• Title/Summary/Keyword: Authentication-based

Search Result 2,135, Processing Time 0.033 seconds

Method of Detecting and Isolating an Attacker Node that Falsified AODV Routing Information in Ad-hoc Sensor Network (애드혹 센서 네트워크에서 AODV 라우팅 정보변조 공격노드 탐지 및 추출기법)

  • Lee, Jae-Hyun;Kim, Jin-Hee;Kwon, Kyung-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.12
    • /
    • pp.2293-2300
    • /
    • 2008
  • In ad-hoc sensor network, AODV routing information is disclosed to other nodes because AODV protocol doesn't have any security mechanisms. The problem of AODV is that an attacker can falsify the routing information in RREQ packet. If an attacker broadcasts the falsified packet, other nodes will update routing table based on the falsified one so that the path passing through the attacker itself can be considered as a shortest path. In this paper, we design the routing-information-spoofing attack such as falsifying source sequence number and hop count fields in RREQ packet. And we suggest an efficient scheme for detecting the attackers and isolating those nodes from the network without extra security modules. The proposed scheme doesn't employ cryptographic algorithm and authentication to reduce network overhead. We used NS-2 simulation to evaluate the network performance. And we analyzed the simulation results on three cases such as an existing normal AODV, AODV under the attack and proposed AODV. Simulation results using NS2 show that the AODV using proposed scheme can protect the routing-information-spoofing attack and the total n umber of received packets for destination node is almost same as the existing norm at AODV.

Proposal and Analysis of Primality and Safe Primality test using Sieve of Euler (오일러체를 적용한 소수와 안전소수의 생성법 제안과 분석)

  • Jo, Hosung;Lee, Jiho;Park, Heejin
    • Journal of IKEEE
    • /
    • v.23 no.2
    • /
    • pp.438-447
    • /
    • 2019
  • As the IoT-based hyper-connected society grows, public-key cryptosystem such as RSA is frequently used for encryption, authentication, and digital signature. Public-key cryptosystem use very large (safe) prime numbers to ensure security against malicious attacks. Even though the performance of the device has greatly improved, the generation of a large (safe)prime is time-consuming or memory-intensive. In this paper, we propose ET-MR and ET-MR-MR using Euler sieve so it runs faster while using less memory. We present a running time prediction model by probabilistic analysis and compare time and memory of our method with conventional methods. Experimental results show that the difference between the expected running time and the measured running time is less than 4%. In addition, the fastest running time of ET-MR is 36% faster than that of TD-MR, 8.5% faster than that of DT-MR and the fastest running time of ET-MR-MR is 65.3% faster than that of TD-MR-MR and similar to that of DT-MR-MR. When k=12,381, the memory usage of ET-MR is 2.7 times more than that of DT-MR but 98.5% less than that of TD-MR and when k=65,536, the memory usage of ET-MR-MR is 98.48% less than that of TD-MR-MR and 92.8% less than that of DT-MR-MR.

Development of Specific SNP Molecular Marker from Thistle in the DNA Sequences of Chloroplast TrnL-F and Matk Region Using HRM Analysis (엉겅퀴의 엽록체 TrnL-F와 Matk 영역 염기서열의 HRM 분석을 통한 특이적 SNP 분자마커의 개발)

  • Lee, Shin-Woo;Lee, Soo Jin;Kim, Yun-Hee
    • Journal of Life Science
    • /
    • v.29 no.5
    • /
    • pp.524-529
    • /
    • 2019
  • Medicinal plants resources are becoming important assets since their usages have been expanded to the development of functional foods for human health, cosmetics and pharmaceutical industries. However, their phylogenetic origins and names are different from each country and quite often they are mixed each other resulting in the confusion for consumers. Particularly when they are very similar based on their morphological characteristics and distributed, it is extremely difficult to differentiate their origins even by specialists. Therefore, identification of each plant species is important for standardizing herbal medicine. Thistle is a medicinal and perennial plant. Obtaining information about the genetic diversity of plant populations is highly important for conservation and germplasm utilization. Although thistle is an important medicinal plant species registered in South Korea, no molecular markers are currently available to distinguish from other similar species from different countries. In this study, we developed single nucleotide polymorphism (SNP) markers derived from chloroplast genomic sequences to identify distinct Korean-specific thistle species via high resolution melting (HRM) curve analyses. We performed molecular authentication of four different kinds of thistle species from different regions using DNA sequences in the trnL-F and matK chloroplast intergenic region. The SNP markers developed in this study are useful for rapidly identifying specific thistle species from different country.

The Complete Chloroplast Genome Sequence and Intra-Species Diversity of Rhus chinensis

  • Kim, Inseo;Park, Jee Young;Lee, Yun Sun;Joh, Ho Jun;Kang, Shin Jae;Murukarthick, Jayakodi;Lee, Hyun Oh;Hur, Young-Jin;Kim, Yong;Kim, Kyung Hoon;Lee, Sang-Choon;Yang, Tae-Jin
    • Plant Breeding and Biotechnology
    • /
    • v.5 no.3
    • /
    • pp.243-251
    • /
    • 2017
  • Rhus chinensis is a shrub widely distributed in Asia. It has been used for traditional medicine and ecological restoration. Here, we report the complete chloroplast genome sequence of two R. chinensis genotypes collected from China and Korea. The assembled chloroplast genome of Chinese R. chinensis is 149,094 bp long, consisting of a large single copy (97,246 bp), a small single copy (18,644 bp) and a pair of inverted repeats (16,602 bp). Gene annotation revealed 77 protein coding genes, 30 tRNA genes, and 4 rRNA genes. A phylogenomic analysis of the chloroplast genomes with 11 known complete chloroplast genomes clarified the relationship of R. chinensis with the other plant species in the Sapindales order. A comparative chloroplast genome analysis identified 170 SNPs and 85 InDels at intra-species level of R. chinensis between Chinese and Korean collections. Based on the sequence diversity between Korea and Chinese R. chinensis plants, we developed three DNA markers useful for genetic diversity and authentication system. The chloroplast genome information obtained in this study will contribute to enriching genetic resources and conservation of endemic Rhus species.

Source-Location Privacy in Wireless Sensor Networks (무선 센서 네트워크에서의 소스 위치 프라이버시)

  • Lee, Song-Woo;Park, Young-Hoon;Son, Ju-Hyung;Kang, Yu;Choe, Jin-Gi;Moon, Ho-Gun;Seo, Seung-Woo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.125-137
    • /
    • 2007
  • This paper proposes a new scheme to provide the location privacy of sources in Wireless Sensor Networks (WSNs). Because the geographical location of a source sensor reveals contextual information on an 'event' in WSN, anonymizing the source location is an important issue. Despite abundant research efforts, however, about data confidentiality and authentication in WSN, privacy issues have not been researched well so far. Moreover, many schemes providing the anonymity of communication parties in Internet and Ad-hoc networks are not appropriate for WSN environments where sensors are very resource limited and messages are forwarded in a hop-by-hop manner through wireless channel. In this paper, we first categorize the type of eavesdroppers for WSN as Global Eavesdropper and Compromising Eavesdropper. Then we propose a novel scheme which provides the anonymity of a source according to the types of eavesdroppers. Furthermore, we analyze the degree of anonymity of WSN using the entropy-based modeling method. As a result, we show that the proposed scheme improves the degree of anonymity compared to a method without any provision of anonymity and also show that the transmission range plays a key role to hide the location of source sensors.

Protecting Fingerprint Data for Remote Applications (원격응용에 적합한 지문 정보 보호)

  • Moon, Dae-Sung;Jung, Seung-Hwan;Kim, Tae-Hae;Lee, Han-Sung;Yang, Jong-Won;Choi, Eun-Wha;Seo, Chang-Ho;Chung, Yong-Wha
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.6
    • /
    • pp.63-71
    • /
    • 2006
  • In this paper, we propose a secure solution for user authentication by using fingerprint verification on the sensor-client-server model, even with the client that is not necessarily trusted by the sensor holder or the server. To protect possible attacks launched at the untrusted client, our solution makes the fingerprint sensor validate the result computed by the client for the feature extraction. However, the validation should be simple so that the resource-constrained fingerprint sensor can validate it in real-time. To solve this problem, we separate the feature extraction into binarization and minutiae extraction, and assign the time-consuming binarization to the client. After receiving the result of binarization from the client, the sensor conducts a simple validation to check the result, performs the minutiae extraction with the received binary image from the client, and then sends the extracted minutiae to the server. Based on the experimental results, the proposed solution for fingerprint verification can be performed on the sensor-client-server model securely and in real-time with the aid of an untrusted client.

Extending the OMA DRM Framework for Supporting an Active Content (능동형 콘텐츠 지원을 위한 OMA DRM 프레임워크의 확장)

  • Kim, Hoo-Jong;Jung, Eun-Su;Lim, Jae-Bong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.93-106
    • /
    • 2006
  • With the rapid growth of the wireless Internet communication, a new generation of mobile devices have made possible the broad distribution of mobile digital contents, such as image, music, video, games and applications over the wireless Internet. Mobile devices are rapidly becoming the major means to extend communication channels without copy Protection, usage rule controlling and authentication. As a result, mobile digital contents may be illegally altered, copied and distributed among unauthorized mobile devices. In this paper, we take a look at Open Mobile Alliance (OMA) DRM v2.0 in general, its purpose and function. The OMA is uniquely the focal point for development of an open standard for mobile DRM. Next we introduces features for an active content and illustrates the difference between an active content and an inactive content. Enabling fast rendering of an active content, we propose an OMA-based DRM framework. This framework include the following: 1) Extending DCF Header for supporting an selective encryption, 2) Content encryption key management, 3) Rendering API for an active content. Experimental results show that the proposed framework is able to render an active content fast enough to satisfy Quality of Experience. %is framework has been proposed for a mobile device environment, but it is also applicable to other devices, such as portable media players, set-top boxes, or personal computer.

A Study on Court Auction System using Ethereum-based Ether (이더리움 기반의 이더를 사용한 법원 경매 시스템에 관한 연구)

  • Kim, Hyo-Jong;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.2
    • /
    • pp.31-40
    • /
    • 2021
  • Blockchain technology is also actively studied in the real estate transaction field, and real estate transactions have various ways. In this paper, we propose a model that simplifies the authentication procedure of auction systems using Ethereum's Ether to solve the problem of offline court auctions. The proposed model is written in Ethereum's Solidity language, the court registers the sale date and the sale date with the DApp browser, and the bidder accesses the address of the individual's wallet created through Metamask's private key. The bidder then selects the desired sale and enters the bid price amount to participate in the auction. The bidder's record of the highest bid price for the sale he wants is written on the Ethereum test network as a smart contract. and creates a block. Finally, smart contracts written on the network are distributed by the court auction manager to all nodes in the blockchain network, and each node in the blockchain network can be viewed and contract verified. As a result of analyzing the smart contracts of the proposed model and the performance of the system, there are fees incurred due to the creation and use of Ether on platforms using Ethereum, and participation. Ether's changes in value affect the price of the sale, resulting in inconsistent fees in smart contracts each time. However, in future work, we issue our own tokens to solve the market volatility problem and commission problem with the value change of Ether, and refine complex court auction systems.

A Study on the Artificial Intelligence Ethics Measurement indicators for the Protection of Personal Rights and Property Based on the Principles of Artificial Intelligence Ethics (인공지능 윤리원칙 기반의 인격권 및 재산보호를 위한 인공지능 윤리 측정지표에 관한 연구)

  • So, Soonju;Ahn, Seongjin
    • Journal of Internet Computing and Services
    • /
    • v.23 no.3
    • /
    • pp.111-123
    • /
    • 2022
  • Artificial intelligence, which is developing as the core of an intelligent information society, is bringing convenience and positive life changes to humans. However, with the development of artificial intelligence, human rights and property are threatened, and ethical problems are increasing, so alternatives are needed accordingly. In this study, the most controversial artificial intelligence ethics problem in the dysfunction of artificial intelligence was aimed at researching and developing artificial intelligence ethical measurement indicators to protect human personality rights and property first under artificial intelligence ethical principles and components. In order to research and develop artificial intelligence ethics measurement indicators, various related literature, focus group interview(FGI), and Delphi surveys were conducted to derive 43 items of ethics measurement indicators. By survey and statistical analysis, 40 items of artificial intelligence ethics measurement indicators were confirmed and proposed through descriptive statistics analysis, reliability analysis, and correlation analysis for ethical measurement indicators. The proposed artificial intelligence ethics measurement indicators can be used for artificial intelligence design, development, education, authentication, operation, and standardization, and can contribute to the development of safe and reliable artificial intelligence.

Development of SCAR Markers for the Discrimination of Rhei Radix et Rhizoma and Rhei Undulatai Rhizoma based on the RAPD (RAPD 분석을 통한 대황(大黃)과 종대황(種大黃) 감별용 SCAR 유전자 마커 개발)

  • Moon, Byeong-Cheol;Lee, Young-Mi;Chun, Jin-Mi;Lee, A-Young;Yoon, Tae-Sook;Cheon, Myeong-Sook;Choo, Byung-Kil;Kim, Ho-Kyoung
    • The Korea Journal of Herbology
    • /
    • v.24 no.4
    • /
    • pp.115-120
    • /
    • 2009
  • Objectives : Due to the morphological similarity and frequent occurrence of intermediate forms as well as morphological variations of aerial part, the correct identification between Rhei Radix et Rhizoma and Rhei Undulatai Rhizoma is very difficult. To develop a reliable method for correct identification and improving the quality standards of Rhei Radix et Rhizoma and Rhei Undulatai Rhizoma, we analyzed RAPD and developed SCAR marker. Methods : To amplify target DNA at the genomic level, 32 Operon 10-mer random primers were applied with four Rheum species, R. officinale, R. palmatum, R. tanguticum and R. undulatum. The nucleotide sequences were determined and species-specific primers were prepared depending on the species-specific RAPD amplicons after subcloned into the pGEM-Teasy vector. To develop the SCAR markers, species-specific PCR amplification and multiplex-PCR were carried out using the single species-specific primer pairs and combinations of them, respectively. Results : We used RAPD analysis of four Rheum plant species to obtain several species-specific RAPD amplicons. From nucleotide sequences of these RAPD amplicons, we developed two SCAR markers that amplified 314 bp and 390 bp DNA fragments in only R. undulatum but not in R. officinale, R. palmatum, R. tanguticum and R. undulatum, for distinguishing Rhei Undulatai Rhizoma and Rhei Radix et Rhizoma. Furthermore, we established SCAR markers for the simultaneous discrimination of the three species within a single reaction by using multiplex-PCR. Conclusions : These genetic markers can be used for the efficient discrimination of plants species and commercial herbal medicines between Rhei Undulatai Rhizoma and Rhei Radix et Rhizoma, to ultimately prevent indiscriminate distribution and prescription of these herbal medicines.