• Title/Summary/Keyword: Noise Attack

Search Result 136, Processing Time 0.024 seconds

Enhancing the Reliability of Wi-Fi Network Using Evil Twin AP Detection Method Based on Machine Learning

  • Seo, Jeonghoon;Cho, Chaeho;Won, Yoojae
    • Journal of Information Processing Systems
    • /
    • v.16 no.3
    • /
    • pp.541-556
    • /
    • 2020
  • Wireless networks have become integral to society as they provide mobility and scalability advantages. However, their disadvantage is that they cannot control the media, which makes them vulnerable to various types of attacks. One example of such attacks is the evil twin access point (AP) attack, in which an authorized AP is impersonated by mimicking its service set identifier (SSID) and media access control (MAC) address. Evil twin APs are a major source of deception in wireless networks, facilitating message forgery and eavesdropping. Hence, it is necessary to detect them rapidly. To this end, numerous methods using clock skew have been proposed for evil twin AP detection. However, clock skew is difficult to calculate precisely because wireless networks are vulnerable to noise. This paper proposes an evil twin AP detection method that uses a multiple-feature-based machine learning classification algorithm. The features used in the proposed method are clock skew, channel, received signal strength, and duration. The results of experiments conducted indicate that the proposed method has an evil twin AP detection accuracy of 100% using the random forest algorithm.

Enhanced Differential Power Analysis based on the Generalized Signal Companding Methods (일반화된 신호 압신법에 기반한 향상된 차분전력분석 방법)

  • Choi, Ji-Sun;Ryoo, Jeong-Choon;Han, Dong-Guk;Park, Tae-Hoon
    • The KIPS Transactions:PartC
    • /
    • v.18C no.4
    • /
    • pp.213-216
    • /
    • 2011
  • Differential Power Analysis is fully affected by various noises including temporal misalignment. Recently, Ryoo et al have introduced an efficient preprocessor method leading to improvements in DPA by removing the noise signals. This paper experimentally proves that the existing preprocessor method is not applied to all processor. To overcome this defect, we propose a Differential Trace Model(DTM). Also, we theoretically prove and experimentally confirm that the proposed DTM suites DPA.

A New Robust Blind Crypto-Watermarking Method for Medical Images Security

  • Mohamed Boussif;Oussema Boufares;Aloui Noureddine;Adnene Cherif
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.93-100
    • /
    • 2024
  • In this paper, we propose a novel robust blind crypto-watermarking method for medical images security based on hiding of DICOM patient information (patient name, age...) in the medical imaging. The DICOM patient information is encrypted using the AES standard algorithm before its insertion in the medical image. The cover image is divided in blocks of 8x8, in each we insert 1-bit of the encrypted watermark in the hybrid transform domain by applying respectively the 2D-LWT (Lifting wavelet transforms), the 2D-DCT (discrete cosine transforms), and the SVD (singular value decomposition). The scheme is tested by applying various attacks such as noise, filtering and compression. Experimental results show that no visible difference between the watermarked images and the original images and the test against attack shows the good robustness of the proposed algorithm.

Feasibility study of a novel hash algorithm-based neutron activation analysis system for arms control treaty verification

  • Xiao-Suo He;Yao-Dong Dai;Xiao-Tao He;Qing-Hua He
    • Nuclear Engineering and Technology
    • /
    • v.56 no.4
    • /
    • pp.1330-1338
    • /
    • 2024
  • Information on isotopic composition and geometric structure is necessary for identifying a true warhead. Nevertheless, such classified information should be protected physically or electronically. With a novel Hash encryption algorithm, this paper presents a Monte Carlo-based design of a neutron activation analysis verification module. The verification module employs a thermal neutron source, a non-uniform mask (physically encrypting information about isotopic composition and geometric structure), a gamma detector array, and a Hash encryption algorithm (for electronic encryption). In the physical field, a non-uniform mask is designed to distort the characteristic gamma rays emitted by the inspected item. Furthermore, as part of the Hash algorithm, a key is introduced to encrypt the data and improve the system resolution through electronic design. In order to quantify the difference between items, Hamming distance is used, which allows data encryption and analysis simultaneously. Simulated inspections of simple objects are used to quantify system performance. It is demonstrated that the method retains superior resolution even with 1% noise level. And the performances of anti-statistical attack and anti-brute force cracking are evaluated and found to be very excellent. The verification method lays a solid foundation for nuclear disarmament verification in the upcoming era.

A Study of Activities do Daily Living Performance on Arthritic Elderly Patients (노인의 퇴행성 슬관절염과 일상생활 수행력에 관한 연구)

  • Park Rae-Joon;Park Young-Han
    • The Journal of Korean Physical Therapy
    • /
    • v.14 no.4
    • /
    • pp.183-203
    • /
    • 2002
  • To know the effect of index of social ability (ISA) and function of social life (FSL) with activities of daily living (ADL) and instrumental activities of daily living (IADL), we carried out a study on the elderly with osteoarthritis daily living in Daegu city for 4 months, from April to July 2002. The followings were observed: 1. The score of functional disability of knee, ADL and ISA were better at lower age (p < 0.01). 2. The younger they are, the better FSL they have. The lower age group has good FSL (p < 0.01). 3. Weight affects more to the under 49Kg group than 50-59Kg group and 60-69Kg group in functional disability of knee, while it doesn't make much difference for the other groups (p > 0.05) and other assessment index doesn't show any relationship with weight. 4. Regarding relat ionship with height , taller group has better knee functions: it's proved by post hock examination that the over 160cm group has much higher knee function than the other groups (p < 0.05). In case of ADL, the over 160cm group and under 149cm group were better than 150$\∼$159cm group. (p < 0.01) . 5. ISA was also different depending on height . It was proved that FSL was the better for the over 160cm group than for the others as a result of post hock examination (p < 0.05). 6. In regard of how many months have passed since the attack of functional disability of knee, knee joint function was better for the 12mon$\∼$36mon group than for the others and the score of ADL was lower for the 12mon$\∼$36mon group than for the others (p < 0.01). ISA was lower for the 12mon$\∼$36mon group and the under 6mon group than for the other groups (p < 0.01). FSL was lower for the 12mon$\∼$36mon group and the under 6mon group than the other groups. (p < 0.01). 7. Comparing left knee with right one, the problem with left knee has lower score of functional disability in all items (p < 0.01). 8. Considering friction noise, knee joint function was slightly better for non-friction noise-group, but it's not statistically significant though. ADL and ISA were better for non-friction noise-group (p < 0.01), while no statistical significance was found in FSL, 9. Knee joint function was better for the group who doesn't have limitation on range of knee flexion motion (p,0.05) but no other difference was found in other items from this group. 10. Limitation on range of knee flexion motion has no statistical difference in ADL and FSL. However, ISA was better for the non-limitation group (p < 0.05) . 11. Knee joint function score has high correlation with ISA (r=0.812, p < 0.01) and FSL (r=0.732, p < 0.01) , which shows the better knee joint function, the higher the score. 12. ISA and FSL were highly correlated: the better ISA, the better FSL (r=0.893, p < 0.01), while ADL has no correlation with either knee joint function or ISA or FSL.

  • PDF

The Robustness Wavelet Watermarking with Adaptive Weight MASK (적응 가중치 마스크 처리 기반 강인한 웨이브릿 워터마킹)

  • 정성록;김태효
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.4 no.2
    • /
    • pp.46-52
    • /
    • 2003
  • In this paper, the wavelet watermarking algorithm based on adaptive weight MASK processing as a watermark embedded-method for Copyright Protection of Digital contents is Proposed. Because watermark induce as a noise of original image, the watermark size should be limited for preventing quality losses and embedding watermark into images. Therefore, it should be preserve the best condition of the factors, robustness, capacity and visual quality. Tn order to solve this problem, we propose watermarking embedded method by applying adaptive weight MASK to the algorithm and optimize its efficiency. In that result, the watermarked images are improved about external attack. Specifically, correlation coefficient has over 0.8 on both modifications of brightness and contrast. Also, correlation coefficient of wavelet compression of embedded watermark last by over 0.65.

  • PDF

Wavelet based data Watermarking (웨이브릿 기반의 데이터 워터마킹)

  • 김동현
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.6
    • /
    • pp.1224-1228
    • /
    • 2003
  • The use of digital imaging technique and digital contents based on internet has grown rapidly for last several years, and the needs of digital image protection become more important. For the purpose of copyright protection on digital image, the verification of authentication techniques like content authentication, ownership authentication, illegal copy and etc are needs. Digital watermarking, the invisible encryption technique to insert digital watermarking into image, the sophisticated perceptual information should be used for providing transparency and robustness of images on watermarking process. In this paper, we implement the algorithm for preventing forged attack. ownership protection and authentication by transforming the wavelet algorithms in frequency domain in terms of human visual system.

Analysis of Unsteady Blade Forces in a Vertical-axis Small Wind Turbine (수직형 소형풍력터빈의 비정상 익력 평가)

  • LEE, SANG-MOON;KIM, CHUL-KYU;JEON, SEOK-YUN;ALI, SAJID;JANG, CHOON-MAN
    • Journal of Hydrogen and New Energy
    • /
    • v.29 no.2
    • /
    • pp.197-204
    • /
    • 2018
  • In the present study, unsteady flow analysis has been conducted to investigate the blade forces and wake flow around a hybrid street-lamp having a vertical-axis small wind turbine and a photovoltaic panel. Uniform velocities of 3, 5 and 7 m/s are applied as inlet boundary condition. Relatively large vortex shedding is formed at the wake region of the photovoltaic panel, which affects the increase of blade torque and wake flow downstream of the wind turbine. It is found that blade force has a good relation to the variation of the angle of attack with the rotation of turbine blades. Variations in the torque on the turbine blade over time create a cyclic fluctuation, which can be a source of turbine vibration and noise. Unsteady fluctuation of blade forces is also analyzed to understand the nature of the vibration of a small wind turbine over time. The detailed flow field inside the turbine blades is analyzed and discussed.

A Study on the Improvement of Pitch Autopilot Flight Control Law (세로축 자동조종 비행제어법칙 개선에 관한 연구)

  • Kim, Chong-Sup;Hwang, Byung-Moon;Lee, Chul
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.36 no.11
    • /
    • pp.1104-1111
    • /
    • 2008
  • The supersonic advanced trainer based on digital flight-by-wire flight control system uses aircraft flight information such as altitude, calibrated airspeed and angle of attack to calculate flight control law, and this information is measured by IMFP(Integrated Multi-Function Probe) equipment. The information has triplex structure using three IMFP sensors. Final value of informations is selected by mid-value selection logic to have more flight data reliability. As the result of supersonic flight test, pitch oscillation is occurred due to IMFP noise when altitude hold autopilot mode is engaged. This tendency may affect stability and handling quality of an aircraft during autopilot mode. This paper addresses autopilot control law design to remove pitch oscillation and these control laws are verified by non-real time simulation and flight test. Also, pitch response characteristics of pitch attitude hold autopilot mode is improved by upgrading the control law structure and feedback gain tuning during bank turn.

Audio Forensic Marking using Psychoacoustic Model II and MDCT (심리음향 모델 II와 MDCT를 이용한 오디오 포렌식 마킹)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.4
    • /
    • pp.16-22
    • /
    • 2012
  • In this paper, the forensic marking algorithm is proposed using psychoacoustic model II and MDCT for high-quality audio. The proposed forensic marking method, that inserts the user fingerprinting code of the audio content into the selected sub-band, in which audio signal energy is lower than the spectrum masking level. In the range of the one frame which has 2,048 samples for FFT of original audio signal, the audio forensic marking is processed in 3 sub-bands. According to the average attack of the fingerprinting codes, one frame's SNR is measured on 100% trace ratio of the collusion codes. When the lower strength 0.1 of the inserted fingerprinting code, SNR is 38.44dB. And in case, the added strength 0.5 of white gaussian noise, SNR is 19.09dB. As a result, it confirms that the proposed audio forensic marking algorithm is maintained the marking robustness of the fingerprinting code and the audio high-quality.