• Title/Summary/Keyword: ATTACK AREA

Search Result 347, Processing Time 0.03 seconds

Channel-Hopping Scheme for Enhancing Fairness Performance under Smart Jammer Attacks in Tactical WLANs (전술 무선랜 재밍 환경에서의 형평성 성능 향상을 위한 채널도약 기법)

  • Kim, Yongchul
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.11
    • /
    • pp.2188-2195
    • /
    • 2015
  • In tactical wireless local area networks, jamming attack can easily occur by sending out continuous radio signals. The damage will be serious when the channel frequency is identical. Since wireless channel environment is open to everyone, the perfect solution for jamming attack does not exist. However, a channel-hopping scheme is well known for mitigating those jamming attacks. In this paper, I consider various channel-hopping schemes in order to analyze the throughput and fairness performance under smart jammer attack. Also an analytical model is introduced to evaluate the throughput performances of channel-hopping schemes. After analyzing well known channel-hopping schemes, I propose a simple channel-hopping scheme that can enhance fairness significantly at minimal throughput degradation expense.

Surface pressure measurement on a wing of SWIM by using PSP (PSP를 이용한 항공기 형상 모형 날개 표면 압력 측정)

  • Jung, Hye-Jin;Kwon, Kijung
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.36 no.4
    • /
    • pp.337-345
    • /
    • 2008
  • this study, three dimensional surface pressure distributions of SWIM whose main wing has NACA4412 airfoil with NACA0012 flaps were experimentally measured by pressure sensitive paint. Surface pressures on suction and pressure sides of the wing were measured by changing an angle of attack at a Reynolds number of 3.1x105 in KARI 1m subsonic wind tunnel. The experimental results showed that as an angle of attack increases minimum pressure region on a suction side moved from the wing root to the tip and low pressure region around trailing edge of the wing tip which causes wing tip vortex was observed. Although low pressure region at the tip still observed at an angle of attack 15 deg., other area on a suction side showed flat pressure distribution in a span-wise direction. It was also observed that the mean value of pressure coefficients was about 0.077 through a comparison between PSP and pressure taps at the same test conditions.

Distribution Properties of Airborne Chlorides in Korea (우리나라의 비래염분 분포 특성)

  • Lee, Jong-Suk;Ahn, Ki-Hong;Kim, Do-Gyeum;Park, Jung-Jun
    • Journal of the Korea Concrete Institute
    • /
    • v.22 no.6
    • /
    • pp.769-776
    • /
    • 2010
  • Concrete structures immersed in seawater are exposed to uniform chloride concentration. However, seashore concrete structures are subjected to various airborne chlorides concentration depending on areas, distance from seashore, orientation of structures and wind direction etc. Therefore, structures which is not coming into direct contact with seawater are greatly affected by salt attack and those cases have been reported. This study intends to investigate salt attack by airborne chlorides in terms of the distance from the seashore based on the measurements conducted at 73 spots and 27 areas during 3 years in the Eastern, Western and Southern coasts of South Korea. Results revealed large regional variations of the salinity in coastal regions along with significant seasonal effects caused by seasonal winds. Moreover, the salinity is seen to diminish as the distance from the seashore increases at a rate corresponding to the function $y=ax^{-b}$. These results will be helpful to do the durability design and management of seashore structures.

Security Risks Evaluation based on IPv6 Firewall Rules (IPv6의 방화벽 규칙을 기반으로한 보안위험 평가)

  • Phang, Seong-Yee;Lee, Hoon-Jae;Lim, Hyo-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.261-264
    • /
    • 2008
  • IPv6 has been proposed and deployed to cater the shortage of IPv4 addresses. It is expected to foresee mobile phones, pocket PCs, home devices and any other kind of network capable devices to be connected to the Internet with the introduction and deployment of IPv6. This scenario will bring in more challenges to the existing network infrastructure especially in the network security area. Firewalls are the simplest and the most basic form of protection to ensure network security. Nowadays, firewalls' usage has been extended from not only to protect the whole network but also appear as software firewalls to protect each network devices. IPv6 and IPv4 are not interoperable as there are separate networking stacks for each protocol. Therefore, the existing states of the art in firewalling need to be reengineered. In our context here, we pay attention only to the IPv6 firewalls configuration anomalies without considering other factors. Pre-evaluation of security risk is important in any organization especially a large scale network deployment where an add on rules to the firewall may affect the up and running network. We proposed a new probabilistic based model to evaluate the security risks based on examining the existing firewall rules. Hence, the network administrators can pre-evaluate the possible risk incurred in their current network security implementation in the IPv6 network. The outcome from our proposed pre-evaluation model will be the possibilities in percentage that the IPv6 firewall is configured wrongly or insecurely where known attacks such as DoS attack, Probation attack, Renumbering attack and etc can be launched easily. Besides that, we suggest and recommend few important rules set that should be included in configuring IPv6 firewall rules.

  • PDF

Evaluation of Measles Vaccine Effectiveness in a Community Outbreak (지역사회 유행을 통하여 평가한 홍역 예방접종의 효과)

  • Park, Byung-Chan;Park, Sue-Kyung;Cheong, Hae-Kwan
    • Journal of Preventive Medicine and Public Health
    • /
    • v.35 no.1
    • /
    • pp.33-40
    • /
    • 2002
  • Objective : From an analysis of a community outbreak of measles in Youngju, Gyeongbuk, in March 2000, the authors evaluated the effectiveness of the measles vaccination and its determinants to Provide an epidemiologic basis for the establishment of a vaccination policy. Methods : Information was collected regarding the vaccinations from the health records of four primary schools and through a questionnaire surrey of the parents of students in two middle and two high schools (N=4638). Measles cases were surveyed from the patient list of each school and from case reports in the public health center. The attack rate and vaccine effectiveness of measles was evaluated by school; grade; frequency, region, and institution of vaccination. Results : The attack rate cf measles, 6.3% among the total subjects, was higher in middle school students (15.8%) than in primary (2.0%, p<0.05) and high school students (8.9%, p<0.05). The attack rate of the unvaccinated group was 4.6-fold higher than the vaccinated group in primary schools (p<0.05). Vaccine effectiveness was 83.2% among lower graders of primary schools, 34.0% among higher graders of primary schools,26.1% in middle schools, and -7.0% in high schools. In multiple logistic regression analysis, grade in school (odds ratio, 0.77; 95% CI=0.67-0.87) and frequency of vaccination (odds ratio, 0.57: 95% CI=0.37-0.58) were significant predictors of the outcome. Conclusions : We concluded that the explosive outbreak of measles in this area resulted from both inadequate vaccination coverage and secondary failure of vaccination. There was no evidence of any effect of the cold chain system on the vaccine failure.

Design of a Coordinator-based Intrusion Detection System in Ubiquitous Sensor Network Environment (USN환경에서 코디네이터 기반의 침입탐지시스템 설계)

  • Kim, Hwang-Rae;Kang, Yeon-I
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.3
    • /
    • pp.984-990
    • /
    • 2010
  • Zigbee sensor network technology to build a ubiquitous environment has an important role. However, Zigbee technology, sensing environmental information within the local area to deliver the information because it was designed for the purpose of simple tasks, Attack by a variety of technologies that could potentially compromise the network is very high. To solve this problems, many defense mechanisms are presented in a lot of papers. But, to attack the existing Zigbee various response measures for the implementation of the functionality of the sensor nodes very heavy and high expensive problem. To resolve this problems, with superior computing power Zigbee network coordinator to install, based coordinator to intrusion detection systems is proposed. Coordinator-based IDS(Intrusion Detection System) of the Zigbee network is detected attack, and present a new approach to resolve, possible applications in various fields, so in real life Zigbee technology is expected to contribute to graft.

Corrosion Resistance of Cr-bearing Rebar in Concrete Subjected to Carbonation and Chloride Attack (중성화와 염해의 복합 열화 환경하의 콘크리트 내에서의 Cr강방식철근의 방식성)

  • Tae, Sung-Ho
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.10 no.3
    • /
    • pp.115-122
    • /
    • 2006
  • Ten types of steel bars having different Cr contents were embedded in concretes with chloride ion contents of 0.3, 0.6, 1.2, and $2.4kg/m^3$ to fabricate specimens assuming such deteriorative environments. After being carbonated to the reinforcement level, these concretes were subjected to corrosion-accelerating cycles of heating/cooling and drying/wetting. The time-related changes in the corrosion area and corrosion loss of the Cr-bearing rebars were then measured to investigate their corrosion resistance. The results revealed that in a deteriorative environment prone to both carbonation and chloride attack, corrosion resistance was evident with a Cr content of 7% or more and 9% or more in concretes with chloride ion contents of 1.2 and $2.4kg/m^3$, respectively.

A New Key Protection Technique of AES Core against Scan-based Side Channel Attack (스캔 기반 사이드 채널 공격에 대한 새로운 AES 코아 키 보호 기술)

  • Song, Jae-Hoon;Jung, Tae-Jin;Park, Sung-Ju
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.1
    • /
    • pp.33-39
    • /
    • 2009
  • This paper presents a new secure scan design technique to protect secret key from scan-based side channel attack for an Advanced Encryption Standard(AES) core embedded on an System-on-a-Chip(SoC). Our proposed secure scan design technique can be applied to crypto IF core which is optimized for applications without the IP core modification. The IEEE1149.1 standard is kept, and low area and power consumption overheads and high fault coverage can be achieved compared to the existing methods.

A Lightweight Authentication Mechanism for Acknowledgment Frame in IEEE 802.15.4 (IEEE 802.15.4에서 확인 프레임을 위한 경량 인증 메커니즘)

  • Heo, Joon;Hong, Choong-Seon
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.3
    • /
    • pp.175-185
    • /
    • 2007
  • In IEEE 802.15.4 (Low-Rate Wireless Personal Area Network) specification, a successful reception and validation of a data or MAC command frame can be confirmed with an acknowledgment. However, the specification does not support security for acknowledgment frame; the lack of a MAC covering acknowledgments allows an adversary to forge an acknowledgment for any frame. This paper proposes an identity authentication mechanism at the link layer for acknowledgment frame in IEEE 802.15.4 network. With the proposed mechanism there is only three bits for authentication, which can greatly reduce overhead of device. The encrypted bit stream for identity authentication will be transmitted to device by coordinator within association process. Statistical method and simulation results prove that our mechanism is successful in handling MAC layer attack.

Physical Layer Security Method with CAN Bus Node ID Auto-Setting (CAN 버스에서 노드 ID 자동 설정을 통한 물리 계층 보안 기법)

  • Kang, Tae-Wook;Lee, Jong-Bae;Lee, Seongsoo
    • Journal of IKEEE
    • /
    • v.24 no.2
    • /
    • pp.665-668
    • /
    • 2020
  • When a node in automotive CAN bus is hacked, such node should be blocked to prevent severe danger in the car. In order to do that, such node should be uniquely identified. However, there is no way to identify individual nodes in a CAN bus. In this paper, a physical layer security method is proposed where individual nodes are identified by assigning unique ID to the nodes during booting process. The proposed method was implemented in a CAN controller using Verilog HDL, and it is verified that the node ID auto-setting and internal attack defense are successfully performed.