• Title/Summary/Keyword: efficient countermeasure

Search Result 140, Processing Time 0.02 seconds

New Pre-processing Method for Second-Order CPA on the IT Convergence Device (IT융합 디바이스에 대한 물리적 2차 CPA 공격을 위한 새로운 전처리 기법)

  • Lee, Chul-Hee;Hwang, Ah-Reum;Lee, Dong-Geon;Kim, Hyoung-Nam;Kim, Ho-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.9B
    • /
    • pp.1369-1380
    • /
    • 2010
  • In this paper, we propose the efficient Second-Order Differential Power Analysis attack, which has ability to find significant information such as secret key in the devices consisting IT convergence environment such as Smartgrid, Advanced Metering Infrastructure(AMI) and ZigBee-based home networking service. This method helps to find the secret key easily at a device, even though it uses a countermeasure like masking which makes First-Order DPA attack harder. First, we present the performance results of our implementation which implements practical Second-Order DPA attack using the existing preprocessing function, and analyze it. Then we propose a stronger preprocessing function which overcomes countermeasures like masking. Finally, we analyze the results of the Second-Order CPA attack using proposed preprocessing function and verify that proposed scheme is very threatening to the security fields of IT convergence technology through the experimental results.

Comparison Before and After Implementation of Travel Speed in Shoulder-Use Lanes on Expressway (고속도로 갓길차로 운영 전후 소통개선 효과분석)

  • Ko, Eunjeong;Lee, Sujin;Kim, Hyungjoo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.19 no.2
    • /
    • pp.36-47
    • /
    • 2020
  • The objective of this study is to analyze the effect of the shoulder-use lane, which is a representative traffic management technique that increases the road capacity. The operation of the shoulder-use lane has been actively used as a countermeasure to improve traffic congestion, because it has the effect of improving traffic flow during rush hour. In Korea, the shoulder-use lanes are available at Gyeongbu, Yeongdong, and on the Seoul Outer Ring expressway, and their use is gradually increasing. Therefore, a comprehensive analysis was conducted to analyze the effects of the shoulder-use lane; including 1) analysis of individual shoulder lanes based on a time space diagram, and 2) analysis of shoulder lanes by road axis. These findings can contribute to the efficient installation and operation of shoulder-use lanes on expressways.

Efficient Channel Estimation and Packet Scheduling Scheme for DVB-S2 ACM Systems (DVB-S2 ACM 시스템을 위한 효율적인 채널 예측 및 패킷 스케줄링 기법)

  • Kang, Dong-Bae;Park, Man-Kyu;Chang, Dae-Ig;Oh, Deock-Gil
    • Journal of Satellite, Information and Communications
    • /
    • v.7 no.1
    • /
    • pp.65-74
    • /
    • 2012
  • The QoS guarantee for the forward link in satellite communication networks is very important because there are a variety of packets with multiplexing. Especially, the packets are processed depending on the available bandwidth in satellite network changing the wireless channel state in accordance with weather condition. The DVB-S2 increases the transmission efficiency by applying the adaptive coding and modulation (ACM) techniques as a countermeasure of rain attenuations. However, the channel estimation algorithm is required to support the ACM techniques that select the MODCOD values depending on the feedback data transmitted by RCSTs(Return Channel via Satellite Terminal) because satellite communication networks have a long propagation delay. In this paper, we proposed the channel estimation algorithm using rain attenuation values and reference data and the packet scheduling scheme to support the QoS and fairness. As a result of performance evaluation, we showed that proposed algorithm exactly predicts the channel conditions and supports bandwidth fairness to the individual RCST and guarantees QoS for user traffics.

Development of the vulnerable period assessment method for the weekly groundwater resources management in Yeongsan river basin considering the critical infiltration concept and the correlation between hydrological data sets (한계침투량 개념과 수문자료 간 상관관계를 고려한 영산강 유역의 주 단위 지하수자원 관리 취약 시기 평가 방법 개발)

  • Lee, Jae-Beom;Kim, Il-Hwan;Yang, Jeong-Seok
    • Journal of Korea Water Resources Association
    • /
    • v.52 no.3
    • /
    • pp.195-206
    • /
    • 2019
  • In this study, the vulnerable period assessment method for weekly groundwater resources management was developed considering correlation between data of groundwater level, river level, precipitation applying critical infiltration concept. The vulnerable periods of 3 case study were assessed using data of groundwater, precipitation, river level, and results were compared. The weights for between observation stations were calculated using correlation of groundwater, precipitation, river level data, and weights that could be considered recently trend of data for each observation station. The vulnerable period was assessed using final calculated weights and multi criteria decision method, compared result for each case study. The developed method can be a quantitative basis for the establishment of efficient groundwater resources management and the decision of specific countermeasure applyment.

On the Security of a New C2C-PAKA Protocol (새로운 C2C-PAKA 프로토콜의 안전성 연구)

  • Byun, Jin-Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.473-483
    • /
    • 2012
  • To achieve an entire end-to-end security, the classical authentication setting such that all participants have a same password is not practical since a password is not a common secret but a personal secret depending on an individual. Thus, an efficient client to client different password-based authenticated key agreement protocol (for short, EC2C-PAKA) has been suggested in the cross-realm setting. Very recently, however, a security weakness of the EC2C-PAKA protocol has been analyzed by Feng and Xu. They have claimed that the EC2C-PAKA protocol is insecure against a password impersonation attack. They also have presented an improved version of the EC2C-PAKA protocol. In this paper, we demonstrate that their claim on the insecurity of EC2C-PAKA protocol against a password impersonation attack is not valid. We show that the EC2C-PAKA protocol is still secure against the password impersonation attack. In addition, ironically, we show that the improved protocol by Feng and Xu is insecure against an impersonation attack such that a server holding password of Alice in realm A can impersonate Bob in realm B. We also discuss a countermeasure to prevent the attack.

Development of the Smart Autonomous Moving Air Purifier System (스마트 자율주행 공기청정기 시스템 개발)

  • Lim, Ah-Yeon;Shin, Hyo-Jin;Jeong, Eui-Hoon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.2
    • /
    • pp.109-114
    • /
    • 2022
  • Recently, since fine dust has become a serious social problem, air purifiers are in the spotlight as a countermeasure against this. Therefore, in this paper, we conducted R&D on the Smart Autonomous Moving Air Purifier System. The developed Smart Autonomous Moving Air Purifier can improve the limitations of the standard used area of existing air purifiers and perform an air purification function efficiently. In addition, we developed App and Web-based programs together for convenient use of Smart Autonomous Moving Air Purifier. Easily operate three air purification modes (Selection mode, Autonomous highest zone mode, Autonomous instant purification mode) through the App and conveniently monitor statistical values (Recent data, Total data, Warning) anywhere through the Web. And, we showed through test that the proposed Smart Autonomous Moving Air Purifier is more efficient than existing air purifiers.

A Case Report of Imports Morphological Variation of Pinelliae Tuber Based on the Genetic Analysis (유전자 분석 기반 수입산 형태 변이 반하 유통 사례 보고)

  • Kim, Wook Jin;Choi, Goya;Noh, Sumin;Moon, Byeong Cheol
    • The Korea Journal of Herbology
    • /
    • v.37 no.5
    • /
    • pp.9-16
    • /
    • 2022
  • Objectives : The purpose of this study is to report that applying the genetic discrimination method to Pinelliae Tuber is suitable as a countermeasure for the limitations of morphological identification announced publicly in the Ministry of Food and Drug Safety(MFDS). Methods : Randomly selected fifty samples in Pinelliae Tuber imported from China were used for morphological and genetic identification. The morphological identification was applied method announced publicly by the MFDS. The traits of morphological identification were classified as Pinellia ternata, P. tripartita, Pinellia pedatisecta, and Typhonium flagelliforme, according to the formation of tuberous root and tuber morphology. The genetic identifications were conducted by Sequence Characterized Amplified Region(SCAR) marker and DNA barcoding analysis for cross-validation, respectively. SCAR marker was verified according to the presence or absence of amplicon through PCR amplification using species-specific primers. DNA barcoding analysis used sequence information of the matK region. Results : As a result of the morphological identification, 27 out of 50 samples were identified as original species 'P. ternata' of genuine 'Pinelliae Tuber', and 23 were identified as adulterant species 'P. pedatisecta'. Unlike this, the genetic identification was identified as the original species 'P. ternata' in all 50 samples in the SCAR marker and matK regional sequence analysis. Conclusions : Pinelliae Tuber of morphological mutant that can not be classified by morphological identification is imported from China. The SCAR marker would be used as accurate and efficient assays for species identification of the morphological mutant.

Development of Return flow rate Prediction Algorithm with Data Variation based on LSTM (LSTM기반의 자료 변동성을 고려한 하천수 회귀수량 예측 알고리즘 개발연구)

  • Lee, Seung Yeon;Yoo, Hyung Ju;Lee, Seung Oh
    • Journal of Korean Society of Disaster and Security
    • /
    • v.15 no.2
    • /
    • pp.45-56
    • /
    • 2022
  • The countermeasure for the shortage of water during dry season and drought period has not been considered with return flowrate in detail. In this study, the outflow of STP was predicted through a data-based machine learning model, LSTM. As the first step, outflow, inflow, precipitation and water elevation were utilized as input data, and the distribution of variance was additionally considered to improve the accuracy of the prediction. When considering the variability of the outflow data, the residual between the observed value and the distribution was assumed to be in the form of a complex trigonometric function and presented in the form of the optimal distribution of the outflow along with the theoretical probability distribution. It was apparently found that the degree of error was reduced when compared to the case not considering where the variance distribution. Therefore, it is expected that the outflow prediction model constructed in this study can be used as basic data for establishing an efficient river management system as more accurate prediction is possible.

Shipping Alliance Restructuring and Countermeasure for Busan Port Operation (해운동맹 재편 동향 및 부산항 신항 운영 대응 방안)

  • Chang-Ki Park
    • Journal of Navigation and Port Research
    • /
    • v.48 no.4
    • /
    • pp.284-293
    • /
    • 2024
  • As the importance of container ships in maritime transport grows, the demand and supply for such vessels have been increasing. To reduce costs and improve operational efficiency, container shipping lines have formed shipping alliances, engaging in joint operations and vessel-sharing arrangements. Since the establishment of these alliances in 1995, they have evolved in various forms. In 2024, Maersk and Hapag-Lloyd announced the formation of a new shipping alliance, the 'Gemini Cooperation,' set to begin in February 2025, signaling a potential realignment of shipping alliances. This shift will significantly impact operations of ports like Busan. In the case of Busan Port, the inability of a single terminal to accommodate large shipping alliance vessels has led to an increased reliance on multiple terminals, which in turn has caused an increase of inter-terminal transportation cost and a decrease in operational ef iciency. Therefore, this paper aimed to examine changes in shipping alliances since 2012, analyze the current usage of container terminals at Busan Port, and propose strategies for efficient port operations in response to expected realignment of shipping alliances.

A Study on Efficient and Secure user Authentication System based on Smart-card (효율적이고 안전한 스마트카드 기반 사용자 인증 시스템 연구)

  • Byun, Jin-Wook
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.2
    • /
    • pp.105-115
    • /
    • 2011
  • User authentication service is an absolutely necessary condition while securely implementing an IT service system. It allows for valid users to securely log-in the system and even to access valid resources from database. For efficiently and securely authenticating users, smart-card has been used as a popular tool because of its convenience and popularity. Furthermore the smart-card can maintain its own power for computation and storage, which makes it easier to be used in all types of authenticating environment that usually needs temporary storage and additional computation for authenticating users and server. First, in 1981, Lamport has designed an authentication service protocol based on user's smart-card. However it has been criticized in aspects of efficiency and security because it uses hash chains and the revealment of server's secret values are not considered. Over the years, many smart-card based authentication service protocol have been designed. Very recently, Xu, Zhu, Feng have suggested a provable and secure smart-card based authentication protocol. In this paper, first, we define all types of attacks in the smart-card based authentication service. According to the defined attacks, however, the protocol by Xu, Zhu, Feng is weak against an attack that an attacker with secret values of server is able to impersonate a valid user without knowing password and secret values of user. An efficient and secure countermeasure is suggested, then the security is analyzed.