• Title/Summary/Keyword: Man-in-the-Middle

Search Result 618, Processing Time 0.03 seconds

Enhancing Security in Mobile IPv6

  • Modares, Hero;Moravejosharieh, Amirhossein;Salleh, Rosli Bin;Lloret, Jaime
    • ETRI Journal
    • /
    • v.36 no.1
    • /
    • pp.51-61
    • /
    • 2014
  • In the Mobile IPv6 (MIPv6) protocol, a mobile node (MN) is a mobile device with a permanent home address (HoA) on its home link. The MN will acquire a care-of address (CoA) when it roams into a foreign link. It then sends a binding update (BU) message to the home agent (HA) and the correspondent node (CN) to inform them of its current CoA so that future data packets destined for its HoA will be forwarded to the CoA. The BU message, however, is vulnerable to different types of security attacks, such as the man-in-the-middle attack, the session hijacking attack, and the denial-of-service attack. The current security protocols in MIPv6 are not able to effectively protect the BU message against these attacks. The private-key-based BU (PKBU) protocol is proposed in this research to overcome the shortcomings of some existing MIPv6 protocols. PKBU incorporates a method to assert the address ownership of the MN, thus allowing the CN to validate that the MN is not a malicious node. The results obtained show that it addresses the security requirements while being able to check the address ownership of the MN. PKBU also incorporates a method to verify the reachability of the MN.

The Relationship Between GPS-Based Physical Activity Patterns and Depression

  • Kwang Ho Seok;Sung Man Bae
    • Journal of Practical Engineering Education
    • /
    • v.16 no.4
    • /
    • pp.577-585
    • /
    • 2024
  • This study analyzed the relationship between GPS-based physical activity patterns and mental health using Kaggle Student Life data. Data were collected over a 10-week period from 48 students at Dartmouth College through Android smartphones and included GPS, dark, and phone lock data, and measures such as the Patient Health Questionnaire-9 (PHQ-9), Loneliness Scale, the Positive and Negative Affect Schedule (PANAS), and Perceived Stress Scale. Using latitude and longitude data obtained from GPS measurements, various physical activity indicators were calculated, including the total distance traveled, average distance traveled, average distance traveled in the morning, average distance traveled in the afternoon, average distance traveled in the evening, and average distance traveled in the middle of the night. Pearson's correlation analysis was performed to explore the relationship between GPS-based physical activity patterns and mental health. The study results indicated a significant negative correlation between the average distance traveled in the afternoon and PHQ-9 scores. Results indicated that the higher the afternoon activity, the lower the depressive symptoms. There was a positive correlation be-tween the PANAS-Pos score and the average distance traveled in the evening, indicating that positive emotions tended to increase as evening activities increased. This finding suggests a relationship between physical activity at specific times and mental health.

Historical Meaning of PungGongYuBoDoRyak ("풍공유보도략(豊公遺寶圖略)"의 복식사적 의미)

  • Chang, In-Woo
    • Journal of the Korean Society of Costume
    • /
    • v.59 no.10
    • /
    • pp.124-136
    • /
    • 2009
  • This Study is on the Punggongyubodoryake. Punggongyubodoryak was the records and pictures written by Ohgyeongmun(吳景文, Painter) and Gangbonpungeon(岡本豊彦, a Japanese painter, 1773~1745). in 1832. Those records and pictures were about the gifts which Korea's King(宣祖, 1567-1608) sent to Doyotomi Hideyosi(豊臣秀吉, Pungsinsugil) in 1590. Most of the gifts were of the Korean costume, which meant that Korea recognized Doyotomi Hideyosi as the new general of Japan, Tokugawa Shogunate(幕府將軍). The pictures of every Clothing in punggongyubodoryake described forms of every cloth and delineated ornamental patterns and sizes of clothing as closely as actual, they were clothes of the Middle period of Chosun. the author of the study inferred that it would be one of the impotent materials in the history of the Korean traditional costume. Among the clothes, there were several danryeongs(단령, ceremonial coat), okgwan (玉冠 woman headdress with) and paeok(佩玉, pendents with jade stings) and choongdan(中單 ceremonial undercoat) and Sang(裳, ceremonial Skirts for man), gyeontongsuseulran (肩通袖膝襕, chinese coat) was recorded in punggongyubodoryake. they were not a set of clothes for ceremonial costume but a mixture of men's and women's costume, of korean and abroad styles. the author inferred that this phenomenon was actually a good proof that the gifts were sent to Hideyosi only as courtesy, which meant for downgrading the receiver.

Survey of Algorithms and Techniques Used to Improve the Security of A Public Wi-Fi Network

  • Aloufi, Hanouf;Alsuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.194-202
    • /
    • 2022
  • The use of public Wi-Fi has increased in recent years with many people like to spend their time outside in malls or café shops which provide public Wi-Fi for their customers. However, since the public Wi-Fi can be accessed from any device the security of public Wi-Fi plays a big role to prevent the stealing of information by an attacker with methods and techniques such as WPA, WPA2 and WPA3. However, it is well known to the attackers that these methods are not difficult to get hacked by the attacker device to take the client precious information. Some researches were done in increasing the security of public Wi-Fi each with their own different technique or algorithm to provide more secure connection to the public Wi-Fi and prevent any unauthorized user to connect to avoid stealing the data of another legal user. Theses research paper are evaluated to learn which method excel in protecting the public Wi-Fi security by giving an analysis to the methods provided by the research paper with comparing the pros and cons of each algorithm. Moreover, the research displays that there are methods to actually provide security to the public Wi-Fi with each being very different in implementation.

Efficient and Security Enhanced Evolved Packet System Authentication and Key Agreement Protocol

  • Shi, Shanyu;Choi, Seungwon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.87-101
    • /
    • 2017
  • As people increasingly rely on mobile networks in modern society, mobile communication security is becoming more and more important. In the Long Term Evolution/System Architecture Evolution (LTE/SAE) architecture, the 3rd Generation Partnership (3GPP) team has also developed the improved Evolved Packet System Authentication and Key Agreement (EPS AKA) protocol based on the 3rd Generation Authentication and Key Agreement (3G AKA) protocol in order to provide mutual authentication and secure communication between the user and the network. Unfortunately, the EPS AKA also has several vulnerabilities such as sending the International Mobile Subscriber Identity (IMSI) in plain text (which leads to disclosure of user identity and further causes location and tracing of the user, Mobility Management Entity (MME) attack), man-in-middle attack, etc. Hence, in this paper, we analyze the EPS AKA protocol and point out its deficiencies and then propose an Efficient and Security Enhanced Authentication and Key agreement (ESE-EPS AKA) protocol based on hybrid of Dynamic Pseudonym Mechanism (DPM) and Public Key Infrastructure (PKI) retaining the original framework and the infrastructure of the LTE network. Then, our evaluation proves that the proposed new ESE-EPS AKA protocol is relatively more efficient, secure and satisfies some of the security requirements such as confidentiality, integrity and authentication.

TinyIBAK: Design and Prototype Implementation of An Identity-based Authenticated Key Agreement Scheme for Large Scale Sensor Networks

  • Yang, Lijun;Ding, Chao;Wu, Meng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.11
    • /
    • pp.2769-2792
    • /
    • 2013
  • In this paper, we propose an authenticated key agreement scheme, TinyIBAK, based on the identity-based cryptography and bilinear paring, for large scale sensor networks. We prove the security of our proposal in the random oracle model. According to the formal security validation using AVISPA, the proposed scheme is strongly secure against the passive and active attacks, such as replay, man-in-the middle and node compromise attacks, etc. We implemented our proposal for TinyOS-2.1, analyzed the memory occupation, and evaluated the time and energy performance on the MICAz motes using the Avrora toolkits. Moreover, we deployed our proposal within the TOSSIM simulation framework, and investigated the effect of node density on the performance of our scheme. Experimental results indicate that our proposal consumes an acceptable amount of resources, and is feasible for infrequent key distribution and rekeying in large scale sensor networks. Compared with other ID-based key agreement approaches, TinyIBAK is much more efficient or comparable in performance but provides rekeying. Compared with the traditional key pre-distribution schemes, TinyIBAK achieves significant improvements in terms of security strength, key connectivity, scalability, communication and storage overhead, and enables efficient secure rekeying.

Nonitoring of amitraz, bromopropylate, coumaphos, cymiazole in honey samples sold in 2011 (2011년 시판된 벌꿀 중 amtraz, bromopropylate, coumaphos, cymiazole 모니터링)

  • Lee, Eun Man;Ryoo, Jae Jeong
    • Analytical Science and Technology
    • /
    • v.26 no.1
    • /
    • pp.1-10
    • /
    • 2013
  • It was known that many beekeepers use some acaricides to protect their bees. Among the acaricides used in bees, amitraz, bromopropylate, coumaphos, and cymiazole were used commonly in Korea. In middle of 2006, Korean government set maximum residual limit (MRL) of amitraz and coumaphos as 0.2 ppm and 0.1 ppm, respectively. Because the environment of bee farm changes every year, it is needed to monitor acaricides in honey continuously. In this work, ten samples of honey collected from local markets and internet in 2011 were tested for determination of the amount of amitraz, bromopropylate, coumaphos and cymiazole by HPLC-DAD. Levels of the acaricide residues found were less than 25 ppb.

Content Analysis of On-Line Consumer Information for Elderly - Comparison between the US and Korea Apparel E-tailing Sites - (노년층 의류 소비자를 위한 온라인 소비자 정보에 대한 분석 - 한국과 미국의 웹사이트의 비교연구 -)

  • Hong, Kyung-Hee;Choo, Ho-Jung
    • The Research Journal of the Costume Culture
    • /
    • v.16 no.3
    • /
    • pp.559-573
    • /
    • 2008
  • Internet apparel businesses are required to provide various kinds of consumer information which includes both product information and customer service information. "New Age Elderly" who become an aged man in 21th century are familiar with internet and other high technological tools from their life time experience with technological development and ready to enjoy the convenience the technology offers. As a preliminary step to develop internet consumer information model for elderly consumers, this study examines the US and Korea apparel e-tailing sites targeting elderly consumers. Ten Korean sites and nine US sites were selected and compared for their provision of consumer information in terms of contents, ease to access, and the completeness of the information. Results of data analysis indicate that elderly market in Korea is not yet clearly defined compared to the US. In Korea, elderly consumer market is considered as a part of middle-aged market, and there was no unique target marketing efforts observed. Korean sites are better than the US's sites in terms of shopping information, while the US sites offer detailed information about the company, and customer service information. In both countries, fashion related information is lacking and failing to satisfy fashion conscious elderly consumers. Managerial implications were discussed.

  • PDF

Hwaong Eco-park Land Use Plan in Consideration of Reclamation (화옹지구 간척생태공원 토지이용계획)

  • Sung, Ji-Young
    • Proceedings of the Korean Society of Agricultural Engineers Conference
    • /
    • 2005.10a
    • /
    • pp.443-449
    • /
    • 2005
  • As sustainable development and environment-friendly efforts in large-scale development projects emerge as major interests at home and abroad, man-made wetlands and eco-park facilities have been newly planned or created when developing reclamation districts recently. In this study, based on findings from a comprehensive review of relevant studies and planning cases, the basic direction and objectives of the plan were developed. A comprehensive analysis on the status of ecological environment and demographic and social environment showed that the planned site is in a process of migrating from early stages of reclamation to middle stages. It was planned for the eco-park to function as a major base along an ecological network consisting a freshwater lake and rivers and streams flowing into the lake in Hwaong District. Through a master plan and sectoral plans were planned according to desalination levels after reclamation. Then, habitats for livings organisms were also planned. The eco-park, the planned site, is also in a process of migrating from the early stages to middles stages. By creating an eco-park that considers post-reclamation ecological environment changes, natural succession processes will be preserved, which is expected to help local ecosystems to restore their functions on their own over a relatively long period of time and enable to observe the restoration process.

  • PDF

Beyond Heteronormativity in Toni Morrison's The Bluest Eye and Home

  • Moon, Jina
    • Journal of English Language & Literature
    • /
    • v.64 no.1
    • /
    • pp.61-76
    • /
    • 2018
  • This essay examines Toni Morrison's African-American characters' struggle in The Bluest Eye (1970) and Home (2012) through the lens of heteronormativity, arguing that they suffer double victimization due to both their race and gender. The Bluest Eye portrays a family tragedy caused by an African-American husband and wife's failure to live up to images of gender as represented in white, middle-class media. Written forty-two years later, Home describes an African-American man and woman who establish their own lives away from gendered standards after striving to meet social expectations and becoming traumatized in the process. Their adversities stem not only from the deeply rooted racial discrimination in American society but also from subtle gendered norms implanted by heteronormativity. Morrison's characters in her earlier narrative face a tragic denouement, ultimately destroying their children's lives. By contrast, Morrison's later characters explore more utopian ways of life unfettered by heteronormativity, overcoming hardships imposed by white-centered heteronormal society. By portraying socially victimized characters, Toni Morrison problematizes the power behind the discriminatory nature of heteronormativity and suggests a more gender-neutral, egalitarian way of organizing society, free from the constraints of heterosexuality and from violence created by normalized gender rules.