• Title/Summary/Keyword: 무결성 검사

Search Result 67, Processing Time 0.024 seconds

Evaluation of Software Diagnostics for Secure Operational Environment in Nuclear I&C systems (원전 계측제어 시스템 보안성환경을 위한 진단기능 평가)

  • Yoo, Sung Goo;Seul, Namo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.8
    • /
    • pp.107-112
    • /
    • 2016
  • Safety Critical Instrumentation and Control Systems perform those functions to maintain nuclear power plants' parameters within acceptable limits established for a design basis events and anticipated operating occurrence to ensure safety function. Those digitalized systems shall protect inadvertent and non-malicious behavior to ensure the reliable operation of systems, known as a Secure Development and Operational Environment(SDOE). SDOE would be established through managerial and technical controls. The objective of this paper is to evaluate the effectiveness of Cyclic Redundancy Checksum diagnostic, which is one of technical controls for SDOE, that can confirm the integrity of software of I&C systems to establish the secure environment. The results of this assessment would be the practical implementation of design and safety review of nuclear I&C systems.

Robust watermarking technique in geometric distortion and authentication of digital images (기하학적인 변형에 강건한 워터마킹 기법과 디지털 영상의 인증)

  • Lee, Na-Young;Kim, Won;Kim, Gye-Young; Choi, Hyung-Il
    • The KIPS Transactions:PartB
    • /
    • v.10B no.4
    • /
    • pp.367-372
    • /
    • 2003
  • The existing watermarking techniques for copyright protection of a digital image are fragile in geometric distortion and it is hard to detect whether it was manipulated artificially. In this paper, we proposed the new copyright protection system that can authorize a digital mage and :an embed or extract a robust watermark in a artificial manipulation in order to solve these problems. In a watermarking part, the proposed a watermarking technique embeds a watermark in a phase component after a Complex Wavelet Transform (CWT) with an original image, and a watermark is extracted from an watermarked image by stages. A copyright about an image can be insisted on than a threshold after comparing a correlation of an original watermark with an extracted watermark if large. In an authentication part of a digital image, EZW (Embedded Zerotree Wavelet) is used, and an authentication cord of an watermarked image is generated. An authentication code of an image to have been distribute to is compared with a generated authentication cord, and artificial operation isn´t than a threshold if large. The proposed copyright protection system through performance evaluation display that it was robust in geometric distortion and a artificial operation was able to be detected.

A Study on Efficient Tamper Detection of Digital Image (디지털 영상의 효율적인 변형 검출에 관한 연구)

  • Woo, Chan-Il;Lee, Seung-Dae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.196-201
    • /
    • 2016
  • Digital watermarking is a technique used to hide information within digital media. Digital watermarking techniques can be classified as either robust watermarking or fragile watermarking. Robust watermarking techniques are generally used for the purpose of copyright protection. In addition, fragile watermarking techniques are used for the authentication and integrity verification of a digital image. Therefore, fragile watermarks should be easily breakable for trivial tampering of a watermarked image. This paper proposes an efficient fragile watermarking method for image tamper detection in the spatial domain. In the proposed method, a hash code and symmetric key encryption algorithm are used. The proposed method of inserting a watermark by dividing the original image into many blocks of small sizes is not weak against attacks, such as cut and paste. The proposed method can detect the manipulated parts of a watermarked image without testing the entire block of the image.

Vulnerability Analysis and Improvement in Man-in-the-Middle Attack for Remote User Authentication Scheme of Shieh and Wang's using Smart Card (Shieh and Wang's의 스마트카드 상호인증 스킴에 대한 중간자공격 개선)

  • Shin, Kwang-Cheul
    • The Journal of Society for e-Business Studies
    • /
    • v.17 no.4
    • /
    • pp.1-16
    • /
    • 2012
  • Shieh and Wang [10] recently proposed an efficient mutual authentication scheme that combined the cost-effectiveness of operations of Lee et al. [6]. scheme and the security and key agreement of Chen and Yeh scheme. Shieh and Wang [10] scheme, however, does not satisfy the security requirements against a third party (the man-in the middle, attacker) that have to be considered in remote user authentication scheme using password-based smart cards. Shieh and Wang weaknesses are the inappropriateness that it cannot verify the forged message in 3-way handshaking mutual authentication, and the vulnerability that the system (server) secret key can easily be exposed. This paper investigates the problems of Shieh and Wang scheme in the verification procedure of the forged messages intercepted by the eavesdrop. An enhanced two-way remote user authentication scheme is proposed that is safe and strong against multiple attacks by adding the ability to perform integrity check on the server and proposed scheme is not expose user password information and the system's confidential information.

A Study on Security Analysis and Security Design for IPv6 Transition Mechanisms (IPv6 전환 기술의 보안 위협 분석 및 보안 설계에 대한 연구)

  • Choi, In-Seok;Kim, Young-Han;Jung, Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.11B
    • /
    • pp.689-697
    • /
    • 2005
  • The IETF has created the v6ops Working Group to assist IPv6 transition and propose technical solutions to achieve it. But it's quite problem which security consideration for a stage of IPv4/IPv6 transition and co-existence. There are new security problem threat that it caused by the characteristics of heterogeneity. In this paper, we describe IPv6 transition mechanisms and analyze security problem for IPv6 transition mechanism. also we propose security consideration and new security mechanism. We analyzed DoS and DRDoS in 6to4 environment and presented a address sanity check as a solution. We also showed an attack of address exhaustion in address allocation server. To solve this problem, we proposed challenge-response mechanism in DSTM.

Design of data integration model between hospitals for healthcare information collection (헬스케어 정보 수집을 위한 병원간 데이터 통합 모델 설계)

  • Jeong, Yoon-Su;Han, Kun-Hee
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.6
    • /
    • pp.1-7
    • /
    • 2018
  • As IT technology develops recently, medical equipment used in hospitals is demanding high performance. However, since the user visits different hospitals depending on the user's situation, the medical information treated at the hospital is distributed among the hospitals. In this paper, we propose a model to efficiently integrate the health care information of the users stored in the hospital in order to collect the healthcare information of the users who visited the different hospitals. The proposed model synchronizes users' healthcare information collected from personal wearable devices to collect user - centered healthcare information. In addition, the proposed model performs integrity and validity check related to user's healthcare information in a database existing in a cloud environment in order to smoothly share data with the healthcare service center. In particular, the proposed model enables tree - based data processing to smoothly manage healthcare information collected from mobile platforms.

Structural vulnerability analysis and improvement of a biometrics-based remote user authentication scheme of Li and Hwang's (Li & Hwang's 생체기반 인증스킴에 대한 취약성 분석 및 개선)

  • Shin, Kwang-Cheul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.7
    • /
    • pp.107-115
    • /
    • 2012
  • Recently, Li and Hwang scheme proposed a biometrics-based remote user authentication scheme using smart card. It is asserted that this scheme has very excellent benefits by the operation cost efficiency based on the smart card, one-way function and biometrics using random numbers. But this scheme cannot provide the properly authentication, especially, it is analyzed as the vulnerable security scheme for Denial-of-Service(DoS) attacks by impersonate attacks. The attacker controls the insecure channel, they can easily fabricate messages to pass the user's or server's authentication, and the malicious attacker can impersonate the user to cheat the server and can impersonate the server to cheat the user without knowing any secret information. This paper proposes the strong improved scheme which can respond to multiple attacks by supplementing the function of integrity check from the server which applied variable authenticator and OSPA without exposing the user's password information. It is supplemented pregnable of disguise attack and mutual authentication of Li and Hwang scheme.

UDRE Monitoring Analysis of Korean Satellite Navigation System (한국형 위성항법시스템의 UDRE 모니터링 분석)

  • Park, Jong-Geun;Ahn, Jongsun;Heo, Moon-Beom;Joo, Jung Min;Lee, Kihoon;Sung, Sangkyung;Lee, Young Jae
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.43 no.2
    • /
    • pp.125-132
    • /
    • 2015
  • This paper is about analysis of UDRE monitoring method for Korean Satellite navigation system, which is the correction parameter of satellite measurements. New receiver clock bias and tropospheric delay error estimation method to make pseudo-range residual for UDRE monitoring is proposed. Saastamoinen model and Neill mapping function are used for estimate the tropospheric delay and EKF is used for estimgate the receiver clock bias. Through the satellite measurements and regional weather data received directly from the domestic is using for UDRE monitoring analysis, more suitable UDRE monitoring threshold can be deducted and it is expected to be utilized for fault detection technique of Korean Satellite Navigation System.

Enhancing Installation Security for Naval Combat Management System through Encryption and Validation Research

  • Byeong-Wan Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.1
    • /
    • pp.121-130
    • /
    • 2024
  • In this paper, we propose an installation approach for Naval Combat Management System(CMS) software that identifies potential data anomalies during installation. With the popularization of wireless communication methods, such as Low Earth Orbit(LEO) satellite communications, various utilization methods using wireless networks are being discussed in CMS. One of these methods includes the use of wireless network communications for installation, which is expected to enhance the real-time performance of the CMS. However, wireless networks are relatively more vulnerable to security threats compared to wired networks, necessitating additional security measures. This paper presents a method where files are transmitted to multiple nodes using encryption, and after the installation of the files, a validity check is performed to determine if there has been any tampering or alteration during transmission, ensuring proper installation. The feasibility of applying the proposed method to Naval Combat Systems is demonstrated by evaluating transmission performance, security, and stability, and based on these evaluations, results sufficient for application to CMS have been derived.

Experimental Evaluation of the Effect of the Mixing Design Factors of the Cementitious Composite for 3D Printer on the Printing Quality (3D 프린터용 시멘트 복합체의 배합요인에 따른 출력 품질의 실험적 평가)

  • Seo, Ji-Seok;Kim, Yun-Yong
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.26 no.1
    • /
    • pp.89-96
    • /
    • 2022
  • In this paper, to evaluate the output quality of the cementitious composite mixture for printing with the ME method for construction 3D printer, visual inspection of the output appearance and the dimensional error rate, compressive strength and flexural strength of the output were measured. As a result of the test, the mixing design with excellent output appearance was P1-2, P1-4, P2-5, P2-6, and the mixing design with good output appearance was P0-1, P1-1, P1-3, P1-6, P1-7 and P2-4. Of these mixing designs, P0-1 and P2-6 had the lowest dimensional error rates As a result of evaluating the compressive strength and flexural strength of the various mixing designs, the Mixing design with excellent output designs showed good mechnical properties. However, mixing designs with excellent mechanical properties does not necessarily have excellent output quality. Therefore, in order to accurately evaluate the output quality, it is judged that visual inspection and dimensional error rate inspection should be performed first, and then the mechanical characteristics should be reviewed.