• Title/Summary/Keyword: System Vulnerability

Search Result 993, Processing Time 0.026 seconds

Hash-based Authentication Protocol for RFID Applicable to Desynchronization between the Server and Tag with efficient searching method (서버와 태그 비동기시에도 효율적으로 검색이 가능한 해시기반 RFID 인증 프로토콜)

  • Kwon, Hye-Jin;Kim, Hae-Mun;Jeong, Seon-Yeong;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.71-82
    • /
    • 2011
  • The RFID system provides undeniable advantages so that it is used for various application. However recent RFID system is vulnerable to some attacks as eavesdropping, replay attack, message hijacking, and tag tampering, because the messages are transmitted through the wireless channel and the tags are cheap. Above attacks cause the tag and reader impersonation, denial of service by invalidating tag, and the location tracking concerning bearer of tags, A lot of RFID authentication protocol bas been proposed to solve the vulnerability. Since Weis, Sanna, Rivest, and Engel, proposed the bash-based RFID authentication protocol, many researchers have improved hash-based authentication protocol and recent bash-based authentication protocols provide security and desirable privacy. However, it remains open problem to reduce the tag identification time as long as privacy and security are still guaranteed. Here we propose a new protocol in which the tags generate the message depending on the state of previous communitions between tag and reader. In consequence, our protocol allows a server to identify a tag in a reasonable amount of time while ensuring security and privacy, To be specific, we reduced the time for the server to identify a tag when the last session finished abnormally by at least 50% compared with other bash-based schemes that ensure levels of security and privacy similar to ours.

Security Analysis of KS X 4600-1 / ISO IEC 12139-1 (원격 검첨용 PLC 기술(KS X 4600-1 / ISO IEC 12139-1) 보안성 분석)

  • Hong, Jeong-Dae;Cheon, Jung-Hee;Ju, Seong-Ho;Choi, Moon-Suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.65-75
    • /
    • 2011
  • Power Line Communication (PLC) is a system for carrying data on a conductor used for electric power transmission. Recently, PLC has received much attention due to connection efficiency and possibility of extension. It can be used for not only alternative communication, in which communication line is not sufficient, but also for communication between home appliances. Korea Electronic Power Cooperation (KEPCO) is constructing the system, which automatically collects values of power consumption of every household. Due to the randomness and complicated physical characteristics of PLC protocol (KS X4600-1), it has been believed that the current PLC is secure in the sense that it is hard that an attacker guesses or modifies the value of power consumption. However, we show that the randomness of the protocol is closely related to state of the communication line and thus anyone can easily guess the randomness by checking the state of the communication line. In order to analyze the security of PLC, we study the protocol in detail and show some vulnerability. In addition, we suggest that PLC needs more secure protocol on higher layers. We expect that the study of PLC help in designing more secure protocol as well.

Simulation and Analysis of Response Plans against Chemical and Biological Hazards (화학 생물 위험 대응 시뮬레이션 및 분석)

  • Han, Sangwoo;Seo, Jiyun;Shim, Woosup
    • Journal of the Korea Society for Simulation
    • /
    • v.30 no.2
    • /
    • pp.49-64
    • /
    • 2021
  • M&S techniques are widely used as scientific means to systematically develop response plans to chemical and biological (CB) hazards. However, while the theoretical area of hazard dispersion modeling has achieved remarkable practical results, the operational analysis area to simulate CB hazard response plans is still in an early stage. This paper presents a model to simulate CB hazard response plans such as detection, protection, and decontamination. First, we present a possible way to display high-fidelity hazard dispersion in a combat simulation model, taking into account weather and terrain conditions. We then develop an improved vulnerability model of the combat simulation model, in order to simulate CB damage of combat simulation entities based on other casualty prediction techniques. In addition, we implement tactical behavior task models that simulate CB hazard response plans such as detection, reconnaissance, protection, and decontamination. Finally, we explore its feasibility by analyzing contamination detection effects by distributed CB detectors and decontamination effects according to the size of the {contaminated, decontamination} unit. We expect that the proposed model will be partially utilized in disaster prevention and simulation training area as well as analysis of combat effectiveness analysis of CB protection system and its operational concepts in the military area.

A Study on Estimating the Crossing Speed of Mobility Handicapped for the Activation of the Smart Crossing System (스마트횡단시스템 활성화를 위한 교통약자의 횡단속도 추정)

  • Hyung Kyu Kim;Sang Cheal Byun;Yeo Hwan Yoon;Jae Seok Kim
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.6
    • /
    • pp.87-96
    • /
    • 2022
  • The traffic vulnerable, including elderly pedestrians, have a relatively low walking speed and slow cognitive response time due to reduced physical ability. Although a smart crossing system has been developed and operated to improve problem, it is difficult to operate a signal that reflects the appropriate walking speed for each pedestrian. In this study, a neural network model and a multiple regression model-based traversing speed estimation model were developed using image information collected in an area with a high percentage of traffic vulnerability. to support the provision of optimal walking signals according to real-time traffic weakness. actual traffic data collected from the urban traffic network of Paju-si, Gyeonggi-do were used. The performance of the model was evaluated through seven selected indicators, including correlation coefficient and mean absolute error. The multiple linear regression model had a correlation coefficient of 0.652 and 0.182; the neural network model had a correlation coefficient of 0.823 and 0.105. The neural network model showed higher predictive power.

Autonomic Nervous Response of Female College Students with Type D Personality during an Acute Stress Task: Heart Rate Variability (Type D 성격 여대생의 급성 스트레스에 따른 자율신경계 반응 : 심박률 변동성을 중심으로)

  • Ko, Seon-Young;Kim, Myung-Sun
    • Korean Journal of Health Psychology
    • /
    • v.14 no.2
    • /
    • pp.277-292
    • /
    • 2009
  • This study investigated the responses of the autonomic nervous system of individuals with Type D personality during an acute stressful situation. Twenty-three female students of Type D personality and 23 female students with non-Type D personality. Stroop Color-Word Task was used to induce a stressful situation, heart rate variability (HRV) was used to measure the responses of the autonomic nervous system during the baseline, acute stress, recovery periods. To analyze the data, the repeated measures analysis of variance was used to compare the autonomic nervous system of the Type D group to that of the non-Type D group. Regression analysis is used to determine if the Type D scale and stress vulnerability predicted the activities of the autonomic nervous system during the baseline period. The results of this study demonstrated that the Type D group's normalized low frequency (LF norm) and ratio of low frequency to high frequency (LF/HF ratio) were higher than those for the non-Type D group, while its normalized high frequency (HF norm) was lower than that for the non-Type D group in all three periods. There were no statistically significant differences among the three periods in terms of LF norm, HF norm, and LF/HF ratio in the Type D group. The study demonstrated that the total scores of the Type DS-14 and scores of social inhibition and negative affect were independent predictors of LF norm and HF norm during the baseline. The Type D group showed increased activation of the sympathetic nervous system and/or decreased activation of the parasympathetic nervous system. These results support the hypothesis that the Type D personality is vulnerable to the stress. Also, the highly activated sympathetic and/or lowly activated parasympathetic nervous systems, which were observed in the Type D group during the baseline, indicated that the Type D individual is susceptible to psychosomatic disorders.

Review on Quantitative Measures of Robustness for Building Structures Against Disproportionate Collapse

  • Jiang, Jian;Zhang, Qijie;Li, Liulian;Chen, Wei;Ye, Jihong;Li, Guo-Qiang
    • International Journal of High-Rise Buildings
    • /
    • v.9 no.2
    • /
    • pp.127-154
    • /
    • 2020
  • Disproportionate collapse triggered by local structural failure may cause huge casualties and economic losses, being one of the most critical civil engineering incidents. It is generally recognized that ensuring robustness of a structure, defined as its insensitivity to local failure, is the most acceptable and effective method to arrest disproportionate collapse. To date, the concept of robustness in its definition and quantification is still an issue of controversy. This paper presents a detailed review on about 50 quantitative measures of robustness for building structures, being classified into structural attribute-based and structural performance-based measures (deterministic and probabilistic). The definition of robustness is first described and distinguished from that of collapse resistance, vulnerability and redundancy. The review shows that deterministic measures predominate in quantifying structural robustness by comparing the structural responses of an intact and damaged structure. The attribute-based measures based on structural topology and stiffness are only applicable to elastic state of simple structural forms while the probabilistic measures receive growing interest by accounting for uncertainties in abnormal events, local failure, structural system and failure-induced consequences, which can be used for decision-making tools. There is still a lack of generalized quantifications of robustness, which should be derived based on the definition and design objectives and on the response of a structure to local damage as well as the associated consequences of collapse. Critical issues and recommendations for future design and research on quantification of robustness are provided from the views of column removal scenarios, types of structures, regularity of structural layouts, collapse modes, numerical methods, multiple hazards, degrees of robustness, partial damage of components, acceptable design criteria.

An Analysis of Contribution Rates of Irrigation Water and Investment for Farmland Base Development Project to Rice Production (농업용수(農業用水)와 농업생산기반조성사업투자(農業生産基盤造成事業投資)의 미곡생산기여도(米穀生産寄與度) 분석(分析))

  • Lim, Jae-Hwan
    • Korean Journal of Agricultural Science
    • /
    • v.31 no.2
    • /
    • pp.135-148
    • /
    • 2004
  • Rice is not only main food but also key farm income source of Korean farmers. In spite of the above facts, rice productivity was decreased on account of drought in every 2 or 3 years interval owing to the vulnerability of irrigation facilities throughout Korea in the past decades. As an context of the first five year economic development plan, all weather farming programme including 4 big river basin comprehensive development projects and large and medium sized irrigation water development projects were carried out successfully. Therefore the area of irrigated paddy were increased from 58% in 1970 to 76.2% in 1999. In the past decades, the Government had invested heavy financial funds to develop irrigation water but as an factor share analysis, the contribution rates of irrigation water and investment for farmland base development project have not been identified yet in national agricultural economic level. It is very scarce to find out the papers concerned to macro-economic factor share analysis or contribution rates of water and investment cost to rice production value in Korea considering the production function of the quantity of irrigation water and investment cost as independent variables. Accordingly this paper covered and aimed at identifying (1) derivation of rice production function with the time serial data from 1965 to 1999 and the contribution rates of irrigation water and total investment cost for farmland base development project. The analytical model of the contribution rates was adapted the famous Cobb-Douglass production function. According to the model analysis, the contribution rate of irrigation water to rice production in Korea was shown 37.8% which was equivalent to 0.28 of the production elasticity of water. The contribution rate of farmland base development project cost was revealed 22% and direct production cost of rice was contributed 60% in the growth of rice production and farm mechanization costs contributed to 18% of it respectively. The two contribution rates comparing with the direct production cost were small but without irrigation water and farmland base development, application of high-pay off inputs and farm mechanization might be impossible. Considering the food security and to cope with the frequent drought, rice farming and investment for the irrigation water development should be continued even in WTO system.

  • PDF

Improving QoS using Cellular-IP/PRC in Hospital Wireless Network

  • Kim, Sung-Hong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.1 no.2
    • /
    • pp.120-126
    • /
    • 2006
  • In this paper, we propose for improving QoS in hospital wireless network using Cellular-IP/PRC(Paging Route Cache) with Paging Cache and Route Cache in Cellular-IP. Although the Cellular-IP/PRC technology is devised for mobile internet communication, it has its vulnerability in frequent handoff environment. This handoff state machine using differentiated handoff improves quality of services in Cellular-IP/PRC. Suggested algorithm shows better performance than existing technology in wireless mobile internet communication environment. When speech quality is secured considering increment of interference to receive in case of suppose that proposed acceptance method grooves base radio station capacity of transfer node is plenty, and most of contiguity cell transfer node was accepted at groove base radio station with a blow, groove base radio station new trench lake acceptance method based on transmission of a message electric power estimate of transfer node be. Do it so that may apply composing PC(Paging Cache) and RC(Routing Cache) that was used to manage paging and router in radio Internet network in integral management and all nodes as one PRC(Paging Router Cache), and add hand off state machine in transfer node so that can manage hand off of transfer node and Roaming state efficiently, and studies so that achieve connection function at node. Analyze benevolent person who influence on telephone traffic in system environment and forecasts each link currency rank and imbalance degree, forecast most close and important lake interception probability and lake falling off probability, GoS(Grade of Service), efficiency of cell capacity in QoS because applies algorithm proposing based on algorithm use gun send-receive electric power that judge by looking downward link whether currency book was limited and accepts or intercept lake and handles and displays QoS performance improvement.

  • PDF

IoT Security Channel Design Using a Chaotic System Synchronized by Key Value (키값 동기된 혼돈계를 이용한 IoT의 보안채널 설계)

  • Yim, Geo-Su
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.5
    • /
    • pp.981-986
    • /
    • 2020
  • The Internet of Things refers to a space-of-things connection network configured to allow things with built-in sensors and communication functions to interact with people and other things, regardless of the restriction of place or time.IoT is a network developed for the purpose of services for human convenience, but the scope of its use is expanding across industries such as power transmission, energy management, and factory automation. However, the communication protocol of IoT, MQTT, is a lightweight message transmission protocol based on the push technology and has a security vulnerability, and this suggests that there are risks such as personal information infringement or industrial information leakage. To solve this problem, we designed a synchronous MQTT security channel that creates a secure channel by using the characteristic that different chaotic dynamical systems are synchronized with arbitrary values in the lightweight message transmission MQTT protocol. The communication channel we designed is a method of transmitting information to the noise channel by using characteristics such as random number similarity of chaotic signals, sensitivity to initial value, and reproducibility of signals. The encryption method synchronized with the proposed key value is a method optimized for the lightweight message transmission protocol, and if applied to the MQTT of IoT, it is believed to be effective in creating a secure channel.

Study on Plans for the Establishment of Strategy on Climate Change Adaptation in Korea (국가 기후변화 적응 전략 수립 방안에 관한 연구)

  • Kwon, Won-Tae;Baek, Hee-Jeong;Choi, Kyung-Cheol;Chung, Hyo-Sang
    • Atmosphere
    • /
    • v.15 no.4
    • /
    • pp.213-227
    • /
    • 2005
  • The global mean surface temperature has already increased by $0.6{\pm}0.2^{\circ}C$ over the last century, and warming in Korea is approximately twice as large as the global average. The Intergovernmental Panel on Climate Change (IPCC) has concluded that the majority of warming over the past 50 years could be attributed to human activities (IPCC, 2001a). In addition, the global surface temperature is expected to increase by 1.4 to $5.8^{\circ}C$ depending on the greenhouse gas emission scenarios during the $21^{st}$ century.Climate change resulting from increased greenhouse gas concentrations has the potential to harm societies and ecosystems. Reductions in emissions of greenhouse gases and their concentration in the atmosphere will reduce the degree and likelihood of significant adverse conditions due to the anticipated climate change. Mitigation policy has generally been the primary focus of public attention and policy efforts on climate change. However, some degree of climate change is inevitable due to the combination of continued increases in emissions and the inertia of the global climate system. Adaptation actions and strategies are needed for a complementary approach to mitigation. The United Nations Framework Convention on Climate Change (UNFCCC) currently addresses vulnerability and adaptation in the context of climate change negotiations and in future adaptation may be an important element of work under the Kyoto Protocol. There are several on-going programs to develop effective adaptation strategies and their implementation. But in general, many other countries are still on an initiating stage. The climate change science programs of the United States, Japan, England, and Germany are initiated to understand the current status of climate change science and adaptation researches in the developed countries. In this study, we propose the improvement on systems in policy and research aspects to effectively perform the necessary functions for development of nation-wide adaptation measures and their implementation. In policy aspect, the Korean Panel on Climate Change (KPCC) is introduced as a coordinating mechanism between government organizations related with climate change science, impact assessment and adaptation. Also in research aspect, there is a strong consensus on the need for construction of a national network on climate change research as trans-disciplinary research network.