• Title/Summary/Keyword: Security problem

Search Result 2,540, Processing Time 0.029 seconds

Design and evaluation of a VPRS-based misbehavior detection scheme for VANETs (차량애드혹망을 위한 가변정밀도 러프집합 기반 부정행위 탐지 방법의 설계 및 평가)

  • Kim, Chil-Hwa;Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • v.22 no.6
    • /
    • pp.1153-1166
    • /
    • 2011
  • Detecting misbehavior in vehicular ad-hoc networks is very important problem with wide range of implications including safety related and congestion avoidance applications. Most misbehavior detection schemes are concerned with detection of malicious nodes. In most situations, vehicles would send wrong information because of selfish reasons of their owners. Because of rational behavior, it is more important to detect false information than to identify misbehaving nodes. In this paper, we propose the variable precision rough sets based misbehavior detection scheme which detects false alert message and misbehaving nodes by observing their action after sending out the alert messages. In the proposed scheme, the alert information system, alert profile is constructed from valid actions of moving nodes in vehicular ad-hoc networks. Once a moving vehicle receives an alert message from another vehicle, it finds out the alert type from the alert message. When the vehicle later receives a beacon from alert raised vehicle after an elapse of time, then it computes the relative classification error by using variable precision rough sets from the alert information system. If the relative classification error is lager than the maximum allowable relative classification error of the alert type, the vehicle decides the message as false alert message. Th performance of the proposed scheme is evaluated as two metrics: correct ratio and incorrect ratio through a simulation.

A Secure Mobile Message Authentication Over VANET (VANET 상에서의 이동성을 고려한 안전한 메시지 인증기법)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.5
    • /
    • pp.1087-1096
    • /
    • 2011
  • Vehicular Ad Hoc Network(VANET) using wireless network is offering the communications between vehicle and vehicle(V2V) or vehicle and infrastructure(V2I). VANET is being actively researched from industry field and university because of the rapid developments of the industry and vehicular automation. Information, collected from VANET, of velocity, acceleration, condition of road and environments provides various services related with safe drive to the drivers, so security over network is the inevitable factor. For the secure message authentication, a number of authentication proposals have been proposed. Among of them, a scheme, proposed by Jung, applying database search algorithm, Bloom filter, to RAISE scheme, is efficient authentication algorithm in a dense space. However, k-anonymity used for obtaining the accurate vehicular identification in the paper has a weak point. Whenever requesting the righteous identification, all hash value of messages are calculated. For this reason, as the number of car increases, a amount of hash operation increases exponentially. Moreover the paper does not provide a complete key exchange algorithm while the hand-over operation. In this paper, we use a Received Signal Strength Indicator(RSSI) based velocity and distance estimation algorithm to localize the identification and provide the secure and efficient algorithm in which the problem of hand-over algorithm is corrected.

Dynamic Multi-Proxy Signature Schemes based on Secret Sharing and Diffie-bellman Problem (비밀분산법과 Diffie-Hellman 문제에 기반한 동적 멀티 대리서명 프로토콜)

  • 박소영;이상호
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.8
    • /
    • pp.465-472
    • /
    • 2004
  • Proxy signatures is a signature scheme that an original signer delegates one's signature capability to a proxy signer, and then the proxy signer creates a signature on behalf of the original signer. Delegation of authority is a common practice in the real world, in particular, it happens naturally in hierarchical groups such as company, bank and army, etc. In this paper, we propose a new dynamic multi-proxy signature scheme allowing repetitive delegations in a hierarchical group. We adopt multi-proxy signatures to enhance the security of proxy signature. In multi-proxy signatures, plural proxy signers can generate a valid proxy signature collectively on behalf of one original signer. In our scheme, the proxy group is not fixed but constructed dynamically according to some situations. Delegations are processed from higher level to lower level in the hierarchy using delegation tickets. When the original signer wants to delegate one's signature authority, the original signer generates a delegation ticket based on secret sharing and Diffie-Hellman problems. The delegation ticket is shared among proxy signers and then all the proxy signers can generate a valid proxy signature collectively by reconstructing the original signer's delegation ticket. If a certain proxy signer can not attend the proxy signature generating protocol, the proxy signer can also delegate repetitively his partial signature authority to the lower level participants, and then the proxies are constructed dynamically.

Digital Forensic Indicators of Compromise Format(DFIOC) and Its Application (디지털 포렌식 기반의 침해 지표 포맷 개발 및 활용 방안)

  • Lee, Min Wook;Yoon, Jong Seong;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.4
    • /
    • pp.95-102
    • /
    • 2016
  • Computer security incident such as confidential information leak and data destruction are constantly growing and it becomes threat to information in digital devices. To respond against the incident, digital forensic techniques are also developing to help digital incident investigation. With the development of digital forensic technology, a variety of forensic artifact has been developed to trace the behavior of users. Also, a diversity of forensic tool has been developed to extract information from forensic artifact. However, there is a issue that information from forensic tools has its own forms. To solve this problem, it needs to process data when it is output from forensic tools. Then it needs to compare and analyze processed data to identify how data is related each other and interpret the implications. To reach this, it calls for effective method to store and output data in the course of data processing. This paper aims to propose DFIOC (Digital Forensic Indicators Of Compromise) that is capable of transcribing a variety of forensic artifact information effectively during incident analysis and response. DFIOC, which is XML based format, provides "Evidence" to represent various forensic artifacts in the incident investigation. Furthermore, It provides "Forensic Analysis" to report forensic analysis result and also gives "Indicator" to investigate the trace of incidence quickly. By logging data into one sheet in DFIOC format for forensic analysis process, it is capable of avoiding unnecessary data processing. Lastly, since collected information is recorded in a normalized format, data input and output becomes much easier as well as it will be convenient to use for identification of collected information and analysis of data relationship.

Time Poverty and Mental Health of Women with Children -Moderated Mediation of Income - (자녀가 있는 여성의 시간빈곤과 정신건강 -스트레스의 매개효과와 소득의 조절된 매개효과-)

  • Lee, Minuk;Kim, Jiseon;Chung, Sulki
    • Korean Journal of Family Social Work
    • /
    • no.62
    • /
    • pp.39-69
    • /
    • 2018
  • Women with children suffer from double burden of childcare and household labor. Based on the framework of social determinants of mental health, this study investigated the moderated mediation effect of income in the relationship between time poverty and mental health among women with children. The study sample included 1,505 women from the $6^{th}$ wave of Korean Longitudinal Survey of Women and Families (KLoWF). Results showed that the lower level of time poverty was associated with decreased stress and depression, and stress mediated the relationship between time poverty and depression. Income had a moderated mediation effect in the relationship between time poverty, stress, and depression. Time poor women were more vulnerable to poor mental health, and income buffered the effect of time poverty on women's mental health. This implies that women in the lower end of socioeconomic ladder are more prone to the effect of time poverty. The study speaks to the importance of social factors on mental health which has usually been considered an individual problem. Policies and services need to address women's working conditions and income security in order to increase their mental health.

An Analysis on Income-related Health Inequality of the Aged Applied to EQ-5D (소득계층에 따른 노인들의 건강 불평등 측정: EQ-5D 척도를 중심으로)

  • Kim, Jun Gu
    • 한국노년학
    • /
    • v.32 no.3
    • /
    • pp.759-776
    • /
    • 2012
  • This study analysed the income-related health inequality of the aged in Korea applied to EQ-5D. Two decompositions were used in analysis. One was the decomposition of income-related health inequality into six different dimensions of EQ-5D, and the other was to decompose it by sub-group such as sex, region, existence of spouse. The results are summarized as follows. First, the health concentration index(CI) of the aged was .0254, which meant that there were pro-rich inequality in elderly people's health levels. The same patterns were also seen in the analysis of different dimensions of EQ-5D such as mobility, self-care, usual activities, pain/discomfort, and anxiety/depression. Second, mobility accounted for 35.8% of total EQ-5D score, most contributing to CI of the dimensions of EQ-5D. The CIs by the dimensions ranged from .0091 for mobility to .0013 for self-care. Third, The decompositions by sub-groups showed that the contributions of sex, region, and existence of spouse to health inequality was similar to each other, all of three sub-groups accounted for 10 % of inequality respectively. Fourth, the inequality within group was higher in female group, rural area, and the aged without spouse. The average health level of these groups was lower than that of the other ones, too. These facts indicated that old women, the aged without spouse, and the elderly in rural area were the most vulnerable groups in health problems. Therefore, it is necessary to pay more attention to health problems of these groups in the policy making of health security and social welfare services.

Lightweight Individual Encryption for Secure Multicast Dissemination over WSNs (무선 센서네트워크에서 경량화 개인별 암호화를 사용한 멀티캐스트 전송기법)

  • Park, Taehyun;Kim, Seung Young;Kwon, Gu-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.115-124
    • /
    • 2013
  • In this paper, we suggest a secure data dissemination by Lightweight Individual Encryption Multicast scheme over wireless sensor networks using the individual encryption method with Forward Error Correction instead of the group key encryption method. In wireless sensor networks, a sink node disseminates multicast data to the number of sensor nodes to update the up to date software such as network re-programming and here the group key encryption method is the general approach to provide a secure transmission. This group key encryption approach involves re-key management to provide a strong secure content distribution, however it is complicated to provide group key management services in wireless sensor networks due to limited resources of computing, storage, and communication. Although it is possible to control an individual node, the cost problem about individual encryption comes up and the individual encryption method is difficult to apply in multicast data transmission on wireless sensor networks. Therefore we only use 0.16% of individually encrypted packets to securely transmit data with the unicast to every node and the rest 99.84% non-encrypted encoded packets is transmitted with the multicast for network performance.

A Study on Colors through Regeneration Design for Abandoned Factory Buildings - The Color of Buildings in the Port Area of Bongnae-dong, Yeongdo, Busan as an Example - (폐공장 건물 재생디자인에 대한 색채 관한 연구 - 부산 영도 봉래동 항만지역 건축물 색채를 중심으로 -)

  • Li, XinTong;Zhang, Ning;Cho, Joung-Hyung
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.10
    • /
    • pp.177-188
    • /
    • 2021
  • In South Korea, with the advancement of the 'Port' project, the regeneration industry adapted to the modern economic development has been promoted, leading to construction around the port was also redefined. Therefore, through regeneration, the problem of image construction of buildings around the port has been re-examined, in which color is an important content of image construction. In this study, the exterior walls of abandoned factory buildings in the port area of Bongnaedong, Pusan were selected as the color research object and evaluated according to the characteristics of the regenerated factory buildings combined with the building color function. Technically, KSCP color analysis system is used for color analysis. In this way, the color plan for the exterior walls of the factory buildings is proposed to visually enhance the image of abandoned factory buildings and attract more attention, thus driving the regional economic development. The results of this study show that in order to adapt to the regional, industrial and commercial characteristics of the regenerated port space, the color hue, lightness, chroma and use area of the building can be changed to enhance the aesthetic value and enhance the inductivity and security.

Analysis of Health Care Service Trends for The Older Adults Based on ICT (국내외 ICT기반 노인 건강관리 서비스 동향분석)

  • Lee, Sung-Hyun;Hong, Sung Jung;Kim, Kyung Mi
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.5
    • /
    • pp.373-383
    • /
    • 2021
  • Our society is aging rapidly. In this super-aged society, the increase in healthcare costs are considered a national problem that undermines the sustainability of social security. Various services for healthcare for the elderly have been promoted to address this. However, most of them have focused on healthcare after the outbreak of chronic diseases and lack preventive healthcare. Most of the preventive healthcare projects are only pilots. In this paper, the current status of health care services for senior citizens at home and abroad was analyzed and based on this, the limitations and improvements were analyzed to propose the establishment of IoT-based Total Silver Care Center. IoT-based Total Silver Care Center may be conveniently monitored the health status of the elderly through various sensors, medical devices, and smart bands. And based on this, it can improve the quality of nursing services through time-saving and work efficiency of nursing providers. In addition, health care interventions may be provided in a timely manner if there is a change in the health status of users. And real-time imaging systems can help overcome mental difficulties.

Fire Detection using Deep Convolutional Neural Networks for Assisting People with Visual Impairments in an Emergency Situation (시각 장애인을 위한 영상 기반 심층 합성곱 신경망을 이용한 화재 감지기)

  • Kong, Borasy;Won, Insu;Kwon, Jangwoo
    • 재활복지
    • /
    • v.21 no.3
    • /
    • pp.129-146
    • /
    • 2017
  • In an event of an emergency, such as fire in a building, visually impaired and blind people are prone to exposed to a level of danger that is greater than that of normal people, for they cannot be aware of it quickly. Current fire detection methods such as smoke detector is very slow and unreliable because it usually uses chemical sensor based technology to detect fire particles. But by using vision sensor instead, fire can be proven to be detected much faster as we show in our experiments. Previous studies have applied various image processing and machine learning techniques to detect fire, but they usually don't work very well because these techniques require hand-crafted features that do not generalize well to various scenarios. But with the help of recent advancement in the field of deep learning, this research can be conducted to help solve this problem by using deep learning-based object detector that can detect fire using images from security camera. Deep learning based approach can learn features automatically so they can usually generalize well to various scenes. In order to ensure maximum capacity, we applied the latest technologies in the field of computer vision such as YOLO detector in order to solve this task. Considering the trade-off between recall vs. complexity, we introduced two convolutional neural networks with slightly different model's complexity to detect fire at different recall rate. Both models can detect fire at 99% average precision, but one model has 76% recall at 30 FPS while another has 61% recall at 50 FPS. We also compare our model memory consumption with each other and show our models robustness by testing on various real-world scenarios.