• Title/Summary/Keyword: falsification

Search Result 87, Processing Time 0.029 seconds

Group Key Management Method for Secure Device in Smart Home Environment (스마트홈 환경에서의 안전한 디바이스 관리를 위한 그룹키 관리 기법)

  • Ryu, Ho-Seok;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.479-487
    • /
    • 2015
  • According to IT development, smart home services is providing remote service, monitoring service and other various services through smart home devices based on network. But, smart home environment exists security threats such as data falsification, illegal authentication and invasion of privacy through a malicious device. Smart home is studying to prevent these security threats, but the studies of smart home environment security are still in early stage of development and the studies of group key management method is lacking in smart home. In this paper, we propose the group key management method for secure device in smart home.

Analysis of GPS Spoofing Characteristics and Effects on GPS Receiver (GPS 신호기만의 특성 및 수신기에 미치는 영향 분석)

  • Shin, Mi-Young;Cho, Sung-Lyong;Kim, Jun-Oh;Song, Ki-Won;Lee, Sang-Jeong
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.2
    • /
    • pp.296-303
    • /
    • 2010
  • The term "spoofing" refers to the transmission of counterfeit signals to provide undetectable falsification of GPS service. A spoofing can be accomplished using information from open literature which defines the signal format and the data structure. Spoofing is intended either to produce erroneous navigation solutions or saturate the processor of the victim receiver. The GPS receiver has no way to get rid of the effect of a spoofing because GPS receivers for civil service do not have an anti-spoofing scheme. This paper analyzes the spoofing characteristics, spoofing methods and environment conditions. And the spoofing effects on GPS receiver are analyzed in detail using the designed software-based spoofer and the Nordnav receiver.

Security Micro-web Page Based Battlefiled Smart Map (보안 마이크로 웹페이지 기반 전장 스마트 지도)

  • Heo, Jun;Ha, Sunju;Cha, Shin;Eun, Seongbae
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.12 no.4
    • /
    • pp.259-266
    • /
    • 2017
  • GPS was developed for military purposes. As a result, it is used as a military important means such as guided weapons and strategy / tactics. However, GPS depends on the communication infrastructure and is affected by interference signals. In this paper, we propose a secure micro - web page - based smart map that can enhance security without relying on communication infrastructure on the battlefield. The proposed system consists of general smartphone, security QR, central server and smart map. Only use the network when downloading the security key and SmartMap before the task starts. During operation, the smartphone transmits and receives data using a secure QR. The security QR inserts the security code to prevent forgery and falsification and confirms whether the data is authentic by checking whether the smart phone is forged or not. As a result of implementation, we solved communication security problem of existing technology by using location based service without relying on communication infrastructure.

The Peer Effects of Under-performing Students on Proficient Students: Evidence from Regression Discontinuity Design (학업성취도 미달 학생이 보통 이상 학생의 학업성취도에 미치는 친구효과 추정)

  • Woo, Seokjin
    • Journal of Labour Economics
    • /
    • v.39 no.3
    • /
    • pp.75-97
    • /
    • 2016
  • This paper estimates the peer effect of how improving the under-performing students can affect the academic performance of other students, focusing on the ratio of students more than proficient. We take advantage of the regression discontinuity design of the policy assignment rule of School-for-Improvement (SFI), which targeted the under-performing schools as an identification strategy. The estimation results from the 2009-2010 NAEA (National Assessment of Educational Achievement) reveal that the decrease of the ratio of under-performing students tends to increase the ratio of excellent or proficient students at around the policy cutoff. The finding turns out to be robust to various falsification tests.

  • PDF

A New Fuzzy Key Generation Method Based on PHY-Layer Fingerprints in Mobile Cognitive Radio Networks

  • Gao, Ning;Jing, Xiaojun;Sun, Songlin;Mu, Junsheng;Lu, Xiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.3414-3434
    • /
    • 2016
  • Classical key generation is complicated to update and key distribution generally requires fixed infrastructures. In order to eliminate these restrictions researchers have focused much attention on physical-layer (PHY-layer) based key generation methods. In this paper, we present a PHY-layer fingerprints based fuzzy key generation scheme, which works to prevent primary user emulation (PUE) attacks and spectrum sensing data falsification (SSDF) attacks, with multi-node collaborative defense strategies. We also propose two algorithms, the EA algorithm and the TA algorithm, to defend against eavesdropping attacks and tampering attacks in mobile cognitive radio networks (CRNs). We give security analyses of these algorithms in both the spatial and temporal domains, and prove the upper bound of the entropy loss in theory. We present a simulation result based on a MIMO-OFDM communication system which shows that the channel response characteristics received by legitimates tend to be consistent and phase characteristics are much more robust for key generation in mobile CRNs. In addition, NIST statistical tests show that the generated key in our proposed approach is secure and reliable.

Fake Face Detection and Falsification Detection System Based on Face Recognition (얼굴 인식 기반 위변장 감지 시스템)

  • Kim, Jun Young;Cho, Seongwon
    • Smart Media Journal
    • /
    • v.4 no.4
    • /
    • pp.9-17
    • /
    • 2015
  • Recently the need for advanced security technologies are increasing as the occurrence of intelligent crime is growing fastly. Previous liveness detection and fake face detection methods are required for the improvement of accuracy in order to be put to practical use. In this paper, we propose a new liveness detection method using pupil reflection, and new fake image detection using Adaboost detector. The proposed system detects eyes based on multi-scale Gabor feature vector in the first stage, The template matching plays a role in determining the allowed eye area. And then, the reflected image in the pupil is used to decide whether or not the captured image is live or not. Experimental results indicate that the proposed method is superior to the previous methods in the detection accuracy of fake images.

Supporting Trusted Soft Decision Scheme Using Volatility Decay in Cooperative Spectrum Sensing

  • Zhao, Feng;Feng, Jingyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2067-2080
    • /
    • 2016
  • Cooperative spectrum sensing (CSS) for vacant licensed bands is one of the key techniques in cognitive radio networks. Currently, sequential probability ratio test scheme (SPRT) is considered as a powerful soft decision approach to improve the sensing result for CSS. However, SPRT assumes all secondary users (SU) are honest, and thus offering opportunities for malicious SUs to launch the spectrum sensing data falsification attack (SSDF attack). To combat such misbehaved behaviors, recent efforts have been made to trust mechanism. In this paper, we argue that powering SPRT with traditional trust mechanism is not enough. Dynamic SSDF attackers can maintain high trust in an alternant process of submitting honest or false sensing data, resulting in difficultly detecting them. Noting that the trust value of dymamic SSDF attackers behave highly volatile, a novel trusted SPRT scheme (VSPRT) based on volatility decay analysis is proposed in this paper to mitigate the harmful effect of dynamic SSDF attackers in the process of the soft-decision data fusion, and thus improving the accuracy of the final sensing result. Simulation results show that the VSPRT scheme outperforms the conventional SPRT schemes.

Analysis of Chinese Oversea Direct Investment(ODI) and Methodology of Investment Stimulation in Korea (중국의 대 한국 직접투자 특징 분석 및 투자확대 방안 연구)

  • YU, Ja-Young;LEE, Ji-Na
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.70
    • /
    • pp.109-133
    • /
    • 2016
  • As for Korea, China is very important because of an advantageous geological accessibility and high economic dependency. Therefore, the Korean government announced its plan to establish 5billion dollars' investment from Greater China (including Hong Kong and Singapore) and the government has put much effort into accommodating more Chinese investment by diversifying investment channels from Greater China. Under this major Chinese investment boom, it is crucial to conduct in-depth research on accommodation of Chinese investment and create a plan to establish Chinese capital investment that will benefit both the investing country and the countries receiving the investment. Hence, the present study analyzed current trends in Chinese investment for the Korean market, focusing on the stimulation methodology for establishing greater investment from China. To this end, this paper examined various investment characteristics of Chinese investors for the Korean market by researching investment development levels on different time lines and analyzing Chinese investment in Korea for a variety of industries. Through the research, the following study derived a more effective strategy to accommodate greater Chinese capital investment. There has been a worldwide increase in the number of letter of credit cases involving fraud recently. It may happen that the documents which are tendered to the banks under a documentary credit are forged, altered or fraudulent. Banks assume no liability or responsibility for the form, sufficiency, accuracy, genuineness or falsification of any documents.

  • PDF

Analysis of Argumentation Structure in Students' Writing on Socio-scientific issues (SSI): Focusing on the Unit of Climate Change in High School Earth Science I

  • Yoo, Bhyung-ho;Kwak, Youngsun;Park, Won-Mi
    • Journal of the Korean earth science society
    • /
    • v.41 no.4
    • /
    • pp.405-414
    • /
    • 2020
  • In this study, we analyzed the development of high school students' argumentation through their writings on socio-scientific Issues (SSI) related to the Climate Change Unit in the Earth Science I curriculum. Pre- and post-writing assignments on the two main causes of global warming were analyzed and compared. In addition, an in-depth interview of the focus group was conducted with 7 students who showed a distinct change in the level of argumentation. According to the results, 16 of 52 students remained at the same argumentation level in pre- and post-writing assignments, and students remaining at Level 2 among five levels had difficulty in understanding the Toulmin's argument pattern (TAP) structure. Using the TAP structure, 29 of 52 students demonstrated increased argumentation levels in the post-writing assignments. The conclusions include that writing lessons on SSI using the TAP in Earth science classes can improve the level of high school students' argumentative writing, and that the level of students' argumentation can develop with the elaboration of their level of falsification. Also, it is suggested that the science curriculum should increase students' science writing competencies by specifying science writing as one of the goals.

Securing Cooperative Spectrum Sensing against Rational SSDF Attack in Cognitive Radio Networks

  • Feng, Jingyu;Zhang, Yuqing;Lu, Guangyue;Zhang, Liang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.1
    • /
    • pp.1-17
    • /
    • 2014
  • Cooperative spectrum sensing (CSS) is considered as a powerful approach to improve the utilization of scarce radio spectrum resources. However, most of CSS schemes assume all secondary users (SU) are honest, and thus offering opportunities for malicious SUs to launch the spectrum sensing data falsification attack (SSDF attack). To combat such misbehaved behaviors, recent efforts have been made to trust schemes. In this paper, we argue that powering CSS with traditional trust schemes is not enough. The rational SSDF attack is found in this paper. Unlike the simple SSDF attack, rational SSDF attackers send out false sensing data on a small number of interested primary users (PUs) rather than all PUs. In this case, rational SSDF attackers can keep up high trustworthiness, resulting in difficultly detecting malicious SUs in the traditional trust schemes. Meanwhile, a defense scheme using a novel trust approach is proposed to counter rational SSDF attack. Simulation results show that this scheme can successfully reduce the power of rational SSDF, and thus ensure the performance of CSS.