• 제목/요약/키워드: Data Falsification

검색결과 40건 처리시간 0.026초

The Consequences of Data Fabrication and Falsification among Researchers

  • KANG, Eungoo;HWANG, Hee-Joong
    • 연구윤리
    • /
    • 제1권2호
    • /
    • pp.7-10
    • /
    • 2020
  • Purpose: The experience by a researcher highlighted steps is guided by a specific ethical codes of conduct. The purpose of the current study is to discuss the fabrication and falsification of data as the key ethical misconduct committed by many researchers focus on their causes and impact in the research field. Research design, data and methodology: To obtain suitable textual resource, the current study used content analysis to closely take a look at the fabrication and falsification based on prior research in the realm of publication ethics. As a result, the current authors could collect and understand adequate textual data from appropriate prior resources. Results: The Research misconduct is a common practice in different countries across the world. Based on the findings from this study, data fabrication or falsification have a grievous impact on all the stakeholders of a study. The unethical behavior affects the parties concerned both psychologically and financially. Conclusions: It is, therefore, recommended that researchers should be held accountable. This can be done through different means, including raising awareness of vulnerability to data fabrication and falsification. The government and research institute should also advocate for effective policies guiding research studies across the world.

Mitigation of Adverse Effects of Malicious Users on Cooperative Spectrum Sensing by Using Hausdorff Distance in Cognitive Radio Networks

  • Khan, Muhammad Sajjad;Koo, Insoo
    • Journal of information and communication convergence engineering
    • /
    • 제13권2호
    • /
    • pp.74-80
    • /
    • 2015
  • In cognitive radios, spectrum sensing plays an important role in accurately detecting the presence or absence of a licensed user. However, the intervention of malicious users (MUs) degrades the performance of spectrum sensing. Such users manipulate the local results and send falsified data to the data fusion center; this process is called spectrum sensing data falsification (SSDF). Thus, MUs degrade the spectrum sensing performance and increase uncertainty issues. In this paper, we propose a method based on the Hausdorff distance and a similarity measure matrix to measure the difference between the normal user evidence and the malicious user evidence. In addition, we use the Dempster-Shafer theory to combine the sets of evidence from each normal user evidence. We compare the proposed method with the k-means and Jaccard distance methods for malicious user detection. Simulation results show that the proposed method is effective against an SSDF attack.

Sequential fusion to defend against sensing data falsification attack for cognitive Internet of Things

  • Wu, Jun;Wang, Cong;Yu, Yue;Song, Tiecheng;Hu, Jing
    • ETRI Journal
    • /
    • 제42권6호
    • /
    • pp.976-986
    • /
    • 2020
  • Internet of Things (IoT) is considered the future network to support wireless communications. To realize an IoT network, sufficient spectrum should be allocated for the rapidly increasing IoT devices. Through cognitive radio, unlicensed IoT devices exploit cooperative spectrum sensing (CSS) to opportunistically access a licensed spectrum without causing harmful interference to licensed primary users (PUs), thereby effectively improving the spectrum utilization. However, an open access cognitive IoT allows abnormal IoT devices to undermine the CSS process. Herein, we first establish a hard-combining attack model according to the malicious behavior of falsifying sensing data. Subsequently, we propose a weighted sequential hypothesis test (WSHT) to increase the PU detection accuracy and decrease the sampling number, which comprises the data transmission status-trust evaluation mechanism, sensing data availability, and sequential hypothesis test. Finally, simulation results show that when various attacks are encountered, the requirements of the WSHT are less than those of the conventional WSHT for a better detection performance.

Enhanced Robust Cooperative Spectrum Sensing in Cognitive Radio

  • Zhu, Feng;Seo, Seung-Woo
    • Journal of Communications and Networks
    • /
    • 제11권2호
    • /
    • pp.122-133
    • /
    • 2009
  • As wireless spectrum resources become more scarce while some portions of frequency bands suffer from low utilization, the design of cognitive radio (CR) has recently been urged, which allows opportunistic usage of licensed bands for secondary users without interference with primary users. Spectrum sensing is fundamental for a secondary user to find a specific available spectrum hole. Cooperative spectrum sensing is more accurate and more widely used since it obtains helpful reports from nodes in different locations. However, if some nodes are compromised and report false sensing data to the fusion center on purpose, the accuracy of decisions made by the fusion center can be heavily impaired. Weighted sequential probability ratio test (WSPRT), based on a credit evaluation system to restrict damage caused by malicious nodes, was proposed to address such a spectrum sensing data falsification (SSDF) attack at the price of introducing four times more sampling numbers. In this paper, we propose two new schemes, named enhanced weighted sequential probability ratio test (EWSPRT) and enhanced weighted sequential zero/one test (EWSZOT), which are robust against SSDF attack. By incorporating a new weight module and a new test module, both schemes have much less sampling numbers than WSPRT. Simulation results show that when holding comparable error rates, the numbers of EWSPRT and EWSZOT are 40% and 75% lower than WSPRT, respectively. We also provide theoretical analysis models to support the performance improvement estimates of the new schemes.

Attack-Proof Cooperative Spectrum Sensing Based on Consensus Algorithm in Cognitive Radio Networks

  • Liu, Quan;Gao, Jun;Guo, Yunwei;Liu, Siyang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제4권6호
    • /
    • pp.1042-1062
    • /
    • 2010
  • Cooperative spectrum sensing (CSS) is an effective technology for alleviating the unreliability of local spectrum sensing due to fading/shadowing effects. Unlike most existing solutions, this paper considers the use of CSS technology in decentralized networks where a fusion center is not available. In such a decentralized network, some attackers may sneak into the ranks of cooperative users. On the basis of recent advances in bio-inspired consensus algorithms, an attack-proof, decentralized CSS scheme is proposed in which all secondary users can maintain cooperative sensing by exchanging information locally instead of requiring centralized control or data fusion. Users no longer need any prior knowledge of the network. To counter three potential categories of spectrum sensing data falsification (SSDF) attacks, some anti-attack strategies are applied to the iterative process of information exchange. This enables most authentic users to exclude potentially malicious users from their neighborhood. As represented by simulation results, the proposed scheme can generally ensure that most authentic users reach a consensus within the given number of iterations, and it also demonstrates much better robustness against different SSDF attacks than several existing schemes.

인지 라디오 네트워크를 위한 안전한 협력 센싱 기법 (Secure Cooperative Sensing Scheme for Cognitive Radio Networks)

  • 김태운;최우열
    • 한국통신학회논문지
    • /
    • 제41권8호
    • /
    • pp.877-889
    • /
    • 2016
  • 본 논문에서는 인지 라디오 네트워크를 구성하는 기본요소와, 그를 위협하는 공격 유형에 대하여 살펴본다. 특히, SSDF (Spectrum Sensing Data Falsification) 공격에 대하여 자세히 살펴보고, 이를 극복하기 위한 해법을 제시한다. SSDF 공격은 실현하기 쉬운 반면, 이를 탐지하고 대응하기 위하여 많은 노력이 필요하다. 본 논문에서 제안하는 기법은 악의적인 사용자와 그들의 센싱 리포트를 구분해 내기 위하여 이상 탐지 (Anomaly Detection) 기술을 사용 한다. 제안하는 기법의 유효성을 검증하기 위하여 시뮬레이션을 수행 하였으며, 그 결과 비정상적인 센싱 리포트를 효과적으로 구분해 내고 활성화 된 주 사용자(Primary User)를 정확히 탐지해 내는 것을 확인 할 수 있었다.

Publication Ethics and KODISA Journals

  • KIM, Dongho;YOUN, Myoung-Kil
    • 연구윤리
    • /
    • 제1권2호
    • /
    • pp.1-5
    • /
    • 2020
  • Purpose: The purpose of this paper is to identify the most common misconducts in publication ethics, to demonstrate KODISA journals' management of the misconducts, and to share the findings with future and potential authors of Journal of Research and Publication Ethics (JRPE). Research design, data and methodology: This is an analytical study that explores and examines research and publication ethics and misconducts. Results: Based on literature review, major publication misconducts that many academic journals had to contend with over the years encompass unethical authorship, including ghost, guest, and gift authorships, data falsification and fabrication, plagiarism, including self-plagiarism, submission and publication fraud (multiple submission and publication), and potential conflicts of interest. Conclusions: KODISA and its journals have strived and done great work in making the journals transparent and in combatting the issues associated with plagiarism, including self-plagiarism. However, it seems there is no mechanism to detect or deter unethical authorship, conflicts of interest, and fabrication and falsification misconducts. The inception of JRPE signifies how KODISA and its journals continuously view research and publication ethics as their foremost important factor in maintaining and improving the academic journals. The future research and scholastic manuscripts of JRPE could provide necessary and updated information about research and publication ethics, practices, and misconducts.

Design and Implementation of Digital Jikin using Smartphone Application

  • Hong, Daewon;Kang, Miju;Chun, Junchul
    • 인터넷정보학회논문지
    • /
    • 제18권5호
    • /
    • pp.87-94
    • /
    • 2017
  • Due to the recent advances of IT industry, many companies and institutions have been used electronic documents rather than original paper copies. However, the characteristic of electronic document allows it to be readily damaged from proscribed copying, counterfeit, and falsification. These can cause the serious security problems for electronic documents. Conventional security methods for digital documents involve adding a separated image or marker, but these methods can reduce the readability of document. Therefore, we proposed a digital Jikin (Korean traditional stamp) which is normally used to identify the source or author of a document in asia. The proposed digital Jikin can preserve the readability of electronic document while protecting the document from proscribed copying, counterfeit, or falsification using image processing approach. In this paper, a digital Jikin application is designed and implemented under android platform and it converts the critical information of document onto the digital Jikin. The proposed digital Jikin contains important information in the boundary of Jikin not only about the author of documents or source, but also keywords, number of images, and many more. Therefore, the authenticity of document or whether the document has been altered or not by other person can be evaluated by the server. The proposed digital Jikin can be sent to a server through the wireless networks and can be stored using PHP and MySQL. We believe that the proposed method can offer the better and simple solution for strengthening the security of electronic document.

RFID 기술을 이용한 u-헬스케어 서비스 인증 프로토콜 (u-Healthcare Service Authentication Protocol based on RFID Technology)

  • 정윤수;이상호
    • 디지털융복합연구
    • /
    • 제10권2호
    • /
    • pp.153-159
    • /
    • 2012
  • 최근 u-헬스케어는 웰빙 시대와 IT 대중화가 맞물려 RFID 기술을 의료 서비스에 접목하는 새로운 비즈니스 모델이 각광을 받고 있다. u-헬스케어 서비스는 RFID 기술이 u-헬스케어에 접목되면서 의료 프로세스 상에 발생하는 수기입력, 중복 데이터 발생, 데이터 위 변조, 정보 버전 상이 등의 품질 저하 요인을 해결할 수 있는 방안이 필요하다. 이 논문에서는 u-헬스케어를 통해 의료 서비스를 제공받는 사용자의 프라이버시를 보호하기 위한 RFID 기반의 사용자 인증 프로토콜을 제안한다. 제안 프로토콜에서는 의료 서비스를 제공받는 사용자의 데이터 위 변조 및 프라이버시와 u-헬스케어 보안시스템의 안전성을 획기적으로 제고하기 위해서 환자에 관한 비밀 정보는 병원에서 생성된 비밀키와 연접하여 DB 테이블 내의 해당 환자의 비밀키 필드에 저장한다. 또한, 불법적인 사용자의 접근이 있을 경우 인증 서버에게 통보하여 u-헬스케어의 불법 유 무 판별한 후 u-헬스케어 서비스 접근을 승인받도록 한다.

이차 보간에 따른 ENF 기반의 위변조 디지털 파일 탐지 기법 (ENF based Detection of Forgery and Falsification of Digital Files due to Quadratic Interpolation)

  • 박세진;윤지원
    • 정보과학회 논문지
    • /
    • 제45권3호
    • /
    • pp.311-320
    • /
    • 2018
  • 최근 형사 및 모든 분야의 소송에서 디지털 오디오 및 비디오를 증거로써 사용하는 경우가 증가하고 있으며, 이에 디지털 포렌식 기법을 이용한 과학 수사가 발전하고 있다. 컴퓨팅 기능과 파일 편집 기술의 발달로 누구나 간단하게 비디오 파일을 조작할 수 있게 되면서 디지털 데이터를 조작하는 사례는 증가하고 있으며, 이로 인해 디지털 데이터에 대한 감정을 통해 증거의 무결성과 신뢰성을 확보하는 일이 요구되고 있다. 본 연구에서는 디지털 포렌식 기법 중 하나로 전력 공급에 대한 지리적 환경에 따른 전력망 그리드를 통해 전력망 주파수 신호(Electrical Network Frequency: ENF)를 추출하고 QIFFT를 이용해 peak 검출을 위한 신호처리 과정을 거치는 기법에 대해 제안한다. 그리고 표준편차를 이용한 탐지 알고리즘을 통해 73%의 정확도로 비디오 파일의 위변조 여부 확인 및 위변조 지점을 찾는 실험을 진행하고 이를 검증하였다.