• Title/Summary/Keyword: Man-In-The-Middle

Search Result 618, Processing Time 0.028 seconds

Security Scheme for Prevent malicious Nodes in WiMAX Environment (WiMAX 환경에서 악의적 노드 예방을 위한 보안 기법)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.2
    • /
    • pp.382-389
    • /
    • 2009
  • As the use of mobile device is popularized, the needs of variable services of WiMAX technique and the importance of security is increasing. There is a problem that can be easily attacked from a malicious attack because the action is achieved connectionlessly between neighbor link establishing procedure and TEK exchange procedure in mobile WiMAX even though typical 1 hop network security technique is adapted to WiMAX for satisfying these security requirement. In this paper, security connected mechanism which safely connects neighbor link establishing procedure of WiMAX and TEK exchange procedure additional to the basic function provided by IEEE 802.16e standard to satisfy security requirement of mobile WiMAX is proposed. The proposed mechanism strengthens the function of security about SS and BS by application random number and private value which generated by SS and BS to public key of neighbor link establishing procedure and TEK exchange procedure. Also, we can prevent from inside attack like man-in-the-middle which can occur in the request of TEK through cryptographic connection of neighbor link establishing procedure and TEK exchange procedure.

The Type and Structure of Men's Belt in Early-Middle of Chosun Era (조선 초·중기 출토 허리끈의 유형과 구조 - 여산 송씨 출토 허리끈을 중심으로 -)

  • Son, Hee-Jin;Kwo, Young-Suk
    • Fashion & Textile Research Journal
    • /
    • v.13 no.5
    • /
    • pp.672-678
    • /
    • 2011
  • This was written based on the type and structure of korean man's waist belt in the early and middle era of the Chosun era. The waist belt was excavated from the Mokdaldong in the Daejeon city. The types of korean man's waist belt in the Chosun era were classified into Wondahae (i.e., round shape belt) and Gwangdahae. The Wondahae consist of two types which are circle shaped and straight types. The circle shaped wondahae contain one fringe in the main body of the belt and its joint part is decorated with a small network such as lacing decoration with the size about 1 cm around. The shape of the Wondahae has been changed from the circle shaped into the straight types and also has a tendency to be wider and longer as time went by. The standard form of the Gwangdahae is straight with about 2-3 cm width and elaborated by lacelike fringe as well. This also has a tendency to be wider starting from the 1600s show. The structure of this belts were divided into braid and ornament parts. The ornament part was constructed with the lacelike netting and fringe parts. The sophisticated craft techniques have a great decorative beauty. Through an analysis of FT-IR, the materials of those three belt are known which are made of the silk and the core thread was filled with cotton. Moreover, it can be confirmed that the glitter material of the ornament part were designed with gold foil and has been analyzed with SEM-EDX.

Boundaries and Differences in the Narrative of Passing: James W. Johnson and Nella Larsen (패싱, 경계와 차이의 서사 -제임스 W. 존슨과 넬라 라선)

  • Kang, Hee
    • Journal of English Language & Literature
    • /
    • v.53 no.2
    • /
    • pp.307-333
    • /
    • 2007
  • When W. E. B. Du Bois says that "the problem of the twentieth century is the problem of the color line," such a statement clearly recognizes the significance of the issue of racial identity, a cultural phenomenon called 'passing.' Both Johnson in The Autobiography of an Ex-Colored Man and Larsen in Passing confront this issue. Both novels, using the metaphor of passing, not only trace the racial anxiety and race politics of the time but also expose the unstable landscape of the established social and cultural boundaries of racial identity. Mapping out multiple meanings and various dimensions of passing, this paper argues how Johnson's and Larsen's narratives display the ambivalence of color line while they at the same time complicate, problematize, and destabilize the mainstream racial boundaries and differences. It furthers to delineate how the two writers, with difference, deal with the problem of passing, the significance of racial identity, and black middle class values along with its intraracial differences. Rather than draw a clear definition of and a definitive closure on passing narrative, this paper focuses on its complexities and undecidability, challenging every dimension of its established significations. It also explores the complex dynamic between passing act and individual identity, for passing here is not just a racially signified term but extends its significance to the other factors of identity, such as class and even sexuality. Johnson and Larsen open up a site for a newly emergent, modern racial identity for black middle class in the twentieth century American urban spaces. Both writers, illuminating the subversive and slippery nature of language in their passing narrative, clearly herald new, different forms of Afro-American writings and themes for the different century they face.

The Effects of a Life-Respect Education Program on Middle School Students' Values on Life-Respect (생명존중교육프로그램이 중학생의 생명존중의식과 생명존중태도에 미치는 영향)

  • Song, Mi-Kyeong;Kim, Kyung-Ran;Park, Chun-Man
    • The Journal of Korean Society for School & Community Health Education
    • /
    • v.15 no.1
    • /
    • pp.105-119
    • /
    • 2014
  • Objectives: This study investigates the factors influencing values on life-respect among middle school students. Methods: The participants in this study were 126 students from S middle school and Y middle school, both located in Gyeongnam province. The experimental group consisted of 40 students from S middle school, Control group-Iconsisted of 39 students from S middle school, and Control group-II consisted of 47 students from Y middle school. The experimental group was provided with 12 incidences of the life-respect education program from April 1st to June 29th. One period took 45 minutes and proceeded according to a structure of introduction, development, and consolidation. The experimental group received a life-respect education program, Control group-I received health teaching, but Control group-II didn't receive any special education except what was regularly part of their curriculum. The content of the life-respect education program included the following topics: value of life-respect, respect for human life and ethics, life-respect campaign, having a healthy mind, suicide prevention, dealing with crisis, prevention of school violence, abortion and life-respect, social weak minority consideration, death, brain death, euthanasia, life cycle and task, and forest activities. Questionnaires were administered as pre and post-tests which consisted of questions regarding death anxiety, suicide risk, and values on life-respect. The pre and post-tests were analyzed with t-tests, paired t-tests, ANOVAs, and factor analyses using SPSS 18.0. Results: 1. There was a statistically significant increase in the experimental group(p<.0001) and control group-I(p<0.05) in value and attitude about life-respect. On the other hand, it was shown that there was no difference between pre and post-test in control group-II. 2. The result of examining the differences between pre and post-tests after education on values and attitudes toward life-respect using ANCOVA showed, there was a statistically significant difference (p<0.001) among the three groups. Conclusion: the life-respect education program which was conducted over 12 meeting with middle school students had an positive effect, which can be used as basic data for fostering values on life-respect. These findings indicate that the life-respect education program this study used is effective for fostering value of life-respect and decreasing suicide risk.

  • PDF

Vulnerabilities and Attack Methods in Visible Light Communications Channel (가시광 통신 채널의 취약성 및 공격 방법)

  • Park, So-Hyun;Joo, Soyoung;Lee, Il-Gu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.469-471
    • /
    • 2021
  • As wireless communication technology advances to ensure high accuracy and safety at high speeds, research and development of Visible Light Communication (VLC) technology has been accelerated as an alternative to traditional radio frequency (RF) technology. As the radio spectrum of RF communication becomes more congested and demand for bandwidth continues to increase, VLCs that can use unlicensed frequency band are proposed as a solution. However, VLC channels have broadcasting characteristics that make them easily exposed to eavesdropping and jamming attacks, and are vulnerable to MITM (Man-In-The-Middle) due to their line of sight (LOS) propagation characteristics. These attacks on VLC channels compromise the confidentiality, integrity, and availability of communications links and data, resulting in higher data retransmission rates, reducing throughput and increasing power consumption, resulting in lower data transmission efficiency. In this work, we model vulnerable VLC channels to analyze the impact of attacks and communications vulnerabilities by malicious jammers.

  • PDF

A Distribution Key Management Protocol for improving Security of Inner Attack in WiMAX Environment (WiMAX 환경에서 내부 공격의 안전성을 향상시킨 분산 키 관리 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.1
    • /
    • pp.107-115
    • /
    • 2009
  • The cryptological key which is used in WiMAX environment is used at regular intervals by mobile nodes (laptop computer, PDA, cell-phone) which is in the range of base station coverage. But it is very weak at local attack like man-in-the-middle when the mobile node is off the range of base station or enters into the range to communicate with base station because the communication section is activated wirelessly. This paper proposes a distribution key building protocol which can reuse security key used by nodes to reduce cryptological security attack danger and communication overhead which occurs when mobile node tries to communicate with base station. The proposed distribution key establishing protocol can reduce overhead which occurs between base station and mobile node through key reusing which occurs during the communication process and also, makes security better than IEEE 802.16 standard by creating shared key which is required for inter-certification through the random number which node itself creates.

Weaknesses of the new design of wearable token system proposed by Sun et al. (Sun 등이 제안한 착용 가능한 토큰 시스템의 취약점 분석에 관한 연구)

  • Kim, Jung-Yoon;Choi, Hyoung-Kee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.5
    • /
    • pp.81-88
    • /
    • 2010
  • Sun et al. proposed a new design of wearable token system for security of mobile devices, such as a notebook and PDA. In this paper, we show that Sun et al.'s system is vulnerable to off-line password guessing attack and man in the middle attack based on known plain-text attack. We propose an improved scheme which overcomes the weaknesses of Sun et al.'s system. The proposed protocol requires to perform one modular multiplication in the wearable token, which has low computation ability, and modular exponentiation in the mobile devices, which have sufficient computing resources. Our protocol has no security problem, which threatens Sun's system, and known vulnerabilities. That is, the proposed protocol overcomes the security problems of Sun's system with minimal overheads.

Self. Actualization of College of Nursing Students Resulting from Psychiatric Nursing Practice (정신과 간호실습 과정과 자기실현에 관한 연구)

  • 이광자
    • Journal of Korean Academy of Nursing
    • /
    • v.6 no.1
    • /
    • pp.29-40
    • /
    • 1976
  • This study attempted to measure personality changes in collegiate nursing students as a result of their psychiatric nursing practice. The study population consisted of 310 students in 8 colleges of nursing in Korea, 96 with psychiatric practice, 103 with other clinical practice and III without clinical practice experience. The objectives of the study were to identify: 1. The self-actualization scores of nursing students resulting from psychiatric nursing practice. 2. The self-actualization scores of nursing students resulting from other clinical nursing practice. 3. The difference between scores for students with clinical practice experience and those without experience. 4. The relevance between self-actualization and sibling order. 5. The relevance between self- actualization and religion. 6. The coefficiently scores for students before and after clinical practice. The instrument used was the Personal Orientation Inventory (POI), developed by Shostrom. It provides a measure of values and behavior which are thought to be of importance in the development of self- actualization. The main findings of the study were as follows: 1. There was a significant difference in the Time Competence, Self Regard, and Nature of Man scales resulting from psychiatric nursing practice. 2. There was a significant difference in the Inner Directed, Existentialist, Feeling Reactivity, Spontaneity, Nature of Man and Capacity for Intimate Contact scales resulting from other clinical nursing practice. 3. There was a significant difference in the Inner Directed, Feeling Reactivity, Spontaneity, Self- Regard and Capacity for Intimate Contact scales between students with clinical practice and those without practice. 4. There was a significant difference in the Self-Acceptance scale for both the eldest and the youngest siblings. 5. There was a significant difference in the Time Competence, Inner Directed, Existentialist, Self-Acceptance and Capacity for Intimate Contact scales for middle and youngest siblings, 6. There was a significant difference in the Existentialist scale between students with a religion and those without one. 7. There was a significant difference for students without a religion in the Time Competence, Inner Directed, Self-Regard, Nature of Man, and Capacity for Intimate Contact scales after clinical practice. 8. There was a significant difference for students, with a religion in the Inner Directed, Existentialist, Spontaneity, and Nature of Man scales after clinical practice. 9. There was a significant difference for students in the Self- Actualizing value, Spontaneity, Nature of Man and Synergy scales according to whether their parents had a religion or not. 10. Before and after practice, significantly different correlations were found between the Time Competence and Capacity for Intimate Contact scales : the Inner Directed and Existentialist scales ; the Self- Actualizing Value and the Feeling Reactivity, Spontaneity, Self-Regard and Nature of Man scales : the Feeling Reactivity and Acceptance of Aggression scales: the Spontaneity and the Self-Regard and Nature of Man scales; and between the Self-Regard and Nature of Man scales.

  • PDF

A secure authentication system on wired wireless integrated network using OpenFlow (OpenFlow를 이용한 유‧무선 통합 네트워크 환경에서의 인증 시스템)

  • Moon, Jeong-Kyung;Cho, Han Jin;Kim, Jin-Mook
    • Journal of Digital Convergence
    • /
    • v.12 no.4
    • /
    • pp.285-291
    • /
    • 2014
  • Recent, development of wireless communication devices are rapidly and these device being deployed to the user very fast. By this results, a wired network device and the new device such as wireless devices incorporate. Then a demand of new mesh network is rapidly growing. In this wired/wireless integrated network environment, the network is configured automatically, and a user or wireless communication devices must be provided for authentication services. But, these services do not in the real world. Therefore, in this paper, we propose that wired/wireless integrated network environment to automatically configure the network using OpenFlow and the authentication system using Kerberos method. Our proposed system to be able to provide authentication services, confidentiality, integrity services for user or wired/wireless communication devices. And it can be prvented as well to man-in-the-middle attacks.

Password-Based Authenticated Tripartite Key Exchange Protocol (패스워드 기반 인증된 3자 키 교환 프로토콜)

  • Lee, Sang-Gon;Lee, Hoon-Jae;Park, Jong-Wook;Yoon, Jang-Hong
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.4
    • /
    • pp.525-535
    • /
    • 2005
  • A password-based authenticated tripartite key exchange protocol based on A. Joux's protocol was proposed. By using encryption scheme with shared password, we can resolve man-in-the-middle attack and lack of authentication problems. We also suggested a scheme to avoid the offline dictionary attack to which symmetric encryption schemes are vulnerable. The proposed protocol does not require a trusted party which is required in certificate or identity based authentication schemes. Therefore in a ad hoc network which is difficult to install network infrastructure, the proposed protocol would be very useful. The proposed protocol is more efficient in computation aspect than any existing password-based authenticated tripartite key exchange protocols. When it is used as a base line protocol of tree based group key exchange protocol, the computational weak points of the proposed protocol are compensated.

  • PDF