• Title/Summary/Keyword: Location verification

Search Result 311, Processing Time 0.03 seconds

Analysis of VANET Authentication Protocol using Casper in the Formal Verification (정형검증 도구인 Casper를 이용한 VANET 인증 프로토콜 분석)

  • Lee, Su-Youn;Ahn, Hyo-Beom
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.27-33
    • /
    • 2012
  • VANET(Vehicular Ad-hoc Network) is a kind of ad hoc networks consist of intelligence vehicular ad nodes, and has become a hot emerging research project in many fields. It provide traffic safety, cooperative driving and etc. but has also some security problems that can be occurred in general ad hoc networks. Also, in VANET, vehiculars sho uld be able to authenticate each other to securely communicate with network-based infrastructure, and their location s and identifiers should not be exposed from the communication messages. This paper explains V2I authentication pr otocol using a hash function that preserves the user privacy. In addition, we analyze the security stability of the V2I authentication protocol using Casper in the formal verification technique. As a result, V2I authentication protocol us ing hash function prove a stability.

Car Collision Verification System for the Ubiquitous Parking Management (유비쿼터스 주차관리를 위한 차량충돌 검증시스템)

  • Mateo, Romeo Mark A.;Yang, Hyun-Ho;Lee, Jae-Wan
    • Journal of Internet Computing and Services
    • /
    • v.12 no.5
    • /
    • pp.101-111
    • /
    • 2011
  • Most researches in WSN-based parking management system used wireless sensors to monitor the events in a car parking area. However, the problem of car collisions in car parks was not discussed by previous researches. The car position details over time are vital in analyzing a collision event. This paper proposes a collision verification method to detect and to analyze the collision event in the parking area, and then notifies car owners. The detection uses the information from motion sensors for comprehensive details of position and direction of a moving car, and the verification processes an object tracking technique with a fast OBB intersection test. The performance tests show that the location technique is more accurate with additional sensors and the OBB collision test is faster compared to a normal OBB intersection test.

The Train of Location Detection Algorithm and Verification (열차 위치 검지 알고리즘 및 검증)

  • Jeong, Rag-Gyo;Cho, Hong-Sig;Chung, Sang-Gi;Yoon, Yong-Ki;Kim, Young-Seok
    • Proceedings of the KIEE Conference
    • /
    • 2004.10a
    • /
    • pp.221-223
    • /
    • 2004
  • Accurate and reliable tracking system is essential for the central train control system. There are two systems widely being used, one is the fixed block system which utilizes the track circuit for the detection of train position, the other is the moving block system which has the advantage over the former since it enables shorter radio signal for the train position detection. In this paper a new algorithm is proposed which uses signal's phase difference of arrival to detect the train position. Experimental verification of the algorithm is presented in the paper.

  • PDF

An Overview of Content Poisoning in NDN: Attacks, Countermeasures, and Direction

  • Im, Hyeonseung;Kim, Dohyung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.7
    • /
    • pp.2904-2918
    • /
    • 2020
  • With a huge demand for replicated content on the Internet, a new networking paradigm called information-centric networking (ICN) has been introduced for efficient content dissemination. In ICN, named content is distributed over the network cache and it is accessed by name instead of a location identifier. These aspects allow users to retrieve content from any of the nodes having replicas, and consequently 1) network resources are more efficiently utilized by avoiding redundant transmission and 2) more scalable services are provided by distributing server loads. However, in-network caching in ICN brings about a new type of security issues, called content poisoning attacks, where fabricated content is located in the network cache and interferes with the normal behavior of the system. In this paper, we look into the problems of content poisoning in ICN and discuss security architectures against them. In particular, we reconsider the state-of-the-art schemes from the perspective of feasibility, and propose a practical security architecture.

Location detection algorithm and verification (열차의 위치측위 알고리즘 및 검증)

  • Jeong Rak Gyo;Shin Ki Dong;Chung Sang Gi;Cho Hong-Shik
    • Proceedings of the KSR Conference
    • /
    • 2004.10a
    • /
    • pp.1229-1234
    • /
    • 2004
  • Accurate and reliable tracking system is essential for the central train control system. There are two systems widely being used. one is the fixed block system which utilizes the track circuit for the detection of train position. the other is the moving block system which has the advantage over the former since it enables shorter radio signal for the train position detection. In this paper a new algorithm is proposed which uses signal's phase difference of arrival to detect the train position. Experimental verification of the algorithm is presented in the paper.

  • PDF

Landslide Susceptibility Analysis and its Verification using Likelihood Ratio, Logistic Regression and Artificial Neural Network Methods: Case study of Yongin, Korea

  • Lee, S.;Ryu, J. H.
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.132-134
    • /
    • 2003
  • The likelihood ratio, logistic regression and artificial neural networks methods are applied and verified for analysis of landslide susceptibility in Yongin, Korea using GIS. From a spatial database containing such data as landslide location, topography, soil, forest, geology and land use, the 14 landsliderelated factors were calculated or extracted. Using these factors, landslide susceptibility indexes were calculated by likelihood ratio, logistic regression and artificial neural network methods. Before the calculation, the study area was divided into two sides (west and east) of equal area, for verification of the methods. Thus, the west side was used to assess the landslide susceptibility, and the east side was used to verify the derived susceptibility. The results of the landslide susceptibility analysis were verified using success and prediction rates. The v erification results showed satisfactory agreement between the susceptibility map and the exis ting data on landslide locations.

  • PDF

Development of a Spatial Location-Allocation Model of Center Villages (I) - Development and Verification of Model - (농촌중심마을의 공간적 입지-배분 모형의 개발(I) - 모형의 개발 및 검증 -)

  • 김대식;정하우
    • Magazine of the Korean Society of Agricultural Engineers
    • /
    • v.43 no.2
    • /
    • pp.112-121
    • /
    • 2001
  • In this study, a spatial location-allocation model of center villages (SLAMCV) was developed for selecting spatial center villages and allocating their rear villages. In SLAMCV, rural space was considered as a network with villages for nodes and roads for connecting lines. For quantification of residents’ accessibilities in the network, a disutility index (DUI) was developed and used, which is dependent upon travelling distance between the center and its hinter villages, design vehicle speed in connecting road and population of hinter villages. SLAMCV was verified to Christaller’s hexagonal hierachical settlement system to test the theoretical reasonability and computing algorithm of the model.

  • PDF

Propose of New Ultrasonic Nondestructive Code Considering Discontinuity Position (불연속부의 위치를 고려한 초음파 비파괴 검사 규격의 개선안)

  • Jeong, Hwa-Young;Shin, Byoung-Chul;Jung, Beom-Seok;Lee, Chang-Moo
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.3 no.4
    • /
    • pp.173-178
    • /
    • 1999
  • KS-code(KS B 0896) for nondestructive ultrasonic testing classifies the quality level by ratio of flaw size to plate thickness only. But stress distributions using verification(3 point bending test) show that location of the flaws is more important than the flaw size. So. KS-code should take the effect of flaw location for classifying the quality level of welded steel structures.

  • PDF

Study of Security Issue and Application of EXIF tag in Image File (이미지 파일 EXIF 태그의 정보보호 및 활용에 관한 연구)

  • Seo, Tae-Woong;Kim, Chang-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.695-696
    • /
    • 2011
  • Smart-phone is appropriate for using image information and location information. However it is possible to be exploited for forgery and manipulation. So we experimented on modified data on the smart-phone as image and location information in EXIF and researched the technology for data verification.

  • PDF

Probabilistic Landslide Susceptibility Analysis and Verification using GIS and Remote Sensing Data at Penang, Malaysia

  • Lee, S.;Choi, J.;Talib, En. Jasmi Ab
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.129-131
    • /
    • 2003
  • The aim of this study is to evaluate the hazard of landslides at Penang, Malaysia, using a Geographic Information System (GIS) and remote sensing. Landslide locations were identified in the study area from interpretation of aerial photographs and field surveys. The topographic and geologic data and satellite image were collected, processed and constructed into a spatial database using GIS and image processing. The used factors that influence landslide occurrence are topographic slope, topographic aspect topographic curv ature and distance from drainage from topographic database, geology and distance from lineament from the geologic database, land use from TM satellite image and vegetation index value from SPOT satellite image. Landslide hazardous area were analysed and mapped using the landslide-occurrence factors by probability - likelihood ratio - method. The results of the analysis were verified using the landslide location data. The validation results showed satisfactory agreement between the hazard map and the existing data on landslide location.

  • PDF