• Title/Summary/Keyword: broadcast authentication

Search Result 61, Processing Time 0.026 seconds

Cyber Attack Detection Using Message Authentication for Controller Area Networks (차량 내부 네트워크에서 메세지 인증을 이용한 사이버 공격 탐지)

  • Lee, Suyun;Park, Seo-Hee;Song, Ho-Jin;Beak, Youngmi
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.107-109
    • /
    • 2022
  • This paper proposes a new security system to detect cyber-attacks based on message authentication in a in-vehicle network. In the in-vehicle network, when a sending node transmits messages in a broadcast manner, it only uses a message identifier, rather than a node's identifier. It leads to a problem not identifying the source. In the proposed system, the sending node generates a message authentication code (MAC) using a cryptographic hash function to the control data and transmits it with the control data. When generating the MAC for each message, a multidimensional chaotic map is applied to increase the randomness of the result. The receiving node compares its MAC generated from the control data in the received message with the MAC of the received message to detect whether the message transmitted from the sending node is forged or not. We evaluate the performance of the proposed system by using CANoe and CAPL (Communication Access Programming Language). Our system shows a 100% of detection rate against cyber-attacks injected.

  • PDF

Study of Operating μTESLA in Multi-hop Unattended WSN (멀티 홉 UWSN 환경에서의 μTESLA 운영에 관한 고찰)

  • Choi, JinChun;Kang, Jeonil;Nyang, DaeHun;Lee, KyungHee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.459-470
    • /
    • 2013
  • ${\mu}TESLA$ is well known as the most representative energy-efficient broadcast authentication method. Until now, there are many researches that figure out the problems or limitation of ${\mu}TESLA$ and mitigate or solve them, but most researches have been verified in the environment far from the real world. We consider the necessity of verifying what the real efficiency of ${\mu}TESLA$ is. In this paper, we assume that sensors that continuously repeat hibernation and activity perform communication under the UWSN(Unattended WSN), which BS does not stay in the network. In this environment, we newly inspect the performance of ${\mu}TESLA$ by performing various simulations.

Operating μTESLA based on Variable Key-Slot in Multi-Hop Unattended WSN (멀티 홉 Unattended WSN에서 가변 키 슬롯 기반 μTESLA의 운영)

  • Choi, JinChun;Kang, Jeonil;Nyang, DaeHun;Lee, KyungHee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.3
    • /
    • pp.223-233
    • /
    • 2014
  • As a broadcast message authentication method in wireless sensor networks, ${\mu}$TESLA enables sensor nodes efficiently authenticate message from base station (BS). However, if we use ${\mu}$TESLA that has very short length of key slot in unattended wireless sensor network (UWSN), sensors may calculate a huge amount of hashs at once in order to verify the revealed secret key. In contrast, if we set the length of ${\mu}$TESLA's key slot too long in order to reduce the amount of hashs to calculate, BS should wait out the long slot time to release key. In this paper, we suggest variable key slot ${\mu}$TESLA in order to mitigate the problem. As showing experiment results, we prove that our suggestion improve sensor node's response time and decrease of number of hash function calculation.

Implementation of Multidimensional Trace System for Specific Object by RFID (RFID를 이용한 다차원 특정 객체 추적 시스템의 구현)

  • Min, So-Yeon;Jung, Yong-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.12
    • /
    • pp.3694-3701
    • /
    • 2009
  • This paper suggests that location tracking system by RFID. It uses the location tracking and the authentication to entrance after inserts passive RFID tag into user Identification card. The readers periodically broadcast their signal, and then the readers understand where users are by analyzing them. In one of tracking systems, it is possible to detect the area where user had stayed for the longest time during moving according to signal power, to know user moved path and user next moving path. Also, it can be used in entrance authentication system in security area by using tag ID value which stored to backend server.

Limited Reception Function based Two-Way Authentication T-DMB System (제한수신 기능을 통한 양방향 인증 T-DMB 시스템)

  • Lee, Jong-Won;Park, Sang-No;Yu, Dae-Sang;Kim, Jong-Moon;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.794-796
    • /
    • 2016
  • Recently terrestrial mobile multimedia broadcasting(T-DMB) service is being provided throughout the country are expanding and demand is increasing day by day. T-DMB has the advantage of being cheaper in cost than installing another mobile multimedia broadcasting. However, there are a variety data of additional and provide it difficult for localized emergency alert broadcasting services. In this paper, a method to solve this problem feature was designed to restrict incoming unidirectional / bidirectional authentication via T-DMB system. In the mobile device is received by the T-DMB broadcasting service authentication mechanism for re-transmission to the mobile device, and T-DMB receiving other registered users can view it impossible to receive the broadcast. Through the proposed system it is considered to be able to solve the problems of the existing T-DMB technology.

  • PDF

A Watermarking Technique using Block-based Wavelet Transform (블록 기반 웨이블릿 변환을 이용한 워터마킹 기법)

  • 이정수;김회율
    • Journal of Broadcast Engineering
    • /
    • v.5 no.2
    • /
    • pp.290-299
    • /
    • 2000
  • In this paper, we introduce a watermarking technique using a block-based wavelet transform. Our objective is to achieve the invisibility of the watermark embedded into an image. That is, the difference between the original image and the watermarked image is perceptually invisible. Also, we propose a scheme that is robust to common Image processing by embedding the watermark into ail frequencies. Especially, we certified that the proposed watermarking algorithm was robust to JPEG compression and noise. In addition, our detection scheme can detect the manipulated area for the purpose of authentication. From the experimental results, we conclude that the proposed watermarking system satisfied the objectives proposed in this paper.

  • PDF

Fragile Image Watermarking Using Bit Planes (비트 플레인을 이용한 영상의 연성 워터마킹)

  • 이혜주
    • Journal of Broadcast Engineering
    • /
    • v.6 no.1
    • /
    • pp.41-49
    • /
    • 2001
  • Digital watermarking has been proposed for copyright protection of digital data. According to the property of an embedded watermark, it is classified into two categories, robust watermarking and fragile watermarking. The former is used for copyright protection, and the latter applies to the authentication/integrity to verify the authenticity of data, If an Image has been modified or forged. the embedded watermark cannot be extracted from the Image. As a results, it is possible to defect the modification of the image. As pixels are represented by tilts, the modification of bits corresponds to the alteration of the image. In this paper, a new fragile watermarking is proposed In which two watermarks are embedded in order to detect some modification occurred In high and low bit Planes. From simulation results, the embedded watermark is Invisible in a watermarked image and we can locale some Places where the modification occurring

  • PDF

A Proposal of User Authentication System to Prevent Fraudulent Viewing in Online Education Services (온라인 교육 서비스에서 부정 시청 방지를 위한 사용자 인증 시스템 제안)

  • Kim, Minji;Lee, Seeun;Yi, Seungsin;Jung, Myeongju;Baek, Hoki
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • fall
    • /
    • pp.146-148
    • /
    • 2021
  • 최근 온라인 교육 서비스 시장은 코로나 19 로 인해 수요가 급증하였다. 또한, 이동통신 기술의 발달로 그 규모가 확대되었고, 사용자는 시간과 장소에 구애 받지 않고 원하는 강의를 시청할 수 있게 되었다. 그러나 온라인 교육 환경에서는 아이디 공유를 통해 강의를 부정 시청하는 사례가 빈번하게 발생하고 있다. 특히나 하나의 계정을 다수의 사용자가 공유하거나 타인에게 양도함으로써 온라인 교육 서비스 업체가 손해를 입거나 사용자의 개인정보가 유출될 수 있다. 따라서 본 논문에서는 온라인 강의 플랫폼에서 본인 인증을 강화하고 강의 부정 시청을 방지할 수 있는 시스템을 제안한다.

  • PDF

Sensor Network Broadcast Authentication for Bridge State Monitoring (교량 감시를 위한 센서 네트워크 브로드캐스트 인증기법)

  • Lim, Hwa-Jung;Lee, Heon-Guil
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.995-998
    • /
    • 2005
  • 센서 네트워크는 자원의 제약을 지닌 수 많은 센서들로 구성되어있어 보안에 취약하다. 따라서 데이터를 안전하기 전달하기 위해 센서 노드와 노드, 노드와 베이스스테이션 사이에 인증을 요구하게 된다. 본 논문에서는 센서 노드와 베이스스테이션 사이에 집합 노드 (aggregate node)들을 두어 집합 노드와 베이스스테이션 사이에 강력한 시간동기화를 요구하지 않는 TESLA 기법과 집합 노드와 센서 노드 사이에 ${\mu}TESLA$ 기법을 적용하여 교량 환경에 보다 효율적인 브로드캐스트 인증기법 방안을 제시한다.

  • PDF

Impact of Trust-based Security Association and Mobility on the Delay Metric in MANET

  • Nguyen, Dang Quan;Toulgoat, Mylene;Lamont, Louise
    • Journal of Communications and Networks
    • /
    • v.18 no.1
    • /
    • pp.105-111
    • /
    • 2016
  • Trust models in the literature of MANETs commonly assume that packets have different security requirements. Before a node forwards a packet, if the recipient's trust level does not meet the packet's requirement level, then the recipient must perform certain security association procedures, such as re-authentication. We present in this paper an analysis of the epidemic broadcast delay in such context. The network, mobility and trust models presented in this paper are quite generic and allow us to obtain the delay component induced only by the security associations along a path. Numerical results obtained by simulations also confirm the accuracy of the analysis. In particular, we can observe from both simulation's and analysis results that, for large and sparsely connected networks, the delay caused by security associations is very small compared to the total delay of a packet. This also means that parameters like network density and nodes' velocity, rather than any trust model parameter, have more impact on the overall delay.