• Title/Summary/Keyword: ad hoc

Search Result 2,481, Processing Time 0.036 seconds

Methodology for Computer Security Incident Response Teams into IoT Strategy

  • Bernal, Alejandro Enciso;Monterrubio, Sergio Mauricio Martinez;Fuente, Javier Parra;Crespo, Ruben Gonzalez;Verdu, Elena
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.5
    • /
    • pp.1909-1928
    • /
    • 2021
  • At present, the Colombian government shares information on threats or vulnerabilities in the area of cybersecurity and cyberdefense, from other government agencies or departments, on an ad-hoc basis but not in real time, with the surveillance entities of the Government of the Republic of Colombia such as the Joint Command of Cybernetic Operations (CCOCI) and the Cybernetic Emergencies Response Team of Colombia (ColCERT). This research presents the MS-CSIRT (Management System Computer Security Incident Response Teams) methodology, that is used to unify the guidelines of a CSIRT towards a joint communication command in cybersecurity for the surveillance of Information Technology (IT), Technological Operations (TO), Internet Connection Sharing (ICS) or Internet of Things (IoT) infrastructures. This methodology evaluates the level of maturity, by means of a roadmap, to establish a CSIRT as a reference framework for government entities and as a guide for the areas of information security, IT and TO to strengthen the growth of the industry 4.0. This allows the organizations to draw a line of cybersecurity policy with scope, objectives, controls, metrics, procedures and use cases for the correct coordination between ColCERT and CCOCI, as support entities in cybersecurity, and the different companies (ICS, IoT, gas and energy, mining, maritime, agro-industrial, among others) or government agencies that use this methodology.

A Study on the Zone-Key based Secure Routing Scheme in MANET (MANET에서 영역-키 기반 보안 라우팅 기법에 관한 연구)

  • Yang, Hwan Seok;Kim, Young Sun
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.33-39
    • /
    • 2020
  • In MANET consisting of only mobile nodes, all nodes serve as routes. However, the dynamic topology due to frequent movement of nodes degrades routing performance and is also cause of many security vulnerabilities. Therefore, security must be applied to routing techniques that can influence the performance of MANET. In this paper, we propose a technique for efficiently responding to various routing attacks and safe data transmission through application of zone-key based security routing techniques. A zone-based network structure was used, and a management node that manages member nodes in each zone was used in the proposed technique. In addition, the damage from the attacking node was minimized by issuing a key to each node and applying this to a routing technique. The zone management node issues a key for encryption routing information and manages the issuance information. A member node that wants to transmit data encrypts routing in formation using a key issued from the zone management node, and then performs path discovery using this. The improved performance of the proposed technique was confirmed through a comparative experiment with the CBSR and ARNA technique, excellent performance was confirmed through experiments.

QLGR: A Q-learning-based Geographic FANET Routing Algorithm Based on Multi-agent Reinforcement Learning

  • Qiu, Xiulin;Xie, Yongsheng;Wang, Yinyin;Ye, Lei;Yang, Yuwang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.11
    • /
    • pp.4244-4274
    • /
    • 2021
  • The utilization of UAVs in various fields has led to the development of flying ad hoc network (FANET) technology. In a network environment with highly dynamic topology and frequent link changes, the traditional routing technology of FANET cannot satisfy the new communication demands. Traditional routing algorithm, based on geographic location, can "fall" into a routing hole. In view of this problem, we propose a geolocation routing protocol based on multi-agent reinforcement learning, which decreases the packet loss rate and routing cost of the routing protocol. The protocol views each node as an intelligent agent and evaluates the value of its neighbor nodes through the local information. In the value function, nodes consider information such as link quality, residual energy and queue length, which reduces the possibility of a routing hole. The protocol uses global rewards to enable individual nodes to collaborate in transmitting data. The performance of the protocol is experimentally analyzed for UAVs under extreme conditions such as topology changes and energy constraints. Simulation results show that our proposed QLGR-S protocol has advantages in performance parameters such as throughput, end-to-end delay, and energy consumption compared with the traditional GPSR protocol. QLGR-S provides more reliable connectivity for UAV networking technology, safeguards the communication requirements between UAVs, and further promotes the development of UAV technology.

TCA: A Trusted Collaborative Anonymity Construction Scheme for Location Privacy Protection in VANETs

  • Zhang, Wenbo;Chen, Lin;Su, Hengtao;Wang, Yin;Feng, Jingyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.10
    • /
    • pp.3438-3457
    • /
    • 2022
  • As location-based services (LBS) are widely used in vehicular ad-hoc networks (VANETs), location privacy has become an utmost concern. Spatial cloaking is a popular location privacy protection approach, which uses a cloaking area containing k-1 collaborative vehicles (CVs) to replace the real location of the requested vehicle (RV). However, all CVs are assumed as honest in k-anonymity, and thus giving opportunities for dishonest CVs to submit false location information during the cloaking area construction. Attackers could exploit dishonest CVs' false location information to speculate the real location of RV. To suppress this threat, an edge-assisted Trusted Collaborative Anonymity construction scheme called TCA is proposed with trust mechanism. From the design idea of trusted observations within variable radius r, the trust value is not only utilized to select honest CVs to construct a cloaking area by restricting r's search range but also used to verify false location information from dishonest CVs. In order to obtain the variable radius r of searching CVs, a multiple linear regression model is established based on the privacy level and service quality of RV. By using the above approaches, the trust relationship among vehicles can be predicted, and the most suitable CVs can be selected according to RV's preference, so as to construct the trusted cloaking area. Moreover, to deal with the massive trust value calculation brought by large quantities of LBS requests, edge computing is employed during the trust evaluation. The performance analysis indicates that the malicious response of TCA is only 22% of the collaborative anonymity construction scheme without trust mechanism, and the location privacy leakage is about 32% of the traditional Enhanced Location Privacy Preserving (ELPP) scheme.

DEVS-based Modeling Simulation for Semiconductor Manufacturing Using an Simulation-based Adaptive Real-time Job Control Framework (시뮬레이션 기반 적응형 실시간 작업 제어 프레임워크를 적용한 웨이퍼 제조 공정 DEVS 기반 모델링 시뮬레이션)

  • Song, Hae-Sang;Lee, Jae-Young;Kim, Tag-Gon
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.3
    • /
    • pp.45-54
    • /
    • 2010
  • The inherent complexity of semiconductor fabrication processes makes it hard to solve well-known job scheduling problems in analytical ways, which leads us to rely practically on discrete event modeling simulations to learn the effects of changing the system's parameters. Meanwhile, unpredictable disturbances such as machine failures and maintenance diminish the productivity of semiconductor manufacturing processes with fixed scheduling policies; thus, it is necessary to adapt job scheduling policy in a timely manner in reaction to critical environmental changes (disturbances) in order for the fabrication process to perform optimally. This paper proposes an adaptive job control framework for a wafer fabrication process in a control system theoretical approach and implements it based on a DEVS modeling simulation environment. The proposed framework has the advantages in view of the whole systems understanding and flexibility of applying new rules compared to most ad-hoc software approaches in this field. Furthermore, it is flexible enough to incorporate new job scheduling rules into the existing rule set. Experimental results show that this control framework with adaptive rescheduling outperforms fixed job scheduling algorithms.

Determination Method of TTL for Improving Energy Efficiency of Wormhole Attack Defense Mechanism in WSN (무선 센서 네트워크에서 웜홀 공격 방어기법의 에너지 효율향상을 위한 TTL 결정 기법)

  • Lee, Sun-Ho;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.4
    • /
    • pp.149-155
    • /
    • 2009
  • Attacks in wireless sensor networks (WSN), are similar to the attacks in ad-hoc networks because there are deployed on a wireless environment. However existing security mechanism cannot apply to WSN, because it has limited resource and hostile environment. One of the typical attack in WSN is setting up wrong route that using wormhole. To overcome this threat, Ji-Hoon Yun et al. proposed WODEM (WOrmhole attack DEfense Mechanism) which can detect and counter with wormhole. In this scheme, it can detect and counter with wormhole attacks by comparing hop count and initial TTL (Time To Live) which is pre-defined. The selection of a initial TTL is important since it can provide a tradeoff between detection ability ratio and energy consumption. In this paper, we proposed a fuzzy rule-based system for TTL determination that can conserve energy, while it provides sufficient detection ratio in wormhole attack.

A Design of Sensor Web service Framework for Wireless Sensor Networks Environment (무선 센서 네트워크 환경에 대한 센서 웹 서비스 프레임워크의 설계)

  • Kim, Yong-Tae;Jeong, Yoon-Su;Park, Byung-Joo;Park, Gil-Cheol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.10
    • /
    • pp.123-131
    • /
    • 2009
  • In this paper, we design ZigBee RF based framework for mobile web service on collected data by sensor node and transmitting data to data base by sensor network and remote sensing server through wireless connection. The proposed system is an integrated platform of sensor network for the sensor management and providing SOA based sensor web access. This paper combines SOA technology with sensor network. composes sensor node as web view, and provides high capability. extensiveness, reliability, and usability to the user who accesses to sensor web. The mobile message conversion module, SOAP message processing module. WSDL message generator, and mobile web service module is embodied for improving the capacity of the framework. The capacity evaluation of local wireless communication system which is proposed in this paper is analyzed through NS-2 simulation.

Exploring Types of Elementary School Students' Failures in an Engineering Design Process and How Students Cope with Them (공학적 설계 과정에서 초등학생들이 마주하는 실패 경험과 이에 대한 대처 행동의 특징 탐색)

  • Sim, Ju Yeon;Park, Jisun
    • Journal of Korean Elementary Science Education
    • /
    • v.42 no.4
    • /
    • pp.577-590
    • /
    • 2023
  • This study explored types of failure encountered by elementary school students during the engineering design process and how they coped with them. To achieve this goal, we developed and taught engineering design lessons on water shortages to four fourth-grade classes, observing and interviewing seven focus groups. Our analysis revealed that student failures can be categorized into two main types: those caused by cognitive factors and those influenced by environmental factors. While cognitive failures are typically within students' control, environmental factors are beyond their reach. Our findings also showed that students tended to avoid discussing the root causes of failure and instead relied on ad hoc solutions. Additionally, some students lowered their expectations for success to avoid failure. Based on our findings, we offer practical recommendations for educators to help students learn from their failures in a constructive manner.

An Empirical Study on the Effects of Regulation in Online Gaming Industry via Vector Autoregression Model (벡터자기회귀(VAR) 모형을 활용한 온라인 게임 규제 영향에 대한 실증적 연구: 웹보드 게임을 중심으로)

  • Moonkyoung Jang;Seongmin Jeon;Byungjoon Yoo
    • Information Systems Review
    • /
    • v.19 no.1
    • /
    • pp.123-145
    • /
    • 2017
  • This study empirically examines the effects of regulation on online gaming. Going beyond ad hoc heuristic approaches on individual behavior, we investigate the effects of regulation on dynamic changes of games or service providers. In particular, we propose three theoretical perspectives: social influence to investigate the regulation effect, the role of prior experience to determine the difference in the regulation effect size through users' prior experience, and network externalities to discover the difference in the regulation effect size according to the number of users on an online gaming platform. We use the vector autoregression methodology to model patterns of the co-movement of online games and to forecast game usage. We find that online gamers are heterogeneous. Therefore, policy makers should make suitable regulations for each heterogeneous group to effectively avoid generating gaming addicts without interrupting the economic growth of the online gaming industry.

"Legal Study on Boundary between Airspace and Outer Space" (영공(領空)과 우주공간(宇宙空間)의 한계(限界)에 관한 법적(法的) 고찰(考察))

  • Choi, Wan-Sik
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.2
    • /
    • pp.31-67
    • /
    • 1990
  • One of the first issues which arose in the evolution of air law was the determination of the vertical limits of airspace over private property. In 1959 the UN in its Ad Hoc Committee on the Peaceful Uses of Outer Space, started to give attention to the question of the meaning of the term "outer space". Discussions in the United Nations regarding the delimitation issue were often divided between those in favour of a functional approach ("functionalists"), and those seeking the delineation of a boundary ("spatialists"). The functionalists, backed initially by both major space powers, which viewed any boundary as possibly restricting their access to space(Whether for peaceful or military purposes), won the first rounds, starting with the 1959 Report of the Ad Hoc Committee on the Peaceful Uses of Outer Space which did not consider that the topic called for priority consideration. In 1966, however, the spatialists, were able to place the issue on the agenda of the Outer Sapce Committee pursuant to Resolution 2222 (xxx1). However, the spatialists were not able to present a common position since there existed a variety of propositions for delineation of a boundary. Over the years, the funtionalists have seemed to be losing ground. As the element of location is a decisive factor for the choice of the legal regime to be applied, a purely functional approach to the regulation of activities in the space above the Earth does not offer a solution. It is therefore to be welcomed that there is clear evidence of a growing recognition of the defect inherent to such an approach and that a spatial approach to the problem is gaining support both by a growing number of States as well as by publicists. The search for a solution of the problem of demarcating the two different legal regimes governing the space above the Earth has undoubtedly been facilitated, and a number of countries, among them Argentina, Belgium, France, Italy and Mexico have already advocated the acceptance of the lower boundary of outer space at a height of 100km. The adoption of the principle of sovereignty at that height does not mean that States would not be allowed to take protective measures against space activities above that height which constitute a threat to their security. A parallel can be drawn with the defence of the State's security on the high seas. Measures taken by States in their own protection on the high seas outside the territorial waters-provided that they are proportionate to the danger-are not considered to infringe the principle of international law. The most important issue in this context relates to the problem of a right of passage for space craft through foreign air space in order to reach outer space. In the reports to former ILA Conferences an explanation was given of the reasons why no customary rule of freedom of passage for aircraft through foreign territorial air space could as yet be said to exist. It was suggested, however, that though the essential elements for the creation of a rule of customary international law allowing such passage were still lacking, developments apperaed to point to a steady growth of a feeling of necessity for such a rule. A definite treaty solution of the demarcation problem would require further study which should be carried out by the UN Outer Space Committee in close co-operation with other interested international organizations, including ICAO. If a limit between air space and outer space were established, air space would automatically come under the regime of the Chicago Convention alone. The use of the word "recognize" in Art. I of chicago convention is an acknowledgement of sovereignty over airspace existing as a general principle of law, the binding force of which exists independently of the Convention. Further it is important to note that the Aricle recognizes this sovereignty, as existing for every state, holding it immaterial whether the state is or is not a contracting state. The functional criteria having been created by reference to either the nature of activity or the nature of the space object, the next hurdle would be to provide methods of verification. With regard to the question of international verification the establishment of an International Satelite Monitoring Agency is required. The path towards the successful delimitation of outer space from territorial space is doubtless narrow and stony but the establishment of a precise legal framework, consonant with the basic principles of international law, for the future activities of states in outer space will, it is still believed, remove a source of potentially dangerous conflicts between states, and furthermore afford some safeguard of the rights and interests of non-space powers which otherwise are likely to be eroded by incipient customs based on at present almost complete freedom of action of the space powers.

  • PDF