• Title/Summary/Keyword: countermeasure methods

Search Result 218, Processing Time 0.03 seconds

Cybersecurity Threats and Countermeasures of the Smart Home Ecosystem

  • Darem, Abdulbasit;Alhashmi, Asma A.;Jemal, H.A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.303-311
    • /
    • 2022
  • The tremendous growth of the Internet of things is unbelievable. Many IoT devices have emerged on the market over the last decade. This has made our everyday life easier inside our homes. The technology used at home has changed significantly over the past several decades, leading to what is known today as the smart home. However, this growth has also brought new challenges to our home security and privacy. With the smart home becoming more mainstream, cybersecurity issues have become a fundamental concern. The smart home is an environment where heterogeneous devices and appliances are interconnected through the Internet of Things (IoT) to provide smart services to residents. These services include home climate control, energy management, video on demand, music on-demand, remote healthcare, remote control, and other similar services in a ubiquitous manner. Smart home devices can be controlled via the Internet using smartphones. However, connecting smart home appliances to wireless networks and the Internet makes individuals vulnerable to malicious attacks. Remote access within the same environment or over the Internet requires an effective access control mechanism. This paper intends to shed light on how smart home devices are working as well as the type of security and privacy threats of the smart home. It also illustrated the types of authentication methods that can be used with smart home devices. In addition, a comparison of Smart home IoT-based security protocols was presented along with a security countermeasure that can be used in a smart home environment. Finally, a few open problems were mentioned as future research directions for researchers.

Montgomery Multiplier with Very Regular Behavior

  • Yoo-Jin Baek
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.17-28
    • /
    • 2024
  • As listed as one of the most important requirements for Post-Quantum Cryptography standardization process by National Institute of Standards and Technology, the resistance to various side-channel attacks is considered very critical in deploying cryptosystems in practice. In fact, cryptosystems can easily be broken by side-channel attacks, even though they are considered to be secure in the mathematical point of view. The timing attack(TA) and the simple power analysis attack(SPA) are such side-channel attack methods which can reveal sensitive information by analyzing the timing behavior or the power consumption pattern of cryptographic operations. Thus, appropriate measures against such attacks must carefully be considered in the early stage of cryptosystem's implementation process. The Montgomery multiplier is a commonly used and classical gadget in implementing big-number-based cryptosystems including RSA and ECC. And, as recently proposed as an alternative of building blocks for implementing post quantum cryptography such as lattice-based cryptography, the big-number multiplier including the Montgomery multiplier still plays a role in modern cryptography. However, in spite of its effectiveness and wide-adoption, the multiplier is known to be vulnerable to TA and SPA. And this paper proposes a new countermeasure for the Montgomery multiplier against TA and SPA. Briefly speaking, the new measure first represents a multiplication operand without 0 digits, so the resulting multiplication operation behaves in a very regular manner. Also, the new algorithm removes the extra final reduction (which is intrinsic to the modular multiplication) to make the resulting multiplier more timing-independent. Consequently, the resulting multiplier operates in constant time so that it totally removes any TA and SPA vulnerabilities. Since the proposed method can process multi bits at a time, implementers can also trade-off the performance with the resource usage to get desirable implementation characteristics.

Evaluation of Seismic Performance of Quay Walls during Earthquakes (지진동을 받는 안벽 구조물의 내진 성능 평가)

  • 김성렬
    • Proceedings of the Earthquake Engineering Society of Korea Conference
    • /
    • 2000.04a
    • /
    • pp.112-119
    • /
    • 2000
  • the shaking table tests for 5 different model sections are performed to investigate the behaviors of quay walls during earthquakes and to evaluate the seismic performance of quay walls with countermeasures. 5 different model sections describe the cases of dense soil and loose soil in the foundation repectively the case to which gravel backfill was applied and the cases to which light material replacement method and sand compction pile method was applied repectively for sesmic countermeasure methods. Pore water pressures accelerations and deformations in quay walls and grounds are analyzed. As a result the softening of foundation and backfill soils have much influence on the behaviors of quay walls. Also light material replacement method and sand compaction pile method are effective in improving the seismic performance of quay walls.

  • PDF

A Case Study on Investigation Stability of Cut Slope in Road (국도와 인접한 절토부 사면안전성 대책에 관한 연구)

  • 이승호;임재승;정태영;신희순;이은동
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2003.06a
    • /
    • pp.45-52
    • /
    • 2003
  • Construction and extension of road by industrialization are increasing. According to this, construction of large cutting slope is increasing. Therefore, many methods for slope stability by this are applied. Failure happens according to dip and dip direction of slope. It is actuality that is connoting unstable element. This slope include coaly shale. Stability of slope failure this study takes place by road extension running examination for stability property calculate. Use this and examined stability about stereographic projection and wedge failure. Apply suitable reinforcement countermeasure about unstable cutting slope and analyzed stability. Wish to consider effective and robust processing plan of great principle earth and sand side securing stability. Hereafter with these data, is going to utilize in reinforcement and failure prevention.

  • PDF

A Study on the Seismic Rehabilitation Method through Using Environmentally-friendly Ductile Mortar and Fiber Materials (친환경 연성모르타르와 섬유로드를 이용한 내진보강 방안에 관한 연구)

  • Baek, Jong-Myeong;Shin, Min-Ho;Kim, Han-Bae;Kim, Bag-Jin
    • Proceedings of the KSR Conference
    • /
    • 2011.10a
    • /
    • pp.3237-3250
    • /
    • 2011
  • As the growing concern about environment and earthquake for the concrete structure, many seismic rehabilitation and retrofitting methods have recently been studied but they are not coping enough with the changes of structure, specificly various problems have been found in seismic rehabilitation method - both in exposure or non exposure - when they are implemented to the underground structure, utility conduit, water supply facilities, underground wall, parking lot, road pavement, and elevated structure etc. This study is about the seismic rehabilitation method using environmentally friendly functional inorganic mortar and resilient material, and it is effectively retrofitted seismic performance as it reinforces not only physical strength, but also flexural and bond strength from the resilient material, and it has been analyzed and evaluated when the environmentally friendly functional inorganic mortar and the resilient material are applied so as to countermeasure the effect of earthquake and viable problems and approved for possibility of various applications and wide use.

  • PDF

Transmission Power Range based Sybil Attack Detection Method over Wireless Sensor Networks

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.6
    • /
    • pp.676-682
    • /
    • 2011
  • Sybil attack can disrupt proper operations of wireless sensor network by forging its sensor node to multiple identities. To protect the sensor network from such an attack, a number of countermeasure methods based on RSSI (Received Signal Strength Indicator) and LQI (Link Quality Indicator) have been proposed. However, previous works on the Sybil attack detection do not consider the fact that Sybil nodes can change their RSSI and LQI strength for their malicious purposes. In this paper, we present a Sybil attack detection method based on a transmission power range. Our proposed method initially measures range of RSSI and LQI from sensor nodes, and then set the minimum, maximum and average RSSI and LQI strength value. After initialization, monitoring nodes request that each sensor node transmits data with different transmission power strengths. If the value measured by monitoring node is out of the range in transmission power strengths, the node is considered as a malicious node.

The Properties of Breakdown and Test for Resistance to Cracking of Power Cable for PL Countermeasure (PL법 대응을 위한 전력케이블의 열 충격 및 절연파괴 특성)

  • Kim, Young-Seok;Shong, Kil-Mok;Kim, Sun-Gu
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2007.11a
    • /
    • pp.349-352
    • /
    • 2007
  • It is impossible to database(DB) the patterns of cable events and cause analysis of faulted cable because the product liability(PL) law have been enforced in Korea, since 2002. In additions, simulation and pattern of cable events are needed for DB system under accelerated deterioration. In this paper, we tested for resistance to nicking of cable below the 22.9kV class due to thermal stresses. This method of exam is following IEC 60811-3-1(Common test methods for insulating and sheathing materials of electric cables). First of all, set the cable in the thermal stress instrument, temperature changed from -20 degree to 120 degree. After thermal stress, we observed a surface crack of cable through microscope and carried out AC withstand voltage test.

  • PDF

Ground Behavior Analysis of Excavation near High Rising Building and Field Observation Control (도심지 굴착에서 지반의 거동예측과 계측관리)

  • 기홍석;박근수;오재화;이문수
    • Proceedings of the Korean Society of Agricultural Engineers Conference
    • /
    • 1998.10a
    • /
    • pp.401-406
    • /
    • 1998
  • This study aimed at the technique for the construction control in braced excavation works. Selecting a case of Kwangju subway works, field observational values were compared with prediction using Plaxis's. Maximum observational values relevant to both horizontal and vertical proved satisfactory in that they were within the criteria. Numerical results by used Plaxis were overestimated greater than observational values, which meant the prediction were safe tendency. .It must be emphasized that displacement measurement for neighboring important structures should be carried out in order to take countermeasure charge for construction methods, in case that the risk or failure was previewed.

  • PDF

Development of Fault Detection Algorithm Using S-Transform (S-Transform을 이용한 고장 검출 알고리즘 개발)

  • Lee, Soon-Jeong;Seo, Hun-Chul;Choi, Hae-Sul;Kim, Chul-Hwan
    • Proceedings of the KIEE Conference
    • /
    • 2011.07a
    • /
    • pp.774-775
    • /
    • 2011
  • Recently, by increasing of devices which are sensitive to power quality, microprocessor and power electronics, the deterioration of power quality is accelerated. Accordingly, various methods for analysis, detection, compensation and countermeasure on power quality are proposed. For this, the study of distinction of various disturbances and fault which is occurred in power system is necessary to prior. Therefore, in this paper, the classification algorithm among steady state and single line to ground fault which is commonly occurred fault is proposed using S-Transform.

  • PDF

A Practical Security Risk Analysis Process and Tool for Information System

  • Chung, Yoon-Jung;Kim, In-Jung;Lee, Do-Hoon
    • Journal of Information Processing Systems
    • /
    • v.2 no.2
    • /
    • pp.95-100
    • /
    • 2006
  • While conventional business administration-based information technology management methods are applied to the risk analysis of information systems, no security risk analysis techniques have been used in relation to information protection. In particular, given the rapid diffusion of information systems and the demand for information protection, it is vital to develop security risk analysis techniques. Therefore, this paper will suggest an ideal risk analysis process for information systems. To prove the usefulness of this security risk analysis process, this paper will show the results of managed, physical and technical security risk analysis that are derived from investigating and analyzing the conventional information protection items of an information system.