• 제목/요약/키워드: Intruder

검색결과 157건 처리시간 0.031초

ZERO-KNOWLEDGE GROUP IDENTIFICATION AND HIDDEN GROUP SIGNATURE FOR SMART CARDS USING BILINEAR PAIRINGS

  • Lee, Young Whan;Choi, Byung Mun
    • 충청수학회지
    • /
    • 제20권4호
    • /
    • pp.355-366
    • /
    • 2007
  • In this paper, we propose a new blind group identification protocol and a hidden group signature protocol as its application. These protocols involve many provers and one verifier such that (1) the statement of all the provers are proved simultaneously, (2) and also all the provers using computationally limited devices (e.g. smart cards) have no need of computing the bilinear pairings, (3) but only the verifier uses the bilinear pairings. A. Saxena et al. proposed a two-round blind (group) identification protocol in 2005 using the bilinear pairings. But it reveals weakness in the active-intruder attack, and all the provers as well as the verifier must have devices computing bilinear pairings. Comparing their results, our protocol is secure from the active-intruder attack and has more fit for smart cards. In particular, it is secure under only the assumption of the hardness of the Discrete-Logarithm Problem in bilinear groups.

  • PDF

경비용 로봇을 위한 전방향 카메라 장치 설계 (Omnidirectional Camera System Design for a Security Robot)

  • 김길수;도용태
    • 대한임베디드공학회논문지
    • /
    • 제3권2호
    • /
    • pp.74-81
    • /
    • 2008
  • This paper describes a low-cost omnidirectional camera system designed for the intruder detection capability of a security robot. Moving targets on sequential images are detected first by an adaptive background subtraction technique, and the targets are identified as intruders if they fail to enter a password within a preset time. A warning message is then sent to the owner's mobile phone. The owner can check scene pictures posted by the system on the web. The system developed worked well in experiments including a situation when the indoor lighting was suddenly changed.

  • PDF

모델 기반 설계 기법을 이용한 무인항공기의 침입기 추적 및 충돌회피 알고리즘 설계 (Intruder Tracking and Collision Avoidance Algorithm Design for Unmanned Aerial Vehicles using a Model-based Design Method)

  • 최현진;유창선;유혁;김성욱;안석민
    • 한국항공운항학회지
    • /
    • 제25권4호
    • /
    • pp.83-90
    • /
    • 2017
  • Unmanned Aerial Vehicles(UAVs) require collision avoidance capabilities equivalent to the capabilities of manned aircraft to enter the airspace of manned aircraft. In the case of Visual Flight Rules of manned aircraft, collision avoidance is performed by 'See-and-Avoid' of pilots. To obtain those capabilities of UAVs named as 'Sense-and-Avoid', sensor-system-based intruder tracking and collision avoidance methods are required. In this study, a multi-sensor-based tracking, data fusion, and collision avoidance algorithm is designed by using a model-based design tool MATLAB/SIMULINK, and validations of the designed model and code using numerical simulations and processor-in-the-loop simulations are performed.

TMO 기반 감시 로봇의 설계 및 구현 (Design and implementation of a surveillance robot)

  • 정유진;박선식;이재효
    • 한국콘텐츠학회:학술대회논문집
    • /
    • 한국콘텐츠학회 2009년도 춘계 종합학술대회 논문집
    • /
    • pp.856-860
    • /
    • 2009
  • 본 논문에서는 빈 사무실의 침입을 감시하는 로봇을 설계하고 구현한다. 실시간 감시를 위해 TMO-Linux 커널을 사용하였고 로봇으로 X-Bot 플랫폼을 이용하였다. 로봇의 카메라 움직임을 제어하고 영상을 처리하는 영상서버를 설계하고 구현하였다. 또한 영상서버와 TMO 서버와 통신하며 로봇과 카메라를 제어하는 클라이언트를 설계하고 구현하였다.

  • PDF

BLIND IDENTIFICATION USING BILINEAR PAIRINGS FOR SMART CARDS

  • Lee, Young-Whan
    • Journal of applied mathematics & informatics
    • /
    • 제26권5_6호
    • /
    • pp.1139-1147
    • /
    • 2008
  • A. Saxena et al. first proposed a two-flow blind identification protocol in 2005. But it has a weakness of the active-intruder attack and uses the pairing operation that causes slow implementation in smart cards. In this paper, we give a method of the active-intruder attack on their identification scheme and propose a new zero- knowledge blind identification protocol for Smart cards. Our protocol consists of only two message flows and does not rely on any underlying signature or encryption scheme. The prover using computationally limited devices such as smart cards has no need of computing the bilinear pairings. It needs only for the verifier. Our protocol is secure assuming the hardness of the Discrete-Logarithm Problem in bilinear groups.

  • PDF

Study on Institutional Control Period for Near Surface Disposal Facilities Considering Inadvertent Intruder Scenarios

  • Yoon, Jeong-Hyoun;Kim, Chang-Lak;Park, Heui-Joo;Park, Joo-Wan;Byoung moo Kang;Gyuseong Cho
    • 한국원자력학회:학술대회논문집
    • /
    • 한국원자력학회 1998년도 춘계학술발표회논문집(2)
    • /
    • pp.441-446
    • /
    • 1998
  • As for safety assessment of a radioactive waste disposal facility, radiation dose to inadvertent intruders is evaluated according to scenarios related to intruder's postulated activities at the disposal site after the end of Institutional Control Period(ICP). Simple trench and Below Ground Vault(BGV) are considered for this study as alternative disposal systems, and different scenarios are applied to each disposal type. The results show that 300 years of ICP is needed for simple trench and 100 years for BGV. Even for BGV, concentration of long-lived radioactive nuclides should be limited considering degradation of BGV after 300 years.

  • PDF

군집 로봇의 침입자 포위를 위한 비동기 행동 제어 알고리즘 (Asynchronous Behavior Control Algorithm of the Swarm Robot for Surrounding Intruders)

  • 김종선;주영훈
    • 제어로봇시스템학회논문지
    • /
    • 제18권9호
    • /
    • pp.812-818
    • /
    • 2012
  • In this paper, we propose an asynchronous behavior control algorithm of the swarm robot for surrounding intruders when detected an intruder in a surveillance environment. The proposed method is divided into three parts: First, we proposed the method for the modeling of a state of the swarm robot. Second, we proposed an asynchronous behavior control algorithm for the surrounding an intruder by the swarm robot. Third, we proposed a control method for the collision avoidance with the swarm robot. Finally, we show the effectiveness and feasibility of the proposed method through some experiments.

커널 백도어 공격 탐지 및 복구시스템 설계에 관한 연구 (A Study for Detection of the Kernel Backdoor Attack and Design of the restoration system)

  • 전완근;오임걸
    • 한국산업정보학회논문지
    • /
    • 제12권3호
    • /
    • pp.104-115
    • /
    • 2007
  • 커널 백도어로부터 공격이 탐지되는 즉시 해킹 피해를 입은 시스템에서 증거 손실을 최소화하고 안전하고 신뢰할 수 있는 증거 보존, 그리고 신속하게 대응하도록 함으로써 시스템 피해를 최소할 수 있는 백업 및 분석시스템을 설계 구현한다. 본 논문에서는 삭제된 로그파일을 복원하고 복원된 파일과 하드디스크의 이미지를 분석하여 해커의 위치를 찾을 수 있다.

  • PDF

자동차 보안시스템에서 통신 인증프로토콜의 보안성 검증 (Security Verification of a Communication Authentication Protocol in Vehicular Security System)

  • 한명석;배우식
    • 디지털융복합연구
    • /
    • 제12권8호
    • /
    • pp.229-234
    • /
    • 2014
  • 자동차산업의 발전과 함께 차량전자통신시스템이 고성능화 되어가고 있으며 사용자 편의 면에서도 상당히 많은 발전을 거듭해가고 있다. 그러나 통신시스템의 특성상 전송구간에서 공격자의 공격에 대한 문제가 제기되고 있으며 안전한 통신에 대한 필요성이 중요시 되고 있다. 자동차의 운행, 제어계통 및 영상장비 등에 공격자의 공격이 성공하게 되면 안전 및 프라이버시에 심각한 문제가 발생하게 된다. 따라서 하드웨어적인 보안 및 보안통신프로토콜에 대한 연구가 중요한 부분으로 이루어지고 있다. 본 논문에서는 안전한 차량 통신프로토콜을 제안하며 공격자의 각종 공격에 안전한 프로토콜을 정형검증도구인 Casper/FDR 도구를 이용하여 실험하였으며 제안 프로토콜이 안전하며 문제없이 종료됨을 확인하였다.

Design of watermark trace-back system to supplement connection maintenance problem

  • Kim, Hwan-Kuk;Han, Seung-Wan;Seo, Dong-Il;Lee, Sang-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2003년도 ICCAS
    • /
    • pp.2151-2154
    • /
    • 2003
  • Internet is deeply rooted in everyday life and many things are performed using internet in real-world, therefore internet users increased because of convenience. Also internet accident is on the increase rapidly. The security vendor developed security system to protect network and system from intruder. Many hackings can be prevented and detected by using these security solutions. However, the new hacking methods and tools that can detour or defeat these solutions have been emerging and even script kids using these methods and tools can easily hack the systems. In consequence, system has gone through various difficulties. So, Necessity of intruder trace-back technology is increased gradually. Trace-back technology is tracing back a malicious hacker to his real location. trace-back technology is largely divided into TCP connection trace-back and IP packet trace-back to trace spoofed IP of form denial-of-service attacks. TCP connection trace-back technology that autonomously traces back the real location of hacker who attacks system using stepping stone at real time. In this paper, We will describe watermark trace-back system using TCP hijacking technique to supplement difficult problem of connection maintenance happened at watermark insertion. Through proposed result, we may search attacker's real location which attempt attack through multiple connection by real time.

  • PDF