Earticle

현재 위치 Home

International Journal of Security and Its Applications

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(IJSIA) [Science & Engineering Research Support Center, Republic of Korea(IJSIA)]
  • pISSN
    1738-9976
  • 간기
    격월간
  • 수록기간
    2008 ~ 2016
  • 등재여부
    SCOPUS
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
Vol.10 No.10 (30건)
No
1

Anti-PUE Attack Base on Fractal Dimension in Spectrum Sensing

Xu Jie, Fu Shuang

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.10 2016.10 pp.1-12

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Secure problem has become a major concern in spectrum sensing. PUE attack is a common attack in spectrum sensing. To defend PUE attack, an anti-PUE attack method in spectrum sensing based on fractal dimension is proposed. It detects PUE attack by identifying the modulation type of the received signal using SVM classifier. Sevcik fractal dimension in frequency domain (SFDF) and Higuchi fractal dimension (HFD) of the received signal are adopted as the characteristics for classification by SVM classifier. So the task of anti-PUE attack can be carried out in spectrum sensing. Besides the parameters for spectrum sensing, i.e. SFDF and HFD, no other parameter is required to be calculated, which will decrease the calculation amount and calculation time. The Numerical results show that, the proposed method can effectively detect the PUE attack. When SNR is larger than 10 dB, its PUE detection probability can reach 1. Even when SNR is low to -10 dB, the PUE detection probability is larger than 0.97.

2

Evaluation of the Effectiveness of NFC-based Anti-Theft Security System for Motorbike

Taeseok Jin

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.10 2016.10 pp.13-20

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This paper proposes a method for the immobilization of motorbike brakes in conjunction with near-field communication (NFC) technology in order to meet the increasing demand for security and convenience of motorbike drivers. The immobilizer proposed in this paper improves previous detachable immobilizers based on mechanical locks in order to provide a fundamental solution to theft prevention. By adopting NFC, the system offers user authentication and personalization services in a secure manner. The author presents the principle of operation of the proposed method, and configuration of the immobilization device based on secure authentication. In this paper, a solenoid valve design is proposed to remotely perform lock/unlock operation with the aid of the motorbike immobilizer and information security system. The author presents the NFC secure authentication method for unlocking the immobilizer upon identifying the mobile terminal of the user, the method of automatic or manual control of the brake fluid pressure of a stopped motorbike, and the experimental mechanical prototyping results.

3

Double Validation Multi Level Proxy Blind Signature Scheme Key Management

Wang Jin-feng

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.10 2016.10 pp.21-28

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Identity-based signature (IBS) scheme can be widely used in resource-limited situations such as mobile e-commerce. In this paper, a lattice-based IBS scheme is first established by using trapdoor generation algorithm GenTrap, preimage sample algorithm SampleD and trapdoor delegated algorithm DelTrap put forward by Micciancio and Peikert in Eurocrypt’12; then the proposed scheme is proven to satisfy strong unforgeability against selective ID and static chosen massage attack in the standard model based on small integer solutions (SIS); and finally the proposed scheme is compared with the existing similar scheme in computing performance. The results show that the scheme presented in this paper enjoys the highest efficiency.

4

In order to resist to active attacks, Chen Jiaqi has proposed an authenticated noncertificate three-party key negotiation protocol in 2010, but this key protocol cannot resist to passive attacks or meet the requirements for some security attributes mentioned in his paper. In order to solve the above problems, He De-biao has proposed a new authenticated non-certificate three-party key negotiation protocol on the basis of noncertificate two-party key negotiation protocol. The results of the security analysis and the efficiency analysis of the new protocol show that the new protocol can meet the security requirements of the authenticated non-certificate three-party key negotiation protocol. Compared with the protocol proposed by Chen Jiaqi, the new protocol has less bilinear pairings and higher calculation efficiency.

5

An Analytic Study of Cyber Security Strategies of Japan

Kyoungsik Min, Seung-Woan Chai

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.10 2016.10 pp.37-46

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Japan has recently enacted the Fundamental Act on Cyber Security, taking prompt actions to reinforce the status of the cyber security policy and to organize the implementation system. This kind of change in policy indicates that cyber space does not remain as a field of information restricted to Internet but has become an international field of discussion about economy, society and politics. This study summarizes the change of cyber security policy of Japan, and analyzes the recent changes.

6

A Fuzzy Relative Ratio Method for Construction Safety Management Performance Evaluation

Laijun Luo, Hui Zhou

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.10 2016.10 pp.47-56

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The construction safety management evaluation problem owns many evaluation indexes. Owing to the complexity and uncertainty of evaluation index and the ambiguity of human thinking, the crisp number cannot work well in construction safety management evaluation problem. Interval number can well depict the uncertain and fuzzy information. Thus, for the construction safety management evaluation problem, we construct a multi-attribute group decision making model and use the relative method to solve. Relative ratio method is a practical and useful technique in dealing with multi-attribute decision making problems. Combined with traditional relative ratio method and interval number theory, the article proposes a multi-attribute group decision making model under the condition of uncertain information in the construction safety performance evaluation problem. Firstly, interval number evaluation matrix is applied to describe the uncertain decision information by experts. Secondly, normalization formulas are adopted to construct the normalized interval number decision matrix. Besides, Euclidian distance function is further used in the original relative ratio technique. Finally, an application example shows that the proposed model is reasonable and efficient, and can easily extend to similar decision problems.

7

A Study on the Intention of Public Institution Managers and Procurement Business Bidding Managers to Use the e-Procurement System

Kil-hwan Shin, Choon Yeul Lee, Woon-heok Ko

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.10 2016.10 pp.57-66

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This study analyzes the difference in the intention to use an e-Procurement system by examining public institution procurement managers and the bidding managers of procurement businesses who participate in government bids. A comparison of intention of use between procurement institutions and procurement businesses showed that the influence on the intention to use among public institution procurement managers was stronger than was that on procurement business bidding managers. The results also showed that public institution procurement managers had a stronger influencing relationship with social influence, task–technology fit, partnership, and security variables; the factors and functions related to these must be strengthened in order to revitalize the e-Procurement system. Meanwhile, procurement business bidding managers had a strong relationship with the facilitating condition and technological characteristic variables. This study is significant in showing the importance of strengthening the functions related to security.

8

A General Encryption Algorithm for Different Format Videos

Hao Li, Cheng Yang, Jiayin Tian, Jianbo Liu

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.10 2016.10 pp.67-76

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

With the rapid development of social network, more and more information is being presented in the form of multimedia, so the security of multimedia files, especially video files, has been capturing the attention of the researchers. Video encryption is widely applied to the DRM system, video conference, medical and military fields and so on. A general video encryption algorithm is proposed to solve the problem that the existing multiple formats (compression formats and container formats) of video requires a unified encryption scheme. Meanwhile, the proposed scheme can not only provide variable levels of security, but also have good performance of compression efficiency and computational complexity, which can ensure that the encrypted video data can be operation.

9

This article discusses the related art network security management, the proposed design of multi-level network security management system based on middleware ICE technology, the design of single-level system design and related species module of the overall framework for implementation. It is given based on the communication module ICE technology detailed design, it can be done from the LAN to the WAN, the communication between the various modules. The realization of various kinds at all levels of network security devices and associated host centralized monitor. Centralized configuration, through a variety of security-related information in a timely manner log collection management network species, real-time view of the network security status, dynamically adjusting network security policy comprehensive network security audit information, can effectively improve the overall security of network security management.

10

Mobile Security and its Application

Jun Hou Chan, Jer Lang Hong

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.10 2016.10 pp.89-106

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Ownership of a smartphone has never been easier nowadays, and it is supported by the fact that most of the people around us have a smartphone or an equivalent smart device. What is smartphone and why is it a smart? A smartphone by definition is as the name suggests, it is a phone is smart enough to not only be limited to the features and capabilities of a traditional cellular phone but also perform what a “smart” device can. And in recent years, the device that is deemed as the most intelligent device is the computer as it is the most advance piece of technology that is commercially available to the general public. Why this is so, is because in our opinion it has revolutionized how most if not all of the societies of today work. Hence what makes a smartphone is the mobile operating system that it is built upon, which is similar to a computer. It is becoming more and more of a common sight nowadays and this is because they are being offered at a price where more people are able to afford, hence they are reaching the hands of ceiling of the lower income families, all the way up to the higher income families. Back then, pure play devices were mostly simple in terms of how it function and works, hence if possible, we could suggest that the security aspect was never or rather has never been an issue other than the alteration of data after operation such as the tape of video recorders or images captured but never in the process, in the sense that there were no interruptions during operation, most likely is because it was clear and visible, but nowadays when you combine all of those devices into a complex entity, we tend to leave a hole in the cloth somewhere that we did not or rather can’t see due to the overwhelming amount of other things that we have. In this paper we discuss the current state of the commercially available operating systems of the two biggest names in smart devices, namely iOS and Android; and measure how secure and/or vulnerable (susceptible) are they to malwares and the nature of the mobile ad hoc network. We first analyze the integrity of the core of a smart device, the operating system and then use it to evaluate the effectiveness of their techniques and defenses of preventing and identifying malwares.

11

Network Information Security Research based on the Grey Matter Element Analysis Method

Qingji Tian

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.10 2016.10 pp.107-118

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

With the progress of science and technology and the development of society, computer network information security becomes a social problem. In this paper, according to the characteristics of computer network information, the influencing system of computer network information security is constructed. Using matter element analysis method and grey theory to establish the grey matter-element model of the computer network information security, computer network information security can be divided into four grey clustering levels, according to the results of the expert scoring to determine the grey clustering level of computer network information security, which provides a professional, scientific and reasonable method for studying computer network information security.

12

The TNC IF-T Protocol Binding for Tunneled EAP Methods (TIPBTEM) is specified by Trusted Computing Group (TCG) for TNC assessment (i.e., Platform-Authentication) exchanges. Because the TIPBTEM includes Platform-Authentication in addition to the usual user authentication, it differs greatly from the traditional security protocols in terms of security requirements. To analyze the security of the TIPBTEM correctly, the extended strand space model (SSM) for trusted network access protocols is applied in this paper. And it is pointed out that the TIPBTEM cannot prevent man-in-the-middle (MITM) attacks in some cases. To eliminate MITM attacks, the unsecure cases of the TIPBTEM are improved based on cryptographic binding. And then it is showed that these improved TIPBTEM cases can resist MITM attacks in the extended SSM.

13

A network of autonomous by multiple mobile nodes with a wireless interface in the absence of a particular network infrastructure environment is referred to as Mobile Ad-hoc network. The demanding in construction of the stand-alone networks and interconnection between convergence devices have led an increase in research on Mobile Ad-hoc Network and the application of Mobile Ad-hoc environments has been paid much attention as a wireless computing which is growing fast in the field of computer engineering With performance both as hosts and routers, easy network configuration, and fast response, mobile nodes participating in Mobile Ad-hoc Networks are suitable for mobile computing but have vulnerable points, about lack of dynamic network topology due to mobility, network scalability, passive attacks and active attacks which make it impossible to manage continuous security authentication service. In this study, proposes Session key-Encrypted key exchange authentication mechanism for a robust authentication based on Mobile Ad-hoc Network and through identify wireless environment security vulnerabilities, currently being used in OTP S/Key and DH-EKE analyzes.

14

RFID Tag Ownership Transfer Protocol of Multi-owner with Different Weights Based on Lagrange Algorithm

Gan Yong, Yang Zong-qin, He Lei, Du Chao

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.10 2016.10 pp.147-154

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

As it is known, the researches on ownership transfer issues of RFID tag have focused on a single owner. However in practice, RFID tag may have multiple owners who occupy different weights. To solve the problem, the ownership transfer protocol of multi-owner with different weights based on Lagrange has been proposed. Assuming the key is divided into n parts in this paper, and the owner gets the corresponding sub secret key according to the weight. Then, If and only if the sum of the weights of the owners involved in the restoration of the secret key is equal to or greater than t, the secret key can be obtained, or not. Therefore, security of ownership transition and flexibility in the practical application are enhanced.

15

An X-ray Inspection System for Illegal Object Classification based on Computer Vision

Yu Wang, Xiaomin Yang, Wei Wu, Bingshan Su, Gwanggil Jeon

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.10 2016.10 pp.155-168

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Security checks at airport are of importance to any safe flight. Traditional method for security check is to check the luggage manually. However, this method needs lots of human labor and time. It is desired to automatically check x-ray image of the luggage with computer vision. In this paper, the illegal object classification system is implemented. First, we introduce a computer vision based x-ray inspection system for Illegal object classification. Then we propose a method by combining Taruma feature based on Contourlet transform and histogram. Finally, we apply the random forests classifier to classify these features from the illegal objects. Experimental results show that the proposed method can effectively distinguish different kinds of illegal objects.

16

Sensitive Data Hiding Scheme for Internet of Things using Function Call Obfuscation Techniques

Jeongmi Shin, Yeonseung Ryu

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.10 2016.10 pp.169-180

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

A new era of Internet of Things (IoT) will emerge in near future due to the rapid innovations and advancements in computing and communication technologies. In order to make IoT era become possible, sensitive data in IoT devices such as cryptographic keys should be protected from malicious attackers. In particular, cryptographic keys are vital for securing systems and communication. In this paper, we study a sensitive data hiding scheme for IoT devices using software obfuscation techniques. Proposed scheme exploits function call obfuscation and creates a hidden area between functions to secretly store sensitive data. The proposed scheme outperforms the legacy hardware-based schemes which impose additional hardware cost to IoT devices.

17

An Improved Zero-knowledge Identification Scheme based on Quasi-Dyadic Codes

Mu Han, Xiaolin Feng, Shidian Ma

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.10 2016.10 pp.181-190

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper we present an improved version of the zero-knowledge identification scheme based on algebraic coding theory. Our protocol is related to the Véron’s identification scheme but permits a lower communication complexity by transferring two hash values in each round instead of three. And the protocol decreases the cheating probability to about 1/2 instead of 2/3 which reduces the rounds of the protocol. Furthermore, we construct the parity-check matrix in a quasi-dyadic form in order to dramatically reduce the matrix size. In sum, the new scheme has good properties of having a small matrix size, computation complexity, and for an overall communication cost of 22.8kb for authentication.

18

Image Watermarking Scheme Based on DWT-DCT and SSVD

Zhi Zhang, Chengyou Wang, Xiao Zhou

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.10 2016.10 pp.191-206

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

With the fast development of network, it becomes urgent to protect copyright and rightful ownership of an image, and digital watermark technology is a comprising solution to do that. However, the false positive problem exists in a number of watermarking schemes based on singular value decomposition (SVD). This paper offers a novel image watermark scheme to avoid the false positive problem, which combines with discrete cosine transform (DCT),discrete wavelet transform (DWT), and shuffled singular value decomposition (SSVD). In order to address the problem, the principal components obtained by SSVD are embedded into a constructed matrix composed of the direct current (DC) component which is extracted from the non-overlapping image block acqured by dividing the low frequency. The low frequency is obtained by applying DWT to the host image. Otherwise, the experiments concerning the imperceptibility and robustness are conducted in this paper. Compared with other reliable watermark methods, the obtained experimental results demonstrate that the proposed method has excellent imperceptibility and behaves satisfactory robustness in resisting the attacks such as Salt and Pepper noise, Gaussian noise, and image cropping, etc.

19

Analysis and Comparison of Regulations for National Cybersecurity

Dea-woo Park

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.10 2016.10 pp.207-214

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Cyber space moving at the speed of light is beyond the national boundaries and globalized, demonstrates the power of a country and affects people’s living in the visible world. The technology in the cyber world is further complicated and advanced and it has less temporal spatial restrictions. It is almost impossible that departments of the government or individuals tackle infringements, cybercrimes and terror attacks. In this paper, the author studied a policy for national cybersecurity and research to make the laws on national cybersecurity. To do this, the author made a comparative study of the cybercrime, cyber terror, and cyber warfare. When a crisis occurs on the cyber security of the country, a study Analysis and Comparison of Regulations for National Cybersecurity that is currently in effect, and study the alert issued in step 5 of cyber crisis. The author will endeavor to establish regulations and systems and embody policies related to sustainable national cybersecurity policies for the country and people

20

Authentication with key agreement (AKA) protocols are implemented to provide identity authentication and session keys for communication entities. In order to reduce the heavy trust reliance on key generator center (KGC) in identity based AKA protocols, a certificateless based AKA (CLAKA) protocol for client-server environment without the third-party (i.e., KGC) is introduced in this paper. The proposed protocol is constructed based on elliptic curve cryptosystem (ECC) and multi-factor protections (such as password, biometrics, and smart card). Moreover, security proof based on BAN-logic is carried out and shows that our protocol can provide mutual authentication, user anonymity, dynamic identity and perfect forward security, and resist to user impersonation attack, server spoofing attack and privileged insider attack. Meanwhile, security and efficiency analysis shows that our proposed protocol outperforms the previous related ones.

21

Study on Displacement-based Design Method for Structures with Buckling Restrained Brace: Security and Seismic Design

Changhao Zhang, Wei Wang, Jianhu Feng

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.10 2016.10 pp.227-236

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

According to the mechanical performance and energy dissipation characteristics of buckling restrained brace, combined with the seismic design idea of code for seismic design of buildings(GB 50011 -2010), we put forward the displacement-based design method for structures with buckling restrained brace. In this paper, we analyze the seismic design of high-rise buildings and test the relationship between structural target displacement and BRB added stiffness for a single-degree-reedom system. By using an engineering example to verify the validity of the design method, the time history analysis results to elastic and elastic-plastic show that the displacement of BRB frame structure under frequent earthquake can reach the expected target displacement, under rare earthquake, the input energy are dissipated by BRB, improving the seismic capacity and safety reserves.

22

Enhanced User Authentication Method Using USB Device Information

Jin-Hae Lee, Seon-Joo Kim, Jin-Woo Lee, Jin-Mook Kim, In-June Jo

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.10 2016.10 pp.237-248

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

We are accustomed to using various multimedia services through authorization as a legitimate user, by entering ID and password. However, while technology using ID and password in that case, is inexpensive for constructing system, and convenient for general public to use, user ID and password can be easily exposed to attackers by various attacking techniques, such as password guessing attack, reply attack, and others[1]. In order to resolve such problems, users can be authenticated by adding other authentication methods, such as security card, OTP, certification, finger print recognition, and others, to user authentication using ID and Password [2-5]. In this thesis, we suggest user authentication method that uses authentication data stored in USB memory after generating authentication data by combining USB memory info and user password in multimedia environment. In such system, even if attacker takes over user authentication data stored in USB memory, USB memory device info is still unknown, and thus, seized information cannot be used. In addition, it is convenient to use due to inexpensive construction cost and regular USB memory. Therefore, in the future, it is expected to provide easy construction and operation environment to the companies required to use ID and password based authentication.

23

A Dynamic Semi Parametric Panel Spatial Lag Model for Brain Drain and Economic Stability Based on the Security Perspective

Shengming Chen, Yabin Zhang, Azhong Ye

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.10 2016.10 pp.249-260

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this article, the authors research on the effect of international mobility of talent impact on Chinese economic development based on nonlinear relationship. From the perspective of the heterogeneity of human capital, this article introduces brain drain into a production function and analyzes the relationship between brain drain and economic development of the home country, and this paper draws an conclusion that moderate brain drain enhance the economic development of home country, but the unlimited brain drain will weaken the home country’s production capacity. On the contrary, it will cause the loss of economic of the home country. On the other hand, this article use Chinese Provincial Panel Data during 1997-2014 to construct the indicators of brain drain, and then use dynamic semi-parametric spatial lag model to empirical test the above inference. And find that there is indeed optimal level of brain drain in our country, but the level of the eastern coastal provinces is too high which inhibit the economic development of this region. Therefore, develop differentiated brain drain policies for coastal and inland, be a reasonable guide to the transnational flow of talent is important to increase China's economic.

24

Design and Evaluation of Novel Effective Montgomery Modular Multiplication Architecture

Maryam Moayedi, Abdalhossein Rezai

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.10 2016.10 pp.261-270

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Secure communication is a challenging issue in modern industries and critical infrastructures. The core technology used for securing the communication is cryptography. Modular multiplication is an important operation in cryptosystems. This paper investigates a novel modular multiplication algorithm and architecture. In the proposed algorithm and architecture, the parallel architecture and compact SD technique are utilized to improve the performance of modular multiplication operation and cryptosystems. The proposed architecture is implemented on Xilinx Virtex 5 FPGA. The complexity analysis results and FPGA implementation results show that the proposed modular multiplication algorithm and architecture provide improvement on the total computation time and area×time complexity compared to other modified modular multiplication algorithms and architectures.

25

Reducing Computations in Chang et al.’s on-line Electronic Check

Zhili Zhou, Ching-Nung Yang, Chih-Fei Chen

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.10 2016.10 pp.271-288

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

With the recent popularity of shopping online, on-line electronic check (OLEC) as low-risk and low-cost way to perform payment has become an important component in e-commerce. Recently, Chang et al. propose an OLEC by using hash chain to represent the maximum face value and the face amount on an e-check. However, these values of Chang et al.’s OLEC cannot be arbitrary, and it is infeasible to compute hash operations for too large values. In this paper, we adopt a decimal based hash chain to design an enhanced OLEC (EOLEC). Our EOLEC significantly reduces the hash operations in Chang et al.’s OLEC to provide a much faster transaction, and meanwhile retains its original characteristics. Also, our EOLEC with arbitrary maximum face value and face amount on a check is more like the traditional paper check.

26

False Information Diffusion in Public Crisis on Interpersonal Network and Intervention Strategies

Zhu Xiaoxia, Hao Jiajia, Hu Haiju

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.10 2016.10 pp.289-302

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

With the development of economy, the public crisis has been increasing frequently and false information took shape because of the public’s assentation and lack of recognition. The diffusion of false information has intensified the public panic and anxiety. Beside, it may cause secondary damage easily. Therefore, the management department of false information in public crisis information should control the diffusion of the false information quickly in order to reduce the loss. By the diffusion of the network of false information in public crisis based on the scale-free network (BA), this paper defines the nature of each social individual from the perspective of multi-agent. On the basis of these properties, this paper defines the individual opinion interaction rules when communicating. The research concludes that active individuals of information diffusion on interpersonal network are not the people with a great amount of friends, but the ones who have few friends. Nevertheless, the management department of false information in public crisis should maintain a circuitous neutral attitude rather than the “all-or nothing” coercive measures when intervene the diffusion process of the false information diffusion. Besides, the influencing social individuals are the “opinion leaders” who have a wide range of interpersonal communication.

27

Nowadays, more and more users outsource their data to third party cloud storage servers for the purpose of sharing, so cloud data sharing becomes one of the popular services offered by cloud service providers. However, the third party storage servers in cloud data sharing systems, which are not fully trusted by data owners, make access control to the shared data a challenging issue. Although Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is an emerging cryptographic solution for this issue, dealing with dynamic changes to users' access privileges (attribute revocation) in its practical applications as cloud data sharing systems is a real challenge. To overcome this challenge, we propose a fine-grained access control scheme for cloud data sharing systems by designing secure and efficient attribute-revocable CP-ABE scheme. Our scheme only allows non-revoked users in the attribute group to update their secret key by themselves using their unique key-update keys and the ciphertexts are updated by minimally trusted cloud server using a ciphertext-update key. Compared with the existing access controls achieved by attribute-revocable CP-ABE schemes, our proposed access control scheme reduces the trust degree of the cloud server in the attribute revocation mechanism. Furthermore, the analysis indicates that our access control scheme is more secure and efficient to apply to practical scenarios.

28

Detection and Performance Analysis of Wormhole Attack in MANET using DELPHI Technique

Sandeep Kumar Arora, Ayushree

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.10 2016.10 pp.321-330

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Security is one of the primary issue in the Mobile Adhoc Network (MANET) particularly as for the size and complex nature of the system. The principle reason of security issues in MANET is that there is no physical connection between the nodes. This paper gives the impact of wormhole attack and discloses how to provide security to the packets with the help of Delphi technique. By applying Delay Per Hop Indicator (DELPHI), nodes which are the responsible for wormhole attack can be removed with the support of hop count method and AODV routing The metrics used for calculating network presentation are packet loss, throughput and end to end delay, which gives the better Quality of Services.

29

Study on Cybersecurity of Hybrid, Multi-hop, Wireless Network

Li Li, Hu Zhiyu

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.10 2016.10 pp.331-340

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

As the frontier of Internet development, hybrid, wireless, multi-hop network has transformed the way we live. Nowadays, this network has been engaged in many areas like economy, war, culture, medical treatment, agriculture, ecology, commerce, etc. The concepts of digital coalmine and digital oil field, in special, promote the development of the study on hybrid, wireless, multi-hop network. The paper establishes cybersecurity mechanism by introducing concepts relevant to this network, and by summarizing its internal and external security threats. By conducting simulation experiment to the security mechanism, the paper concludes that to the influence on security mechanism, the number of nodes is in direct proportion, while the transmission period of node connection in inverse proportion. The paper aims to offer reasonable suggestions and guidance to the development of hybrid, wireless, multi-hop network, to promote the application of the wireless network, and to increase its value, solve security problems and ensure sound operation of hybrid, wireless, multi-hop network.

30

The Data Processing Approach for Preserving Personal Data in FinTech-Driven Paradigm

Kyongjin Kim, Sengphil Hong

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.10 No.10 2016.10 pp.341-350

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

FinTech-driven paradigm shift in financial service poses challenges for financial sector in balancing the potential benefits of development with the potential risks. It is difficult to detect as advanced threats, so the extent of the damage cannot be foreseen in the financial sector. In this paper, we suggest the approach based on trust about processing data including personally identifiable information for preserving and protecting in the environment using FinTech.

 
페이지 저장