• Title/Summary/Keyword: Man-in-the-Middle

Search Result 615, Processing Time 0.029 seconds

Secure Handover Scheme in IEEE 802.16e/WiBro Networks (IEEE 802.16e/와이브로 망에서의 안전한 핸드오버 적용 방안)

  • Jo Hea-Suk;Jeon Woong-Ryul;Kim Seung-Joo;Won Dong-Ho
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.318-321
    • /
    • 2006
  • 현재 국내 국책사업으로 추진 중인 와이브로(WiBro) 기술 규격이 포함되어 있는 휴대인터넷 표준 규격인 IEEE 802.16e는 IP기반으로, 이동성이 뛰어나고 고속전송 기능의 특징을 가지고 있다. 또한 기지국간의 핸드오버(Handover)를 지원함으로써 이동성을 지원한다. 그러나 이러한 핸드오버 기법에 있어서 Replay 공격, Man-in-the-Middle 공격, Stolen-Verifier 공격 등에 취약한 문제점이 드러나고 있다. 본 논문은 이러한 기존 핸드오버 기법의 취약점을 개선하기 위해서 사용자의 인증서와 Timestamp값을 통한 IEEE 802.16e/와이브로 망에서 안전한 핸드오버 적용 방안에 대해 제안한다.

  • PDF

Dynamic Time Decision Method for Reducing Packet Delay Time in Wireless Communication based Internet of Things (무선 통신 기반의 사물 인터넷에서 패킷 지연 시간을 감소하기 위한 동적 시간 결정 기법)

  • Jeon, Garam-Moe;Cho, Tae-Ho
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2016.01a
    • /
    • pp.103-104
    • /
    • 2016
  • 사물 인터넷에서는 대부분의 기기가 와이맥스와 같은 무선 통신을 사용하는데 음영지역이 발생할 경우 펨토셀이 필요하다. 펨토셀은 안전적인 통신을 제공하지만 외부에서 무선 송신을 통해 접근할 수 있어 중간자 공격이 발생하기 쉽다. 강제 지연 인터락 프로토콜은 중간자 공격을 탐지하지만 고정된 지연 시간을 통해 패킷 전송 시간은 일정하다. 본 논문은 평가 함수를 사용하여 동적 지연 시간 결정을 통해 패킷 전달 시간에 대해 감소하는 방법을 제안한다. 이로 인해 제안 기법에서는 지연 시간이 효율적으로 감소하여 전송 속도를 향상한다.

  • PDF

MARINE-based Man in the Middle Attack Detection Method Using Traffic Information Accumulated in IoV (IoV에서 축적된 교통 정보를 활용한 MARINE 기반 중간자 공격 탐지 방법)

  • Wonjin Chung;Taeho Cho
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.01a
    • /
    • pp.97-100
    • /
    • 2023
  • 차량 인터넷은 목적지까지 스스로 주행하는 자율 주행 자동차의 최적 경로 설정을 도와주는 차세대 네트워크이다. 자율 주행 자동차의 원활한 자율 주행을 위해서는 도로 위 객체 인지뿐만 아니라 실시간 교통 정보가 수신되어야 한다. 공격자는 자동차로 전달되는 메시지를 탈취하여 내용을 변경하거나 메시지를 제거하는 중간자 공격을 시도할 수 있다. 중간자 공격을 탐지하기 위해 MARINE 기법이 제안되었지만, 주행하는 자동차가 적은 환경에서 중간자 공격을 탐지하기 어렵다. 제안 방법은 이러한 문제를 해결하기 위해 교통 정보 센터에 축적된 교통 정보를 이용하여 자동차에 전달되는 메시지를 분석하고 중간자 공격을 탐지하는 방법을 제안한다.

  • PDF

Design of a Static ARP Table Management xApp for an E2 Interface Security in Open RAN (Open RAN에서의 E2 인터페이스 보호를 위한 정적 ARP 테이블 관리 xApp 설계)

  • Jihye Kim;Jaehyoung Park;Jong-Hyouk Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.381-382
    • /
    • 2024
  • Open RAN(Radio Access Network)을 선도적으로 연구하고 있는 O-RAN Alliance에서는 Open RAN의 E2 인터페이스에서 발생 가능한 보안 위협 중 하나로 MitM(Man-in-the-Middle) 공격을 명시하였다. 그러나 이에 대응하기 위한 보안 요구사항으로는 3계층 보안 프로토콜인 IPsec 사용을 명시하고 있으며, 2계층 공격인 ARP(Address Resolution Protocol) 스푸핑에 대한 요구사항은 명시하고 있지 않다. 따라서 본 논문에서는 MitM 공격 중 하나인 ARP 스푸핑으로부터 E2 인터페이스를 보호하기 위해, Near-RT RIC의 ARP 테이블에서 E2 인터페이스로 연결되는 장비에 대한 MAC 주소를 정적으로 설정할 수 있는 xApp을 제안한다.

Sexuality Expressed in the 19C Fashion in Foucauldian Post-Structural Perspective - Focusing on Femininity and Masculinity Represented in the Mainstream Fashion and Anti-Fashion in the Middle and Latter of the Nineteenth Century - (Foucault의 후기구조주의적 시각에서 본 19세기 패션에 표현된 성 - 19세기 중.후반 남녀 주류 패션과 반패션에 나타난 여성성과 남성성을 중심으로 -)

  • Choi, Kyung-Hee
    • The Research Journal of the Costume Culture
    • /
    • v.15 no.2 s.67
    • /
    • pp.232-251
    • /
    • 2007
  • The purpose of this study was to understand sexuality expressed in fashion in a discursive view and reinterpret sexuality represented in fashion in the 19th century in Foucauldian post-structural perspective. As for methodology, at first the conception of sexuality was examined from structural feminism to post-structural pluralism by a literature review and discussed in relation with the matters of body and fashion on the basis of Foucault's discourse. Then, sexuality represented in the 19C fashion as a case study was re-estimated in terms of power relationship between dominant and oppositional discourses and mainstream fashion and anti-fashion as well. The conception of sexuality in Foucauldian post-structuralism maintains the view of plural sexuality, which floats by discourse and power produced in a specific historical context. In the Foucauldian perspective sexuality expressed in the mainstream fashion and anti-fashion in the nineteenth century shows the following aspects. The mainstream fashion in the middle and latter of the 19C made the clear sexual difference in dress of plain and functional male suit and extravagant and decorative female dress on the center of bourgeois masculinity in the context of modernity and capitalism. Although anti-fashion was also co-existed with the mainstream fashion, it was criticized by the Victorian people. It codifies sexual ideology of the binary opposition of male domination and female subordination. Therefore, the traditional sexual ideology in the 19C is a capitalist value, which gives a priority to bourgeois man's profits, and the Victorian discourses of sexuality constructs the clear sexual difference in dress in the period.

  • PDF

Actual Wearing Conditions and Attitude: An Initial Report on an Outdoor Wearing Survey for Man and Woman in their 30s to 50s (30~50대 남녀의 아웃도어 웨어 착용실태 및 인식조사(제 1보))

  • Paek, Kyung Ja;Hwang, Young Mi;Lee, Jeong Ran
    • Fashion & Textile Research Journal
    • /
    • v.15 no.5
    • /
    • pp.787-796
    • /
    • 2013
  • This study is an initial report of actual wearing conditions and attitude based on a survey of wearing outdoor wear for men and women in their 30s to 50s who enjoy daily leisure sport activities. Most middle-aged men and women who enjoy outdoor activities were interested in new trends and clothing styles. The greatest area of interest was health(42.9%), followed by leisure and sports(38.4%); in addition, hiking(40.2%) was the most popular outdoor activity. The majority of subjects participated in outdoor activities for over 5 years(34.4%). The highest frequency of outdoor activities was conducted once or twice a month, and it took one to three hours for each activity. Nearly half of the respondents( 47.7%) answered that the goal of outdoor activities was to maintain their health. Subjects in their 40s and 50s were more equipped in their outdoor activities and in their 50s made ongoing investments despite costs. When wearing clothing, the subjects placed a priority on design(in the case of subjects in their 30s) and comfort(for subjects in their 40s and 50s). This survey shows that the subjects emphasized access to outdoor wear and equipment. In all age groups, the biggest complaint about outdoor wear was price; in addition, they were unsatisfied with the length and the sleeves of outdoor jackets. Outdoor wear will draw a positive attention for its practical use of clothing if it is developed according to consumer demands based on functionality for outdoor activities and convenience in daily life.

A Study on the Microstructure and Mechanical Properties for the Weldment with Variation of Welding Process of the API 5L-B42 Pipeline for Natural Gas Transmission (천연가스 수송용 API 5L-X42 강관의 용접방법에따른 용접부의 미세조직과 기계적 특성에 관한 연구)

  • Baek Jong-Hyun;Kim Cheol-Man;Kim Young-Pyo;Kim Woo-Sik
    • 한국가스학회:학술대회논문집
    • /
    • 1997.09a
    • /
    • pp.33-38
    • /
    • 1997
  • Demand of the clean and convenient natural gas has continuously increased with recognizing of the environment problem since liquefied natural gas was introduced in Korea. Clean fuel natural gas was supplied to each city through high tensile strength pipeline connected by welding. Grades of pipeline were divided into the high and middle pressure according to supply pressure. Pipeline was welded mainly SMA welding process due to its easy handling, the other welding process was adopted according to the constructing condition. We were examined on the microstructure variation and mechanical properties of weld metal for high pressure pipeline, API 5L X-42.

  • PDF

School Safety Education Factors Predicting Injury Prevalence Among Korean Adolescence (학교의 안전교육 관련 특성이 청소년의 사고발생 예측에 미치는 영향)

  • 이명선;박경옥
    • Korean Journal of Health Education and Promotion
    • /
    • v.21 no.2
    • /
    • pp.147-165
    • /
    • 2004
  • Injury is a leading cause of death in the children and adolescent populations. In particular, more than 80% of unintentional injury was related to risk-taking behaviors involved in diverse accidents around school and home. Therefore, educational approaches should be provided for children and adolescent populations, and schools are the essential and appropriate sites to conduct safety education. This study was conducted to identify injury prevalence and safety education at schools among middle and high school students in Korea. About 1,034 middle and high students in 28 schools participated in a self-administered survey. The target schools were selected from the stratified random sampling method throughout schools of seven metropolitan cities in Korea. The questionnaires were delivered to the vice-principals by ground mailing service and the vice-principals administered survey data collection. The questionnaire asked about safety education provided in schools, injury experience in the last year, needs for injury prevention class in school, and demographics. All survey responses were entered into SPSS worksheet. Multivariate analysis of variance (MANOVA) and descriptive discriminant analysis (DDA) were used in statistical analysis with SPSS software 11.1. Multivariate analysis of variance was conducted as a preliminary analysis of DDA. According to the result of multivariate analysis of variance, gender (man), grade (poor), living with both parents, and displaying injury prevention messages on school news board were significantly different between the injured student group and the uninjured student group (p= .00). These four factors also had significant effects on students' injury experience in DDA, although correlation of the four factors with injury experience was weak overall based on their canonical function coefficients. All structure coefficients of the four factors were greater than .30, which means the four factors have discriminant effects on injury prevalence. The sizes of the discriminant effects, in order, were largly from gender, grade, living with both parents, and safety message display on school news boards.

Traumatic Intracranial Aneurysm Presenting with Delayed Subarachnoid Hemorrhage

  • Kim, Jae-Hoon;Kim, Jae-Min;Cheong, Jin-Hwan;Kim, Choong-Hyun
    • Journal of Korean Neurosurgical Society
    • /
    • v.41 no.5
    • /
    • pp.336-339
    • /
    • 2007
  • Traumatic intracranial aneurysm rarely occurs after a head injury. The authors report a case of a 51-year-old man in whom subarachnoid hemorrhage was developed as a result of delayed traumatic aneurysmal rupture of the distal portion of the middle cerebral artery following a minor, closed-head injury. The unruptured aneurysm had been evident on the magnetic resonance image taken two days prior to onset of the subarachnoid hemorrhage. The clinical presentation and possible underlying mechanism are discussed with a review of pertinent literature.

Key Exchange Protocols for Domestic Broadband Satellite Access Network (광대역 위성 엑세스 방을 위한 키 교환 프로토콜 제안)

  • 오흥룡;염흥열
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.13-25
    • /
    • 2004
  • The key exchange protocols are very crucial tools to provide the secure communication in the broadband satellite access network. They should be required to satisfy various requirements such as security, key confirmation, and key freshness. In this paper, we present the guideline of security functions in BSAN(Broadband Satellite Access Network), and analyze the specification of the security primitives and the hey exchange Protocols for the authenticated key agreement between RCST(Return Channel Satellite Terminal) and NCC(fretwork Control Centre). In addition, we propose the security specification for a domestic broad satellite network based on the analysis on the analysis profile of ETSI(European Telecommunications Standards Institute) standards. The key exchange protocols proposed in ETSI standard are vulnerable to man-in-the-middle attack and they don't provide key confirmation. To overcome this shortcoming, we propose the 4 types of the key exchange protocols which have the resistant to man-in-the-middle-attack, key freshness, and key confirmation, These proposed protocols can be used as a key exchange protocol between RCST and NCC in domestic BSAN. These proposed protocols are based on DH key exchange protocol, MTI(Matsumoto, Takashima, Imai) key exchange protocol, and ECDH(Elliptic Curve Diffie-Hellman).