• Title/Summary/Keyword: network security

Search Result 6,093, Processing Time 0.033 seconds

Routing Table Protection From an Attack to Falsify Hop Count in Mobile Ad-hoc Networks (모바일 애드 혹 네트워크(Mobile Ad-hoc Networks)에서 홉 카운트 변조 공격으로부터의 라우팅 테이블 보안)

  • Kim, Jin-Hee;Lee, Jae-Hyun;Kwon, Kyung-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.7
    • /
    • pp.43-52
    • /
    • 2008
  • The AODV routing algorithm in a mobile ad-hoc networks broadcasts RREQ packet to find a route from a source to a destination. An attacker node may intercept a RREQ packet and attack by falsifying a field in that packet. In this paper, we propose a simply modified method which can protect a routing table from an attack to falsify the hop count field in the RREQ packet. When establishing a connection between a source and a destination, we update routing table of each node on the connection based on minimum delay instead of minimum hop count. By doing this, we can protect routing table from an attack to falsify a hop count Our simulation is implemented in Network Simulator(NS-2). We analyze how an attacker affects the mobile ad-hoc networks. The result of the simulation shows that the proposed mechanism transfers a data securely.

A Design of Group Authentication by using ECDH based Group Key on VANET (VANET에서 ECDH 기반 그룹키를 이용한 그룹간 인증 설계)

  • Lee, Byung Kwan;Jung, Yong Sik;Jeong, Eun Hee
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.7
    • /
    • pp.51-57
    • /
    • 2012
  • This paper proposes a group key design based on ECDH(Elliptic Curve Diffie Hellman) which guarantees secure V2V and V2I communication. The group key based on ECDH generates the VGK(Vehicular Group key) which is a group key between vehicles, the GGK(Global Group Key) which is a group key between vehicle groups, and the VRGK(Vehicular and RSU Group key) which is a group key between vehicle and RSUs with ECDH algorithm without an AAA server being used. As the VRGK encrypted with RGK(RSU Group Key) is transferred from the current RSU to the next RSU through a secure channel, a perfect forward secret security is provided. In addition, a Sybil attack is detected by checking whether the vehicular that transferred a message is a member of the group with a group key. And the transmission time of messages and the overhead of a server can be reduced because an unnecessary network traffic doesn't happen by means of the secure communication between groups.

An Empirical Research on the IoT Basis Gas AMI Platform and Smart Metering Services (IoT 기반 가스 원격검침(AMI) 플랫폼과 서비스의 실증 연구)

  • Lee, Seungwoo;Lee, Sangshin;Song, Min-hwan;Kwon, Youngmin
    • Journal of the Korean Institute of Gas
    • /
    • v.24 no.3
    • /
    • pp.1-10
    • /
    • 2020
  • This paper describes the development of a smart advanced metering infrastructure(AMI) architecture and services for using smart metering in gas industry. A general gas AMI system is composed of a smart gas meter, IoT network, the AMI platform, and an operation management system with security functions. The proposed gas AMI platform supports two-way communication between smart metering devices and AMI services and is applied by oneM2M standard to support interoperability between various types of metering devices and heterogeneous IoT networks. To demonstrating AMI system with the proposed platform, we installed about 2,900 smart gas meters in real environments and operated AMI systems for one year. We verified that about 94% of gas meters are normally worked and AMI services are stably operated without error or malfunction.

A Reliable Protocol for Real-time Monitoring in Industrial Wireless Sensor Networks (산업 무선 센서 네트워크에서 실시간 모니터링을 위한 신뢰성 향상 기법)

  • Oh, Seungmin;Jung, Kwansoo
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.5
    • /
    • pp.424-434
    • /
    • 2017
  • In industrial wireless sensor networks, many applications require integrated QoS supporting. This paper proposes a reliable protocol for real-time monitoring in industrial wireless sensor networks. Retransmission is well-known to recover the transmission failure, however, this might cause the time delay to violate the real-time requirement. The proposed protocol exploits broadcasting feature of wireless networks and the temporal opportunity concept. The opportunities to relay the data packets are shared by the broadcasting feature and the temporal opportunity concept maximize the number of candidates in communication. Simulation results show that the proposed protocol is superior to the existing real-time protocols in term of real-time service and reliability.

Design and Implementation of Multimedia Monitoring System Using WebCam Structure (WebCam을 이용한 멀티미디어 보안시스템의 설계와 구현)

  • 송은성;오용선
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.11a
    • /
    • pp.161-166
    • /
    • 2003
  • In this paper, we propose a novel method of design and implementation for the multimedia monitoring system using Web Camera. Recently WebCam is variously applied to many different areas and implemented as an improved performance using convenient functions of Web in this Internet era. Multimedia moving pictures has been popularly used in a variety of ways in different areas of monitoring systems in order to enhance the performance and the service with their data compression capability and the speed of the communication network these days. The design method of WebCam system presented in this paper might offer not only a convenient function of the monitoring system but great application capabilities. It can be used for a real time application of the multimedia picture and audio transmission so that the monitoring system can manage the security information in the sense for the reality. Tn addition, the monitoring system may be used as an inreal-time application using data storage and retrieval features of the Web. We offer both functions of monitoring in this structured form of implemented system.

  • PDF

A Cluster Group Head Selection using Trajectory Clustering Technique (궤적 클러스터링 기법을 이용한 클러스터 그룹 헤드 선정)

  • Kim, Jin-Su;Shin, Seung-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.12
    • /
    • pp.5865-5872
    • /
    • 2011
  • Multi-hop communication in clustering system is the technique that forms the cluster to aggregate the sensing data and transmit them to base station through midway cluster head. Cluster head around base station send more packet than that of far from base station. Because of this hot spot problem occurs and cluster head around base station increases energy consumption. In this paper, I propose a cluster group head selection using trajectory clustering technique(CHST). CHST select cluster head and group head using trajectory clustering technique and fitness function and it increases the energy efficiency. Hot spot problem can be solved by selection of cluster group with multi layer and balanced energy consumption using it's fitness function. I also show that proposed CHST is better than previous clustering method at the point of network energy efficiency.

System Design of IDS for DDoS Detect and Defense (DDoS공격감지 및 방어를 위한 침입방지 시스템의 설계)

  • Hong, Seong-Sik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.11
    • /
    • pp.6845-6848
    • /
    • 2014
  • This paper proposes a system design of IDS for detecting and defending against DDoS attacks on a network. The proposed system has three parts; the Alert, Attack Analyzer and Defense agent. When the server resource was reduced too much by incoming traffic, the Alert Agent sends message and traffic information to the Attack Analyzer. The message and traffic to the Attack analyzer include only the sender & receiver address and packet numbers for minimizing the overload of Attack Analyzer. Message Received Attack Analyzer investigates the Message. If the pattern of traffic is the same as the DDoS Style, the Analyzer sends a message to the Defense Agent to block that traffic. In this system, at the serious state of the server-down, the Attack analyzer uncovers the DDoS Attacker and send a message to the Defense Agent to block that traffic. This works for server reactivation as soon as possible.

Design of Integrated Authentication Scheme for Safe Personal Information Management in a U-Health Environment (U-Health환경에서 안전한 개인정보 관리를 위한 통합 인증스키마 설계)

  • Min, So-Yeon;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.6
    • /
    • pp.3865-3871
    • /
    • 2014
  • The U-health service provides medical services with patients anytime or anywhere and is defined as the service that combines information and communication technology with health and medical service. However, it causes some troubles, such as the disclosure of patients' medical information or data spills (personal information extrusion). Moreover, it has the weak point of the security threats associated with data based on existing wire-wireless systems because it conducts data transmission and reception through the network. Therefore, this paper suggests a safe personal information management system by designing integrated certification schema that will help compensate for the weaknesses of the U-health service. In the proposal, the protocols for user information, certification between medical institution and users, data communication encryption & decryption, and user information disuse were designed by applying the ID-Based Encryption, and analyzed such existing systems and PKI Based-based communication process, securely and safely.

Sound Monitoring System of Machining using the Statistical Features of Frequency Domain and Artificial Neural Network (주파수 영역의 통계적 특징과 인공신경망을 이용한 기계가공의 사운드 모니터링 시스템)

  • Lee, Kyeong-Min;Vununu, Caleb;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.8
    • /
    • pp.837-848
    • /
    • 2018
  • Monitoring technology of machining has a long history since unmanned machining was introduced. Despite the long history, many researchers have presented new approaches continuously in this area. Sound based machine fault diagnosis is the process consisting of detecting automatically the damages that affect the machines by analyzing the sounds they produce during their operating time. The collected sound is corrupted by the surrounding work environment. Therefore, the most important part of the diagnosis is to find hidden elements inside the data that can represent the error pattern. This paper presents a feature extraction methodology that combines various digital signal processing and pattern recognition methods for the analysis of the sounds produced by tools. The magnitude spectrum of the sound is extracted using the Fourier analysis and the band-pass filter is applied to further characterize the data. Statistical functions are also used as input to the nonlinear classifier for the final response. The results prove that the proposed feature extraction method accurately captures the hidden patterns of the sound generated by the tool, unlike the conventional features. Therefore, it is shown that the proposed method can be applied to a sound based automatic diagnosis system.

A study of DDS Middleware based Multimedia PACS Data Transmission Scheme for QoS in Hospital Network (병원 전산망에서 QoS보장을 위한 DDS 미들웨어 기반 멀티미디어 PACS 데이터 전송 기법 연구)

  • Kim, Nam-Ho;Seung, Teak-Young;Lee, Suk-Hwan;Lee, Jong-Keuk;Kwon, Ki-Ryong
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2012.05a
    • /
    • pp.462-463
    • /
    • 2012
  • 팍스시스템은 의료 영상을 디지탈화한 시스템이다. PACS데이터는 초창기 CR(Computed Radiography)의 경우 10MB내외의 데이터를 발생하였으나 의료장비의 발전으로 인해 DB(Digital Radiography)는 20MB이상의 데이터를 발생하였다. 또 CT(Computed Tomography)의 경우 0.5MB데이터를 100Slice내외의 데이터를 발생하였으나, 현재는 Cardiac/PET 등의 CT는 Multi Frame을 지원하며 300~5000Slice이상의 데이터를 발생하게 됨에 따라 네트워크에 상당한 트래픽이 발생하여 병원 진료 환경에 심각한 영향을 초래한다. 또한, 스마트 폰, 태블릿 pc등의 발전으로 인해 많은 사용자들은 실시간 또는 멀티미디어와 같은 데이터 표현 방식으로 팍스 데이터를 보길 원할 것이며, 팍스 시스템 또한 그러한 요구조건을 만족시키기 위해 발전하고 있다. 병원에서 사용하는 네트워크는 인터넷 서비스의 모토인 best effort방법을 일반적으로 사용한다. 이러한 데이터 전송방식은 진료에 직접적인 영향을 미치는 팍스 데이터의 전송에 영향을 미칠 수 있다. 특히 네트워크의 트래픽이 제한적인 환경에서 높은 대역폭을 요구하는 멀티미디어 팍스 데이터를 다수의 사용자들이 전송받기 원하면 지연시간으로 인해 원활한 진료진행을 방해 받을 수 있다. 이러한 문제를 해결하기 위해 네트워크 개발자들은 QoS라는 개념을 도입하였고, 여러 계층에서 QoS를 보장하기 위한 연구가 진행되였다. 일반적으로, 네트워크에서 QoS를 지원하기 위한 여러가지 형태의 연구들을 조사하고, 분산 시스템을 제어하기 위한 DDS 미들웨어에 대한 연구를 기반으로 병원 네트워크에서 적용 방안을 설계하고 시뮬레이션을 통해 검증함으로써 새로운 형태의 병원 네트워크를 제안하고자 한다.

  • PDF