• 제목/요약/키워드: adversary proceeding

검색결과 14건 처리시간 0.025초

Conjunctive 키워드 검색 스킴에서의 취약점 분석

  • 이현숙;정익래;변진구;임종인;이동훈
    • 한국방송∙미디어공학회:학술대회논문집
    • /
    • 한국방송공학회 2007년도 동계학술대회
    • /
    • pp.116-119
    • /
    • 2007
  • In a keyword search scheme a user stores encrypted data on an untrusted server and gives a database manager a capability for a keyword which enables a database manager to find encrypted data containing the keyword without revealing the keyword to the database manager. Conjunctive keyword search scheme enables a user to obtain data containing all of several keywords through only one query. One of the security requirements of conjunctive keyword search schemes is that a malicious adversary should not be able to generate new valid capabilities from the observed capabilities. In U:5 paper we show that conjunctive keyword search schemes are not secure. In particular, given two capabilities corresponding two sets of keywords, an adversary is able to generate a new capability corresponding to the dierence set of two keywords sets.

  • PDF

무선 센서 네트워크에서 동적 여과를 위한 퍼지 기반 확률 조절 기법 (Probability Adjustment Scheme for the Dynamic Filtering in Wireless Sensor Networks Using Fuzzy Logic)

  • 한만호;이해영;조대호
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 한국정보통신설비학회 2008년도 정보통신설비 학술대회
    • /
    • pp.159-162
    • /
    • 2008
  • Generally, sensor nodes can be easily compromised and seized by an adversary because sensor nodes are hostile environments after dissemination. An adversary may be various security attacks into the networks using compromised node. False data injection attack using compromised node, it may not only cause false alarms, but also the depletion of the severe amount of energy waste. Dynamic en-route scheme for Filtering False Data Injection (DEF) can detect and drop such forged report during the forwarding process. In this scheme, each forwarding nodes verify reports using a regular probability. In this paper, we propose verification probability adjustment scheme of forwarding nodes though a fuzzy rule-base system for the Dynamic en-route filtering scheme for Filtering False Data Injection in sensor networks. Verification probability determination of forwarding nodes use false traffic rate and distance form source to base station.

  • PDF

국제상사분쟁해결(國際商事紛爭解決)을 위한 온라인중재(仲裁)에서 정당(正當)한 절차(節次)에 관한 연구(硏究) (A Study on the Due Process in Online Arbitral Proceeding for the International Commercial Disppute Settlement)

  • 유병욱
    • 무역상무연구
    • /
    • 제26권
    • /
    • pp.225-253
    • /
    • 2005
  • Nowadays we does not hesitate to definite answer that the arbitration is the most developed dispute settlement out of court in the international commercial transaction. Online arbitration is desirable for the reasons of speed and cost effectiveness to settle the dispute about the international commercial transaction. Online arbitration is fast because it uses the communication technologies that allow information to be sent fast and efficiently. But in online arbitration too much speed and efficiency may lead to a violation of due process rights and consequently the online arbitration awards run a risk to be set aside or refused its enforcement under the international commercial arbitration mechanism. Speed and efficiency may conflict with the procedural guarantee characterizing each adversary dispute resolution process. As arbitration is exclusive of recourse to courts, a state must guarantee that arbitral proceeding should be satisfied with the claim rights requirement. The main question regarding the sources of regulation is particularly for the due process whether or not this is provided by the availability of grounds to set arbitral award aside. In other words, does it respect due process in the arbitration proceeding including information communication and technology under the online arbitration. In this paper it is discussed about how the main issue in arbitration should be implemented in online arbitration proceedings to cope with the due process requirements in national and international.

  • PDF

이동성 공격자에 강인한 문턱 RSA 서명방식 (Robust Threshold RSA Signature Scheme Against a Mobile Adversary)

  • 박찬섭;염대현;이필중
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2002년도 종합학술발표회논문집
    • /
    • pp.405-408
    • /
    • 2002
  • 사전 대응적 안전성은 이동성 공격자에 대해 오랜 기간 안전하게 유지 및 사용되어야 할 암호학적 키들의 안전성을 증가시킨다. 최근에 Shoup은 매우 실제적인 문턱 RSA 서명방식을 제안하였는데, 그의 논문에서는 사전 대응적 안전성에 대해서 고려하지 않았다. 본 논문에서는 Shoup이 제안한 서명방식과 사전 대응적 안전성을 고려하여 이동성 공격자에 강인한 문턱 RSA 서명방식을 제안한다.

  • PDF

소프트웨어 공격에 대한 보안성 분석 (Analyses of Security for Software Attack)

  • 김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2007년도 추계종합학술대회
    • /
    • pp.725-728
    • /
    • 2007
  • Software security is about making software behave correctly in the presence of a malicious attack, even though software failures usually happen spontaneously in the real world. Standard software testing literature is concerned only with what happens when software fails, regardless of intent. The difference between software safety and software security is therefor the presence of an intelligent adversary bent on breaking the system. Software security for attacking the system is presented in this paper

  • PDF

An Efficient Bilateral Remote User Authentication Scheme with Smart Cards

  • Pathan Al-Sakib Khan;Hong Choong-Seon
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2006년도 가을 학술발표논문집 Vol.33 No.2 (D)
    • /
    • pp.132-134
    • /
    • 2006
  • In this paper, we propose an efficient bilateral remote user authentication scheme with smart cards. Our scheme ensures both-way authentication, so that any attempt of the adversary to affect the secure communications between the authentication server and the user could not be successful. We also present a brief analysis of our proposed scheme and show that it is well-resistant against the known attacks in remote user authentication process.

  • PDF

Defense against HELLO Flood Attack in Wireless Sensor Network

  • Hamid Md. Abdul;Hong Choong Seon;Byun Sang Ick
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2005년도 가을 학술발표논문집 Vol.32 No.2 (1)
    • /
    • pp.214-216
    • /
    • 2005
  • We consider Wireless Sensor Network Security (WSN) and focus our attention to tolerate damage caused by an adversary who has compromised deployed sensor node to modify, block, or inject packets. We adopt a probabilistic secret sharing protocol where secrets shared between two sensor nodes are not exposed to any other nodes. Adapting to WSN characteristics, we incorporate these secrets to establish new pairwise key for node to node authentication and design multipath routing to multiple base stations to defend against HELLO flood attacks. We then analytically show that our defense mechanisms against HELLO flood attack can tolerate damage caused by an intruder.

  • PDF

홈 네트워크에서의 USN 보안 고려 사항 분석 (USN Security Considerations in Home Network)

  • 박우출;박현문;이명수;윤명현
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2006년도 심포지엄 논문집 정보 및 제어부문
    • /
    • pp.171-173
    • /
    • 2006
  • Because sensor networks use wireless communication, they are vulnerable to attacks which are more difficult launch in the wired domain. Many wired networks benefit from their inherent physical security properties. It is unlikely that an adversary will dig up the Internet backbone and splice into the line. However, wireless communications are difficult to protect; they are by nature a broadcast medium. In a broadcast medium, adversaries can easily eavesdrop on, intercept, inject, and alter transmitted data. In addition, adversaries are not restricted to using sensor network hardware. We have analyzed the IEEE 802.15.4, ZigBee specification which includes a number of security provisions and options. In this paper, we highlight places where USN security considerations and home network attack scenarios.

  • PDF

A Lightweight Authentication Mechanism for Acknowledgment in LR-WPAN Environment

  • Heo, Joon;Hong, Choong-Seon;Choi, Sang-Hyun
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2005년도 추계학술발표대회 및 정기총회
    • /
    • pp.973-976
    • /
    • 2005
  • In IEEE 802.15.4 (Low-Rate Wireless Personal Area Network) specification, a successful reception and validation of a data or MAC command frame can be confirmed with an acknowledgment. However, the specification does not support security for acknowledgment frame; the lack of a MAC covering acknowledgments allows an adversary to forge an acknowledgment for any frame. This paper proposes an identity authentication mechanism at the link layer for acknowledgment frame in IEEE 802.15.4 network. With the proposed mechanism there is only three bits for authentication, which can greatly reduce overhead. The encrypted bit stream for identity authentication will be transmitted to device by coordinator within association process. Statistical method indicates that our mechanism is successful in handling MAC layer attack.

  • PDF

여과기법 보안효율을 높이기 위한 센서네트워크 클러스터링 방법 (Enhancing Method to make Cluster for Filtering-based Sensor Networks)

  • 김병희;조대호
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 한국정보통신설비학회 2008년도 정보통신설비 학술대회
    • /
    • pp.141-145
    • /
    • 2008
  • Wireless sensor network (WSN) is expected to be used in many applications. However, sensor nodes still have some secure problems to use them in the real applications. They are typically deployed on open, wide, and unattended environments. An adversary using these features can easily compromise the deployed sensor nodes and use compromised sensor nodes to inject fabricated data to the sensor network (false data injection attack). The injected fabricated data drains much energy of them and causes a false alarm. To detect and drop the injected fabricated data, a filtering-based security method and adaptive methods are proposed. The number of different partitions is important to make event report since they can make a correctness event report if the representative node does not receive message authentication codes made by the different partition keys. The proposed methods cannot guarantee the detection power since they do not consider the filtering scheme. We proposed clustering method for filtering-based secure methods. Our proposed method uses fuzzy system to enhance the detection power of a cluster.

  • PDF