• Title/Summary/Keyword: Legitimate Technology

Search Result 66, Processing Time 0.026 seconds

A Cooperative Smart Jamming Attack in Internet of Things Networks

  • Al Sharah, Ashraf;Owida, Hamza Abu;Edwan, Talal A.;Alnaimat, Feras
    • Journal of information and communication convergence engineering
    • /
    • v.20 no.4
    • /
    • pp.250-258
    • /
    • 2022
  • The emerging scope of the Internet-of-Things (IoT) has piqued the interest of industry and academia in recent times. Therefore, security becomes the main issue to prevent the possibility of cyberattacks. Jamming attacks are threads that can affect performance and cause significant problems for IoT device. This study explores a smart jamming attack (coalition attack) in which the attackers were previously a part of the legitimate network and are now back to attack it based on the gained knowledge. These attackers regroup into a coalition and begin exchanging information about the legitimate network to launch attacks based on the gained knowledge. Our system enables jammer nodes to select the optimal transmission rates for attacks based on the attack probability table, which contains the most probable link transmission rate between nodes in the legitimate network. The table is updated constantly throughout the life cycle of the coalition. The simulation results show that a coalition of jammers can cause highly successful attacks.

Norms and Values of Korean Scientific Community (연구규범과 가치관을 통해 본 한국과학기술자사회의 성격: 공공부문 연구자를중심으로)

  • Park, Hea-Jae
    • Journal of Technology Innovation
    • /
    • v.16 no.1
    • /
    • pp.81-106
    • /
    • 2008
  • By analyzing a nation-wide survey, this article examines research related norms and values of 684 scientists in 16 universities and 7 government supported research institutes. The survey shows that Korean scientific community tends to reject communality and disinterestedness while it accepts universalism as a norm. Organized skepticism is received a lukewarm support. In contrast, Korean scientific community tends to perceive the intellectual property and secrecy as legitimate and believe that scientists should consider the applicability of scientific research outcome and its social impacts when they choose research topics. When other variables are controlled for, the more basic research a scientist conducts the scientist is more likely to support communality and reject secrecy. The younger scientists are less likely to accept disinterestedness and the claim that the scientists should keep distance from social issues than the older. Scientists who work in the government-supported research institutes are more likely to view secrecy for more than 6 months as legitimate and reject the claim that science should not be affected by society than university scientists. The implications of these findings are discussed.

  • PDF

A Novel Jamming Detection Technique for Wireless Sensor Networks

  • Vijayakumar, K.P.;Ganeshkumar, P.;Anandaraj, M.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.4223-4249
    • /
    • 2015
  • A novel jamming detection technique to detect the presence of jamming in the downstream direction for cluster based wireless sensor networks is proposed in this paper. The proposed technique is deployed in base station and in cluster heads. The proposed technique is novel in two aspects: Firstly, whenever a cluster head receives a packet it verifies whether the source node is legitimate node or new node. Secondly if a source node is declared as new node in the first step, then this technique observes the behavior of the new node to find whether the new node is legitimate node or jammed node. In order to monitor the behavior of the existing node and new node, the second step uses two metrics namely packet delivery ratio (PDR) and received signal strength indicator (RSSI). The rationality of using PDR and RSSI is presented by performing statistical test. PDR and RSSI of every member in the cluster is measured and assessed by the cluster head. And finally the cluster head determines whether the members of the cluster are jammed or not. The CH can detect the presence of jamming in the cluster at member level. The base station can detect the presence of jamming in the wireless sensor network at CH level. The simulation result shows that the proposed technique performs extremely well and achieves jamming detection rate as high as 99.85%.

Improved RFID Authentication Protocol Based on SSG (SSG기반 개선된 RFID 인증 프로토콜)

  • Park, Taek-Jin
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.4 no.4
    • /
    • pp.311-317
    • /
    • 2011
  • Recently, RFID is substituted for bar codes according to advance in the ubiquitous computing environments, but the RFID system has several problems such as security and privacy because it uses radio frequencies. Firstly, unauthorized reader can easily read the ID information of any Tag. Secondly, Attacker can easily fake the legitimate reader using the collected Tag ID information,such as the any legitimate tag. This paper proposed improved RFID authentication protocol based on SSG. SSG is organized only one LFSR and selection logic. Thus SSG is suitable for implementation of hardware logic in system with extremely limited resources such as RFID tag and it has resistance to known various attacks because of output bit stream for the use as pseudorandom generator. The proposed protocol is secure and effective because it is based on SSG.

Some Theoretical Foundations on the Necessities and Functions of Global Electronic Transactions Act (전자무역 활성화를 위한 글로벌 전자무역거래법의 요건과 역할기능의 이론적 기초)

  • Kim, Ki-Sun
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.17
    • /
    • pp.129-146
    • /
    • 2002
  • The electronic technology development have occurred in the face of existing legal barriers to legal efficacy of computer information goods, and the liberating promise of electronic transactions cannot fully realized unless there is predictability in the legal rules that govern such transactions. This study analyzes some theoretical fundamentals of the Act. First, it proposes that the Act clarify and set forth uniform legal principles applicable to computer information transactions. Secondly, it suggests that if the individual is risk averse, the acceptance set for electronic transactions will be a convex set, and that the application of the Act will make the acceptance set more expanded by lowering the probability of conflicts and by downsizing the risk averness. Thirdly, it also suggest that through the mothod of contingent commodities analysis, the application of the Act by means of its restricted regulations will give more expected utility than the absence of the Act. Fourthly, it derives some implications that the degree of legitimate restriction will be affected by the objective risk inherent to the electronic transactions, and the individual's subjective risk-averseness. Finally, it concludes that harmonization of restriction and protection of individual's rights in electronic transaction process will be a necessary condition for more efficient body of law from the law-economic perspectives.

  • PDF

New Approach for Detecting Leakage of Internal Information; Using Emotional Recognition Technology

  • Lee, Ho-Jae;Park, Min-Woo;Eom, Jung-Ho;Chung, Tai-Myoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4662-4679
    • /
    • 2015
  • Currently, the leakage of internal information has emerged as one of the most significant security concerns in enterprise computing environments. Especially, damage due to internal information leakage by insiders is more serious than that by outsiders because insiders have considerable knowledge of the system's identification and password (ID&P/W), the security system, and the main location of sensitive data. Therefore, many security companies are developing internal data leakage prevention techniques such as data leakage protection (DLP), digital right management (DRM), and system access control, etc. However, these techniques cannot effectively block the leakage of internal information by insiders who have a legitimate access authorization. The security system does not easily detect cases which a legitimate insider changes, deletes, and leaks data stored on the server. Therefore, we focused on the insider as the detection target to address this security weakness. In other words, we switched the detection target from objects (internal information) to subjects (insiders). We concentrated on biometrics signals change when an insider conducts abnormal behavior. When insiders attempt to leak internal information, they appear to display abnormal emotional conditions due to tension, agitation, and anxiety, etc. These conditions can be detected by the changes of biometrics signals such as pulse, temperature, and skin conductivity, etc. We carried out experiments in two ways in order to verify the effectiveness of the emotional recognition technology based on biometrics signals. We analyzed the possibility of internal information leakage detection using an emotional recognition technology based on biometrics signals through experiments.

Consortium Blockchain based Forgery Android APK Discrimination DApp using Hyperledger Composer (Hyperledger Composer 기반 컨소시움 블록체인을 이용한 위조 모바일 APK 검출 DApp)

  • Lee, Hyung-Woo;Lee, Hanseong
    • Journal of Internet Computing and Services
    • /
    • v.20 no.5
    • /
    • pp.9-18
    • /
    • 2019
  • Android Application Package (APK) is vulnerable to repackaging attacks. Therefore, obfuscation technology was applied inside the Android APK file to cope with repackaging attack. However, as more advanced reverse engineering techniques continue to be developed, fake Android APK files to be released. A new approach is needed to solve this problem. A blockchain is a continuously growing list of records, called blocks, which are linked and secured using cryptography. Each block typically contains a cryptographic hash of theprevious block, a timestamp and transaction data. Once recorded, the data inany given block cannot be altered retroactively without the alteration of all subsequent blocks. Therefore, it is possible to check whether or not theAndroid Mobile APK is forged by applying the blockchain technology. In this paper, we construct a discrimination DApp (Decentralized Application) against forgery Android Mobile APK by recording and maintaining the legitimate APK in the consortium blockchain framework like Hyperledger Fabric by Composer. With proposed DApp, we can prevent the forgery and modification of the appfrom being installed on the user's Smartphone, and normal and legitimate apps will be widely used.

An Optimality-Based Analysis of Relative Positioning of Wh-related Prepositions in English

  • Han-gyoo, Khym
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.576-582
    • /
    • 2022
  • In this paper, we discuss the relative positioning of Wh-related English prepositions in a Wh-interrogative construction within the Optimality Theory [1-2]. By employing the two key constraints such as *Prep-Str and Align which are developed for the positioning of Wh-related prepositions from Romance languages such as French and Italian [3] and for the positioning of Wh-related prepositions from the middle English prose from 1500 to 1900 [4-6], and by slightly modifying the constraint hierarchy of *Prep-STR >>Align into **PrepSTR <<>>Align, Choi argues that his new theory can properly explain the unique behaviors of English Whrelated prepositions being able to take two 'optional' operations such as pied-piping and stranding to find legitimate landing sites in a Wh-interrogative construction [7]. However, this new analysis again reveals the following critical problems: (1) Unlike the 'light' English Wh-related prepositions which can two optional operations for legitimate landing sites in a Wh-interrogative construction, 'heavy' Wh-related English prepositions are not allowed to have such two options: they take just one option of pied-piping only. Thus, (2) his argumentation based on the existing constraints and the modified constraint hierarchy is neither general enough nor proper to explain the issue of the relative positioning for all English Wh-related preposition cases. To include such exceptional syntactic property of the 'heavy' preposition cases within the Optimality Theory, we suggest a new constraint of *HPrep-STR ranked at the highest position of the constraint hierarchy to disallow a 'heavy' or multi-syllabic Wh-related English preposition to stay alone at the end of a sentence. The new final hierarchy of constraints we suggest to explain the exceptional positioning of 'heavy' Wh-related prepositions together with the other 'light' Wh-related prepositions in English Wh-interrogative construction will be as follows: *HPrep-STR>>Align<<>>*Prep-STR.

Comparing Feature Selection Methods in Spam Mail Filtering

  • Kim, Jong-Wan;Kang, Sin-Jae
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.17-20
    • /
    • 2005
  • In this work, we compared several feature selection methods in the field of spam mail filtering. The proposed fuzzy inference method outperforms information gain and chi squared test methods as a feature selection method in terms of error rate. In the case of junk mails, since the mail body has little text information, it provides insufficient hints to distinguish spam mails from legitimate ones. To address this problem, we follow hyperlinks contained in the email body, fetch contents of a remote web page, and extract hints from both original email body and fetched web pages. A two-phase approach is applied to filter spam mails in which definite hint is used first, and then less definite textual information is used. In our experiment, the proposed two-phase method achieved an improvement of recall by 32.4% on the average over the $1^{st}$ phase or the $2^{nd}$ phase only works.

  • PDF

Analyzing the correlation of Spam Recall and Thesaurus

  • Kang, Sin-Jae;Kim, Jong-Wan
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.21-25
    • /
    • 2005
  • In this paper, we constructed a two-phase spam-mail filtering system based on the lexical and conceptual information. There are two kinds of information that can distinguish the spam mail from the legitimate mail. The definite information is the mail sender's information, URL, a certain spam list, and the less definite information is the word list and concept codes extracted from the mail body. We first classified the spam mail by using the definite information, and then used the less definite information. We used the lexical information and concept codes contained in the email body for SVM learning in the $2^{nd}$ phase. According to our results the spam precision was increased if more lexical information was used as features, and the spam recall was increased when the concept codes were included in features as well.

  • PDF