• Title/Summary/Keyword: Attack time

Search Result 1,139, Processing Time 0.03 seconds

A Storage and Computation Efficient RFID Distance Bounding Protocol (저장 공간 및 연산 효율적인 RFID 경계 결정 프로토콜)

  • Ahn, Hae-Soon;Yoon, Eun-Jun;Bu, Ki-Dong;Nam, In-Gil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.9B
    • /
    • pp.1350-1359
    • /
    • 2010
  • Recently many researchers have been proved that general RFID system for proximity authentication is vulnerable to various location-based relay attacks such as distance fraud, mafia fraud and terrorist fraud attacks. The distance-bounding protocol is used to prevent the relay attacks by measuring the round trip time of single challenge-response bit. In 2008, Munilla and Peinado proposed an improved distance-bounding protocol applying void-challenge technique based on Hancke-Kuhn's protocol. Compare with Hancke-Kuhn's protocol, Munilla and Peinado's protocol is more secure because the success probability of an adversary has (5/8)n. However, Munilla and Peinado's protocol is inefficient for low-cost passive RFID tags because it requires large storage space and many hash function computations. Thus, this paper proposes a new RFID distance-bounding protocol for low-cost passive RFID tags that can be reduced the storage space and hash function computations. As a result, the proposed distance-bounding protocol not only can provide both storage space efficiency and computational efficiency, but also can provide strong security against the relay attacks because the adversary's success probability can be reduced by $(5/8)^n$.

Studios on the Synthetic Pheromones of Striped Rice Borer and Tortricid Insect Pests (이화명충과 과수잎말이나방류 해충의 합성 Pheromone에 관한 연구)

  • Song Y. H.;Song H. Y.;Kim H. K.;Chang Y. D.;Lippold P. C.
    • Korean journal of applied entomology
    • /
    • v.17 no.1 s.34
    • /
    • pp.41-47
    • /
    • 1978
  • Pheromones of several insect species were evaluated in a screening program in terms of their usefulness in pest forecasting and control in Korea. Species included striped rite borer (Chilo suppressalis) and tortricid moths, which attack deciduous fruit, and colding moth. The pheromone of striped rice borer was supplied through the courtesy of the Tropical Products Institute, London. Pheromones of other species were obtained from Cornell University and the Zoecon Corporation of Palo Alto, California. 'rho results of this experiment were as follows: 1. Live traps containing virgin striped rice borer female moths were more effective in attracting male moths than were the pheromone traps. 2. Since the effectiveness of the striped rice borer pheromone decreased dramatically with time, it was difficult to estimate the peak tine of the borer emergence. 3. The primary species trapped in deciduous fruit orchards was the oriental fruit moth, Grapholitha molesta. The traps were baited with the phermones, OFM and LAW. 4. Several moth species were trapped with OBLR. RBLR. SPAR and ArcM phermones but few were trapped with the remaining eight tortricid pheromones. 5. The following tortricid pheromones might be useful for forecasting the species given: OFM, LAW : Grapholitha molesta OBLR : Archips breviprecanus OBLH, RBLR, ArcM : Archippus coreensis Archips fuscocupreanus Hoshinoa longicellana SPAR, TBM ; Phyroderces sp.

  • PDF

A Study on the Implications and Trends of Logistics Security Assurance Programs for International Trade Facilitation (국제물류보안 인증제도 동향 및 시사점에 관한 연구)

  • Ko, Hyun-Jeung
    • Journal of Korea Port Economic Association
    • /
    • v.27 no.2
    • /
    • pp.333-354
    • /
    • 2011
  • After the terrorist attack of 9/11 on the USA, the security concern to global trade has been raised. In particular, the USA has actively promoted a series of initiatives and rules such as CSI, 24 hour rule, C-TPAT, and so on in the area of logistics activities, which aimed to better protect the country against the potential terrorist threats. While implementing such schemes called as a multi-layed logistics security strategy, a large number of countries trading with USA are facing with the issues of additional time and costs for inspecting cargos in their logistics facilities. As a result, most countries all over the world have sought a way to minimize the impacts from such strategy. The Korea also is preparing the several security programs operated by various ministries, which are aiming to not only improve the efficiency of trade flows but also to ensure supply chain security. However, many companies are expressing the inefficiency of operating such programs. Thus, this paper analyzed several global supply chain security programs currently adopted by international organizations(ISO, WCO, and IMO) and major countries(USA, EU, and Singapore) and suggested a guideline for developing the national logistics security system.

A Study on urinary Incontinence of Adult Women : Preliminary Study (성인여성의 요실금에 관한 기초 연구)

  • 최영희;홍재엽;김문실;김애정;김정아;백성희
    • Journal of Korean Academy of Nursing
    • /
    • v.28 no.1
    • /
    • pp.171-183
    • /
    • 1998
  • The purpose of this study was to identify the incidence of urinary incontinence in adult women and to identify factors related to life style and sexual intercourse that were related to incontinence. The sample consisted of 1,065 women living in Seoul or one of five provinces. Data for this study were collected from January 16 to June 23 using structured questionnaires. The Urinary Symptom Questionnaire developed by Jackson and a demographic questionnaire were used to collect the data. The data were analyzed using frequency, percentage with an SPSS/PC$^{+}$ program. The major finding are as follows : 1. The distribution of age of subjects was as follows : 20-29(10.1%), 20-39(17.8%), 40-49(27.3%). 50-59(22.3%), 60-69(12.9%), 70-79(6.1%). 80-89(2.8%), more than 90(0.6%). The frequency of normal delivery, 0(155%), 1-2(36.0%), 3-4(29.2%), 5-6(13.0%). more than 7(6.3%). The rate of subjects with menopause was 40.8%. 2. It was reported that 50.7% of the subjects experienced urinary incontinence with stress, mixed. and urgency incontinence being 49.8%, 43.4%, 6.8% respectively. 3. The lower urinary symptoms and incidence with urinary incontinence were as follows : Daily frequency. 22.3%, nocturia. 40.8%, urgency, 71.2%, bladder pain 47.8%, unexplainned incontinence, 32.4%, noctural incontinence, 16.1%, and frequency of incontinence, 37.7%. In term of quantity of incontinence, drop/pants damp, 29.5%, dribble/pants wet, 20.5%, flood or soaking through to outer clothing, 1.7%, and flood or running down legs or onto floor, 0.2%. 4. The symptoms related to sexual intercourse and incidence of urinary incontinence were as follows : dry vagina, 39.1%, sex life trouble, 10.8%, pain during sexual intercourse, 27.4%, and urine leakage during sexual intercourse. 8.8%. 5. Life style problems related to urinary incontinence were as follows : fluid intake restriction, 20.0%, affected daily task, 24.5%. avoidance of placess and situations, 35.0%, interference in physical activities, 30.6%, interference in relationships with other people. 19.0%. interference in relationships with husband/companion, 8.1%, and time after attack of urinary symptoms, 76.9%. In term of the feeling about the rest of their lifves the women reported : perfectly happy, 11.3%. pleased, 16.9%. mostly satisfied, 20.2%, mixed feelings, 21.0%, mostly dissatisfied, 21.0%, very unhappy 8.5%, and desperate. 1.0%. In conclusion. this study was a preliminary study to provide nursing practices guidelines for incontinence in adult women. Nurse working with adult women should develop and provide adequate care for these women.n.

  • PDF

Knowledge and Educational Experience about CPR in Dental Hygiene Students (치위생과 학생의 심폐소생술(CPR) 관련 지식수준 및 교육실태)

  • Jun, Soo Kyung;Choi, Hye-Jung
    • Journal of dental hygiene science
    • /
    • v.10 no.5
    • /
    • pp.341-347
    • /
    • 2010
  • This paper reports is a descriptive study for analyzing the knowledge level and educational condition of dental hygiene students regarding cardiopulmonary resuscitation(CPR). This study was implemented from May 24, 2010 to June 4, 2010. The results were as follows: 1. The score was low for the knowledge level of CPR (3.72 out of 8.0). 2. The knowledge level of CPR was higher in the students with heart disease in their family than in those without(t=5.725, P<0.05). 3. While students had a high percentage of correct answers e.g. 93.5% and 73.8% for the mouth-to-mouth CPR and hand position in pressing the upper part of the belly, they had low percentage of correct answers, e.g. 8.2%, 28.9%, 25.4%, and 49.2% for consciousness and breathing check, maintaining the airway and the time to brain damage from a heart attack, respectively. 4. The students used TV(55.2%) and the Internet(20.1%) as the medium for observing CPR. 5. 60.2% of students did not have any training in CPR. 6. More than 90.0% of students required training in CPR. Most of the students requested CPR training when they attended middle and high school. They had hoped to receive CPR training at school or a specialized training organization. In conclusion, the knowledge level of CPR of dental hygiene students is low, and the need for training and participation is high. Therefore, dental hygiene students should receive CPR training.

Strategic and Tactical Use of Naval Ship for Maritime Defense during the reign of King Sejong (조선 세종시대 병선(兵船)의 해방(海防)전략·전술)

  • Min, Jang-won
    • Strategy21
    • /
    • s.44
    • /
    • pp.177-212
    • /
    • 2018
  • The purpose of this article is to examine the 'Discussion of maritime defense' which began to be discussed from the late Goryeo dynasty to the early Joseon dynasty and the process of establishing a maritime defense system. Also it can identify changes in the aspects of the naval ship operation and their strategic tactics during the reign of King Sejong. Japanese raiders began a full-scale invasion from 1350 at the late Goryeo Dynasty, So the government realized the need to raise the 'Sea power' and to organize the maritime defense system for defending enemy invasion. for example, the reinforcement of naval forces, construction of warships, develoment of weapon systems and so on. which have achieved remarkable growth while continuing, have also been used to carry out a three-time 'Conquest of Daemado' in 1389, 1396, 1419. Until then, however, it is difficult to interpret that the naval forces had a systematic and organizational combat operation system. According to fighting patterns on combat reports before the early days of King Sejong's reign, Our naval forces had no advantage over the Japanese raiders in terms of their capabilities and tactics. Then, the period of King Sejong marked a watershed in maritime defense history. Based on accumulated experience of naval battles and force Projections, The paradigm shift of the naval strategic tactics for maritime defense has occurred. First, the capability of the naval vessels has improved. for example, ship speed, durability, and weather resistance. Through these efforts, navy forces were able to pursue and attack, destroy enemy's ships by taking advantage of the 'Ship speed superiority'. This has led to tactical shifts from defensive to offensive. Second, purpose to support offensive tactics, the government put a strategic plan into practice that is the forward depolyment of naval bases from the inland to the coast, considering the 'sea environment' and 'threat'. By doing so, Joseon dynasty was able to secure 'the command of the sea'. This may be a little different from the perception of the so-called 'peace period' that King Sejong's era. We need to remember that Joseon dynasty was working hard for its defense. When studying history of maritime defense, these strategic and tactical elements must be fully considered. Only then we can have a coherent understanding of the many naval battles in the past, including the Imjin War(1592-1598).

Analysis of Harbor Responses due to the Dredging Work at Waterway and Mooring Basin in Busan New Port (부산 신항만에서 수로 및 박지 준설에 따른 항만정온도의 변화 분석)

  • Lee Joong-Woo;Lee Hak-Seung;Lee Hoon;Yang Sang-Yong
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2005.10a
    • /
    • pp.117-124
    • /
    • 2005
  • Recently the first stage of construction for Busan new port emerged over the sea surface at the north container terminal site. With this, there are lot of discussions and debates on increasing the water depth at the approaching channel and mooring basin from the existing 15m to 18m by dredging work in order to be able to serve 12,000TEU containership, and at the same time, correction to the reclamation plan of hinterland at the part of Undong Bay of the new port site. Since the attack of typhoon 'Maemi' in 2003, it is expected that the design wave parameters for coastal and harbor structures in this area would be somewhat changed and so the extreme wave condition at each terminal and tranquility of berthing area does, and therefore, it is necessary to analyze the tranquility at each berth. Hence in this study, we constructed a wave model for these conditions and performed simulation together with the circulation model simulation, compared with the field data collected. The result showed the increase of the harbor response throughout the basin but not severe condition. However, a certain location needs to be prepared for the rough sea condition when a severe typhoon hit the site.

  • PDF

A step-by-step service encryption model based on routing pattern in case of IP spoofing attacks on clustering environment (클러스터링 환경에 대한 IP 스푸핑 공격 발생시 라우팅 패턴에 기반한 단계별 서비스 암호화 모델)

  • Baek, Yong-Jin;Jeong, Won-Chang;Hong, Suk-Won;Park, Jae-Hung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.6
    • /
    • pp.580-586
    • /
    • 2017
  • The establishment of big data service environment requires both cloud-based network technology and clustering technology to improve the efficiency of information access. These cloud-based networks and clustering environments can provide variety of valuable information in real-time, which can be an intensive target of attackers attempting illegal access. In particular, attackers attempting IP spoofing can analyze information of mutual trust hosts constituting clustering, and attempt to attack directly to system existing in the cluster. Therefore, it is necessary to detect and respond to illegal attacks quickly, and it is demanded that the security policy is stronger than the security system that is constructed and operated in the existing single system. In this paper, we investigate routing pattern changes and use them as detection information to enable active correspondence and efficient information service in illegal attacks at this network environment. In addition, through the step-by -step encryption based on the routing information generated during the detection process, it is possible to manage the stable service information without frequent disconnection of the information service for resetting.

A Study on Stabilizing a Network Security Zone Based on the Application of Logical Area to Communication Bandwidth (통신 대역폭 논리영역 적용 기반의 네트워크 보안구간 안정화 연구)

  • Seo, Woo-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.5
    • /
    • pp.3462-3468
    • /
    • 2015
  • Regarding countless network disorders or invasions happening nowadays from 2014 until 2015, illegal access intended to attack through the communication line provided by ISP (Internet Service Provider) appears to be the source of the problem. As a defensive way to prevent such network-based attacks, not only stabilization structures for network communication but various policies as well as physical security devices and solutions corresponding to those have been realized and established. Therefore, now is the time to gain foundational research data to secure network security sections by producing logical area on communication bandwidth or such, suggest tasks to expand the communication line which is another research topic in the network security market, and recognize the fact that the active communication bandwidth linkage paradigm using network communication bandwidth is needed as one of the areas that can realize physical security. Additionally, it is necessary to limit the data in the forms of organizing visible security structures into a certain range of physical information by re-dividing communication capacity being currently provided by telecommunicators into subdivided organizational areas and applying the logical virtualization of communication capacity in each of the areas divided. By proposing a network security section based on a logical field application in place of the existing physical structure, basic data that designs a stable physical network communication structure will be provided.

A Query Result Integrity Assurance Scheme Using an Order-preserving Encryption Scheme in the Database Outsourcing Environment (데이터베이스 아웃소싱 환경에서 순서 보존 암호화 기법을 이용한 질의 결과 무결성 검증 기법)

  • Jang, Miyoung;Chang, Jae Woo
    • Journal of KIISE
    • /
    • v.42 no.1
    • /
    • pp.97-106
    • /
    • 2015
  • Recently, research on database encryption for data protection and query result authentication methods has been performed more actively in the database outsourcing environment. Existing database encryption schemes are vulnerable to order matching and counting attack of intruders who have background knowledge of the original database domain. Existing query result integrity auditing methods suffer from the transmission overhead of verification object. To resolve these problems, we propose a group-order preserving encryption index and a query result authentication method based on the encryption index. Our group-order preserving encryption index groups the original data for data encryption and support query processing without data decryption. We generate group ids by using the Hilbert-curve so that we can protect the group information while processing a query. Finally, our periodic function based data grouping and query result authentication scheme can reduce the data size of the query result verification. Through performance evaluation, we show that our method achieves better performance than an existing bucket-based verification scheme, it is 1.6 times faster in terms of query processing time and produces verification data that is 20 times smaller.