• Title/Summary/Keyword: Security networks

Search Result 1,804, Processing Time 0.028 seconds

The Full-Duplex Device-to-Device Security Communication Under the Coverage of Unmanned Aerial Vehicle

  • Zeng, Qian;Zhang, Zhongshan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.4
    • /
    • pp.1941-1960
    • /
    • 2019
  • Unmanned aerial vehicles (UAVs), acting as mobile base stations (BSs), can be deployed in the typical fifth-generation mobile communications (5G) scenarios for the purpose of substantially enhancing the radio coverage. Meanwhile, UAV aided underlay device-to-device (D2D) communication mode can be activated for further improving the capacity of the 5G networks. However, this UAV aided D2D communication system is more vulnerable to eavesdropping attacks, resulting in security risks. In this paper, the D2D receivers work in full-duplex (FD) mode, which improves the security of the network by enabling these legitimate users to receive their useful information and transmit jamming signal to the eavesdropper simultaneously (with the same frequency band). The security communication under the UAV coverage is evaluated, showing that the system's (security) capacity can be substantially improved by taking advantage of the flexible radio coverage of UAVs. Furthermore, the closed-form expressions for the coverage probabilities are derived, showing that the cellular users (CUs)' secure coverage probability in downlink transmission is mainly impacted by the following three factors: its communication area, the relative position with UAV, and its eavesdroppers. In addition, it is observed that the D2D users or DUs' secure coverage probability is relevant to state of the UAV. The system's secure capacity can be substantially improved by adaptively changing the UAV's position as well as coverage.

A Method for Detecting Unauthorized Access Point over 3G Network (3G망을 사용하는 인가되지 않은 AP 탐지 방법)

  • Kim, I-luk;Cho, Jae-Ik;Shon, Tae-Shik;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.259-266
    • /
    • 2012
  • Malicious rogue AP has been used for variety attacks such as packet sniffing and Man-In-The-Middle Attack. It is used for the purpose of data leakage via 3G network within companies, and the unauthorized AP could be a reason of security incidents even though it is not intended. In this paper, we propose the method for detecting unauthorized access point over 3G networks throughout the RTT (Round Trip Time) value for classification. Through the experiments, we show that the method can classify the AP which is installed by normal way and the AP over 3G networks successfully.

Food Security through Smart Agriculture and the Internet of Things

  • Alotaibi, Sara Jeza
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.33-42
    • /
    • 2022
  • One of the most pressing socioeconomic problems confronting humanity on a worldwide scale is food security, particularly in light of the expanding population and declining land productivity. These causes have increased the number of people in the world who are at risk of starving and have caused the natural ecosystems to degrade at previously unheard-of speeds. Happily, the Internet of Things (IoT) development provides a glimmer of light for those worried about food security through smart agriculture-a development that is particularly relevant to automating food production operations in order to reduce labor expenses. When compared to conventional farming techniques, smart agriculture has the benefit of maximizing resource use through precise chemical input application and regulation of environmental factors like temperature and humidity. Farmers may make data-driven choices about the possibility of insect invasion, natural disasters, anticipated yields, and even prospective market shifts with the use of smart farming tools. The technical foundation of smart agriculture serves as a potential response to worries about food security. It is made up of wireless sensor networks and integrated cloud computing modules inside IoT.

Security Criteria for Design and Evaluation of Secure Plant Data Network on Nuclear Power Plants (원전 계측제어계통의 안전 네트워크 설계 및 평가를 위한 보안 기준)

  • Kim, Do-Yeon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.2
    • /
    • pp.267-271
    • /
    • 2014
  • Nuclear power plant data networks and their associated safety systems are being modernized to include many information technology (IT) networks and applications. Along with the advancement of plant data networks (PDN), instrumentation and control systems are being upgraded with modern digital, microprocessor-based systems. However, nuclear PDN is confronted significant side-effects, which PDN is exposed to prevalent cyber threats typically found in IT environments. Therefore, cyber security vulnerabilities and possibilities of cyber incidents are dramatically increased in nuclear PDN. Consequently, it should be designed fully ensuring the PDN meet all reliability, performance and security requirements in order to overcome the disadvantages raised from adaption of IT technology. In this paper, we provide technical security criteria should be used in design and evaluation of secure PDN. It is believed PDN, which is designed and operated along with these technical security critera, effectively protect against possible outside cyber threats.

A Design of Traceable and Privacy-Preserving Authentication in Vehicular Networks (VANET 환경에서 프라이버시를 보호하면서 사고 발생 시 추적 가능한 인증 프로토콜)

  • Kim, Sung-Hoon;Kim, Bum-Han;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.115-124
    • /
    • 2008
  • In vehicular networks, vehicles should be able to authenticate each other to securely communicate with network-based infrastructure, and their locations and identifiers should not be exposed from the communication messages. however, when an accident occurs, the investigating authorities have to trace down its origin. As vehicles communicate not only with RSUs(Road Side Units) but also with other vehicles, it is important to minimize the number of communication flows among the vehicles while the communication satisfies the several security properties such as anonymity, authenticity, and traceability. In our paper, when the mutual authentication protocol is working between vehicles and RSUs, the protocol offers the traceability with privacy protection using pseudonym and MAC (Message Authentication Code) chain. And also by using MAC-chain as one-time pseudonyms, our protocol does not need a separate way to manage pseudonyms.

CRL Distribution Method based on the T-DMB Data Service for Vehicular Networks (차량통신에서 T-DMB 데이터 서비스에 기반한 인증서 취소 목록 배포 기법)

  • Kim, Hyun-Gon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.161-169
    • /
    • 2011
  • There is a consensus in the field of vehicular network security that public key cryptography should be used to secure communications. A certificate revocation list (CRL) should be distributed quickly to all the vehicles in the network to protect them from malicious users and malfunctioning equipment as well as to increase the overall security and safety of vehicular networks. Thus, a major challenge in vehicular networks is how to efficiently distribute CRLs. This paper proposes a CRL distribution method aided by terrestrial digital multimedia broadcasting (T-DMB). By using T-DMB data broadcasting channels as alternative communication channels, the proposed method can broaden the network coverage, achieve real-time delivery, and enhance transmission reliability. Even if roadside units are not deployed or only sparsely deployed, vehicles can obtain recent CRLs from the T-DMB infrastructure. A new transport protocol expert group (TPEG) CRL application was also designed for the purpose of broadcasting CRLs over the T-DMB infrastructure.

Social Networks As A Tool Of Marketing Communications

  • Nataliia Liashuk
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.137-144
    • /
    • 2023
  • The relevance of the research topic lies in the necessity to use social networks as innovative tools of marketing communications. A wide audience and the ability to segment the market for a specific consumer determine the construction of a corporate strategy, which will be based on using the social networking approach. The spread of the global coronavirus pandemic has led to the rapid development of remote communication channels between the company and the customer. The issue of using marketing tools in social networks acquires the most urgent importance in the modern world of the introduction and implementation of the company's marketing strategies. The purpose of the academic paper is to study the use of social networks as features of implementing the marketing campaign. Social networks are the result of the development of digital technologies and the processes of creating an information society involved in the digital space. The objectives of the research are to analyse the opportunity of using social networks as a tool for marketing communications and their implementation at the level of its widespread use by enterprises and establishments. It is significant to create an advertising campaign by defining the target audience and outlining the key aspects, on which the company is focused. The research methodology consists in determining the theoretical and methodological approaches to the essence of introducing social networks and their practical importance in the implementation of marketing activities of companies. The obtained results can significantly improve the quality of functioning of modern enterprises and organizations that plan to master a new market segment or gain competitive advantages in the existing one. The academic paper examines the essence of social networks as a tool of marketing communications. The key principles of the development of digital social platforms were revealed. The quality of implementing the advertising campaign in the social network was studied, and further prospects for the development of using social networks as a component of the marketing strategy were outlined. Therefore, the academic paper analyses the problems of using social networks as a marketing tool.

A Framework Development for Total Management of Various Embedded Devices (여러 임베디드 장치의 통합 관리를 위한 프레임워크 개발)

  • Bae, HyunChul;Kim, SangWook
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.1 no.2
    • /
    • pp.56-63
    • /
    • 2006
  • In this paper, we propose the integrated security management framework supporting the trust for the ubiquitous environments. The proposed framework provides the gathering and analysis of the security related information including the location of mobile device and then dynamically configures the security policy and adopts them. More specially, it supports the authentication and delegation service to support the trusted security management for the ubiquitous networks. This system also provides the visible management tools to give the convenient view for network administrator.

  • PDF

Analyses of Security Issues and Requirements for RFID System and Its Application

  • Kim, Jung-Te
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.3
    • /
    • pp.335-339
    • /
    • 2009
  • RFID security and privacy issues have been intensively studied in the research field, the authentication between RFID reader and tag is the fundamental them. Most of the existing authentication protocols draw assumptions on classic primitives. Since tags have small capacities, the security mechanisms which are in use in computer networks and communication are not suitable. In this paper, we compare and analyze recent technical research on the problems of privacy and security. It consists of security mechanism, threats and performance evaluation, etc.

Efficient Security Mechanism using Light-weight Data Origin Authentication in Sensor Networks (경량화 데이터 origin 인증을 통한 효율적인 센서 네트워크 보안에 관한 연구)

  • Park, Min-Ho;Lee, Chung-Keun;Son, Ju-Hyung;Seo, Seung-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.7A
    • /
    • pp.717-723
    • /
    • 2007
  • There are many weaknesses in sensor networks due to hardware limitation of sensor nodes besides the vulnerabilities of a wireless channel. In order to provide sensor networks with security, we should find out the approaches different from ones in existing wireless networks; the security mechanism in sensor network should be light-weighted and not degrade network performance. Sowe proposed a novel data origin authentication satisfying both of being light-weighted and maintaining network performance by using Unique Random Sequence Code. This scheme uses a challenge-response authentication consisting of a query code and a response code. In this paper, we show how to make a Unique Random Sequence Code and how to use it for data origin authentication.