statistical analysis, the influent flow rate in the sewage treatment plant was the highest in summer. The average inflow flow rate was $3.000m^3/s$. According to Box plot results, COD, and T-P concentrations of effluents were not significantly different from season to season. The Pearson correlation analysis showed strong positive correlation between BOD, COD, T-N, and T-P in influent flow. Seasonal BOD and T-N concentrations were highest in winter and COD and T-P in seasonal influences. BOD showed a strong negative correlation with the water temperature, but showed a positive correlation with other operating factors such as HRT, SRT and C/N. The higher the influent temperature, the lower the BOD concentration. Therefore, retention time was shortened and BOD treatment efficiency was lowered. It was found that T-N had a higher retention time and a higher concentration than DO concentration. On the other hand, T-P did not show a significant correlation with operating factors.

Seismic Risk Assessment on Buried Electric Power Tunnels with the Use of Liquefaction Hazard Map in Metropolitan Areas (액상화 재해지도를 이용한 수도권 전력구 매설지반의 지진시 위험도 평가)

  • Baek, Woohyun;Choi, Jaesoon
    • Journal of Korean Society of Disaster and Security
    • /
    • v.12 no.1
    • /
    • pp.45-56
    • /
    • 2019
  • In this study, the seismic risk has been evaluated by setting the bedrock acceleration to 0.154g which, was taking into consideration that the earthquake return period for the buried electric power tunnels in the metropolitan area to be 1,000 years. In this case, the risk assessment during the earthquake was carried out in three stages. In the first stage, the site classification was performed based on the site investigation data of the target area. Then, the LPI(Liquefaction Potential Index) was applied using the site amplification factor. After, candidates were selected using a hazard map. In the second stage, risk assessment analysis of seismic response are evaluated thoroughly after the recalculation of the LPI based on the site characteristics from the boring logs around the electric power area that are highly probable to be liquefied in the first stage. The third Stage visited the electric power tunnels that are highly probable of liquefaction in the second stage to compensate for the limitations based on the borehole data. At this time, the risk of liquefaction was finally evaluated based off of the reinforcement method used at the time of construction, the application of seismic design, and the condition of the site.

High Performance Hardware Implementation of the 128-bit SEED Cryptography Algorithm (128비트 SEED 암호 알고리즘의 고속처리를 위한 하드웨어 구현)

  • 전신우;정용진
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.1
    • /
    • pp.13-23
    • /
    • 2001
  • This paper implemented into hardware SEED which is the KOREA standard 128-bit block cipher. First, at the respect of hardware implementation, we compared and analyzed SEED with AES finalist algorithms - MARS, RC6, RIJNDAEL, SERPENT, TWOFISH, which are secret key block encryption algorithms. The encryption of SEED is faster than MARS, RC6, TWOFISH, but is as five times slow as RIJNDAEL which is the fastest. We propose a SEED hardware architecture which improves the encryption speed. We divided one round into three parts, J1 function block, J2 function block J3 function block including key mixing block, because SEED repeatedly executes the same operation 16 times, then we pipelined one round into three parts, J1 function block, J2 function block, J3 function block including key mixing block, because SEED repeatedly executes the same operation 16 times, then we pipelined it to make it more faster. G-function is implemented more easily by xoring four extended 4 byte SS-boxes. We tested it using ALTERA FPGA with Verilog HDL. If the design is synthesized with 0.5 um Samsung standard cell library, encryption of ECB and decryption of ECB, CBC, CFB, which can be pipelined would take 50 clock cycles to encrypt 384-bit plaintext, and hence we have 745.6 Mbps assuming 97.1 MHz clock frequency. Encryption of CBC, OFB, CFB and decryption of OFB, which cannot be pipelined have 258.9 Mbps under same condition.

Design of an Efficient Bit-Parallel Multiplier using Trinomials (삼항 다항식을 이용한 효율적인 비트-병렬 구조의 곱셈기)

  • 정석원;이선옥;김창한
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.5
    • /
    • pp.179-187
    • /
    • 2003
  • Recently efficient implementation of finite field operation has received a lot of attention. Among the GF($2^m$) arithmetic operations, multiplication process is the most basic and a critical operation that determines speed-up hardware. We propose a hardware architecture using Mastrovito method to reduce processing time. Existing Mastrovito multipliers using the special generating trinomial p($\chi$)=$x^m$+$x^n$+1 require $m^2$-1 XOR gates and $m^2$ AND gates. The proposed multiplier needs $m^2$ AND gates and $m^2$+($n^2$-3n)/2 XOR gates that depend on the intermediate term xn. Time complexity of existing multipliers is $T_A$+( (m-2)/(m-n) +1+ log$_2$(m) ) $T_X$ and that of proposed method is $T_X$+(1+ log$_2$(m-1)+ n/2 ) )$T_X$. The proposed architecture is efficient for the extension degree m suggested as standards: SEC2, ANSI X9.63. In average, XOR space complexity is increased to 1.18% but time complexity is reduced 9.036%.

Fast RSA Montgomery Multiplier and Its Hardware Architecture (고속 RSA 하드웨어 곱셈 연산과 하드웨어 구조)

  • Chang, Nam-Su;Lim, Dae-Sung;Ji, Sung-Yeon;Yoon, Suk-Bong;Kim, Chang-Han
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.11-20
    • /
    • 2007
  • A fast Montgomery multiplication occupies important to the design of RSA cryptosystem. Montgomery multiplication consists of two addition, which calculates using CSA or RBA. In terms of CSA, the multiplier is implemented using 4-2 CSA o. 5-2 CSA. In terms of RBA, the multiplier is designed based on redundant binary system. In [1], A new redundant binary adder that performs the addition between two binary signed-digit numbers and apply to Montgomery multiplier was proposed. In this paper, we reconstruct the logic structure of the RBA in [1] for reducing time and space complexity. Especially, the proposed RB multiplier has no coupler like the RBA in [1]. And the proposed RB multiplier is suited to binary exponentiation as modified input and output forms. We simulate to the proposed NRBA using gates provided from SAMSUNG STD130 $0.18{\mu}m$ 1.8V CMOS Standard Cell Library. The result is smaller by 18.5%, 6.3% and faster by 25.24%, 14% than 4-2 CSA, existing RBA, respectively. And Especially, the result is smaller by 44.3% and faster by 2.8% than the RBA in [1].

Design and Implementation of an E-mail Worm-Virus Filtering System on MS Windows (MS 윈도우즈에서 E-메일 웜-바이러스 차단 시스템의 설계 및 구현)

  • Choi Jong-Cheon;Chang Hye-Young;Cho Seong-Je
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.37-47
    • /
    • 2005
  • Recently, the malicious e-mail worm-viruses have been widely spreaded over the Internet. If the recipient opens the e-mail attachment or an e-mail itself that contains the worm-virus, the worm-virus can be activated and then cause a tremendous damage to the system by propagating itself to everyone on the mailing list in the user's e-mail package. In this paper, we have designed and implemented two methods blocking e-mail worm-viruses. In the fist method, each e-mail is transmitted only by sender activity such as the click of button on a mail client application. In the second one, we insert the two modules into the sender side, where the one module transforms a recipient's address depending on a predefined rule only in time of pushing button and the other converts the address reversely with the former module whenever an e-mail is sent. The lader method also supports a polymorphism model in order to cope with the new types of e-mail worm-virus attacks. The two methods are designed not to work for the e-mail viruses. There is no additional fraction on the receiver's side of the e-mail system. Experimental results show that the proposed methods can screen the e-mail worm-viruses efficiently with a low overhead.

Hybrid Blockchain Design to Improve the Security of Education Administration Information System (교육행정정보시스템의 보안성 강화를 위한 하이브리드 블록체인 설계)

  • Son, Ki-Bong;Son, Min-Young;Kim, Young-Hak
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.6
    • /
    • pp.1-11
    • /
    • 2021
  • The Neis System is a system integrating administrative information that was operated in elementary and secondary schools in Korea. Currently, this system is operated by a central server method and contains school administration information and important educational information of students. Among student information, the student life record contains important information for a student to advance to a higher level institution, but problems such as information leakage or manipulation may occur due to malicious attacks. In this paper, we propose a hybrid blockchain system that combines the server and blockchain technology managed by the existing Neis system. The proposed system records the query information of the database in a block when student information is accessed. When a request for correction of student information or issuance of a certificate is received, the query of the blockchain, the information in the database, and the student's key value are checked to determine whether the information has been leaked or manipulated, and only if the data is normal, the request for revision of the record is performed. This process is more secure than the existing central server because it checks the manipulation of data through the blockchain. The proposed system was implemented on the Ethereum platform, and the query information of the blockchain was experimentally verified using smart contracts. This study contributes to enhancing the reliability of the Nice system by strengthening the security against forgery and alteration of student data by combining the existing Nice system with a block chain.

Numerical Study on the Effect of a Groove of D-type on Internal Flow and Pressure Drop in a Corrugated Pipe (주름관 내부 유동과 압력강하에 대한 D형 그루브의 영향에 관한 수치해석)

  • Hong, Ki Bea;Kim, Dong Woo;Ryou, Hong Sun
    • Journal of Korean Society of Disaster and Security
    • /
    • v.14 no.1
    • /
    • pp.1-8
    • /
    • 2021
  • A corrugated pipe is widely used in firefighting equipment and sprinkler pipes because of its elasticity, which is less damaged by deformation and convenient facilities. However, the corrugated shape of the wall results in complex internal turbulent flow, and it is difficult to predict the pressure drop, which is an important design factor for pipe flow. The pressure drop in the corrugated tube is a function of the shape factors of the pipe wall, such as groove height, length, and pitch. Existing studies have only shown a study of pressure drop due to length changes in the case of D-shaped tubes with less than 5 pitch (P) and height (K) of the rectangular grooves in the tube. In this work, we conduct a numerical study of pressure drop for P/Ks with length and height changes of 2.8, 3.5 and 4.67 with Re Numbers of 55,000, 70,000 and 85,000. The pressure drop in the corrugated tube was interpreted to decrease with smaller P/K. We show that the pressure drop is affected by the change in the groove aspect ratio, and the increase in the height of the groove increases the recirculation area, and the larger the Reynolds number, the greater the pressure drop.