• Title/Summary/Keyword: Attack Chain

Search Result 94, Processing Time 0.025 seconds

RFID Tag's Security Level Based RFID Authentication Protocol (전자 태그의 보안 레벨을 기반으로 하는 RFID 인증 프로토콜)

  • Oh Soo-hyun;kwak Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6C
    • /
    • pp.593-600
    • /
    • 2005
  • Recently, RFID system is a main technology to realize ubiquitous computing environments. Because RFID system that is an automatic identification technology using radio frequency is a system to read and write the data of the entity. Therefore, many companies are interested in RFID system to reduce supply chain management and inventory control cost. However, for providing secure service, RFID authentication technology secure against tracking by an adversary is researched first. In this paper, we proposed security level based RFID authentication protocol providing reduce computational and communicational workload in the back-end database. The proposed protocol is secure against reply attack, spoofing attack, traffic analysis, and location privacy, since the proposed protocol based on the security of the hash function.

The Maritime Strategy of Continental Powered Country and Maritime Powered Country based on Attack and Defense theory (공격과 방어의 관점에서 본 해양국가와 대륙국가의 해양전략 - 냉전 기 미·소간 해양전략 및 탈냉전 기 미·중간 해양전략 비교 -)

  • Jung, Gwang-Ho
    • Strategy21
    • /
    • s.32
    • /
    • pp.160-191
    • /
    • 2013
  • This article is focused how the maritime strategy between continental powered country(the Soviet, the China) and maritime powered country(the U.S.) interact with attack and defense theory. We will know, what is the maritime strategy that the U.S. of military superiority has pursued with the point of view of attack, on the other hand, relatively what is the maritime strategy that the Soviet-Sino of military inferiority has pursued with the point of view of defense. In cold war, the Soviet has counteracted to 'blue belt defense' in active defense as to the U.S. 'sea strike' and in post cold war, the China counteract to 'A2/AD' as to the U.S. 'Air-Sea Battle'. The difference between the Soviet-Sino maritime strategy is that the China has emerged the second an economic power and their leadership has a strong's will to strengthen their navy's power. although the U.S. declare the pivot to Asia, the influence on Asia of the U.S. tend to decrease because of sequest. therefore, the China will seek to the more active defense beyond the first island chain. Meanwhile, the U.S. has reinforced of 'hub and spoke strategy' to solidify the U.S. formal allies to band together regional powers and to overcome the A2/AD challenge, the U.S. has been developed that the Air-Sea Battle concept meshes with Washington's 'rebalancing' policy toward the Asia-Pacific as its vital missions to safeguard core island or semi-island allies-namely, Korea and Japan-and crucial sea lanes of communication in the region are conducted mostly from or over the sea.

  • PDF

PNC(Pipeline Network Coding)-Based Message and Node Authentication in Wireless Networks (무선 네트워크에서 파이프라인 네트워크 코딩 기반 메시지 및 노드 인증)

  • Ahn, Myeong-Gi;Cho, Young-Jong;Kang, Kyungran
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.5
    • /
    • pp.999-1008
    • /
    • 2017
  • In this paper, we propose a pipeline network coding (PNC) scheme for efficient data transmission in wireless networks, a data authentication scheme for verifying the integrity of data, and a node authentication scheme for a virtual source. PNC is a technique that improves the overall network performance by relaying data such that the relay node performing network coding transmits to the sender instead. However, network coding is vulnerable to a pollution attack, which is an attack by a malicious attacker to inject modified data into the network. To prevent this, hash-based message authentication code (HMAC) is used. For this purpose, in order to generate a tag used for data authentication, a key must be distributed to the nodes performing authentication. We applied a hash chain to minimize the overhead of key distribution. A null vector is used as the authentication scheme for the virtual source. Finally, we analyze the safety and complexity of the proposed scheme and show he performance through simulation.

Evaluation of Measles Vaccine Effectiveness in a Community Outbreak (지역사회 유행을 통하여 평가한 홍역 예방접종의 효과)

  • Park, Byung-Chan;Park, Sue-Kyung;Cheong, Hae-Kwan
    • Journal of Preventive Medicine and Public Health
    • /
    • v.35 no.1
    • /
    • pp.33-40
    • /
    • 2002
  • Objective : From an analysis of a community outbreak of measles in Youngju, Gyeongbuk, in March 2000, the authors evaluated the effectiveness of the measles vaccination and its determinants to Provide an epidemiologic basis for the establishment of a vaccination policy. Methods : Information was collected regarding the vaccinations from the health records of four primary schools and through a questionnaire surrey of the parents of students in two middle and two high schools (N=4638). Measles cases were surveyed from the patient list of each school and from case reports in the public health center. The attack rate and vaccine effectiveness of measles was evaluated by school; grade; frequency, region, and institution of vaccination. Results : The attack rate cf measles, 6.3% among the total subjects, was higher in middle school students (15.8%) than in primary (2.0%, p<0.05) and high school students (8.9%, p<0.05). The attack rate of the unvaccinated group was 4.6-fold higher than the vaccinated group in primary schools (p<0.05). Vaccine effectiveness was 83.2% among lower graders of primary schools, 34.0% among higher graders of primary schools,26.1% in middle schools, and -7.0% in high schools. In multiple logistic regression analysis, grade in school (odds ratio, 0.77; 95% CI=0.67-0.87) and frequency of vaccination (odds ratio, 0.57: 95% CI=0.37-0.58) were significant predictors of the outcome. Conclusions : We concluded that the explosive outbreak of measles in this area resulted from both inadequate vaccination coverage and secondary failure of vaccination. There was no evidence of any effect of the cold chain system on the vaccine failure.

RFID Tag Ownership Transfer Protocol Using Lightweight Computing Operators (간단한 연산을 사용한 RFID 태그 소유권 이전 프로토콜)

  • Lee, Jae-Dong
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.12
    • /
    • pp.1413-1426
    • /
    • 2013
  • RFID thecnology has been widely adopted by industries for supply chain management. When a product item is manufactured RFID tag is attached to the product item and supply chain management among factories, distributors, retailers and customers needs to handle ownership transfer for the product item carefully. With RFID technology, the secure and efficient ownership transfer protocol is an important issue for the identification of product items and the overall system efficiency on supply chain. Many ownership transfer protocols have been proposed now. They have security problems and use complex operations such as encryption operation and hash function. Lo et al. proposed a protocol using lightweight operations such as shift, addition, XOR, and random number generation[1]. However, this protocol has a security problem in which the secret key between the tag and the new owner is disclosed to the attackers, and it is also weak against the Fraud attack[2]. In this paper, we propose a new ownership transfer protocol using lightweight operations such as shift, addition, and random number generation. This protocol is the modified version of Lo et al.'s protocol and is secure against the security attacks.

A Review on the Change in Submarine Roles in Naval Warfare: Based on Warfare Paradigm (전쟁 패러다임의 전환에 따른 잠수함의 역할 변화에 대한 고찰)

  • Jang, Jun-Seop
    • Strategy21
    • /
    • s.46
    • /
    • pp.89-122
    • /
    • 2020
  • The longing for submarine manufacture and the fear of her power had exited for a long time, but submarine that could submerge and attack was built from 20th century by science technology development. The question, 'Submarine can exercise her power in naval warfare?' had exited before World War I, but the effective value of submarine was shown in the procedure of a chain of naval warfare during World War I and World War II. Germany and the United States made the best use of submarines at that time. The submarines of these nations mounted fierce attack on the enemy's battleships and merchant ships and blocked the sea lanes for war material. These fierce attack on ships became impossible After World War II, and the major powers reduced and coordinated the defence budget, so they considered the role of submarine. However, submarine is still powerful weapon system because she can secretly navigate under the water, and one of the most important force in the navy. The aim of this thesis is analyzing submarine roles in each naval warfare and integrating maritime strategy and weapon system technology into her roles. First, the research about represent submarine roles like anti-surfaceship warfare, anti-submarine warfare, intelligence gathering, land attack, supporting special operation and mine landing warfare will be presented, then the major naval warfare where submarine participated(during ex-World War I, World War I, World War II, The Cold War Era and post Cold War) and the analyzing of submarine roles by time will be presented. Submarine was developed for anti-surfaceship warfare during ex-World War I but could not make remarkable military gain in naval warfare because her performance and weapon was inadequate. However, the effective value of submarine in the procedure of a chain of naval warfare was shown during World War I and World War II. The major powers put battleships into naval warfare undiscriminatingly to command the sea power and submarines did massive damage to enemy navy power, so put a restraint the maritime power of enemy, and blocked the sea lanes for war material. After World War II, the battlefield situation changed rapidly and the concept of preemption became difficult to apply in naval warfare. Therefore, the submarine was unable to concentrate on anti-surfaceship mission. Especially during the Cold War era, nuclear submarine came to appear and her weapon system developed rapidly. These development gave submarines special missions: anti-submarine warfare and intelligence gathering. At that time, United States and Soviet submarines tracked other nation's submarines loaded with nuclear weapons and departing from naval their base. The submarines also collected information on the volume of ships and a coastal missile launching site in company with this mission. After Cold War, the major powers despatched forces to major troubled regions to maintain world peace, their submarines approached the shores of these regions and attacked key enemy installations with cruise missiles. At that time, the United States eased the concept of preemption and made the concept of Bush doctrine because of possible 911 terrorism. The missiles fired from submarines and surface battleships accurately attacked key enemy installations. Many nations be strategically successful depending on what kind of mission a submarine is assigned. The patterns of future naval warfare that my country will provide against will be military power projection and coalition/joint operations. These suggest much more about what future missions we should assign to submarines.

Effect of Filler and Additive on Performance of Cycloaliphatic Epoxy used for Outdoor Insulators (싸이클로알리파틱 에폭시 절연재료의 옥외 성능에 미치는 층전재 및 첨가물의 영향)

  • 허창수;연복희;서유진;이기택;김남렬;황명근;김완태
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2002.07a
    • /
    • pp.431-434
    • /
    • 2002
  • This paper reports on the evaluation of weathering resistance, tracking test and salt-fog of various kinds of cycloaliphatic epoxy systems. It was found that UV irradiation induced the loss of hydrophobic level due to the chain scission attack at the surface. It could be seen that samples containing an UV absorbent/antioxidant and a silicone oil additive knave a good performance in weathering ageing, whereas ATH filled ones have high resistance against tracking failure than others. Under salt-fog test, specimens mixed with silicone oil could suppress leakage current development. It was thought that silicone oil mixed into cycloaliphatic epoxy system could lead to lower the surface energy and to retain hydrophobic properties for a long time, which are desirable for outdoor performances.

  • PDF

A study on DDoS Attack, Detecting and Defence in ubiquitous system (유비쿼터스환경에서의 DDoS의 공격과 탐지, 방어시스템에 관한 연구)

  • Jung, Chang-Duk;Cha, Joo-Won;Hwang, Sun-Il
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2009.11a
    • /
    • pp.544-548
    • /
    • 2009
  • The underlying success of logistics depends on the flow of data and information for effective management. Over the last 30 years, we have seen the power of microprocessors double about every 18months. This continuing trend means that computers will become considerably smaller, cheaper, and more abundant; indeed, they are becoming ubiquitous and are even finding their way into everyday objects, resulting in the creation of smart things. In the long term, ubiquitous technologies will take on great economic significance. Industrial products will become smart because of their integrated information processing capacity, or take on an electronic identity that can be queried remotely, or be equipped with sensors for detecting their environment, enabling the development of innovative products and totally new services. The global marketplace runs on logistics, security, speed, agility and flexibility..In this paper we report that pairing these traditional logistics functions with RFID technology can be a huge value-driver for companies. This winning combination yields increased logistics management effectiveness and more efficient visibility into the supply chain management.

  • PDF

Technical Trends of the Cyber Targeted Attack Traceback-Connection Chain & Traceback (사이버 표적공격 역추적기술 동향 -연결체인 및 역추적)

  • Kim, J.T.;Kim, I.K.;Kang, K.H.
    • Electronics and Telecommunications Trends
    • /
    • v.30 no.4
    • /
    • pp.120-128
    • /
    • 2015
  • 최근 인터넷의 거대화와 더불어 기본적으로 ISP의 오버헤드를 최소화하는 요구사항을 만족시켜 줄 수 있는 역추적기술 보장에 큰 비중을 두고 있으며, 현재 또는 차세대 인터넷에서 적용 가능한 역추적기술이 필요하다. 본 논문은 사이버 표적공격(Advanced Persistent Threats: APT)에 적용 가능한 역추적(Traceback)기술에 대한 동향을 살펴본다. 특히 기존 IP 및 TCP Connection 기반 역추적방법 중 Network 기반 Connection 추적기술인 Timing-based Approach에 대해서 상세히 살펴보며 아울러 본 논문에서 제안하는 Netflow 기반의 ON-OFF 모델 확장을 통한 Timing-based Connection Traceback Approach의 기술적 적용을 통하여 공격 시스템의 위치와 실제 해킹을 시도하는 해커의 위치가 서로 다르다 하더라도 실제 해커의 위치인 공격 근원지를 추적할 수 있는 기술적 가능성 및 전망을 소개한다.

  • PDF

Separation of D and L Amino Acids by High-Performance Liquid Chromatography

  • Lee, Sun-Haing;Ryu, Jae-Wook;Park ,Kyoung-Sug
    • Bulletin of the Korean Chemical Society
    • /
    • v.7 no.1
    • /
    • pp.45-50
    • /
    • 1986
  • Separation of optical isomers of some derivatives of amino acids by reversed-phase HPLC has been accomplished by adding a chelate of an optically active amino acid to copper(Ⅱ) to the mobile phase. Cu(Ⅱ) complexes of L-proline and L-hydroxyproline in the mobile phase showed different degrees of separation. Optical isomers of DNS derivatives of amino acids are selectively separated, but those of several other derivatives are not at all. The kinds of buffer agents, the pH, and the concentrations of acetonitrile and the Cu(Ⅱ) ligand all affect the separations. The elution behavior between D and L DNS-amino acids appears to depend on the alkyl side chain of the amino acids. A chromatographic mechanism is proposed that is based on a stereospecificity of the formation of ternary complexes by the D, L-DNS-amino acids and the chiral additive associated with the stationary phase. The steric effects of the ligand exchange reactions are related with the feasibility of cis and/or trans attack of the amino acids to the binary chiral chelate retained on the stationary phase.