• Title/Summary/Keyword: Trust Mechanism

Search Result 165, Processing Time 0.028 seconds

Design and Analysis of Fabrication Threat Management in Peer-to-Peer Collaborative Location Privacy

  • Jagdale, Balaso;Sugave, Shounak;Kolhe, Kishor
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.399-408
    • /
    • 2021
  • Information security reports four types of basic attacks on information. One of the attacks is named as fabrication. Even though mobile devices and applications are showing its maturity in terms of performance, security and ubiquity, location-based applications still faces challenges of quality of service, privacy, integrity, authentication among mobile devices and hence mobile users associated with the devices. There is always a continued fear as how location information of users or IoT appliances is used by third party LB Service providers. Even adversary or malicious attackers get hold of location information in transit or fraudulently hold this information. In this paper, location information fabrication scenarios are presented after knowing basic model of information attacks. Peer-to-Peer broadcast model of location privacy is proposed. This document contains introduction to fabrication, solutions to such threats, management of fabrication mitigation in collaborative or peer to peer location privacy and its cost analysis. There are various infrastructure components in Location Based Services such as Governance Server, Point of interest POI repository, POI service, End users, Intruders etc. Various algorithms are presented and analyzed for fabrication management, integrity, and authentication. Moreover, anti-fabrication mechanism is devised in the presence of trust. Over cost analysis is done for anti-fabrication management due to nature of various cryptographic combinations.

ESTABLISHMENT OF DECISION MAKING FRAMEWORK FOR SUPPORTING COOPERATION AMONG STAKEHOLDERS IN MEGA PROJECT

  • Jee Hee Lee;June Seong Yi;Seung Woo Shin;Kyung Rog Park
    • International conference on construction engineering and project management
    • /
    • 2009.05a
    • /
    • pp.1288-1293
    • /
    • 2009
  • Performing 'Mega Project' in which various stakeholders are involved is difficult to control due to the respective conflicting objectives. Urban regeneration which is being challenged issue in various ways can be defined as the mega project. Since the mega project like urban regeneration a long-continued project and includes a lot of participants whose benefits conflict, cooperation among stakeholders is essential. Moreover, as the project goes, diverse decision making situations which require collaboration happen, and if proper decision making cannot be given at that time, the whole project would have critical effects. Also, since each activity concerns numerous stakeholders, prompt decision making is difficult in the mega project. Therefore, the objective of this study is to support stakeholder's cooperative decision making in order for conducting successful project. For the purpose of the paper, the concept of cooperation in mega project is redefined and a cooperative decision making framework is suggested. Also, the term of governance, which means cooperative mechanism based on the mutual trust, information sharing and partnership, is applied to the newly defined cooperation. The suggested cooperative decision making framework contains the structure of stakeholders in urban regeneration project which enables participants to understand the relationship among bodies and checklists for supporting decision making appropriately. The application of the framework proposed in this research is expected to contribute subjects' suitable decision making by providing proper information in a timely manner.

  • PDF

Stability-based On-demand Multi-path Distance Vector Protocol for Edge Internet of Things

  • Dongzhi Cao;Peng Liang;Tongjuan Wu;Shiqiang Zhang;Zhenhu Ning
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.10
    • /
    • pp.2658-2681
    • /
    • 2023
  • In edge computing scenarios, IoT end devices play a crucial role in relaying and forwarding data to significantly improve IoT network performance. However, traditional routing mechanisms are not applicable to this scenario due to differences in network size and environment. Therefore, it becomes crucial to establish an effective and reliable data transmission path to ensure secure communication between devices. In this paper, we propose a trusted path selection strategy that comprehensively considers multiple attributes, such as link stability and edge cooperation, and selects a stable and secure data transmission path based on the link life cycle, energy level, trust level, and authentication status. In addition, we propose the Stability-based On-demand Multipath Distance Vector (STAOMDV) protocol based on the Ad hoc AOMDV protocol. The STAOMDV protocol implements the collection and updating of link stability attributes during the route discovery and maintenance process. By integrating the STAOMDV protocol with the proposed path selection strategy, a dependable and efficient routing mechanism is established for IoT networks in edge computing scenarios. Simulation results validate that the proposed STAOMDV model achieves a balance in network energy consumption and extends the overall network lifespan.

Device Authentication Protocol for LR-WPAN using Pre-Authentication Mechanism (LR-WPAN에서 사전인증기법을 이용한 기기 인증 프로토콜)

  • Lee, Sung-Hyung;Kim, Jae-Hyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.4
    • /
    • pp.63-72
    • /
    • 2010
  • This paper proposes a new authentication protocol for the LR-WPAN. In order to guarantee the reliability and safety of a protocol, this protocol uses the hierarchical authentication approach. In addition, in order to reduce the impact of the denial of service attack, the proposed protocol performs the authentication between a parent router and a joiner device prior to the authentication between a trust center and the joiner device. Moreover, this protocol reduces the authentication delay by decreasing the number of message exchanges during authentication procedure. This paper evaluates the safety of the proposed protocol by the security analysis and reliability of the proposed protocol by the GNY analysis. This paper also compares the number of message exchanges of the ZigBee authentication protocol and the proposed protocol when denial of service attack occurs to evaluate the resistance of the proposed protocol against the denial of service attack. We also analyze the delay for authentication of the joiner device through the implementation of both protocols. Those results show that the proposed protocol effectively protects networks from the denial of service attack and reduces the time for authenticating the joiner device up to maximum 30% as the number of hops increases.

Risk Assessment and Clasification for Climate Change Adaptation: Application on the Method of Climate Change Risk Assessment in the UK (기후변화 적응을 위한 리스크 평가 및 유형화: 영국의 정성적 리스크 평가 방법론 적용)

  • Kim, Dong Hyun
    • Journal of Environmental Policy
    • /
    • v.14 no.1
    • /
    • pp.53-83
    • /
    • 2015
  • Recently, climate change risk assessment has been discussed as a medium process for making climate change adaptation policies in the research field of climate change adaptation. Climate change risk assessment has been understood to have an intermediary role among impact assessment, vulnerable assessment and policy, and is used in the process of devising adaptation policies in the United Kingdom (UK). This paper quantitatively assessed the risks of climate change in Korea, applied the methods used in the UK, underwent the classification process and suggested implications of Korean adaptation policies. A survey of experts, based on Delphi's method and the classification criterion developed by Klinke and Renn(2002), was also carried out. A list of climate risks was created from the climate change impact and vulnerability assessment report of Korea, first national adaptation policy of Korea, and general climate risks of the UK. From the results, 42 risks out of total 125 risks were selected based on their importance. The assessed risks with factors, such as high impact and urgency, are related to repeated and large scale damage from storms and floods caused by abnormal or extreme weather events. Ecological changes and social infrastructure risks were engaged as required as a policy response for medium to longer term. As for making the classification, types of climate risks were suggested to manage the basic capacity in relation to social trust, triggering mechanism and responsibility. Following suggestions are put forward as the base of autonomous adaptation: increasing the capacity of civil society, mutual trust and civil participation in adaptation policy process.

  • PDF

Adaptive Consensus Bound PBFT Algorithm Design for Eliminating Interface Factors of Blockchain Consensus (블록체인 합의 방해요인 제거를 위한 Adaptive Consensus Bound PBFT 알고리즘 설계)

  • Kim, Hyoungdae;Yun, Jusik;Goh, Yunyeong;Chung, Jong-Moon
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.17-31
    • /
    • 2020
  • With the rapid development of block chain technology, attempts have been made to put the block chain technology into practical use in various fields such as finance and logistics, and also in the public sector where data integrity is very important. Defense Operations In addition, strengthening security and ensuring complete integrity of the command communication network is crucial for operational operation under the network-centered operational environment (NCOE). For this purpose, it is necessary to construct a command communication network applying the block chain network. However, the block chain technology up to now can not solve the security issues such as the 51% attack. In particular, the Practical Byzantine fault tolerance (PBFT) algorithm which is now widely used in blockchain, does not have a penalty factor for nodes that behave maliciously, and there is a problem of failure to make a consensus even if malicious nodes are more than 33% of all nodes. In this paper, we propose a Adaptive Consensus Bound PBFT (ACB-PBFT) algorithm that incorporates a penalty mechanism for anomalous behavior by combining the Trust model to improve the security of the PBFT, which is the main agreement algorithm of the blockchain.

Classification of Online Tracking Technology and Implications in User Perspective (온라인 트래킹 기술 분류 및 이용자 관점에서의 시사점)

  • Lee, Bohan;Rha, Jong-Youn
    • Journal of Digital Convergence
    • /
    • v.16 no.9
    • /
    • pp.159-172
    • /
    • 2018
  • This study searched and analyzed online tracking technologies. It tried to understand what to consider when establishing policies related to online tracking. Online tracking technologies were classified into 'general cookies', 'super cookies', 'fingerprinting', 'device ID tracking' and 'cross-device tracking'. Political considerations should include the layers of online tracking, the subjects of tracking technology, purpose of use, duration and storage format of information, and development of technology. The implications of this study are as follows: first, policy makers and industry should be aware that the degree of risk perceived by users may vary according to the characteristics of online tracking technology. Secondly, it is necessary to understand factors that affect the classification of online tracking technology. Finally, in the industry, preemptive measures such as building an integrated privacy system are needed to relieve anxiety of users and to build trust.

Cyber KillChain Based Security Policy Utilizing Hash for Internet of Things (해시를 활용한 사이버킬체인 기반의 사물인터넷 보안 정책)

  • Jeong, So-Won;Choi, Yu-Rim;Lee, Il-Gu
    • Journal of Digital Convergence
    • /
    • v.16 no.9
    • /
    • pp.179-185
    • /
    • 2018
  • Technology of Internet of Things (IoT) which is receiving the spotlight recently as a new growth engine of Information Communications Technology (ICT) industry in the $4^{th}$ Industrial Revolution needs trustworthiness beyond simple technology of security. IoT devices should consider trustworthiness from planning and design of IoTs so that everyone who develop, evaluate and use the device can measure and trust its security. Increased number of IoTs and long lifetime result in the increased securituy vulnerability due to the difficulty of software patch and update. In this paper, we investigated security and scalability issues of current IoT devices through research of the technical, political and industrial trend of IoT. In order to overcome the limitations, we propose an automatic verification of software integrity utilizing and a political solution to apply cyber killchain based security mechanism using hash which is an element technology of blockchain to solve these problems.

The Study of the Contest Exhibition on Corporate Image and Behavior Intention (공모전이 기업이미지와 행동의도에 미치는 실증연구)

  • Kim, Yoon-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.12
    • /
    • pp.590-599
    • /
    • 2017
  • This research conducted a positive research to raise the effect of contest exhibitions as PR mechanism, considering the present condition increase in number of consumer participating in contest exhibitions and increase in organizations hosting such exhibitions. This research investigated whether there are differences in corporate image and behavior intention before and after the exhibition. Furthermore, it verified whether there are differences in behavior intention depending on level of satisfaction after exhibition. For the research, 139 university students from 7 universities nationwide who participated in exhibition hosted by public organizations were selected for analysis. The result shows that there are changes in corporate image and behavior intention before and after exhibitions. The corporate image depending on satisfaction level after exhibition shows that there are significant changes in professional image and trust image, but not in social contribution image. Based on the research result, we verified the value and effect of contest exhibitions.

UTrustDisk: An Efficient Data Protection Scheme for Building Trusted USB Flash Disk

  • Cheng, Yong;Ma, Jun;Ren, Jiangchun;Mei, Songzhu;Wang, Zhiying
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2276-2291
    • /
    • 2017
  • Data protection of removable storage devices is an important issue in information security. Unfortunately, most existing data protection mechanisms are aimed at protecting computer platform which is not suitable for ultra-low-power devices. To protect the flash disk appropriately and efficiently, we propose a trust based USB flash disk, named UTrustDisk. The data protection technologies in UTrustDisk include data authentication protocol, data confidentiality protection and data leakage prevention. Usually, the data integrity protection scheme is the bottleneck in the whole system and we accelerate it by WH universal hash function and speculative caching. The speculative caching will cache the potential hot chunks for reducing the memory bandwidth pollution. We adopt the symmetric encryption algorithm to protect data confidentiality. Before mounting the UTrustDisk, we will run a trusted virtual domain based lightweight virtual machine for preventing information leakage. Besides, we prove formally that UTrustDisk can prevent sensitive data from leaking out. Experimental results show that our scheme's average writing throughput is 44.8% higher than that of NH scheme, and 316% higher than that of SHA-1 scheme. And the success rate of speculative caching mechanism is up to 94.5% since the access pattern is usually sequential.