• Title/Summary/Keyword: Attack

Search Result 6,391, Processing Time 0.042 seconds

Transaction Signing-based Authentication Scheme for Protecting Sinkhole Attack in Directed Diffusion based Wireless Sensor Networks (디렉티드 디퓨젼 기반의 무선 센서 네트워크에서의 싱크홀 공격을 막기 위한 트랜잭션 서명기법에 관한 연구)

  • Kim, Tae Kyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.3
    • /
    • pp.31-36
    • /
    • 2010
  • In this paper, We propose a transaction signing-based authentication scheme for protecting sinkhole attacks in wireless sensor networks. Sinkhole attack makes packets that flow network pass through attacker. So, Sinkhole attack can be extended to various kind of attacks such as denial of service attacks, selective delivery or data tamper etc. We analyze sinkhole attack methods in directed diffusion based wireless sensor networks. For the purpose of response to attack method, Transaction signing-based authentication scheme is proposed. This scheme can work for those sensor networks which use directed diffusion based wireless sensor networks. The validity of proposed scheme is provided by BAN logic.

Study on Hit Judgement Model of MMORPG - in case of Travia Online - (MMORPG 히트판정 모델에 관한 연구 - 트라비아 온라인을 중심으로 -)

  • Sohn Hyoung-Ryul
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.6
    • /
    • pp.172-177
    • /
    • 2005
  • Hit judgement is essential factor in design for battle-style MMORPG game system and sets foundation for other game systems. Hit judgement model consists of attack power and attack rate. The former contains minimum, maximum, and critical attack, the latter has miss, hit, and critical blow rate. Random function generates one value of attack rate and consequently the damage is calculated. In this article, we propose hit judgement model which Is widely acceptable for generic MMORPG and describe the effort of applying the proposed model to Travia Online in detail.

  • PDF

Durability Evaluation of concrete using fly ash (플라이애시 혼입 콘크리트의 내구성 평가)

  • 조명석;송영철;류금성;고경택;김성욱;이장화
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2002.05a
    • /
    • pp.755-760
    • /
    • 2002
  • The concrete structures in marine environment has been used type V cement(sulfate-resisting Portland cement), but according to the study results reported recently, the question has been raised for effect of the resistance to salt attack of the concrete using type V cement. It is increased the demands on the use of mineral admixtures such as fly ash, ground granulated blast-furnace slag instead of type V cement in order to improve the durability of concrete structures. Therefore, this study focused on the durability evaluation of concrete containing fly ash under marine environment, and the tests such as salt attack, carbonation, sulfate attack, and freezing-thawing were performed. Test results showed t]hat the resistance to salt attack, sulfate attack and freezing-thawing was improved, and the carbonation was in some disadvantage compared with normal concrete. Nevertheless, the durability of fly ash concrete would be maintained during the service life of structures.

  • PDF

Efficient and Secure Authenticated Key Exchange

  • Park Jong-Min
    • Journal of information and communication convergence engineering
    • /
    • v.3 no.3
    • /
    • pp.163-166
    • /
    • 2005
  • The Key exchange protocols are very crucial tools to provide the secure communication in the broadband satellite access network. They should be required to satisfy various requirements such as security, Key confirmation, and Key freshness. In this paper, Two authenticated key exchange protocols TPEKE-E(Two Pass Encrypted Key Exchange-Exchange-Efficient) and TPEKE-S(Two Pass Encrypted Key xchange-Secure) are introduced. A basic idea of the protocols is that a password can be represented by modular addition N, and the number of possible modular addition N representing the password is $2^N$. The TPEKE-E is secure against the attacks including main-in-the-middle attack and off-line dictionary attack, and the performance is excellent so as beyond to comparison with other authenticated key exchange protocols. The TPEKE-S is a slight modification of the TPEKE-E. The TPEKE-S provides computational in feasibility for learning the password without having performed off line dictionary attack while preserving the performance of the TPEKE-E.

An Estimating Mehod of the Angle of Attack of a Vertical V-type Otter Board (종만곡 V형 전개판의 영각 추정법)

  • Park, Hae-Hoon
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.41 no.2
    • /
    • pp.113-121
    • /
    • 2005
  • How to extimate the angle of attack of a vertical V-type cambered otter board was described. A three-dimensional semi-analytic treatment of a towing cable system was applied to the field experiments of a midwater trawl obtained by the Scanmar system. Also the equilibrium condition of the horizontal component and vertical component of forces and moment around the otter board was used. When the warp length was 300m long and the towing speed was between 2.61 and 3.86 knots, the estimated angle of attack of the otter board was ranged between $24.7^{\circ}$ and $26.2^{\circ}$, though the maximum lift force was at the angle of attack $22^{\circ}$.

A Simulation Analysis of Abnormal Traffic-Flooding Attack under the NGSS environment

  • Kim, Hwan-Kuk;Seo, Dong-Il
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1568-1570
    • /
    • 2005
  • The internet is already a part of life. It is very convenient and people can do almost everything with internet that should be done in real life. Along with the increase of the number of internet user, various network attacks through the internet have been increased as well. Also, Large-scale network attacks are a cause great concern for the computer security communication. These network attack becomes biggest threat could be down utility of network availability. Most of the techniques to detect and analyze abnormal traffic are statistic technique using mathematical modeling. It is difficult accurately to analyze abnormal traffic attack using mathematical modeling, but network simulation technique is possible to analyze and simulate under various network simulation environment with attack scenarios. This paper performs modeling and simulation under virtual network environment including $NGSS^{1}$ system to analyze abnormal traffic-flooding attack.

  • PDF

An SDN based hopping multicast communication against DoS attack

  • Zhao, Zheng;Liu, Fenlin;Gong, Daofu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2196-2218
    • /
    • 2017
  • Multicast communication has been widely used in the Internet. However, multicast communication is vulnerable to DoS attack due to static router configuration. In this paper, HMC, a hopping multicast communication method based on SDN, is proposed to tackle this problem. HMC changes the multicast tree periodically and makes it difficult for the attackers to launch an accurate attack. It also decreases the probability of multicast communication being attacked by DoS and in the meanwhile, the QoS constrains are not violated. In this research, the routing problem of HMC is proven to be NP-complete and a heuristic algorithm is proposed to solve it. Experiments show that HMC has the ability to resist DoS attack on multicast route effectively. Theoretically, the multicast compromised probability can drop more than 0.6 when HMC is adopt. In addition, experiments demonstrate that HMC achieves shorter average multicast delay and better robustness compared with traditional method, and more importantly, it better defends DoS attack.

Microstructural Observations on the deterioration of Concrete Structure for Wastewater Treatment Facilities Subjected to Chemical Attack (화학적 침식을 받은 하수처리시설 콘크리트 구조물의 성능저하에 대한 미세구조적 관찰)

  • Kim Seoung Soo;Lee Seung Tae;Park Kwang Pil;Bong Won Yong
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2005.11a
    • /
    • pp.547-550
    • /
    • 2005
  • Recently, there has been a intensive social interest for concrete structures with respect to durability by carbonation, chemical attack etc. Specially, the deterioration of concrete due to chemical attack in environments such as Wastewater Treatment Facilities is important factors degrading the durability of concrete structure. The purpose of this paper is to evaluate on deterioration of Wastewater Treatment Facilities concrete to chemical attack through instrumental analysis such as XRD, SEM and EDS. According to the results of this study. Wastewater Treatment Facilities concrete to chemical attack due to $So_{4}^{2-},\;Mg^{2+}$ ions founded out to appear deterioration materials peak : ettringite/thaumasite. gypsum and brucite peak.

  • PDF

Sulfate Attack on the Cation Type Accompanying $SO_4^{2-}$ (황산이온과 결합하는 양이온의 종류에 따른 황산염침식)

  • Moon, Han-Young;Kim, Seong-Soo;Jung, Ho-Seop;Lee, Seung-Tae;Kim, Jong-Pil;Koh, Joon-Ho
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2006.05b
    • /
    • pp.221-224
    • /
    • 2006
  • This paper reports a study carried out to investigate sulfate attack caused by cation type(sodium, magnesium) accompanying $SO_4^{2-}$ ions in sulfate solutions. The sulfate attack of mortar specimens was evaluate using the visual appearance, compressive strength loss and expansion. In addition, at the end of 360 days, the products of sulfate attack and the mechanism of attack were investigated through x-ray diffraction.

  • PDF

Collision Attack on Cellular Automata based Hash Function Applicable to Authentication on Online Game (온라인 게임 상의 사용자 인증에 적용 가능한 셀룰러 오토마타 기반 해쉬함수에 대한 충돌쌍 공격)

  • Lee, Chang-Hoon;Lee, Je-Sang;Cho, Sung-Eon;Kim, Tai-Hoon;Kim, Soo-Kyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.2
    • /
    • pp.299-308
    • /
    • 2009
  • In this paper, we. present a collision attack on hash function with 2-dimensional cellular automata[1], which is useful for providing authentication on online game. This attack can find a collision message pair with $2^{28}$ computation using property of nonlinear function. We also extend basic attack with probability $2^{-28}$ to improve attack with probability 1 using Wang's analysis technique.