• Title/Summary/Keyword: RS-attack

Search Result 13, Processing Time 0.023 seconds

New Byzantine Resilient Multi-Path Key Establishment Scheme for Wireless Sensor Networks (무선 센서 네트워크를 위한 비잔틴 공격에 강인한 새로운 다중 패스 키 설정 방법)

  • Kim, Young-Sik;Jang, Ji-Woong;Lim, Dae-Woon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.9C
    • /
    • pp.855-862
    • /
    • 2009
  • The path key establishment phase in the wireless sensor network is vulnerable to Byzantine attack. Huang and Hedhi proposed a Byzantine resilient multi-key establishment scheme using a systematic RS code, which has shortcomings of exposing a part of message symbols and inefficient transmission. In this paper, we propose a new Byzantine resilient multi-path key establishment scheme in which direct message symbols are not exposed to an adversary and are more efficiently transmitted the RS-encoded symbols to the destination node. In the Proposed scheme, a non-systematic RS code is used to transmit a generated indirect secret key and each encoded symbol is relayed through available paths between two sensor nodes. If enough symbols are collected at the destination node, it is possible to reconstruct the secret message through RS decoding.

STA : Sybil Type-aware Robust Recommender System (시빌 유형을 고려한 견고한 추천시스템)

  • Noh, Taewan;Oh, Hayoung;Noh, Giseop;Kim, Chongkwon
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.10
    • /
    • pp.670-679
    • /
    • 2015
  • With a rapid development of internet, many users these days refer to various recommender sites when buying items, movies, music and more. However, there are malicious users (Sybil) who raise or lower item ratings intentionally in these recommender sites. And as a result, a recommender system (RS) may recommend incomplete or inaccurate results to normal users. We suggest a recommender algorithm to separate ratings generated by users into normal ratings and outlier ratings, and to minimize the effects of malicious users. Specifically, our algorithm first ensures a stable RS against three kinds of attack models (Random attack, Average attack, and Bandwagon attack) which are the main recent security issues in RS. To prove the performance of the method of suggestion, we conducted performance analysis on real world data that we crawled. The performance analysis demonstrated that the suggested method performs well regardless of Sybil size and type when compared to existing algorithms.

Improved Authentication Protocol for Privacy Protection in RFID Systems (프라이버시 보호를 위한 개선된 RFID 인증 프로토콜)

  • Oh, Sejin;Lee, Changhee;Yun, Taejin;Chung, Kyungho;Ahn, Kwangseon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.1
    • /
    • pp.12-18
    • /
    • 2013
  • In 2012, Woosik Bae proposed a DAP3-RS(Design of Authentication Protocol for Privacy Protection in RFID Systems) using the hash function and AES(Advanced Encryption Standard) algorithm to hide Tag's identification and to generates variable data in every session. He argued that the DAP3-RS is safe from spoofing attack, replay attack, traffic analysis and etc. Also, the DAP3-RS resolved problem by fixed metaID of Hash-Lock protocol using AES algorithm. However, unlike his argue, attacker can pass authentication and traffic analysis using by same data and fixed hash value on the wireless. We proposed authentication protocol based on AES algorithm. Also, our protocol is secure and efficient in comparison with the DAP3-RS.

ACA Based Image Steganography

  • Sarkar, Anindita;Nag, Amitava;Biswas, Sushanta;Sarkar, Partha Pratim
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.2 no.5
    • /
    • pp.266-276
    • /
    • 2013
  • LSB-based steganography is a simple and well known information hiding technique. In most LSB based techniques, a secret message is embedded into a specific position of LSB in the cover pixels. On the other hand, the main threat of LSB-based steganography is steganalysis. This paper proposes an asynchronous-cellular-automata(ACA)-based steganographic method, where secret bits are embedded into the selected position inside the cover pixel by ACA rule 51 and a secret key. As a result, it is very difficult for malicious users to retrieve a secret message from a cover image without knowing the secret key, even if the extraction algorithm is known. In addition, another layer of security is provided by almost random (rule-based) selection of a cover pixel for embedding using ACA and a different secret key. Finally, the experimental results show that the proposed method can be secured against the well-known steganalysis RS-attack.

  • PDF

A Data Hiding Scheme for Grayscale Images Using a Square Function

  • Kwon, Hyejin;Kim, Haemun;Kim, Soonja
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.4
    • /
    • pp.466-477
    • /
    • 2014
  • Many image hiding schemes based on least significant bit (LSB) transformation have been proposed. One of the LSB-based image hiding schemes that employs diamond encoding was proposed in 2008. In this scheme, the binary secret data is converted into base n representation, and the converted secret data is concealed in the cover image. Here, we show that this scheme has two vulnerabilities: noticeable spots in the stego-image, i.e., a non-smooth embedding result, and inefficiency caused by rough re-adjustment of falling-off-boundary value and impractical base translation. Moreover, we propose a new scheme that is efficient and produces a smooth and high quality embedding result by restricting n to power of 2 and using a sophisticated re-adjustment procedure. Our experimental results show that our scheme yields high quality stego-images and is secure against RS detection attack.

Cyber attack taxonomy for digital environment in nuclear power plants

  • Kim, Seungmin;Heo, Gyunyoung;Zio, Enrico;Shin, Jinsoo;Song, Jae-gu
    • Nuclear Engineering and Technology
    • /
    • v.52 no.5
    • /
    • pp.995-1001
    • /
    • 2020
  • With the development of digital instrumentation and control (I&C) devices, cyber security at nuclear power plants (NPPs) has become a hot issue. The Stuxnet, which destroyed Iran's uranium enrichment facility in 2010, suggests that NPPs could even lead to an accident involving the release of radioactive materials cyber-attacks. However, cyber security research on industrial control systems (ICSs) and supervisory control and data acquisition (SCADA) systems is relatively inadequate compared to information technology (IT) and further it is difficult to study cyber-attack taxonomy for NPPs considering the characteristics of ICSs. The advanced research of cyber-attack taxonomy does not reflect the architectural and inherent characteristics of NPPs and lacks a systematic countermeasure strategy. Therefore, it is necessary to more systematically check the consistency of operators and regulators related to cyber security, as in regulatory guide 5.71 (RG.5.71) and regulatory standard 015 (RS.015). For this reason, this paper attempts to suggest a template for cyber-attack taxonomy based on the characteristics of NPPs and exemplifies a specific cyber-attack case in the template. In addition, this paper proposes a systematic countermeasure strategy by matching the countermeasure with critical digital assets (CDAs). The cyber-attack cases investigated using the proposed cyber-attack taxonomy can be used as data for evaluation and validation of cyber security conformance for digital devices to be applied, and as effective prevention and mitigation for cyber-attacks of NPPs.

An Image Steganography Scheme based on LSB++ and RHTF for Resisting Statistical Steganalysis

  • Nag, Amitava;Choudhary, Soni;Basu, Suryadip;Dawn, Subham
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.5 no.4
    • /
    • pp.250-255
    • /
    • 2016
  • Steganography is the art and science of secure communication. It focuses on both security and camouflage. Steganographic techniques must produce the resultant stego-image with less distortion and high resistance to steganalysis attack. This paper is mainly concerned with two steganographic techniques-least significant bit (LSB)++ and the reversible histogram transformation function (RHTF). LSB++ is likely to produce less distortion in the output image to avoid suspicion, but it is vulnerable to steganalysis attacks. RHTF using a mod function technique is capable of resisting the most popular and efficient steganalysis attacks, such as the regular-singular pair attack and chi-squared detection steganalysis, but it produces a lot of distortion in the output image. In this paper, we propose a new steganographic technique by combining both methods. The experimental results show that the proposed technique overcomes the respective drawbacks of each method.

Clinical characteristics and outcomes in patients with lesion-positive transient ischemic attack

  • Kang, Su-Jeong;Lee, Sang-Gil;Yum, Kyu Sun;Kim, Ji-Seon;Lee, Sung-Hyun;Lee, Sang-Soo;Shin, Dong-Ick
    • Journal of Biomedical and Translational Research
    • /
    • v.19 no.4
    • /
    • pp.110-115
    • /
    • 2018
  • Transient ischemic attack (TIA) indicates high risk for major stroke and is considered a medical emergency. Diffusion-weighted imaging (DWI) enables detection of acute ischemic lesions. The clinical significance of DWI positive lesions in TIA is obscure and its prevalence, clinical features are not established. Therefore, we performed a clinical, etiological and prognostic analysis through a cross-sectional analysis of 235 TIA patients, grouped according to presence of DWI lesion. Clinical features, underlying risk factors for stroke, outcome and rate of recurrence were analyzed. 3 months follow-up of modified Rankin Scales (mRS) were done with telephone survey. DWI positive lesions were present in 14.0% of patients. Etiological factors significantly associated with DWI lesions in TIA patients were male sex (p = 0.038), stroke history (p = 0.012) and atrial fibrillation (p < 0.001). Presence of at least one medium or high risk of cardioembolism from TOAST classification were not associated with lesions when excluding association to atrial fibrillation (p = 0.108). Clinical features showed no significant difference. Whether the patients had lesion-positive DWI was not related to an increase in mRS score during the hospital stay or at the 3-month follow-up after discharge. Future studies should include multi-center samples with large numbers, considering each unique medical environment. Routine acquisition of follow-up DWI for proper evaluation of the tissue-based definition of TIA should also be considered.

Impact of Asymmetric Middle Cerebral Artery Velocity on Functional Recovery in Patients with Transient Ischemic Attack or Acute Ischemic Stroke (일과성허혈발작 및 급성뇌경색환자에서 경두개도플러로 측정된 중간대뇌동맥 비대칭 지수가 환자 예후에 미치는 영향)

  • Han, Minho;Nam, Hyo Suk
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.50 no.2
    • /
    • pp.126-135
    • /
    • 2018
  • This study examined whether the difference in the middle cerebral artery (MCA) velocities can predict the prognosis of stroke and whether the prognostic impact differs among stroke subtypes. Transient ischemic attack (TIA) or acute ischemic stroke patients, who underwent a routine evaluation and transcranial Doppler (TCD), were included in this study. The MCA asymmetry index was calculated using the relative percentage difference in the mean flow velocity (MFV) between the left and right MCA: (|RMCA MFV-LMCA MFV|/mean MCA MFV)${\times}100$. The stroke subtypes were determined using the TOAST classification. Poor functional outcomes were defined as a mRS score ${\geq}3$ at 3 months after the onset of stroke. A total of 988 patients were included, of whom 157 (15.9%) had a poor functional outcome. Multivariable analysis showed that only the MCA asymmetry index was independently associated with a poor functional outcome. ROC curve analysis showed that adding the MCA asymmetry index to the prediction model improved the discrimination of a poor functional outcome from acute ischemic stroke (from 88.6% [95% CI, 85.2~91.9] to 89.2% [95% CI, 85.9~92.5]). The MCA asymmetry index has an independent prognostic value for predicting a poor short-term functional outcome after an acute cerebral infarction. Therefore, TCD may be useful for predicting a poor functional outcome in patients with acute ischemic stroke.

Association of PTGER gene family polymorphisms with aspirin intolerant asthma in Korean asthmatics

  • Park, Byung-Lae;Park, Se-Min;Park, Jong-Sook;Uh, Soo-Taek;Choi, Jae-Sung;Kim, Yong-Hoon;Kim, Mi-Kyeong;Choi, In-Seon S.;Choi, Byoung-Whui;Cho, Sang-Heon;Hong, Chein-Soo;Lee, Yong-Won;Lee, Jae-Young;Park, Choon-Sik;Shin, Hyoung-Doo
    • BMB Reports
    • /
    • v.43 no.6
    • /
    • pp.445-449
    • /
    • 2010
  • Aspirin-intolerant asthma (AIA) is characterized by severe asthmatic attack after ingestion of aspirin and/or non-steroidal anti-inflammatory drugs. In this study, we investigated the relationship between Prostaglandin E2 receptor (PTGER) gene family polymorphisms and AIA in 243 AIA patients and 919 aspirin-tolerant asthma (ATA) controls of Korean ethnicity in two separate study cohorts. After genotyping 120 SNPs of the PTGER gene family for the $1^{st}$ cohort study, four SNPs in PTGER1, ten in PTGER3, six in PTGER3, and a haplotype of PTGER2 showed association signals with decreased or increased risk of AIA. Among the positively associated SNPs, one in PTGER1 and four in PTGER3 were analyzed in the $2^{nd}$ cohort study. The results show that rs7543182 and rs959 in PTGER3 retained their effect, although no statistical significance was retained in the $2^{nd}$ cohort study. Our findings provide further evidence that polymorphisms in PTGER3 might play a significant role in aspirin hypersensitivity among Korean asthmatics.