• Title/Summary/Keyword: Data integrity

Search Result 1,363, Processing Time 0.031 seconds

Real-time Integrity for Vehicle Black Box System (차량용 블랙박스 시스템을 위한 실시간 무결성 보장기법)

  • Kim, Yun-Gyu;Kim, Bum-Han;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.49-61
    • /
    • 2009
  • Recently, a great attention has been paid to a vehicle black box device in the auto markets since it provides an accident re-construction based on the data which contains audio, video, and some meaningful driving informations. It is expected that the device will get to promote around commercial vehicles and the market will greatly grow within a few years. Drivers who equips the device in their car believes that it can find the origin of an accident and help an objective judge. Unfortunately, the current one does not provide the integrity of the data stored in the device. That is the data can be forged or modified by outsider or insider adversary because it is just designed to keep the latest data produced by itself. This fact cause a great concern in car insurance and law enforcement, since the unprotected data cannot be trusted. To resolve the problem, in this paper, we propose a novel real-time integrity protection scheme for vehicle black box device. We also present the evaluation results by simulation using our software implementation.

Design and Implementation of a Spatial-Operation-Trigger for Supporting the Integrity of Meet-Spatial-Objects (상접한 공간 객체의 무결성 지원을 위한 공간 연산 트리거의 설계 및 구현)

  • Ahn, Jun-Soon;Cho, Sook-Kyoung;Chung, Bo-Hung;Lee, Jae-Dong;Bae, Hae-Young
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.2
    • /
    • pp.127-140
    • /
    • 2002
  • In a spatial database system, the semantic integrity should be supported for maintaining the data consistency. In the real world, spatial objects In boundary layer should always meet neighbor objects, and they cannot hold the same name. This characteristic is an implied concept in real world. So, when this characteristic is disobeyed due to the update operations of spatial objects, it is necessary to maintain the integrity of a layer. In this thesis, we propose a spatial-operation-trigger for supporting the integrity of spatial objects. The proposed method is defined a spatial-operation-trigger based on SQL-3 and executed when the constraint condition is violated. A spatial-operation-trigger have the strategy of execution. Firstly, for one layer, the spatial and aspatial data triggers are executed respectively. Secondly, the aspatial data trigger for the other layers is executed. Spatial-operation-trigger for one layer checks whether the executed operation updates only spatial data, aspatial data, or both of them, and determines the execution strategy of a spatial-operation-trigger. Finally, the aspatial data trigger for the other layers is executed. A spatial-operation-trigger is executed in three steps for the semantic integrity of the meet-property of spatial objects. And, it provides the semantic integrity of spatial objects and the convenience for users using automatic correcting operation.

A Study on the Verification of Integrity of Message Structure in Naval Combat Management System

  • Jung, Yong-Gyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.12
    • /
    • pp.209-217
    • /
    • 2022
  • Naval CMS(Combat Management System) is linked to various sensors and weapon equipment and use DDS(Data Distribution Service) for efficient data communication between ICU(Interface Control Unit) Node and IPN(Information Processing Node). In order to use DDS, software in the system communicates in an PUB/SUB(Publication/Subscribe) based on DDS topic. If the DDS messages structure in this PUB/SUB method does not match, problems such as incorrect command processing and wrong information delivery occur in sending and receiving application software. To improve this, this paper proposes a DDS message structure integrity verification method. To improve this, this paper proposes a DDS message structure integrity verification method using a hash tree. To verify the applicability of the proposed method to Naval CMS, the message integrity verification rate of the proposed method was measured, and the integrity verification method was applied to CMS and the initialization time of the existing combat management system was compared and the hash tree generation time of the message structures was measured to understand the effect on the operation and development process of CMS. Through this test, It was confirmed that the message structure verification method for system stability proposed in this paper can be applied to the Naval CMS.

REVIEW OF SPENT FUEL INTEGRITY EVALUATION FOR DRY STORAGE

  • Kook, Donghak;Choi, Jongwon;Kim, Juseong;Kim, Yongsoo
    • Nuclear Engineering and Technology
    • /
    • v.45 no.1
    • /
    • pp.115-124
    • /
    • 2013
  • Among the several options to solve PWR spent fuel accumulation problem in Korea, the dry storage method could be the most realistic and applicable solution in the near future. As the basic objectives of dry storage are to prevent a gross rupture of spent fuel during operation and to keep its retrievability until transportation, at the same time the importance of a spent fuel integrity evaluation that can estimate its condition at the final stage of dry storage is very high. According to the national need and technology progress, two representative nations of spent fuel dry storage, the USA and Japan, have established different system temperature criteria, which is the only controllable factor in a dry storage system. However, there are no technical criteria for this evaluation in Korea yet, it is necessary to review the previously well-organized methodologies of advanced countries and to set up our own domestic evaluation direction due to the nation's need for dry storage. To satisfy this necessity, building a domestic spent fuel test database should be the first step. Based on those data, it is highly recommended to compare domestic data range with foreign results, to build our own criteria, and to expand on evaluation work into recently issued integrity problems by using a comprehensive integrity evaluation code.

Relations between Gratitude Disposition and Ego-Integrity of Korean Elderly Men and Women: Mediating Effects of Generativity and Relatedness (남녀노인의 감사성향과 자아통합감의 관계: 생성감과 관계성의 매개효과)

  • Choe, Myeong Ae;An, Jeong Shin
    • Human Ecology Research
    • /
    • v.55 no.2
    • /
    • pp.181-192
    • /
    • 2017
  • This study investigated the relations between gratitude disposition and the ego-integrity of elderly men and women, focused on generativity and relatedness toward spouse, children, and friends as well as examined gender differences for each path. The subjects were 341 Korean elderly men and women over the age of 60 living in the Busan, Daegu, and Gyeongsang areas. Collected data were analyzed by PASW ver. 18.0 and AMOS 20.0 programs; in addition, frequency, Cronbach ${\alpha}$, Pearson's correlation coefficients, t-test and structural equation modeling were also used for data analysis. The results were as follows. First, the Korean elderly's gratitude disposition had a positive influence on ego-integrity and generativity as well as on relatedness toward spouse, children, and friends. In addition, the relatedness toward spouse, children, and friends of Korean elderly had direct influences on generativity and indirect influences on ego-integrity by mediating generativity. Second, it showed that there was a gender difference in the structural model that explained the relations among the variables. Korean elderly men's relatedness toward spouse, children, and friends had direct effects on generativity. However, in case of Korean elderly women, only relatedness toward children and friends had effects on generativity. The results were discussed in terms of elderly education.

Benford's Law and its Potential for Data Verification in Ecological Monitoring

  • Tae-Jun Choi;Woong-Bae Park;Dae-Hee Kim;Dohee Lee;Yuno Do
    • Proceedings of the National Institute of Ecology of the Republic of Korea
    • /
    • v.5 no.2
    • /
    • pp.43-49
    • /
    • 2024
  • Ecological monitoring provides indispensable data for biodiversity conservation and sustainable resource management. However, the complexity and variability inherent in ecological monitoring data necessitate robust verification processes to ensure data integrity. This study employed Benford's Law, a statistical principle traditionally used in fields such as finance and health sciences, to evaluate the authenticity of ecological monitoring data related to the abundance of migratory bird species across various locations in South Korea. Benford's Law anticipates a specific logarithmic distribution of leading digits in naturally occurring numerical datasets. Our investigation involved two stages of analysis: a first-order analysis considering the leading digit and a second-order analysis examining the first two digits of bird population counts. While the first-order analysis displayed moderate conformity to Benford's Law that suggested overall data integrity, the second-order analysis revealed more pronounced deviations, indicating potential inconsistencies or inaccuracies in certain subsets of the data. Although our data did not perfectly align with Benford's Law, these deviations underscore the complex nature of ecological research, which is influenced by a multitude of environmental, methodological, and human factors.

Identifying Minimum Data Sets of Oral Mucous Integrity Assessment for Documentation Systematization (구강점막의 통합성 사정기록 체계화를 위한 최소자료세트(Minimum Data Set) 규명)

  • Kim, Myoung Soo;Jung, Hyun Kyeong;Kang, Myung Ja;Park, Nam Jung;Kim, Hyun Hee;Ryu, Jeong Mi
    • Journal of Korean Critical Care Nursing
    • /
    • v.12 no.1
    • /
    • pp.46-56
    • /
    • 2019
  • Purpose : The purpose of this study was to identify minimum data sets for oral mucous integrity-related documentation and to analyze nursing records for oral care. Methods: To identify minimum data sets for oral status, the authors reviewed 26 assessment tools and a practical guideline for oral care. The content validity of the minimum data sets was assessed by three nurse specialists. To map the minimum data sets to nursing records, the authors examined 107 nursing records derived from 44 patients who received chemotherapy or hematopoietic stem cell transplantation in one tertiary hospital. Results: The minimum data sets were 10 elements such as location, mucositis grade, pain, hygiene, dysphagia, exudate, inflammation, difficulty speaking, and moisture. Inflammation contained two value sets: type and color. Mucositis grade, pain, dysphagia and inflammation were recorded well, accounting for a complete mapping rate of 100%. Hygiene (100%) was incompletely mapped, and there were no records for exudate (83.2%), difficulty speaking (99.1%), or moisture (88.8%). Conclusion: This study found that nursing records on oral mucous integrity were not sufficient and could be improved by adopting minimum data sets as identified in this study.

Provable Security of 3GPP Integrity Algorithm f9 (3GPP 무결성 알고리즘 f9의 증명가능 안전성)

  • Hong, Do-won;Shin, Sang-Uk;Ryu, Heui-su;Chung, Kyo-Il
    • The KIPS Transactions:PartC
    • /
    • v.9C no.4
    • /
    • pp.573-580
    • /
    • 2002
  • Within the security architecture of the 3GPP system there is a standardised integrity algorithm f9. The integrity algorithm f9 computes a MAC to authenticate the data integrity and data origin of signalling data over a radio access link of W-CDMA IMT-2000. f9 is a variant of the standard CBC MAC based on the block cipher KASUMI. In this paper we provide the provable security of f9 We prove that f9 is secure by giving concrete bound on an adversary's inability to forge in terms of her inability to distinguish the underlying block cipher from a pseudorandom permutation.

Design and Analysis of the Log Authentication Mechanism based on the Merkle Tree (Merkle Tree 기반의 로그인증 메커니즘 설계 및 분석)

  • Lee, Jung yeob;Park, Chang seop
    • Convergence Security Journal
    • /
    • v.17 no.1
    • /
    • pp.3-13
    • /
    • 2017
  • As security log plays important roles in various fields, the integrity of log data become more and more important. Especially, the stored log data is an immediate target of the intruder to erase his trace in the system penetrated. Several theoretical schemes to guarantee the forward secure integrity have been proposed, even though they cannot provide the integrity of the log data after the system is penetrated. Authentication tags of these methods are based on the linear-hash chain. In this case, it is difficult to run partial validation and to accelerate generating and validating authentication tags. In this paper, we propose a log authentication mechanism, based on Mekle Tree, which is easy to do partial validation and able to apply multi threading.

Countermeasure against MITM attack Integrity Violation in a BLE Network (BLE 네트워크에서 무결성 침해 중간자 공격에 대한 대응기법)

  • Han, Hyegyeon;Lee, Byung Mun
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.2
    • /
    • pp.221-236
    • /
    • 2022
  • BLE protocol prevents MITM attacks with user interaction through some input/output devices such as keyboard or display. Therefore, If it use a device which has no input/output facility, it can be vulnerable to MITM attack. If messages to be sent to a control device is forged by MITM attack, the device can be abnormally operated by malicious attack from attacker. Therefore, we describes a scenario which has the vulnerabilities of the BLE network in this paper and propose countermeasure method against MITM attacks integrity violations. Its mechanism provides data confidentiality and integrity with MD5 and security key distribution of Diffie Helman's method. In order to verify the effectiveness of the countermeasure method proposed in this paper, we have conducted the experiments. ​As experiments, the message was sent 200 times and all of them successfully detected whether there was MITM attack or not. In addition, it took at most about 4.2ms delay time with proposed countermeasure method between devices even attacking was going on. It is expected that more secure data transmission can be achieved between IoT devices on a BLE network through the method proposed.