• Title/Summary/Keyword: 허위정보

Search Result 139, Processing Time 0.029 seconds

Interleaved Hop-by-Hop Authentication in Wireless Sensor Network Using Fuzzy Logic to Defend against Denial of Service Attack (인터리브드 멀티홉 인증을 적용한 무선 센서네트워크에서 퍼지로직을 이용한 서비스 거부 공격에 대한 방어 기법)

  • Kim, Jong-Hyun;Cho, Tac-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.3
    • /
    • pp.133-138
    • /
    • 2009
  • When sensor networks are deployed in open environments, an adversary may compromise some sensor nodes and use them to inject false sensing reports. False report attack can lead to not only false alarms but also the depletion of limited energy resources in battery powered networks. The Interleaved hop-by-hop authentication (IHA) scheme detects such false reports through interleaved authentication. In IHA, when a report is forwarded to the base station, all nodes on the path must spend energies on receiving, authenticating, and transmitting it. An dversary can spend energies in nodes by using the methods as a relaying attack which uses macro. The Adversary aim to drain the finite amount of energies in sensor nodes without sending false reports to BS, the result paralyzing sensor network. In this paper, we propose a countermeasure using fuzzy logic from the Denial of Service(DoS) attack and show an efficiency of energy through the simulataion result.

A Key Redistribution Method for Enhancing Energy Efficiency in Dynamic Filtering based Sensor Networks (동적 여과 기법 기반 센서 네트워크의 에너지 효율을 높이기 위한 키 재분배 결정 방법)

  • Sun, Chung-Il;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.1
    • /
    • pp.125-131
    • /
    • 2010
  • In wireless sensor networks application, sensor nodes are randomly deployed in wide and opened environment typically. Since sensor networks have these features, it is vulnerable to physical attacks in which an adversary can capture deployed nodes and use them to inject a fabricated report into the network. This threats of network security deplete the limited energy resource of the entire network using injected fabricated reports. A dynamic en-route filtering scheme is proposed to detect and drop the injected fabricated report. In this scheme, node executes the key redistribution to increases the detection power. It is very important to decide the authentication key redistribution because a frequent key redistribution can cause the much energy consumption of nodes. In this paper, we propose a key redistribution determining method to enhance the energy efficiency and maintain the detection power of network. Each node decides the authentication key redistribution using a fuzzy system in a definite period. The proposed method can provide early detection of fabricated reports, which results in energy-efficiency against the massive fabricated report injection attacks.

21세기의 사이버 군대와 대리전쟁

  • O, Je-Sang
    • Defense and Technology
    • /
    • no.7 s.257
    • /
    • pp.38-43
    • /
    • 2000
  • 전문가들은 예측하기를 미래의 전장은 적을 육안으로 거의 보지 못하고 싸우게 될 것이라 한다. 그리고 군사적으로 주요 요충지마다 로봇 병사가 지키게 될 것이다. 미래전쟁체계는 컴퓨터를 기반으로 하는 체계들로 구성되어 있기 때문에 컴퓨터 체계자체를 지키는 보안 및 안정성이 중요한 무기로 등장할 것이다. 적군의 컴퓨터 해커가 상대의 컴퓨터를 마비시키는 바이러스, 칩변조, 소프트웨어 변조, 시한폭탄 소프트웨어 바이러스, 허위정보 등을 투입할 수도 있다

  • PDF

A Study on the Usability of Mobile Real Estate Service Search Filter and Information Quality -Focused on domestic, US and UK cases- (모바일 부동산 서비스 검색 필터와 정보품질에 관한 연구 -국내, 미국, 영국 사례를 중심으로-)

  • Choi, Yoo Jin;Kim, Seung-In
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.9
    • /
    • pp.249-254
    • /
    • 2017
  • The purpose of this study is to provide a way to develop the information quality of mobile real estate service and improve the false property through search filter service. I compared the cases of typical mobile real estate apps that are currently in use and analyzed the usage and service status by adopting 13 search filters that are the first priority when searching for real estate information. As a result, it has been shown that the provision of high quality search filter service is required to improve the information quality in order to provide users with quick and reliable information organically at any time and anywhere according to the definition of mobile real estate service. As a result, it is more prejudiced than the countermeasures against false fraudulent products, and it is satisfied with the needs of the users and provides the improved search filter service, so that it can be trusted with the definition of mobile real estate brokerage service, Providing quality services can be said to prevent the victims of fraudulent products.

Solution for Prevention of illegal Medical Advertisement (허위·과장 의료광고 예방을 위한 제언)

  • Jeun, Young-Ju
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2017.01a
    • /
    • pp.99-102
    • /
    • 2017
  • illegal medical advertisement have been on the rise, and false and exaggerated medical advertising are increasing the damage to medical consumers. Therefore it is urgent to take countermeasures about this. Thus, this paper try to analyzes the characteristics of general commercial and other medical advertisements and looks for alternatives that can minimize the damage caused by illegal medical advertisements and institutional weaknesses by analyzing the regulatory trends in medical advertising.

  • PDF

A Design of Estimate-information Filtering System using Artificial Intelligent Technology (인공지능 기술을 활용한 부동산 허위매물 필터링 시스템)

  • Moon, Jeong-Kyung
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.115-120
    • /
    • 2021
  • An O2O-based real estate brokerage web sites or apps are increasing explosively. As a result, the environment has been changed from the existing offline-based real estate brokerage environment to the online-based environment, and consumers are getting very good feelings in terms of time, cost, and convenience. However, behind the convenience of online-based real estate brokerage services, users often suffer time and money damage due to false information or malicious false information. Therefore, in this study, in order to reduce the damage to consumers that may occur in the O2O-based real estate brokerage service, we designed a false property information filtering system that can determine the authenticity of registered property information using artificial intelligence technology. Through the proposed research method, it was shown that not only the authenticity of the property information registered in the online real estate service can be determined, but also the temporal and financial damage of consumers can be reduced.

An Approach of False Data Identification Protocol for Minimum Communication Cost in Wireless Sensor Network (무선 센서 네트워크에서 최소 통신비용 수행을 위한 허위 데이터 식별 프로토콜)

  • Boonsongsrikul, Anuparp;Park, Seung-Kyu;Shin, Seung-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.10
    • /
    • pp.121-129
    • /
    • 2011
  • In wireless sensor networks, a compromised sensor node can inject false data during data aggregation. Existing solutions of securing data aggregation require high communication cost in securing data aggregation. In this paper, we propose a monitoring-based secure data aggregation protocol that minimizes communication cost of identifying the location of false data injection attacks. The main idea is that when monitoring nodes find an injected false data, their reporting messages along with Message Authentication Codes (MACs) are summarized in a single message before sending it to the Base Station (BS). Then the BS identifies the attacking node. The simulation shows that energy consumption of the proposed protocol with short and normal concatenations of MACs are 45% and 36% lower than that of an existing protocol, respectively.

Analysis of Incarceration Attacks with RRCReject and RRCRelease in 5G Standalone Non-Public Network

  • Kim, Keewon;Park, Jong-Geun;Park, Tae-Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.10
    • /
    • pp.93-100
    • /
    • 2021
  • In this paper, the possibility of a UE (User Equipment) incarceration attack using RRCRejecet and RRCRelease in 5G SNPN (Standalone Non-Public Network) is analyzed based on the 3GPP standard document. First, the cell selection and reselection procedures of the UE are analyzed, and then the processing process of the false base station and the UE before and after transmission of RRCReject and RRCRelease is analyzed. As a result of the analysis, it is possible that the false base station that transmits a strong signal causes the victim UE to establish an RRC connection to the false base station itself. In addition, if the false base station transmits an RRCReject message without integrity protection in response to the victim UE's attempt to establish an RRC connection, it is determined that the victim UE can continue to stay in the RRC connection attempt process. On the other hand, it is determined that it is impossible to incarcerate the victim UE by inducing an attempt to establish an RRC connection to another false base station using RRCRelease.

A Proposed Private Blockchain System for Preserving Evidence of False Internet Communications (인터넷 허위통신 신고의 증거물 보존을 위한 프라이빗 블록체인 시스템 제안)

  • Bae, Suk-Min;Yang, Seong-Ryul;Jung, Jai-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.11
    • /
    • pp.15-21
    • /
    • 2019
  • Allowing only authorized users to record and inquire in the ledger, private blockchain technology is attracting attention from institutions and companies. Based on distributed ledger technology, records are immutable. Because news via the Internet can be easily modified, the possibility of manipulation is high. Some false communication report systems are designed to prevent such harm. However, during the gap between the false communication report and verification time, contents on the website can be modified, or false evidence can be submitted intentionally. We propose a system that collects evidence using a headless browser for more accurate false communication management, and securely preserves evidence through a private blockchain and prevents possibilities of manipulation. The proposed system downloads original HTML, captures the website as an image, stores it in a transaction along with the report, and stores it in a private blockchain to ensure the integrity from acquisition to preservation of evidence.

Study on Characteristics and User Reactions of Videos Related to COVID-19 Vaccine (코로나19 백신 관련 영상의 특성 및 이용자 반응에 대한 연구)

  • Lee, Mina;Hong, Juhyun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.3
    • /
    • pp.163-171
    • /
    • 2021
  • This study aimed to investigate the main characteristics of the COVID-19 vaccine-related videos spread on YouTube and differences in user responses in the infodemic situation caused by COVID-19. As a result of content analysis of 579 videos related to the COVID-19 vaccine, it was found that all of the false information was written by individual channels. Institutions, organizations, media companies, and government channels reported spread of false information as well as fact-oriented reporting. The progressive channel had a high percentage of positive sentiment in favor of vaccination, and the conservative channel had a high percentage of negative emotion against vaccination. After the vaccination started, the number of videos on government channels increased, and it was found that the number of videos with positive emotions increased. Results of regression analysis of video characteristics that affect the number of likes indicated that personal expert videos and videos from progressive channels received more likes. Combining the research results, we propose a plan to promote government policies regarding the COVID-19 vaccine using social media.