• Title/Summary/Keyword: Unauthorized

Search Result 422, Processing Time 0.025 seconds

Analysis of Time-Based Unauthorized AP Detection Methods According to Hardware Performance of Unauthorized AP (비인증 AP의 하드웨어 성능에 따른 시간 측정 기반의 비인증 AP 탐색 기법의 분석)

  • Jang, Rhong-Ho;Kang, Jeon-Il;Nyang, Dae-Hun;Lee, Kyung-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.3
    • /
    • pp.551-558
    • /
    • 2015
  • As more people use Wi-Fi and hotspot, unauthorized APs become one of big security problems in modern society. From the beginning of 2010, researchers study about unauthorized AP continually and contributed a lot of methods of detecting unauthorized AP that use wireless resources. Many researches about unauthorized AP detection use time-delay measurement (e.g., average or standard deviation) which is caused by additional wireless connection. In the most previous researches, however, the unauthorized APs consist of laptop and pulg-in Wi-Fi adaptor, and researchers did not concern about time-delay caused by software network sharing. In this paper, we show that existing unauthorized AP detection scheme that can not efficiently classify the high performance unauthorized AP.

Entropy-based Spectrum Sensing for Cognitive Radio Networks in the Presence of an Unauthorized Signal

  • So, Jaewoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.1
    • /
    • pp.20-33
    • /
    • 2015
  • Spectrum sensing is a key component of cognitive radio. The prediction of the primary user status in a low signal-to-noise ratio is an important factor in spectrum sensing. However, because of noise uncertainty, secondary users have difficulty distinguishing between the primary signal and an unauthorized signal when an unauthorized user exists in a cognitive radio network. To resolve the sensitivity to the noise uncertainty problem, we propose an entropy-based spectrum sensing scheme to detect the primary signal accurately in the presence of an unauthorized signal. The proposed spectrum sensing uses the conditional entropy between the primary signal and the unauthorized signal. The ability to detect the primary signal is thus robust against noise uncertainty, which leads to superior sensing performance in a low signal-to-noise ratio. Simulation results show that the proposed spectrum sensing scheme outperforms the conventional entropy-based spectrum sensing schemes in terms of the primary user detection probability.

Analysis of the Effects on Soil Erosion and Suspended Sediment Reduction by Alpine Unauthorized and Illegal Agricultural Fields Restoration Scenarios (고랭지 임의·불법 경작지 복구 시나리오에 따른 토양유실 및 부유사량 저감 효과 분석)

  • Lee, Seoro;Lee, Gwanjae
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.66 no.2
    • /
    • pp.53-62
    • /
    • 2024
  • This study assessed the efficiency of reducing soil erosion and suspended sediment through the restoration of alpine unauthorized and illegally cultivated fields, using the SWAT (Soil and Water Assessment Tool) model in the Mandae District. The results showed that in Scenario 5, which involved restoring unauthorized and illegal fields within forests, along rivers (banks), and in ditch areas were restored to their original land categories, achieved the highest efficiency in reducing average annual soil erosion and suspended sediment, with reductions of 8.1% and 4.5%, respectively. In particular, it was confirmed that the restoration of unauthorized and illegal fields within forested areas has a significant impact. This demonstrated that the restoration of unauthorized and illegal agricultural fields can substantially reduce the soil erosion and suspended sediment attributable to non-point source pollution. Our findings highlight the importance of managing these unauthorized and illegal agricultural activities in developing sustainable strategies within non-point source pollution management areas. This study is expected to provide important basic data to effectively establish water quality improvement strategies in the region of non-point source pollution management.

A Comparative Study on bank's responsibilities in the Electronic Payment System -comparison between Korea and U.S.A- (국제 전자결제시스템에서 금융기관의 책임 및 정책적 시사점 -한국과 미국의 전자금융제도 비교-)

  • Lee, Byeong-Ryul
    • International Commerce and Information Review
    • /
    • v.12 no.1
    • /
    • pp.35-54
    • /
    • 2010
  • This article explored the bank's responsibilities in electronic payment system between Korea and U.S.A. In order to complete my research object, I used Article 4A of the U.C.C. and EFTA of 1978 and by Electronic Financial Transaction Act of Korea as a analytic instruments. I also adapted America's various regulations to regulate concerned parties(banks). The system of this article is going to display as fellows; First, I presented recent trend and legal stabilities of electronic payment in this article. Second, I focuses on the allocation of risk of loss caused by ambiguous term in payment orders that do not express the subjective intention of the senders. I also did analyze the solution procession of error occurring in course of send of payment order. Third, In any action which involves a customers's liability for an unauthorized electronic fund transfer, the burden of proof is upon the financial institution to show that the electronic fund transfer was authorized. Forth, Customers have to report the error and unauthorized electronic fund transfer after awaring of it. Then bank will be liable for such a unauthorized electronic fund transfer. But If customer's failure to report, the bank has exemptions. Lastly, In order to prevent or detect the unauthorized electronic fund transfer, bank will agree with custom to establish a commercially reasonable security procedure, while bank has duties to notify in order to decrease the loss resulted from unauthorized payment order in korea law.

  • PDF

A Comparative Study on the Electronic Payment System between United States and Korea (한국과 미국의 전자결제제도 비교연구 -고객보호관련 주요쟁점을 중심으로-)

  • Lee, Byeong-Ryul
    • International Commerce and Information Review
    • /
    • v.11 no.1
    • /
    • pp.27-43
    • /
    • 2009
  • This article explored the customers protection regulations in electronic payment system by Article 4A of the UCC and EFTA of 1978 and by Electronic Financial Transaction Act of Korea. Both Korea and America have various regulations to protect concerned parties(customers). For examples, the errors of payment order, money-back guarantee, and unauthorized payment order etc. First, this Article focuses on the allocation of risk of loss caused by ambiguous term in payment orders that do not express the subjective intention of the senders. Second, most rights and obligations created by Article 4A of America can be varied with the agreement of affected parties. But there are some exceptions. The exceptions include the money-back guarantee. So Receiving bank have to pay to originator the ordered money included interest. However, Korea also has money-back guarantee but bank do not pay interest to sender. Lastly, Electronic Funds Transfer Act of 1978 and Regulation E has US$ 50 regulation in order to protect customers on the unauthorized payment order. Article 4A imposes duty to detect unauthorized payment orders to originator in relation to the establishment of commercially reasonable security procedure, while Korean law imposes the duty to notify the bank in order to decrease the loss resulted from unauthorized payment order.

  • PDF

A System Unauthorized Access using MAC Address and OTP (MAC Address와 OTP를 이용한 비인가 접근 거부 시스템)

  • Shin, Seung-Soo;Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.10 no.3
    • /
    • pp.127-135
    • /
    • 2012
  • This study improves the existing user identification method using user ID and password. The new protocol protecting unauthorized access is designed and developed using user's ID, password, and OTP for user certification as well as MAC address for computer identification on networks. The safety on trials of unauthorized certification is tested and analyzed for four types following the criterion of information acquisition.

Research on the Analysis and Response of Unauthorized Personal Information Collection in Foreign Applications (해외 애플리케이션의 개인정보 무단 수집 실태 분석과 대응 방안에 대한 연구)

  • Kim, Se-Hwan;Yun, Hyung-Jun;Jung, Da-Hyun;Jang, Seung-Hoon;Han, Cheol-Kyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.453-462
    • /
    • 2021
  • The number of foreign applications available in Korea is increasing. Among them, there are many cases where applications having a large number of domestic users collect users' personal information in an unauthorized manner, causing serious problems. Unauthorized collection of personal information conducted through such applications is highly dangerous, because sensitive personal information of users can be used in a malicious way. Further, this is violation of business ethics and may interrupt the creation of the sound information technology ecosystem. This research is purposed to analyze the current status of unauthorized collection of users' personal information by foreign applications available in Korea and to derive countermeasures thereof.

PCA-CIA Ensemble-based Feature Extraction for Bio-Key Generation

  • Kim, Aeyoung;Wang, Changda;Seo, Seung-Hyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.7
    • /
    • pp.2919-2937
    • /
    • 2020
  • Post-Quantum Cryptography (PQC) is rapidly developing as a stable and reliable quantum-resistant form of cryptography, throughout the industry. Similarly to existing cryptography, however, it does not prevent a third-party from using the secret key when third party obtains the secret key by deception, unauthorized sharing, or unauthorized proxying. The most effective alternative to preventing such illegal use is the utilization of biometrics during the generation of the secret key. In this paper, we propose a biometric-based secret key generation scheme for multivariate quadratic signature schemes, such as Rainbow. This prevents the secret key from being used by an unauthorized third party through biometric recognition. It also generates a shorter secret key by applying Principal Component Analysis (PCA)-based Confidence Interval Analysis (CIA) as a feature extraction method. This scheme's optimized implementation performed well at high speeds.

Mandatory Access Control Protection Profile for Secure Operating System (보안 운영체제를 위한 강제적 접근 제어 보호 프로파일)

  • Ko Young Woong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.1 s.33
    • /
    • pp.141-148
    • /
    • 2005
  • Nowadays, it is possible to access sharing data from unauthorized People. Access control prevents unauthorized access to computing resource, information resources, and communication resources. It is very important to defend the critical system resources from the unauthorized. The importance of this study is to develop Protection Profile for Mandatory Access Control (MAC) that satisfies TCSEC assurance level B2. protection profile for MAC will help developers to use reference for the development of requirements and formulating security specification.

  • PDF

An Implementation of Wireless Channel Scanning for Unauthorized Mobile APs Detection (비인가 모바일 AP 탐지를 위한 채널 스캔의 구현에 관한 연구)

  • Hwang, Jaeryong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.363-364
    • /
    • 2015
  • On the area which is restricted an unauthorized WiFi service, mobile WiFi hotspot causes security problems like leaking and gathering internal data. In this paper, we modify a wireless lan driver and implement a detector that periodically scans the wireless channels.

  • PDF