• Title/Summary/Keyword: Intruder

Search Result 157, Processing Time 0.025 seconds

ZERO-KNOWLEDGE GROUP IDENTIFICATION AND HIDDEN GROUP SIGNATURE FOR SMART CARDS USING BILINEAR PAIRINGS

  • Lee, Young Whan;Choi, Byung Mun
    • Journal of the Chungcheong Mathematical Society
    • /
    • v.20 no.4
    • /
    • pp.355-366
    • /
    • 2007
  • In this paper, we propose a new blind group identification protocol and a hidden group signature protocol as its application. These protocols involve many provers and one verifier such that (1) the statement of all the provers are proved simultaneously, (2) and also all the provers using computationally limited devices (e.g. smart cards) have no need of computing the bilinear pairings, (3) but only the verifier uses the bilinear pairings. A. Saxena et al. proposed a two-round blind (group) identification protocol in 2005 using the bilinear pairings. But it reveals weakness in the active-intruder attack, and all the provers as well as the verifier must have devices computing bilinear pairings. Comparing their results, our protocol is secure from the active-intruder attack and has more fit for smart cards. In particular, it is secure under only the assumption of the hardness of the Discrete-Logarithm Problem in bilinear groups.

  • PDF

Omnidirectional Camera System Design for a Security Robot (경비용 로봇을 위한 전방향 카메라 장치 설계)

  • Kim, Kilsu;Do, Yongtae
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.3 no.2
    • /
    • pp.74-81
    • /
    • 2008
  • This paper describes a low-cost omnidirectional camera system designed for the intruder detection capability of a security robot. Moving targets on sequential images are detected first by an adaptive background subtraction technique, and the targets are identified as intruders if they fail to enter a password within a preset time. A warning message is then sent to the owner's mobile phone. The owner can check scene pictures posted by the system on the web. The system developed worked well in experiments including a situation when the indoor lighting was suddenly changed.

  • PDF

Intruder Tracking and Collision Avoidance Algorithm Design for Unmanned Aerial Vehicles using a Model-based Design Method (모델 기반 설계 기법을 이용한 무인항공기의 침입기 추적 및 충돌회피 알고리즘 설계)

  • Choi, Hyunjin;Yoo, Chang-Sun;Ryu, Hyeok;Kim, Sungwook;Ahn, Seokmin
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.25 no.4
    • /
    • pp.83-90
    • /
    • 2017
  • Unmanned Aerial Vehicles(UAVs) require collision avoidance capabilities equivalent to the capabilities of manned aircraft to enter the airspace of manned aircraft. In the case of Visual Flight Rules of manned aircraft, collision avoidance is performed by 'See-and-Avoid' of pilots. To obtain those capabilities of UAVs named as 'Sense-and-Avoid', sensor-system-based intruder tracking and collision avoidance methods are required. In this study, a multi-sensor-based tracking, data fusion, and collision avoidance algorithm is designed by using a model-based design tool MATLAB/SIMULINK, and validations of the designed model and code using numerical simulations and processor-in-the-loop simulations are performed.

Design and implementation of a surveillance robot (TMO 기반 감시 로봇의 설계 및 구현)

  • Chung, Yoojin;Park, Sunsik;Lee, Jaehyo
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.856-860
    • /
    • 2009
  • In this paper, we design and implement a surveillance robot to detect an intruder in an empty office. We use a TMO-Linux kernel for a real-time surveillance and use a X-Bot platform for a robot. We design and implement an image server to process images and to detect an intruder. And we design and implement a client to communicate with a image server and TMO server and control a camera on a surveillance robot.

  • PDF

BLIND IDENTIFICATION USING BILINEAR PAIRINGS FOR SMART CARDS

  • Lee, Young-Whan
    • Journal of applied mathematics & informatics
    • /
    • v.26 no.5_6
    • /
    • pp.1139-1147
    • /
    • 2008
  • A. Saxena et al. first proposed a two-flow blind identification protocol in 2005. But it has a weakness of the active-intruder attack and uses the pairing operation that causes slow implementation in smart cards. In this paper, we give a method of the active-intruder attack on their identification scheme and propose a new zero- knowledge blind identification protocol for Smart cards. Our protocol consists of only two message flows and does not rely on any underlying signature or encryption scheme. The prover using computationally limited devices such as smart cards has no need of computing the bilinear pairings. It needs only for the verifier. Our protocol is secure assuming the hardness of the Discrete-Logarithm Problem in bilinear groups.

  • PDF

Study on Institutional Control Period for Near Surface Disposal Facilities Considering Inadvertent Intruder Scenarios

  • Yoon, Jeong-Hyoun;Kim, Chang-Lak;Park, Heui-Joo;Park, Joo-Wan;Byoung moo Kang;Gyuseong Cho
    • Proceedings of the Korean Nuclear Society Conference
    • /
    • 1998.05b
    • /
    • pp.441-446
    • /
    • 1998
  • As for safety assessment of a radioactive waste disposal facility, radiation dose to inadvertent intruders is evaluated according to scenarios related to intruder's postulated activities at the disposal site after the end of Institutional Control Period(ICP). Simple trench and Below Ground Vault(BGV) are considered for this study as alternative disposal systems, and different scenarios are applied to each disposal type. The results show that 300 years of ICP is needed for simple trench and 100 years for BGV. Even for BGV, concentration of long-lived radioactive nuclides should be limited considering degradation of BGV after 300 years.

  • PDF

Asynchronous Behavior Control Algorithm of the Swarm Robot for Surrounding Intruders (군집 로봇의 침입자 포위를 위한 비동기 행동 제어 알고리즘)

  • Kim, Jong-Seon;Joo, Young-Hoon
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.18 no.9
    • /
    • pp.812-818
    • /
    • 2012
  • In this paper, we propose an asynchronous behavior control algorithm of the swarm robot for surrounding intruders when detected an intruder in a surveillance environment. The proposed method is divided into three parts: First, we proposed the method for the modeling of a state of the swarm robot. Second, we proposed an asynchronous behavior control algorithm for the surrounding an intruder by the swarm robot. Third, we proposed a control method for the collision avoidance with the swarm robot. Finally, we show the effectiveness and feasibility of the proposed method through some experiments.

A Study for Detection of the Kernel Backdoor Attack and Design of the restoration system (커널 백도어 공격 탐지 및 복구시스템 설계에 관한 연구)

  • Jeon, Wan-Keun;Oh, Im-Geol
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.12 no.3
    • /
    • pp.104-115
    • /
    • 2007
  • As soon as an intrusion is detected by kernel backdoor, the proposed method can be preserve secure and trustworthy evidence even in a damaged system. As an experimental tool, we implement a backup and analysis system, which can be response quickly, to minimize the damages. In this paper, we propose a method, which can restore the deleted log file and analyze the image of a hard disk, to be able to expose the location of a intruder.

  • PDF

Security Verification of a Communication Authentication Protocol in Vehicular Security System (자동차 보안시스템에서 통신 인증프로토콜의 보안성 검증)

  • Han, Myoungseok;Bae, WooSik
    • Journal of Digital Convergence
    • /
    • v.12 no.8
    • /
    • pp.229-234
    • /
    • 2014
  • Vehicular electronic communication system has continued to develop in favor of high performance and user convenience with the evolution of auto industry. Yet, due to the nature of communication system, concerns over intruder attacks in transmission sections have been raised with a need for safe and secure communication being valued. Any successful intruder attacks on vehicular operation and control systems as well as on visual equipment could result in serious safety and privacy problems. Thus, research has focused on hardware-based security and secure communication protocols. This paper proposed a safe and secure vehicular communication protocol, used the formal verification tool, Casper/FDR to test the security of the proposed protocol against different types of intruder attacks, and verified that the proposed protocol was secure and ended without problems.

Design of watermark trace-back system to supplement connection maintenance problem

  • Kim, Hwan-Kuk;Han, Seung-Wan;Seo, Dong-Il;Lee, Sang-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2151-2154
    • /
    • 2003
  • Internet is deeply rooted in everyday life and many things are performed using internet in real-world, therefore internet users increased because of convenience. Also internet accident is on the increase rapidly. The security vendor developed security system to protect network and system from intruder. Many hackings can be prevented and detected by using these security solutions. However, the new hacking methods and tools that can detour or defeat these solutions have been emerging and even script kids using these methods and tools can easily hack the systems. In consequence, system has gone through various difficulties. So, Necessity of intruder trace-back technology is increased gradually. Trace-back technology is tracing back a malicious hacker to his real location. trace-back technology is largely divided into TCP connection trace-back and IP packet trace-back to trace spoofed IP of form denial-of-service attacks. TCP connection trace-back technology that autonomously traces back the real location of hacker who attacks system using stepping stone at real time. In this paper, We will describe watermark trace-back system using TCP hijacking technique to supplement difficult problem of connection maintenance happened at watermark insertion. Through proposed result, we may search attacker's real location which attempt attack through multiple connection by real time.

  • PDF