• Title/Summary/Keyword: falsification

Search Result 87, Processing Time 0.029 seconds

Attack-Proof Cooperative Spectrum Sensing Based on Consensus Algorithm in Cognitive Radio Networks

  • Liu, Quan;Gao, Jun;Guo, Yunwei;Liu, Siyang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.6
    • /
    • pp.1042-1062
    • /
    • 2010
  • Cooperative spectrum sensing (CSS) is an effective technology for alleviating the unreliability of local spectrum sensing due to fading/shadowing effects. Unlike most existing solutions, this paper considers the use of CSS technology in decentralized networks where a fusion center is not available. In such a decentralized network, some attackers may sneak into the ranks of cooperative users. On the basis of recent advances in bio-inspired consensus algorithms, an attack-proof, decentralized CSS scheme is proposed in which all secondary users can maintain cooperative sensing by exchanging information locally instead of requiring centralized control or data fusion. Users no longer need any prior knowledge of the network. To counter three potential categories of spectrum sensing data falsification (SSDF) attacks, some anti-attack strategies are applied to the iterative process of information exchange. This enables most authentic users to exclude potentially malicious users from their neighborhood. As represented by simulation results, the proposed scheme can generally ensure that most authentic users reach a consensus within the given number of iterations, and it also demonstrates much better robustness against different SSDF attacks than several existing schemes.

Design and Implementation of Digital Jikin using Smartphone Application

  • Hong, Daewon;Kang, Miju;Chun, Junchul
    • Journal of Internet Computing and Services
    • /
    • v.18 no.5
    • /
    • pp.87-94
    • /
    • 2017
  • Due to the recent advances of IT industry, many companies and institutions have been used electronic documents rather than original paper copies. However, the characteristic of electronic document allows it to be readily damaged from proscribed copying, counterfeit, and falsification. These can cause the serious security problems for electronic documents. Conventional security methods for digital documents involve adding a separated image or marker, but these methods can reduce the readability of document. Therefore, we proposed a digital Jikin (Korean traditional stamp) which is normally used to identify the source or author of a document in asia. The proposed digital Jikin can preserve the readability of electronic document while protecting the document from proscribed copying, counterfeit, or falsification using image processing approach. In this paper, a digital Jikin application is designed and implemented under android platform and it converts the critical information of document onto the digital Jikin. The proposed digital Jikin contains important information in the boundary of Jikin not only about the author of documents or source, but also keywords, number of images, and many more. Therefore, the authenticity of document or whether the document has been altered or not by other person can be evaluated by the server. The proposed digital Jikin can be sent to a server through the wireless networks and can be stored using PHP and MySQL. We believe that the proposed method can offer the better and simple solution for strengthening the security of electronic document.

Sequential fusion to defend against sensing data falsification attack for cognitive Internet of Things

  • Wu, Jun;Wang, Cong;Yu, Yue;Song, Tiecheng;Hu, Jing
    • ETRI Journal
    • /
    • v.42 no.6
    • /
    • pp.976-986
    • /
    • 2020
  • Internet of Things (IoT) is considered the future network to support wireless communications. To realize an IoT network, sufficient spectrum should be allocated for the rapidly increasing IoT devices. Through cognitive radio, unlicensed IoT devices exploit cooperative spectrum sensing (CSS) to opportunistically access a licensed spectrum without causing harmful interference to licensed primary users (PUs), thereby effectively improving the spectrum utilization. However, an open access cognitive IoT allows abnormal IoT devices to undermine the CSS process. Herein, we first establish a hard-combining attack model according to the malicious behavior of falsifying sensing data. Subsequently, we propose a weighted sequential hypothesis test (WSHT) to increase the PU detection accuracy and decrease the sampling number, which comprises the data transmission status-trust evaluation mechanism, sensing data availability, and sequential hypothesis test. Finally, simulation results show that when various attacks are encountered, the requirements of the WSHT are less than those of the conventional WSHT for a better detection performance.

Ethical considerations in publication of medical papers (의학논문 출판윤리)

  • Bae, Chong-Woo
    • Clinical and Experimental Pediatrics
    • /
    • v.51 no.5
    • /
    • pp.447-451
    • /
    • 2008
  • It is fair to say that there are many ethical issues concerning the publication of medical papers. To define the best practice in the ethics of scientific publishing and a proper understanding of appropriate reporting in medical papers, this review should be useful for authors dealing with ethical issues which involve the protection of human and animal rights, the protection of confidentiality and informed consent, fabrication, falsification, plagiarism, author and authorship, copy right transfer, duplicate publication, conflict of interest, and dealing with misconduct cases.

What Is Research Misconducts? Publication Ethics Is as Important as Research Integrity

  • Uhm, Chang-Sub
    • Applied Microscopy
    • /
    • v.46 no.2
    • /
    • pp.67-70
    • /
    • 2016
  • Research ethics are mainly of two fields; research integrity and publication ethics. Research misconducts can occur at both areas. Examples of the research integrity violations are falsification, fabrication, and plagiarism; and those of the publication ethics violations are duplicate publication including self-plagiarism, and improper authorship. In this paper, concepts of research misconducts defined in Research Misconduct-related Rules of The Korean Society of Microscopy are explained and discussed.

u-Healthcare Service Authentication Protocol based on RFID Technology (RFID 기술을 이용한 u-헬스케어 서비스 인증 프로토콜)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of Digital Convergence
    • /
    • v.10 no.2
    • /
    • pp.153-159
    • /
    • 2012
  • Now a days, U-healthcare comes into the spotlight as a new business model which combines RFID technology with medical service in the well-being era and IT popularization. U-healthcare service needs a method that can deals with hand-writing, overlap data, forgery and falsification of data, difference between information version that happen in medical process because of graft between RFID technology and u-healthcare. This paper proposes RFID based user certification protocol to protect user's privacy who gets medical service through U-healthcare. In the protocol, secret information of patient does the XOR with the secret key that is created in the hospital to reconsider the stability of security system of U-healthcare and user's data forgery and falsification and privacy and then saves it in the secret key field of patient in DB table. Also, it informs the case of illegal access to certification server and make it approved the access of u-healthcare service by differentiating whether u-healthcare is illegal or not.

ENF based Detection of Forgery and Falsification of Digital Files due to Quadratic Interpolation (이차 보간에 따른 ENF 기반의 위변조 디지털 파일 탐지 기법)

  • Park, Se Jin;Yoon, Ji Won
    • Journal of KIISE
    • /
    • v.45 no.3
    • /
    • pp.311-320
    • /
    • 2018
  • Recently, the use of digital audio and video as proof in criminal and all kinds of litigation is increasing, and scientific investigation using digital forensic technique is developing. With the development of computing and file editing technologies, anyone can simply manipulate video files, and the number of cases of manipulating digital data is increasing. As a result, the integrity of the evidence and the reliability of the evidence Is required. In this paper, we propose a technique for extracting the Electrical Network Frequency (ENF) through a grid of power grids according to the geographical environment for power supply, and then performing signal processing for peak detection using QIFFT. Through the detection algorithm using the standard deviation, it was confirmed that the video file was falsified with 73% accuracy and the forgery point was found.

Understanding and Education Measures of the Prevention of Forgery and Falsification of Blockchain for Elementary School Students (초등학생 대상 블록체인 기술의 위변조 방지 핵심원리 이해와 교육방안 설계)

  • Jung, Yujin;Kim, Jinsu;Park, Namje
    • Journal of The Korean Association of Information Education
    • /
    • v.23 no.6
    • /
    • pp.513-520
    • /
    • 2019
  • The general learning method aims at conveying knowledge by conveying the contents of the learning set to numerous of learners. However, such a method is difficult to induce the interest of the learner, and the unilateral delivery method has a disadvantage in that the concentration of the learner can be lowered and the overall academic achievement can be lowered. In order to solve this problem, the gay learning method which induces the interest of the students themselves is studied, and the gay learning game which combines the education and the game can influence the learning by inducing the interest of the student. In this paper, we propose a method to prevent the forgery and falsification of the blockchain, which has been widely discussed by the 4th Industrial Revolution, as a card game, And suggests ways to contribute to the development of the process.

A Public Opinion Polling Application with Robust Verification Based on the Ethereum Bolckchain (견고한 검증을 제공하는 이더리움 블록체인 기반의 여론조사 어플리케이션)

  • Jin, Jae-Hwan;Eom, Hyun-Min;Sun, Ju-Eun;Lee, Myung-Joon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.3
    • /
    • pp.895-905
    • /
    • 2018
  • Public opinion polls have a strong influence on modern society as a means of examining the tendency of social groups on specific issues. As the influence of the polls increases, the problem of forgery and falsification of the results becomes an important issue. So, to guarantee the reliability of the results, our society needs novel mechanisms. As one of such mechanisms, the Ethereum blockchain is an environment for developing decentralized applications with the reliable blockchain technology. Ethereum decentralized applications can utilize smart contracts to provide services for users in transparent and reliable ways. In this paper, we propose a polling method that guarantees reliability using the blockchain technology, which is a distributed ledger technique that makes forgery or falsification actually impossible. The proposed method provides a robust verification function on the results of the associated polls for individual voters and verification organizations. Also, we present a distributed opinion polling application running on our private Ethereum blockchain network, showing the effectiveness of the proposed method.

Scientific Misconduct as an International Issue - New OECD project and its implication to national policy -

  • Hideki IWABUCHI
    • Science & Technology Policy
    • /
    • v.16 no.1 s.157
    • /
    • pp.64-71
    • /
    • 2006
  • Fabrication, falsification, plagiarism (so-called FFP), and other unethical acts damage the trust of public in science and scientists. Scientific communities, governments and research institutions should take the appropriate countermeasures. With the increasing visibility and importance of problem, funding agencies and policy-makers find that they must have a better understanding of this phenomenon, and take steps to prevent it. Science is often said as a borderless activity. In these days, many scientific misconduct cases have been emerging almost simultaneously and worldwide. Thus, the immediate actions should be taken internationally as well as nationally. From these points of view, we, Japan, proposed a new international joint-study at OECD Global Science Forum in February 2006, and the proposal was approved with supports by many countries including Korea. OECD would seek an international perspective to address this worldwide problem, bringing together the representatives of science communities, publishers, funding agencies, and policy makers, and exchanging their experiences.

  • PDF