• Title/Summary/Keyword: Network Vulnerability

Search Result 419, Processing Time 0.026 seconds

A Design of Secure Electronic Health Information Management Protocol in the Internet of Things Environment (사물 인터넷 환경에서 안전한 전자의료정보 관리 프로토콜 설계)

  • Park, Jeong Hyo;Kim, Nak Hyun;Jung, Yong Hoon;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.323-328
    • /
    • 2014
  • ZigBee based on the most vulnerable part of u-Healthcare system that uses the ZigBee communication is the wireless section. ZigBee communication sectors to identify vulnerabilities in this paper, we propose to compensate. ZigBee has been raised from the existing vulnerabilities organize and ZigBee also uses the 64bit address that uniquely identifies a vulnerability that was defined as exposure. And to prevent the exposure of a unique identifying address was used to address a temporary identification. ZigBee security services, the proposed system during the Network Key for encryption only use one mechanism of Residential Mode is used. Residential Mode on all nodes of the entire network because they use a common key, the key is stolen, your network's security system at a time are at risk of collapse. Therefore, in order to guard against these risks to the security policy Network Key updated periodically depending on the method used to. The proposed evaluation and comparative analysis of the system were exposed in the existing system can hide the address that uniquely identifies a public key Network Key also updated periodically, so that leaks can occur due to reduced risk.

A Study on Estimating the Crossing Speed of Mobility Handicapped for the Activation of the Smart Crossing System (스마트횡단시스템 활성화를 위한 교통약자의 횡단속도 추정)

  • Hyung Kyu Kim;Sang Cheal Byun;Yeo Hwan Yoon;Jae Seok Kim
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.6
    • /
    • pp.87-96
    • /
    • 2022
  • The traffic vulnerable, including elderly pedestrians, have a relatively low walking speed and slow cognitive response time due to reduced physical ability. Although a smart crossing system has been developed and operated to improve problem, it is difficult to operate a signal that reflects the appropriate walking speed for each pedestrian. In this study, a neural network model and a multiple regression model-based traversing speed estimation model were developed using image information collected in an area with a high percentage of traffic vulnerability. to support the provision of optimal walking signals according to real-time traffic weakness. actual traffic data collected from the urban traffic network of Paju-si, Gyeonggi-do were used. The performance of the model was evaluated through seven selected indicators, including correlation coefficient and mean absolute error. The multiple linear regression model had a correlation coefficient of 0.652 and 0.182; the neural network model had a correlation coefficient of 0.823 and 0.105. The neural network model showed higher predictive power.

Distributed Security for Web Application Contents Protection (웹 어플리케이션 콘텐츠 보호를 위한 분산 보안)

  • Heo, Jin-Kyoung
    • Journal of Digital Contents Society
    • /
    • v.9 no.1
    • /
    • pp.125-130
    • /
    • 2008
  • User web service is increasing by development of internet technology. Quantity of encrypted data that transmitted through the network are increasing by development of encipherment technology. We have many problems; it is caused by technical development and service increase of user requests. It is like that, we have reliability of contents and illegality copy problem of internet contents in web application system. It is contents protection skills in web that encipherment technology, authentication and digital signature. We need message encoding and secret key for solve vulnerability of encipherment in web application system. In this paper, we propose a distributed secure system that can data confidentiality and user authentication. It prevent performance degradation from bottle neck in encipherment server, and improve service quality.

  • PDF

BCC Based Mobile WIMAX Initial Network Entry with Improved Security (보안성이 강화된 타원곡선 암호 기반의 Mobile WIMAX 초기 진입 구간)

  • Choi, Do-Hyun;Park, Jung-Oh;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.11B
    • /
    • pp.1305-1314
    • /
    • 2011
  • Initial entry section has vulnerability which exposes plain text parameter in Mobile WIMAX environment which is the 4th generation technology. Each node message need to be encrypted to prevent the third party attack or message leakage. In this paper, we propose Mobile WIMAX initial entry section encryption using Elliptic Curve Cryptosystem. We have compared proposed model with existing model using OPNET simulator tool. He delay rate has increased little bit in initial entry section than before after the comparison, but it has shown more effective in average delay and throughput than encryption applied other existing model.

A simulative method for evaluating the resistance of the flight deck's operational capability to the attack of anti-ship weapons

  • Yang, Fangqing;Wang, Chao;Liao, Quanmi;Huang, Sheng
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.8 no.6
    • /
    • pp.563-576
    • /
    • 2016
  • The flight deck of an aircraft carrier is relatively vulnerable compared to its hull, as the damage of some subsystems on the flight deck may cause the carrier losing its operational capability. Therefore, this work aims to represent a simulative method for evaluating the resistance of the flight deck's operational capability in the condition that the aircraft carrier is together with its strike group and the enemy uses the anti-ship missiles with the cluster warheads to attack. In the simulations, the susceptibility of the carrier and the vulnerability of the aircraft guarantee resources are gained. Then, with the help of the closed queuing network, the residual sortie generation rate can be solved, which reflects the flight deck's residual operational capability. The results have proven that the flight deck is of strong resistance to these attacks while it is very sensitive to the loss of some key aircraft guarantee resources.

Customer authentication service method for E-commerce (전자상거래를 위한 사용자 인증 기술)

  • 김지은;전현정;윤동식
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.309-316
    • /
    • 2004
  • The industrial structure with Internet is changing from offline to online. By developing of network, E-commerce will be big market. It is natural to increase of E-commerce and interest of people. but, it is supported by system and technics. First of all, we need customer authentication service method. In this paper, we described about Electronic shopping mall Security by three main categories. One is general security solution of I-commerce, Second is analyzing about various threats, vulnerability and countermeasures to that. Third is security consideration of directory service in I-commerce circumstance.

  • PDF

Rights to Control Information and Related Security Technologies on the CyberSpace (사이버공간에서 자기 결정권과 보안 기술)

  • Min, Kyung-Bae;Kang, Jang-Mook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.2
    • /
    • pp.135-141
    • /
    • 2010
  • This research examines technologies and systems regarding right to control information in the network era. For this purpose, It attempts an integrated analysis of technologies and systems on the basis of the tree components of cyberspace. And it examines the prior researches and cases on privacy, personal information, and right to control information with emphasis on technologies and systems of the cyberspace. To protect privacy information, it analyses vulnerability of element technology, platform service technology, and individual technology. In particular, it describes, from the perspective of right to control information, the risk and security measures for personal information to be used as relation-context in the Web 2.0 environment. The research result will assist the methodology of future researches for grand theory on privacy information and help understanding the interaction between technology and society.

ICS Security Risk Analysis Using Attack Tree (공격 트리를 이용한 산업 제어 시스템 보안 위험 분석)

  • Kim, Kyung-Ah;Lee, Dae-Sung;Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.11 no.6
    • /
    • pp.53-58
    • /
    • 2011
  • There is increasing use of common commercial operation system and standard PCs to control industrial production systems, and cyber security threat for industrial facilities have emerged as a serious problem. Now these network connected ICS(Industrial Control Systems) stand vulnerable to the same threats that the enterprise information systems have faced and they are exposed to malicious attacks. In particular Stuxnet is a computer worm targeting a specific industrial control system, such as a gas pipeline or power plant and in theory, being able to cause physical damage. In this paper we present an overview of the general configuration and cyber security threats of a SCADA and investigate the attack tree analysis to identify and assess security vulnerabilities in SCADA for the purpose of response to cyber attacks in advance.

Per-transaction Shared Key Scheme to Improve Security on Smart Payment System

  • Ahmad, Fawad;Jung, Younchan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.1
    • /
    • pp.7-18
    • /
    • 2016
  • Several authentication methods have been developed to make use of tokens in the mobile networks and smart payment systems. Token used in smart payment system is genearated in place of Primary Account Number. The use of token in each payment transaction is advantageous because the token authentication prevents enemy from intercepting credit card number over the network. Existing token authentication methods work together with the cryptogram, which is computed using the shared key that is provisioned by the token service provider. Long lifetime and repeated use of shared key cause potential brawback related to its vulnerability against the brute-force attack. This paper proposes a per-transaction shared key mechanism, where the per-transaction key is agreed between the mobile device and token service provider for each smart payment transaction. From server viewpoint, per-transaction key list is easy to handle because the per-transaction key has short lifetime below a couple of seconds and the server does not need to maintain the state for the mobile device. We analyze the optimum size of the per-transaction shared key which satisfy the requirements for transaction latency and security strength for secure payment transactions.

Cascade Perimeter Defence Model in Multiple VPN Environment (다중 VPN 환경에서의 분산 Perimeter defence 모델에 관한 연구)

  • Lim, Hyung-J.;Kim, Tae-Kyung;Chung, Tai-M.
    • The KIPS Transactions:PartC
    • /
    • v.11C no.1
    • /
    • pp.81-88
    • /
    • 2004
  • This paper analyzed the proper methods to solve the security problems of establishing trust zone which is changed by security policy in large scale networks containing multiple VPNs. Therefore, we surveyed the vulnerability of VPN technologies, it analyzed various models suitable for trust zone. By simulations of various models, we Propose the cascade perimeter defence policy model having the neit as such an efficient transit cost and the strictly isolation for trust tone. This model can protect the trust zone from the public network by dividing the trust Tone according to each VPN group and it shows the better transit performance by cascading the position of perimeter defence policy.