• 제목/요약/키워드: Security networks

검색결과 1,804건 처리시간 0.023초

무선센서네트워크를 위한 랜덤키사전분배기법의 경로키 설정에 대한 재고 (Revisiting Path-Key Establishment of Random Key Predistribution for Wireless Sensor Networks)

  • 권태경;이종협;송주석
    • 정보보호학회논문지
    • /
    • 제19권2호
    • /
    • pp.165-169
    • /
    • 2009
  • 본 논문에서는 무선센서네트워크를 위한 랜덤키사전분배기법의 경로키 설정에 대해서 재고한다. 먼저 랜템키사전 분배기법의 기본적인 단계인 경로키 설정이 성능면에서 비실용적임을 보이고, 이를 크게 개선하기 위한 새로운 기법을 제시하고 그 성능을 분석한다.

Single Image Dehazing: An Analysis on Generative Adversarial Network

  • Amina Khatun;Mohammad Reduanul Haque;Rabeya Basri;Mohammad Shorif Uddin
    • International Journal of Computer Science & Network Security
    • /
    • 제24권2호
    • /
    • pp.136-142
    • /
    • 2024
  • Haze is a very common phenomenon that degrades or reduces the visibility. It causes various problems where high quality images are required such as traffic and security monitoring. So haze removal from images receives great attention for clear vision. Due to its huge impact, significant advances have been achieved but the task yet remains a challenging one. Recently, different types of deep generative adversarial networks (GAN) are applied to suppress the noise and improve the dehazing performance. But it is unclear how these algorithms would perform on hazy images acquired "in the wild" and how we could gauge the progress in the field. This paper aims to bridge this gap. We present a comprehensive study and experimental evaluation on diverse GAN models in single image dehazing through benchmark datasets.

Practical and Provable Security against Differential and Linear Cryptanalysis for Substitution-Permutation Networks

  • Kang, Ju-Sung;Hong, Seok-Hie;Lee, Sang-Jin;Yi, Ok-Yeon;Park, Choon-Sik;Lim, Jong-In
    • ETRI Journal
    • /
    • 제23권4호
    • /
    • pp.158-167
    • /
    • 2001
  • We examine the diffusion layers of some block ciphers referred to as substitution-permutation networks. We investigate the practical and provable security of these diffusion layers against differential and linear cryptanalysis. First, in terms of practical security, we show that the minimum number of differentially active S-boxes and that of linearly active S-boxes are generally not identical and propose some special conditions in which those are identical. We also study the optimal diffusion effect for some diffusion layers according to their constraints. Second, we obtain the results that the consecutive two rounds of SPN structure provide provable security against differential and linear cryptanalysis, i.e., we prove that the probability of each differential (resp. linear hull) of the consecutive two rounds of SPN structure with a maximal diffusion layer is bounded by $p^n(resp.q^n)$ and that of each differential (resp. linear hull) of the SDS function with a semi-maximal diffusion layer is bounded by $p^{n-1}(resp. q^{n-1})$, where p and q are maximum differential and linear probabilities of the substitution layer, respectively.

  • PDF

Certificate Revocation Scheme using MOT Protocol over T-DMB Infrastructure

  • Kim, Hyun-Gon;Kim, Min-Soo;Jung, Seok-Won;Seo, Jae-Hyun
    • 한국멀티미디어학회논문지
    • /
    • 제14권12호
    • /
    • pp.1583-1590
    • /
    • 2011
  • A Certificate Revocation List(CRL) should be distributed quickly to all the vehicles for vehicular communications to protect them from malicious users and malfunctioning equipment as well as to increase the overall security and safety of vehicular networks. Thus, a major challenge in vehicular networks is how to efficiently distribute CRLs. This paper proposes a Multimedia Object Transfer(MOT) protocol based on CRL distribution scheme over T-DMB infrastructure. To complete the proposed scheme, a handoff method, CRL encoding rules based on the MOT protocol, and relative comparison are presented. The scheme can broaden breadth of network coverage and can get real-time delivery with enhanced transmission reliability. Even if road side units are sparsely deployed or, even not deployed, vehicles can obtain recent CRLs from T-DMB infrastructure effectively.

홈 네트워크에서의 USN 보안 고려 사항 분석 (USN Security Considerations in Home Network)

  • 박우출;박현문;이명수;윤명현
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2006년도 심포지엄 논문집 정보 및 제어부문
    • /
    • pp.171-173
    • /
    • 2006
  • Because sensor networks use wireless communication, they are vulnerable to attacks which are more difficult launch in the wired domain. Many wired networks benefit from their inherent physical security properties. It is unlikely that an adversary will dig up the Internet backbone and splice into the line. However, wireless communications are difficult to protect; they are by nature a broadcast medium. In a broadcast medium, adversaries can easily eavesdrop on, intercept, inject, and alter transmitted data. In addition, adversaries are not restricted to using sensor network hardware. We have analyzed the IEEE 802.15.4, ZigBee specification which includes a number of security provisions and options. In this paper, we highlight places where USN security considerations and home network attack scenarios.

  • PDF

An Approach for Applying Network-based Moving Target Defense into Internet of Things Networks

  • Park, Tae-Keun;Park, Kyung-Min;Moon, Dae-Sung
    • 한국컴퓨터정보학회논문지
    • /
    • 제24권9호
    • /
    • pp.35-42
    • /
    • 2019
  • In this paper, we propose an approach to apply network-based moving target defense into Internet of Things (IoT) networks. The IoT is a technology that provides the high interconnectivity of things like electronic devices. However, cyber security risks are expected to increase as the interconnectivity of such devices increases. One recent study demonstrated a man-in-the-middle attack in the statically configured IoT network. In recent years, a new approach to cyber security, called the moving target defense, has emerged as a potential solution to the challenge of static systems. The approach continuously changes system's attack surface to prevent attacks. After analyzing IPv4 / IPv6-based moving target defense schemes and IoT network-related technologies, we present our approach in terms of addressing systems, address mutation techniques, communication models, network configuration, and node mobility. In addition, we summarize the direction of future research in relation to the proposed approach.

신뢰도 평가를 통한 무선 센서 네트워크에서의 거짓 데이타 제거 (Trust-Based Filtering of False Data in Wireless Sensor Networks)

  • 허준범;이윤호;윤현수
    • 한국정보과학회논문지:정보통신
    • /
    • 제35권1호
    • /
    • pp.76-90
    • /
    • 2008
  • 무선 센서 네트워크는 자연재해 탐지 시스템, 의료 시스템, 그리고 군사적 응용분야 등의 다양한 환경에서 유용한 해결책을 제시하고 있다. 그러나 센서 네트워크의 구성 환경 및 자원 제약적인 본질적인 특성으로 인해 기존의 전통적인 보안기법을 그대로 센서 네트워크에 적용하기에는 무리가 있다. 특히 네트워크를 구성하는 센서 노드들은 제한된 배터리를 사용하기 때문에 센서 네트워크에 거짓 데이타가 유입되는 경우 서비스 거부 뿐만 아니라 센서 노드의 제한된 에너지를 소모시키는 등의 심각한 문제를 야기할 수 있다. 기존의 전통적인 암호학적 인증 및 키 관리 방법 등을 통한 보안 기법은 센서 네트워크의 물리적인 노드탈취 공격에 대한 취약성으로 인해서 이러한 거짓 데이타 판별에 대한 해결책을 제시하지 못한다. 본 논문에서는 기존의 평판기반 기법과 달리 각 센서 노드의 위치에 따른 센싱 결과에 대해 일관성 등의 요소를 기반으로 신뢰도를 평가하고, 거짓 데이타를 주입하는 내부 공격에 대한 보안기법을 제안한다. 분석 결과에 따르면 제안한 신뢰도 평가 기반의 데이타 통합 기법은 기존의 중앙값보다 견고한 데이타 통합 결과를 보여준다.

전자무역의 베이지안 네트워크 개선방안에 관한 연구 (A Study on the Improvement of Bayesian networks in e-Trade)

  • 정분도
    • 통상정보연구
    • /
    • 제9권3호
    • /
    • pp.305-320
    • /
    • 2007
  • With expanded use of B2B(between enterprises), B2G(between enterprises and government) and EDI(Electronic Data Interchange), and increased amount of available network information and information protection threat, as it was judged that security can not be perfectly assured only with security technology such as electronic signature/authorization and access control, Bayesian networks have been developed for protection of information. Therefore, this study speculates Bayesian networks system, centering on ERP(Enterprise Resource Planning). The Bayesian networks system is one of the methods to resolve uncertainty in electronic data interchange and is applied to overcome uncertainty of abnormal invasion detection in ERP. Bayesian networks are applied to construct profiling for system call and network data, and simulate against abnormal invasion detection. The host-based abnormal invasion detection system in electronic trade analyses system call, applies Bayesian probability values, and constructs normal behavior profile to detect abnormal behaviors. This study assumes before and after of delivery behavior of the electronic document through Bayesian probability value and expresses before and after of the delivery behavior or events based on Bayesian networks. Therefore, profiling process using Bayesian networks can be applied for abnormal invasion detection based on host and network. In respect to transmission and reception of electronic documents, we need further studies on standards that classify abnormal invasion of various patterns in ERP and evaluate them by Bayesian probability values, and on classification of B2B invasion pattern genealogy to effectively detect deformed abnormal invasion patterns.

  • PDF

Impact of Social Networks Safety on Marketing Information Quality in the COVID-19 Pandemic in Saudi Arabia

  • ALNSOUR, Iyad A.;SOMILI, Hassan M.;ALLAHHAM, Mahmoud I.
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제8권12호
    • /
    • pp.223-231
    • /
    • 2021
  • The study aimed to investigate the impact of social networks safety (SNS) on the marketing information quality (MIQ) during the COVID-19 pandemic in Saudi Arabia. The study examines the statistical differences in social networks safety SNS and marketing information quality MIQ according to the demographics such as age, sex, income, and education. For this study purpose, information security and privacy are two components of social networks safety. The research materials are website resources, regular books, journals, and articles. The population includes all Saudi users of social networks. The figures show that active users of the social network reached 25 Million in 2020. The snowball method was used and sample size is 500 respondents and the questionnaire is the tool for the data collection. The Structural Equation Modelling SEM technique is used. Convergent Validity, Discriminate Validity, and Multicollinearity are the main assumptions of structural equation modeling SEM. The findings show the high positive impact of SNS networks safety on MIQ and the statistical differences in such variables refer to education. Finally, the study presents a set of future suggestions to enhance the safety of social networks in Saudi Arabia.

무선 센서 네트워크 환경에서 단-방향 해쉬 함수 기반 다중 경로 보안 전송 기법 (A Secure Multipath Transmission Scheme Based on One-Way Hash Functions in Wireless Sensor Networks)

  • 이윤정;김동주;박준호;성동욱;유재수
    • 한국콘텐츠학회논문지
    • /
    • 제12권1호
    • /
    • pp.48-58
    • /
    • 2012
  • 다양한 센싱 모듈의 개발과 무선 통신 기술의 발달로 인해, 한정된 통신 능력과 제한된 연산 능력을 갖춘 다수의 센서 노드를 활용하여 무선 센서 네트워크를 구성하는 것이 가능하게 되었다. 이러한 센서 노드는 무인 환경이나 적지와 같은 환경에 배포되기 때문에 보안에 취약하다. 특히 실생활 응용에 사용될 때, 데이터가 노출되면 치명적인 피해를 입을 수 있기 때문에 보안에 대한 고려는 필수적이다. 하지만 기존 네트워크에서의 보안 기법은 센서 노드의 제한된 성능을 고려하지 않기 때문에, 무선 센서 네트워크에 적용하는 것은 한계가 있다. 이러한 점을 해결하기 위해, 본 논문에서는 무선 센서의 제한된 성능을 고려한 에너지 효율적인 보안 기법을 제안한다. 제안하는 기법은 원본 데이터의 해독을 어렵게 하기 위해 단-방향 해쉬 함수인 MD5를 기반으로 데이터를 변환 후, 분할하여 다중 경로를 통해 전송함으로써 보안성을 강화하는 것이 가능하다. 성능 평가 결과, 제안하는 기법은 기존 기법의 약 6%의 에너지만 소비하였다.