• Title/Summary/Keyword: Ajou protocol

Search Result 144, Processing Time 0.023 seconds

WhiteList-based DNP3 Intrusion Detection System for SCADA (SCADA 환경에서의 WhiteList 기반의 DNP3 Protocol 침입 탐지)

  • Kim, Myung-Jong;Kwon, Sung-Moon;Jo, Woo-Yeon;Shon, Tae-Shik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.10a
    • /
    • pp.228-231
    • /
    • 2016
  • 현재 한 번의 공격으로 많은 피해를 줄 수 있는 국가기반시설 위주의 제어시스템은 사이버 공격의 대상으로 가장 적합하다고 할 수 있다. 이에 대비해 제어시스템에서 주로 사용되는 DNP3는 한정적이고 반복된 트래픽을 주고받아 화이트리스트 기반 보안 기법이 사이버 공격으로부터 효과적으로 시스템을 보호할 수 있다. 본 논문에서는 제어시스템에 알려져 있는 취약점에 대해서 소개하고, 화이트리스트 보안 기법을 적용하고 규칙을 정의하여 이상 징후를 탐지하였다.

SE-OLSR: Secure Enhanced Optimized Link State Routing Protocol (보안이 향상된 OLSR 프로토콜)

  • Jeon, Min-Cheol;Kang, Suk-In;Kim, Jong-Uk;Hong, Man-Pyo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06d
    • /
    • pp.105-108
    • /
    • 2011
  • OLSR(Optimized Link State Routing) 프로토콜은 모바일 애드 혹 네트워크(Mobile Ad hoc Networks)에서 사용되는 프로액티브(proactive) 프로토콜이다. OLSR에서는 각 노드가 자신의 MPR(multi-point relay) 노드를 선정하고, MPR 노드를 통해 모든 메시지를 전달한다. 만약 공격자가 네트워크 정보를 조작 하여 자신이 다른 노드들의 MPR로 선정되도록 한다면, 공격자는 주변의 노드의 메시지를 폐기시킬 수 있다. 본 논문에서는 이러한 OLSR의 취약점을 보안하기 위한 SE-OLSR(Secure Enhanced OLSR) 프로토콜을 제안한다.

Realization of DGPS using Mobile Phone and Internet (이동전화와 인터넷을 이용한 DGPS 보정항법 시스템)

  • Ko, Sun-Jun;Won, Jong-Hoon;Park, Hun-Joon;Lee, Ja-Sung
    • Proceedings of the KIEE Conference
    • /
    • 2000.07d
    • /
    • pp.2359-2361
    • /
    • 2000
  • This paper presents a practical method of realizing Differential GPS(DGPS) using an effective communication link. The DGPS technique is used to correct user's pseudorange measurements with trasmintted correction data from the reference station. An effective communication system is the key element for successful application of the DGPS. In this paper, a practical method for efficient data communication link for DGPS using mobile phone and TCP/IP protocol is presented. Its performance is verified via field test.

  • PDF

Device Authentication Protocol for LR-WPAN using Pre-Authentication Mechanism (LR-WPAN에서 사전인증기법을 이용한 기기 인증 프로토콜)

  • Lee, Sung-Hyung;Kim, Jae-Hyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.4
    • /
    • pp.63-72
    • /
    • 2010
  • This paper proposes a new authentication protocol for the LR-WPAN. In order to guarantee the reliability and safety of a protocol, this protocol uses the hierarchical authentication approach. In addition, in order to reduce the impact of the denial of service attack, the proposed protocol performs the authentication between a parent router and a joiner device prior to the authentication between a trust center and the joiner device. Moreover, this protocol reduces the authentication delay by decreasing the number of message exchanges during authentication procedure. This paper evaluates the safety of the proposed protocol by the security analysis and reliability of the proposed protocol by the GNY analysis. This paper also compares the number of message exchanges of the ZigBee authentication protocol and the proposed protocol when denial of service attack occurs to evaluate the resistance of the proposed protocol against the denial of service attack. We also analyze the delay for authentication of the joiner device through the implementation of both protocols. Those results show that the proposed protocol effectively protects networks from the denial of service attack and reduces the time for authenticating the joiner device up to maximum 30% as the number of hops increases.

Study of Hierarchical Routing Protocol of Suggest to End Node in IP-USN (IP-USN에서 END 노드를 고려한 계층적 라우팅 프로토콜 연구)

  • Park, Jun-Sung;Kim, Ki-Hyung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.802-805
    • /
    • 2007
  • IP-USN은 U-city와 같이 대규모 혹은 모든 전자 장비에 IP기반의 서비스를 지원해줄 중요한 기술이다. IP-USN에서 IP의 할당과 무선 Ad-hoc 라우팅은 IP-USN의 핵심기술로 소형, 전력인 센서네트워크에서 중요고려 대상이다. 본 End 노드를 고려한 계층적 라우팅 프로토콜은 IP 할당 및 메모리를 최소화하는 주소할당 기법과 계층적 라우팅을 제안한다.

  • PDF

Method for Inferring Format Information of Data Field from CAN Trace (CAN 트레이스 분석을 통한 데이터 필드 형식 추론 방법 연구)

  • Ji, Cheongmin;Kim, Jimin;Hong, Manpyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.167-177
    • /
    • 2018
  • As the number of attacks on vehicles has increased, studies on CAN-based security technologies are actively being carried out. However, since the upper layer protocol of CAN differs for each vehicle manufacturer and model, there is a great difficulty in researches such as developing anomaly detection for CAN or finding vulnerabilities of ECUs. In this paper, we propose a method to infer the detailed structure of the data field of CAN frame by analyzing CAN trace to mitigate this problem. In the existing Internet environment, many researches for reverse engineering proprietary protocols have already been carried out. However, CAN bus has a structure difficult to apply the existing protocol reverse engineering technology as it is. In this paper, we propose new field classification methods with low computation-cost based on the characteristics of data in CAN frame and existing field classification method. The proposed methods are verified through implementation that analyze CAN traces generated by simulations of CAN communication and actual vehicles. They show higher accuracy of field classification with lower computational cost compared to the existing method.

A Sextant Cluster Based Monitoring on Secure Data Aggregation and Filtering False Data in Wireless Sensor Networks (무선센서 네트워크에서의 육분원 방식 모니터링 기반 안전한 데이터 병합 및 위조 데이터 필터링)

  • Boonsongsrikul, Anuparp;Park, Seung-Kyu;Shin, Seung-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.2
    • /
    • pp.119-126
    • /
    • 2012
  • Local monitoring is an effective technique in securing data of wireless sensor networks. Existing solutions require high communication cost for detecting false data and this results in a network lifetime being shortened. This paper proposes novel techniques of monitoring based secure data aggregation and filtering false data in wireless sensor networks. The aim is to reduce energy consumption in securing data aggregation. An aggregator and its monitoring node perform data aggregation in a 60o sextant cluster. By checking Message Authentication Codes (MAC), aggregation data will be dropped by a forward aggregator if data aggregated by the aggregator and data monitored by the monitoring node are inconsistent. The simulation shows that the proposed protocol can reduce the amount of average energy consumption about 64% when comparing with the Data Aggregation and Authentication protocol (DAA)[1]. Additionally, the network lifetime of the proposed protocol is 283% longer than that of DAA without any decline in data integrity.

Security Verification of a Communication Authentication Protocol in Vehicular Security System (자동차 보안시스템에서 통신 인증프로토콜의 보안성 검증)

  • Han, Myoungseok;Bae, WooSik
    • Journal of Digital Convergence
    • /
    • v.12 no.8
    • /
    • pp.229-234
    • /
    • 2014
  • Vehicular electronic communication system has continued to develop in favor of high performance and user convenience with the evolution of auto industry. Yet, due to the nature of communication system, concerns over intruder attacks in transmission sections have been raised with a need for safe and secure communication being valued. Any successful intruder attacks on vehicular operation and control systems as well as on visual equipment could result in serious safety and privacy problems. Thus, research has focused on hardware-based security and secure communication protocols. This paper proposed a safe and secure vehicular communication protocol, used the formal verification tool, Casper/FDR to test the security of the proposed protocol against different types of intruder attacks, and verified that the proposed protocol was secure and ended without problems.

Improved AODV Routing Protocol Considering the Link Quality of Wireless Transmission Environments (무선 전송환경의 링크품질을 고려한 개선된 AODV 라우팅프로토콜)

  • Lee, Tae-Hoon;Jeun, Sung-Woo;Kim, Young-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.10
    • /
    • pp.1903-1911
    • /
    • 2016
  • As interest in MANET is increasing nowadays, research upon an efficient MANET routing protocol is actively under way. A LQA(Link Qualty Aware)-AODV routing protocol to deal with frequent changes of topology and wireless link variations under tactical operating conditions is proposed in this paper. The suggested LQA-AODV takes into account the channel capacity of each hop during the route request process of the traditional AODV protocol. In detail, LQA-AODV adds a channel capacity cost value to the RREQ message format that occurs during the routing process of the existing AODV Routing Protocol causing the accumulated channel capacity cost values of each sections to be compared before establishing a route. To verify the performance of LQA-AODV, NS2.35 was utilized and the Link-Quality Model was applied in order to reflect the tactical wireless environment. The simulation compares and analyzes LQA-AODV and the existing AODV, showing a large improvement over the traditional AODV in regards to the Packet Delivery Ratio, and End-to-End Delay.