• Title/Summary/Keyword: 위변조

Search Result 474, Processing Time 0.03 seconds

A Study on Security Routing using MD5 in MANET Environments (MANET 환경에서 MD5를 이용한 보안 라우팅에 관한 연구)

  • Lee, Cheol-Seung;Jung, Sung-Ok;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.728-731
    • /
    • 2008
  • Recently demands in construction of the stand-alone networks and interconnection between convergence devices have led an increase in research on IETF MANET working group, Bluetooth, and HomeRF working group and much attention has been paid to the application of MANET as a Ubiquitous network which is growing fast. With performance both as hosts and routers, easy network configuration, and fast response, mobile nodes participating in MANET are suitable for Embedded computing, but have vulnerable points, such as lack of network scalability and dynamic network topology due to mobility, passive attacks, active attacks, which make continuous security service impossible. For perfect MANET setting, routing is required which can guarantee security and efficiency through secure routing. In routing in this study, hashed AODV is used to protect from counterfeiting messages by malicious nodes in the course of path 'finding and setting, and disguising misrouted messages as different mobile nodes and inputting them into the network.

  • PDF

Hybrid TDMA and Binary CDMA System (TDMA와 Binary CDMA의 혼합 다중 접속 시스템)

  • 안호성;나성웅
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5A
    • /
    • pp.527-536
    • /
    • 2004
  • A novel hybrid multiple access system, TD-BCDMA, where Binary CDMA that maintains a constant amplitude by clipping the summation of input signals multiplied by the orthogonal codes is transmitted over a TDMA frame structure, was Nosed. In every time slot of TDMA, binary CDMA modulated multiple channel signals are transmitted with the same waveform of TDMA. TD-BCDMA has all the advantages of TDMA. Flexible adjustment of the data transmission rate In demand is possible by adjusting the number of codes and time slots assigned to each user. This property was used to show an example of Ad Hoc network applications. To obtain a proper synchronization scheme for TD-BCDMA, the Receiver Operating Characteristics performance and the false alarm probability and false dismissal probability under various channel environment of two different schemes, a preamble scheme as in TDMA and a synchronization channel scheme as in CDMA were compared. It was proved that the preamble scheme is more practical and suitable than the synchronization channel scheme for the hybrid multiple access system.

Design & Implementation of Drug Management System based on RFID (RFID기반의 특수의약품 추적관리 시스템 설계 및 구현)

  • Lee, Bong-Keun
    • The KIPS Transactions:PartD
    • /
    • v.13D no.7 s.110
    • /
    • pp.977-984
    • /
    • 2006
  • This paper is intended to trace and management of drug based on RFID Technology at a circulation market, from manufacturer to end user, of drug. To avoid counterfeit and generic drug and establish of order in the circulation of drug, at the moment of manufacturing, tags for each bottle and each box are tagged. and then from factory to hospital, through whole logistics, e-pedigree for the drug is made and monitored. Using inventory information, it is easy to manage and control stock of drug. In addition to, RFID System enables storing and delivery to be simple, process time to be shortened. As this research is to study of applying RFID to drug, in this paper, standard RFID code for drug is suggested and tried to apply domestic middle win. Finally, the result of tag pattern design and how to tag for the drug based on 90Mhz is proposed

Integrity Authentication Algorithm of JPEG Compressed Images through Reversible Watermarking (가역 워터마킹 기술을 통한 JPEG 압축 영상의 무결성 인증 알고리즘)

  • Jo, Hyun-Wu;Yeo, Dong-Gyu;Lee, Hae-Yeoun
    • The KIPS Transactions:PartB
    • /
    • v.19B no.2
    • /
    • pp.83-92
    • /
    • 2012
  • Multimedia contents can be copied and manipulated without quality degradation. Therefore, they are vulnerable to digital forgery and illegal distribution. In these days, with increasing the importance of multimedia security, various multimedia security techniques are studied. In this paper, we propose a content authentication algorithm based on reversible watermarking which supports JPEG compression commonly used for multimedia contents. After splitting image blocks, a specific authentication code for each block is extracted and embedded into the quantized coefficients on JPEG compression which are preserved against lossy processing. At a decoding process, the watermarked JPEG image is authenticated by extracting the embedded code and restored to have the original image quality. To evaluate the performance of the proposed algorithm, we analyzed image quality and compression ratio on various test images. The average PSNR value and compression ratio of the watermarked JPEG image were 33.13dB and 90.65%, respectively, whose difference with the standard JPEG compression were 2.44dB and 1.63%.

Light Weight Authentication and Key Establishment Protocol for Underwater Acoustic Sensor Networks (수중 음파 센서 네트워크 환경에 적합한 경량화된 인증 및 키 발급 프로토콜)

  • Park, Minha;Kim, Yeog;Yi, Okyoen
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.6
    • /
    • pp.360-369
    • /
    • 2014
  • Underwater Acoustic Sensor Networks(UASN) enables varied study from collected data of underwater environments such as pollution monitoring, disaster prevention. The collected data is transmitted from underwater to terrestrial communication entity by acoustic communication. Because of the constraints of underwater environments include low data rate and propagation delay, it is difficult to apply cryptographic techniques of terrestrial wireless communication to UASN. For this reason, if the cryptographic techniques are excluded, then collected data will be exposed to security threats, such as extortion and forgery, during transmission of data. So, the cryptographic techniques, such as the authentication and key establishment protocol which can confirm reliability of communication entities and help them share secret key for encryption of data, must need for protecting transmitted data against security threats. Thus, in this paper, we propose the light weight authentication and key establishment protocol.

PNC(Pipeline Network Coding)-Based Message and Node Authentication in Wireless Networks (무선 네트워크에서 파이프라인 네트워크 코딩 기반 메시지 및 노드 인증)

  • Ahn, Myeong-Gi;Cho, Young-Jong;Kang, Kyungran
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.5
    • /
    • pp.999-1008
    • /
    • 2017
  • In this paper, we propose a pipeline network coding (PNC) scheme for efficient data transmission in wireless networks, a data authentication scheme for verifying the integrity of data, and a node authentication scheme for a virtual source. PNC is a technique that improves the overall network performance by relaying data such that the relay node performing network coding transmits to the sender instead. However, network coding is vulnerable to a pollution attack, which is an attack by a malicious attacker to inject modified data into the network. To prevent this, hash-based message authentication code (HMAC) is used. For this purpose, in order to generate a tag used for data authentication, a key must be distributed to the nodes performing authentication. We applied a hash chain to minimize the overhead of key distribution. A null vector is used as the authentication scheme for the virtual source. Finally, we analyze the safety and complexity of the proposed scheme and show he performance through simulation.

e-Forensic Tool Research for Obtaining Legal Evidence Ability of Digital Evidence by Intelligence Inspection (디지털 증거물의 법적능력 확보를 위한 정보감사용 e-Forensic 툴 연구)

  • Kim, Seungyong;Kim, Gyeongyong;Hwang, Incheol;Kim, Dongsik
    • Journal of the Society of Disaster Information
    • /
    • v.13 no.2
    • /
    • pp.267-275
    • /
    • 2017
  • This research is about the development of e-forensic tool that extract & analyze different forms of digital evidence that individuals come across in a disaster scene. The tool utilizes digital forensic techniques which makes the tool efficient in any disaster analysis situation. In order for the forensic evidence to be selected as legal evidence, the evidence needs to be proven that it is in its original state with no forgery involved. This is where the e-forensic tool comes in, as its ability to collect digital evidence during investigation has proven; that the tool can keep the evidence in its original state and increase the integrity by generating hash TAG and adding the forensic evidence to a password encoded file.

Vulnerability Analysis on Digital Signature Function of Word Processors (워드프로세서의 전자서명 기능에 대한 취약성 분석)

  • Lee, Chang-Bin;Park, Sun-Woo;Lee, Kwang-Woo;Kim, Jee-Yeon;Nam, Jung-Hyun;Lee, Young-Sook;Won, Dong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.8
    • /
    • pp.109-118
    • /
    • 2011
  • Recently, electronic documents are deployed in many areas. However, trust concerns arise owing to the fact that detecting whether an electronic document is modified or not is not an easy process. To facilitate this process, many word processors provide digital signature capabilities on themselves. However, there were not much research on the security of digital signature function of various programs including Microsoft Word and Hancom Hangul. Therefore, in this paper, we analyze the security of Microsoft Word and Hancom Hangul, and propose improvements for their digital signature schemes.

All-Optical Gray Code to Binary Coded Decimal Converter (전광 그레이코드 이진코드 변환기)

  • Jung, Young-Jin;Park, Nam-Kyoo;Jhon, Young-Min;Woo, Deok-Ha;Lee, Seok
    • Korean Journal of Optics and Photonics
    • /
    • v.19 no.1
    • /
    • pp.60-67
    • /
    • 2008
  • An all-optical 4-bit Gray code to binary coded decimal (BCD) converter by means of commercially available numerical analysis tool (VPI) was demonstrated, for the first time to our knowledge. Circuit design approach was modified appropriately in order to fit the electrical method on an all-optical logic circuit based on a cross gain modulation (XGM) process so that signal degradation due to the non-ideal optical logic gates can be minimized. Without regenerations, Q-factor of around 4 was obtained for the most severely degraded output bit (least significant bit-LSB) with 2.5 Gbps clean input signals having 20 dB extinction ratio. While modifying the two-level simplification method and Karnaugh map method to design a Gray code to BCD converter, a general design concept was also founded (one-level simplification) in this research, not only for the Gray code to BCD converter but also for any general applications.

Integrated Photonic Channel Selective Microwave Bandpass Filter Incorporating a 1×2 Switch Based on Tunable Polymeric Ring Resonators (폴리머 링 공진기 기반의 스위치를 이용한 집적광학 채널 선택 마이크로웨이브 대역통과 필터)

  • Kim, Gun-Duk;Lee, Sang-Shin
    • Korean Journal of Optics and Photonics
    • /
    • v.18 no.1
    • /
    • pp.79-83
    • /
    • 2007
  • A reconfigurable photonic microwave (MW) channel selective filter was demonstrated incorporating a $1{\times}2$ switch based on two tunable polymeric resonators with different free spectral ranges. Each resonator, consisting of two cascaded rings with an electrode formed on one of them, plays a role as an on/off switch through the thermooptic effect. The optical signal carrying the MW signal is routed to either port of the switch and detected to show the filtered output at the frequency determined by the free spectral range of the corresponding resonator. When the channel centered at 10 GHz was chosen, the extinction ratio was ${\sim}30dB$, the bandwidth 1 GHz, and the electrical power consumption 4.1 mW. For the other channel located at 20 GHz, we have achieved the extinction ratio of ${\sim}30dB$, the bandwidth of 2 GHz, and the required power of 8.0 mW. Finally the crosstalk between the selected and blocked channels was higher than 24 dB.