• Title/Summary/Keyword: Internet Security Simulation

Search Result 221, Processing Time 0.022 seconds

Performance Analysis of the Amplify-and-Forward Scheme under Interference Constraint and Physical Layer Security (물리 계층 보안과 간섭 제약 환경에서 증폭 후 전송 기법의 성능 분석)

  • Pham, Ngoc Son;Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.179-187
    • /
    • 2014
  • The underlay protocol is a cognitive radio method in which secondary or cognitive users use the same frequency without affecting the quality of service (QoS) for the primary users. In addition, because of the broadcast characteristics of the wireless environment, some nodes, which are called eavesdropper nodes, want to illegally receive information that is intended for other communication links. Hence, Physical Layer Security is applied considering the achievable secrecy rate (ASR) to prevent this from happening. In this paper, a performance analysis of the amplify-and-forward scheme under an interference constraint and Physical Layer Security is investigated in the cooperative communication mode. In this model, the relays use an amplify-and- forward method to help transmit signals from a source to a destination. The best relay is chosen using an opportunistic relay selection method, which is based on the end-to-end ASR. The system performance is evaluated in terms of the outage probability of the ASR. The lower and upper bounds of this probability, based on the global statistical channel state information (CSI), are derived in closed form. Our simulation results show that the system performance improves when the distances from the relays to the eavesdropper are larger than the distances from the relays to the destination, and the cognitive network is far enough from the primary user.

An Implementation of UWB IR System for Long Distance and High-precision Localization (장거리 고정밀 측위를 위한 UWB IR 시스템 구현)

  • Kim, Ki-Yun;Kim, Gil-Gyeom;Kim, Tae-Kwon
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.30 no.1
    • /
    • pp.87-95
    • /
    • 2016
  • Recently, the interests of the precise localization are rapidly increasing, which are linked to IoT(Internet of Things) sensors. The precise localization in indoor environment can be utilized in navigation, security, anti-collision, and various location based services etc. However, conventional positioning sensors, such as PIR, ultrasonic, microwave etc. are vulnerable to weather or insensitive to direction of subject movement or low precision performance. In this paper we implement a UWB-IR localization system for long distance and high-precision localization, which is not affected by temperature, light and weather. The proposed system was divided and designed by H/W, Antenna, S/W parts, each of which was designed based on an accurate analysis and simulation. As a result, we can implemented and verified UWB IR system with precise localization performance.

Sketch effect generating technique based on real painting analysis (실제 작품 분석에 기반한 스케치 효과 생성 기법)

  • Lee, Won-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.8
    • /
    • pp.3687-3691
    • /
    • 2012
  • Various digital contents generation techniques are widely utilized by upgrading PC and mobile device. In this paper, we propose sketch effect simulation based on real drawing pieces. For this, we analyze Vincent Van Gogh's drawing pieces; and then construct DB by extracting sketch stroke pattern of each object. From this database, we select stroke pattern at each object, and then, apply it. Our algorithm can generate similar effect look like real drawing piece. It may be utilized various contents such as children's painting education book.

Efficient Scheduling Algorithm for drone power charging

  • Tajrian, Mehedi;Kim, Jai-Hoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.05a
    • /
    • pp.60-61
    • /
    • 2019
  • Drones are opening new horizon as a major Internet-of-Things (IoT) player which is a network of objects. Drone needs to charge itself during providing services from the charging stations. If there are lots of drones and one charging station, then it is a critical situation to decide which drone should get charged first and make order of priorities for drones to get charged sequentially. In this paper, we propose an efficient scheduling algorithm for drone power charging (ESADPC), in which charging station would have a scheduler to decide which drone can get charged earlier among many other drones. Simulation results have showed that our algorithm reduces the deadline miss ration and turnaround time.

A Study on Trend Impact Analysis Based of Adaptive Neuro-Fuzzy Inference System

  • Yong-Gil Kim;Kang-Yeon Lee
    • International journal of advanced smart convergence
    • /
    • v.12 no.1
    • /
    • pp.199-207
    • /
    • 2023
  • Trend Impact Analysis is a prominent hybrid method has been used in future studies with a modified surprise- free forecast. It considers experts' perceptions about how future events may change the surprise-free forecast. It is an advanced forecasting tool used in futures studies for identifying, understanding and analyzing the consequences of unprecedented events on future trends. In this paper, we propose an advanced mechanism to generate more justifiable estimates to the probability of occurrence of an unprecedented event as a function of time with different degrees of severity using adaptive neuro-fuzzy inference system (ANFIS). The key idea of the paper is to enhance the generic process of reasoning with fuzzy logic and neural network by adding the additional step of attributes simulation, as unprecedented events do not occur all of a sudden but rather their occurrence is affected by change in the values of a set of attributes. An ANFIS approach is used to identify the occurrence and severity of an event, depending on the values of its trigger attributes.

MARINE-based Man in the Middle Attack Detection Method Using Traffic Information Accumulated in IoV (IoV에서 축적된 교통 정보를 활용한 MARINE 기반 중간자 공격 탐지 방법)

  • Wonjin Chung;Taeho Cho
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.01a
    • /
    • pp.97-100
    • /
    • 2023
  • 차량 인터넷은 목적지까지 스스로 주행하는 자율 주행 자동차의 최적 경로 설정을 도와주는 차세대 네트워크이다. 자율 주행 자동차의 원활한 자율 주행을 위해서는 도로 위 객체 인지뿐만 아니라 실시간 교통 정보가 수신되어야 한다. 공격자는 자동차로 전달되는 메시지를 탈취하여 내용을 변경하거나 메시지를 제거하는 중간자 공격을 시도할 수 있다. 중간자 공격을 탐지하기 위해 MARINE 기법이 제안되었지만, 주행하는 자동차가 적은 환경에서 중간자 공격을 탐지하기 어렵다. 제안 방법은 이러한 문제를 해결하기 위해 교통 정보 센터에 축적된 교통 정보를 이용하여 자동차에 전달되는 메시지를 분석하고 중간자 공격을 탐지하는 방법을 제안한다.

  • PDF

Implementation of a Network Simulator for Cyber Attacks and Detections based on SSFNet (SSFNet 기반 사이버 공격 및 탐지를 위한 네트워크 시뮬레이터의 구현)

  • Shim, Jae-Hong;Jung, Hong-Ki;Lee, Cheol-Won;Choi, Kyung-Hee;Park, Seung-Kyu;Jung, Gi-Hyun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.4
    • /
    • pp.457-467
    • /
    • 2002
  • In order to simulate cyber attacks and predict network behavior by attacks, we should represent attributes of network components in the simulation model, and should express characteristics of systems that carry out various cyber attacks and defend from these attacks. To simulate how network load may change under the cyber attacks, we extended SSF[9, 10] that is process-based event-oriented simulation system. We added a firewall class and a packet manipulator into the SSFNet that is a component of SSF. The firewall class, which is related to the security, is to simulate cyber attacks, and the packet manipulator is a set of functions to write attack programs for the simulation. The extended SSFNet enables to simulate a network with the security systems and provides advantages that make easy to port already exsiting attack programs and apply them to the simulation evironment. We made a vitual network model to verify operations of the added classes, and simulated a smurf attack that is a representative denial of sevive attack, and observed the network behavior under the smurf attack. The results showed that the firewall class and packet manipulator developed in this paper worked normaly.

An Efficient Authentication Mechanism in Mobile-IP Network (Mobile-IP망에서의 효율적인 인증 방안)

  • Chung, Sun-Nie;Chae, Ki-Joon;Jang, Jong-Soo;Sohn, Sung-Won
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.3
    • /
    • pp.321-335
    • /
    • 2001
  • The explosive growth in wireless networking increasingly urges the demand to support mobility within the Internet which is what Mobile-IP aims to provide. Because the transmission of signals through open-air s easy to be attacked, it is important to provide secure transmission for mobile users and make them responsible for what they have done in networks. Although IETF provides a secret-key based security mechanism, those mechanisms suffer from scalability, efficiency and non-repudiation service problem. The proposed mechanism uses public-key based authentication optimizing the performance. It includes non-repudiation service on the side of mobile for airtight security in wireless network. The simulation results show that the proposed authentication reduces the total registration time. It especially minimizes the computation cost on the side of the mobile node and solves the power problem. In practice, the proposed authentication is feasible with reasonable performance and security service in macro mobility that Mobile-IP is intended to solve.

  • PDF

Designing an Efficient and Secure Credit Card-based Payment System with Web Services Based on the ANSI X9.59-2006

  • Cheong, Chi Po;Fong, Simon;Lei, Pouwan;Chatwin, Chris;Young, Rupert
    • Journal of Information Processing Systems
    • /
    • v.8 no.3
    • /
    • pp.495-520
    • /
    • 2012
  • A secure Electronic Payment System (EPS) is essential for the booming online shopping market. A successful EPS supports the transfer of electronic money and sensitive information with security, accuracy, and integrity between the seller and buyer over the Internet. SET, CyberCash, Paypal, and iKP are the most popular Credit Card-Based EPSs (CCBEPSs). Some CCBEPSs only use SSL to provide a secure communication channel. Hence, they only prevent "Man in the Middle" fraud but do not protect the sensitive cardholder information such as the credit card number from being passed onto the merchant, who may be unscrupulous. Other CCBEPSs use complex mechanisms such as cryptography, certificate authorities, etc. to fulfill the security schemes. However, factors such as ease of use for the cardholder and the implementation costs for each party are frequently overlooked. In this paper, we propose a Web service based new payment system, based on ANSI X9.59-2006 with extra features added on top of this standard. X9.59 is an Account Based Digital Signature (ABDS) and consumer-oriented payment system. It utilizes the existing financial network and financial messages to complete the payment process. However, there are a number of limitations in this standard. This research provides a solution to solve the limitations of X9.59 by adding a merchant authentication feature during the payment cycle without any addenda records to be added in the existing financial messages. We have conducted performance testing on the proposed system via a comparison with SET and X9.59 using simulation to analyze their levels of performance and security.

MANET Certificate Model Using Distributed Partial-Certificate with Cooperation of Cluster Member Node (MANET 환경 하에서 멤버 노드간의 협력에 의해 분산된 인증서를 이용한 인증서비스에 관한 연구)

  • Lee, Dae-Young;Song, Sang-Hoon;Bae, Sang-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.1
    • /
    • pp.206-215
    • /
    • 2007
  • Ad-Hoc network technology is a mobile internet technology of the future that will be used widely not only in Mobile Network but also in Wireless Personal Area Network (WPAN) and Ubiquitous Network For this to occur, distributed routing protocol design, loop prevention for link information reduction in overhead for control messages and route restoration algorithm must be improved or complemented. Security techniques that can guarantee safe com-munication between Ad-Hot nodes net also be provided. This study proposes and evaluates a new authentication mechanism for MANET. The mechanism segregates the roles of certification authority to keep with the dynamic mobility of nodes and handle rapid and random topological changes with minimal over-head. That is, this model is characterized by its high expandability that allows the network to perform authentication service without the influence of joining and leaving nodes. The efficiency and security of this concept was evaluated through simulation.