• Title/Summary/Keyword: Replay

Search Result 318, Processing Time 0.022 seconds

A Secure 6LoWPAN Re-transmission Mechanism for Packet Fragmentation against Replay Attacks (안전한 6LoWPAN 단편화 패킷 재전송 기법에 관한 연구)

  • Kim, Hyun-Gon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.10
    • /
    • pp.101-110
    • /
    • 2009
  • The 6LoWPAN(IPv6 Low-power Wireless Personal Area Network) performs IPv6 header compression, TCP/UDP/IGMP header compression, packet fragmentation and re-assemble to transmit IPv6 packet over IEEE 802,15.4 MAC/PHY. However, from the point of view of security. It has the existing security threats issued by IP packet fragmenting and reassembling, and new security threats issued by 6LoWPAN packet fragmenting and reassembling would be introduced additionally. If fragmented packets are retransmitted by replay attacks frequently, sensor nodes will be confronted with the communication disruption. This paper analysis security threats introduced by 6LoWPAN fragmenting and reassembling, and proposes a re-transmission mechanism that could minimize re-transmission to be issued by replay attacks. Re-transmission procedure and fragmented packet structure based on the 6LoWPAN standard(RFC4944) are designed. We estimate also re-transmission delay of the proposed mechanism. The mechanism utilizes timestamp, nonce, and checksum to protect replay attacks. It could minimize reassemble buffer overflow, waste of computing resource, node rebooting etc., by removing packet fragmentation and reassemble unnecessary.

Recording and Replay Interface to manipulate 3D Structured Objects (3D 객체의 구조에 기반을 둔 기록 및 재생 인터페이스)

  • Koo, In-Young;Sin, Eun-Joo;Choy, Yoon-Chul;Lim, Soon-Bum
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.737-740
    • /
    • 2009
  • 3D VR modeling data can be used for powerful expression in construction, because it gives help to navigate a construction in 3D space easily. But the current status of VR technique visualizes only an external shape of a construction. A construction has not only its external shape data but also its constructive information. The constructive information is very important and can be expressed as the process of construction and deconstruction. Thus we research on recording and replay interface to manipulate 3D structured objects for the process of construction and deconstruction.

  • PDF

A Supply Chain Management based on Mobile Agents with Flexible Reply Scheme (유연한 응답 기능을 가지는 이동 에이전트에 기반을 둔 공급 체인 관리)

  • Jeong, Won-Ho;Nam, Hui-Jeong
    • The KIPS Transactions:PartD
    • /
    • v.8D no.4
    • /
    • pp.439-450
    • /
    • 2001
  • Mobile agent is one of the promising ways of overcoming network load and latency. It is also a new software paradigm including those concepts of client/server, applet/servelet, and code-on-demand. In this paper, a new mobile agent concept with flexible replay scheme is proposed, which can deal with embarrassing situation when replying results should be accomplished in various distributed applications. For example, they are 1) a burden of bulky result, 2) a need of different replay scheme dependent on work type, 3) connection failure to the target node, and 4) a need of fast migration to next node to keep the itinerary. Regarding the source node, there may be another situation that it wants to be aware of whether its wi가 is completed or not. Three kinds of reply schemes are proposed for dealing flexibly with such situations. They are based on priority reply list where nodes to be replied are stored according to their priorities. An experimental supply chain management model using the proposed reply schemes is designed and implemented. It is one of good distributed applications appropriate for our reply schemes, because it requires different reply schemes according to work types and it is important to gather required information in time.

  • PDF

The Study of Data Recorder for Mission Replay (임무 재생을 위한 데이터 기록장치 연구)

  • Lee, Sang-Myung;Kim, Young-Kil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.8
    • /
    • pp.1817-1823
    • /
    • 2012
  • On the matter in line with NCW(Network Centric Warfare) and information age, the military is on an efficient-expanding trend as sharing with status and information promptly through the various and complex exchange of messages and the voice communication between operators, using a highly efficient operating console. The recording devices that record an operational situation to plan a new operation through the mission analysis and result reviews after finishing military operation or training are developed and operated. Recording method is classified into two groups. one is the direct recording of video data for screen, another is the recording of an exchange of data. This study proposes the new data-oriented recording method to reduce the readiness time for replay and the improvement scheme.

RFID Mutual Authentication Protocol with Security and Performance Improvements (안전성과 성능을 개선한 RFID 상호인증 프로토콜)

  • Hong, Sung-Hyuk;Park, Jong-Hyuk;Yeo, Sang-Soo;Ha, Kyung-Jae
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.6
    • /
    • pp.876-883
    • /
    • 2009
  • In 2008, Kim-Jun proposed RFID Mutual Authentication Protocol based on One-Time Random Numbers which are strong in Eavesdropping Attack, Spoofing attack and Replay attack. However, In 2009, Yoon-Yoo proved that it was weak in Replay attack and proposed a protocol which can prevent Replay attack. But Yoon-Yoo's protocol has problems that efficiency on communication and Brute-force attack. This paper shows weak points of Yoon-Yoo's protocol and proposes an RFID mutual authentication protocol with security and performance improvements.

  • PDF

The Study of Data Recorder for Mission Replay (임무 재생을 위한 데이터기록장치 연구)

  • Lee, Sang-Myung;Kim, Young-Kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.357-360
    • /
    • 2011
  • On the matter in line with NCW(Network Centric Warfare) and information age, the military is on an efficient-expanding trend as sharing with status and information promptly through the various and complex exchange of messages and the phone communication between operators, using a highly efficient operating console. The recording devices that record an operational situation to plan a new operation through the mission analysis and result reviews after finishing military operation or training are developed and operated. Recording method is classified into two groups. one is the recording of display shots, another is the recording of an exchange of messages. This study proposes the new data-oriented recording method to reduce the readiness time of replay and the improvement scheme.

  • PDF

A Study on Assessment of Vessel Traffic Safety Management by Marine Traffic Flow Simulation (해상교통류 시뮬레이션에 의한 해상교통안전관리평가에 관한 연구)

  • Park Young- Soo;Jong Jae-Yong;Inoue Kinzo
    • Journal of the Korea Society for Simulation
    • /
    • v.11 no.4
    • /
    • pp.43-55
    • /
    • 2002
  • Vessel traffic safety management means the managerial technical measures for improving the marine traffic safety in general terms. The main flow of vessel traffic safety management is that: 1) Traffic Survey, 2) Replay by Marine Traffic Flow Simulation, 3) Quantitative Assessment, 4) Policy Alternatives, 5) Prediction·Verification. In the management of vessel traffic safety, it is most important to establish assessment models that can numerically estimate the current safety level and quantitatively predict the correlation between the measures to be taken and the improvement of safety and the reduction of ship handling difficulties imposed on mariners. In this paper, the replay model for traffic flow simulation was made using marine traffic survey data, and the present traffic situation became replay in the computer. An attempt was made to rate the current safety of ports and waterways by applying the Environmental Stress model. And, as a countermeasure for traffic management, by taking of, the promotion of total traffic congestion in early morning rush hour, the correlation between traffic control rate and the reduction in ship handling difficulties imposed on mariners was predicted quantitatively.

  • PDF

R2NET: Storage and Analysis of Attack Behavior Patterns

  • M.R., Amal;P., Venkadesh
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.295-311
    • /
    • 2023
  • Cloud computing has evolved significantly, intending to provide users with fast, dependable, and low-cost services. With its development, malicious users have become increasingly capable of attacking both its internal and external security. To ensure the security of cloud services, encryption, authorization, firewalls, and intrusion detection systems have been employed. However, these single monitoring agents, are complex, time-consuming, and they do not detect ransomware and zero-day vulnerabilities on their own. An innovative Record and Replay-based hybrid Honeynet (R2NET) system has been developed to address this issue. Combining honeynet with Record and Replay (RR) technology, the system allows fine-grained analysis by delaying time-consuming analysis to the replay step. In addition, a machine learning algorithm is utilized to cluster the logs of attackers and store them in a database. So, the accessing time for analyzing the attack may be reduced which in turn increases the efficiency of the proposed framework. The R2NET framework is compared with existing methods such as EEHH net, HoneyDoc, Honeynet system, and AHDS. The proposed system achieves 7.60%, 9.78%%, 18.47%, and 31.52% more accuracy than EEHH net, HoneyDoc, Honeynet system, and AHDS methods.

Soccer Video Highlight Building Algorithm using Structural Characteristics of Broadcasted Sports Video (스포츠 중계 방송의 구조적 특성을 이용한 축구동영상 하이라이트 생성 알고리즘)

  • 김재홍;낭종호;하명환;정병희;김경수
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.7_8
    • /
    • pp.727-743
    • /
    • 2003
  • This paper proposes an automatic highlight building algorithm for soccer video by using the structural characteristics of broadcasted sports video that an interesting (or important) event (such as goal or foul) in sports video has a continuous replay shot surrounded by gradual shot change effect like wipe. This shot editing rule is used in this paper to analyze the structure of broadcated soccer video and extracts shot involving the important events to build a highlight. It first uses the spatial-temporal image of video to detect wipe transition effects and zoom out/in shot changes. They are used to detect the replay shot. However, using spatial-temporal image alone to detect the wipe transition effect requires too much computational resources and need to change algorithm if the wipe pattern is changed. For solving these problems, a two-pass detection algorithm and a pixel sub-sampling technique are proposed in this paper. Furthermore, to detect the zoom out/in shot change and replay shots more precisely, the green-area-ratio and the motion energy are also computed in the proposed scheme. Finally, highlight shots composed of event and player shot are extracted by using these pre-detected replay shot and zoom out/in shot change point. Proposed algorithm will be useful for web services or broadcasting services requiring abstracted soccer video.