• Title/Summary/Keyword: standard attack models

Search Result 10, Processing Time 0.026 seconds

Unified Modeling Language based Analysis of Security Attacks in Wireless Sensor Networks: A Survey

  • Hong, Sung-Hyuck;Lim, Sun-Ho;Song, Jae-Ki
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.4
    • /
    • pp.805-821
    • /
    • 2011
  • Wireless Sensor Networks (WSNs) are rapidly emerging because of their potential applications available in military and civilian environments. Due to unattended and hostile deployment environments, shared wireless links, and inherent resource constraints, providing high level security services is challenging in WSNs. In this paper, we revisit various security attack models and analyze them by using a well-known standard notation, Unified Modeling Language (UML). We provide a set of UML collaboration diagram and sequence diagrams of attack models witnessed in different network layers: physical, data/link, network, and transport. The proposed UML-based analysis not only can facilitate understanding of attack strategies, but can also provide a deep insight into designing/developing countermeasures in WSNs.

Bitwise Collision Attack Based on Second-Order Distance

  • Wang, Danhui;Wang, An
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.3
    • /
    • pp.1802-1819
    • /
    • 2017
  • Correlation-enhanced collision attack has been proposed by Moradi et al. for several years. However, in practical operations, this method costs lots of time on trace acquisition, storage and averaging due to its bytewise collision detection. In this paper, we propose a bitwise collision attack based on second-order distance model. In this method, only 9 average traces are enough to finish a collision attack. Furthermore, two candidate models are given in this study to distinguish collisions, and the corresponding practical experiments are also performed. The experimental results indicate that the operation time of our attack is only 8% of that of correlation-enhanced collision attack, when the two success rates are both above 0.9.

Quantum rebound attacks on reduced-round ARIA-based hash functions

  • Seungjun Baek;Jongsung Kim
    • ETRI Journal
    • /
    • v.45 no.3
    • /
    • pp.365-378
    • /
    • 2023
  • ARIA is a block cipher proposed by Kwon et al. at ICISC 2003 that is widely used as the national standard block cipher in the Republic of Korea. Herein, we identify some flaws in the quantum rebound attack on seven-round ARIA-DM proposed by Dou et al. and reveal that the limit of this attack is up to five rounds. Our revised attack applies to not only ARIA-DM but also ARIA-MMO and ARIA-MP among the PGV models, and it is valid for all ARIA key lengths. Furthermore, we present dedicated quantum rebound attacks on seven-round ARIA-Hirose and ARIA-MJH for the first time. These attacks are only valid for the 256-bit key length of ARIA because they are constructed using the degrees of freedom in the key schedule. All our attacks are faster than the generic quantum attack in the cost metric of the time-space tradeoff.

A Survey Study on Standard Security Models in Wireless Sensor Networks

  • Lee, Sang Ho
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.4
    • /
    • pp.31-36
    • /
    • 2014
  • Recent advancement in Wireless Sensor Networks (WSNs) has paved the way for WSNs to enable in various environments in monitoring temperature, motion, sound, and vibration. These applications often include the detection of sensitive information from enemy movements in hostile areas or in locations of personnel in buildings. Due to characteristics of WSNs and dealing with sensitive information, wireless sensor nodes tend to be exposed to the enemy or in a hazard area, and security is a major concern in WSNs. Because WSNs pose unique challenges, traditional security techniques used in conventional networks cannot be applied directly, many researchers have developed various security protocols to fit into WSNs. To develop countermeasures of various attacks in WSNs, descriptions and analysis of current security attacks in the network layers must be developed by using a standard notation. However, there is no research paper describing and analyzing security models in WSNs by using a standard notation such as The Unified Modeling Language (UML). Using the UML helps security developers to understand security attacks and design secure WSNs. In this research, we provide standard models for security attacks by UML Sequence Diagrams to describe and analyze possible attacks in the three network layers.

  • PDF

Evaluation of the Performance of Re-entry System for the Typical Uncertainties

  • L., Daewoo;C., Kyeumrae;P., Soohong
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.156.4-156
    • /
    • 2001
  • The uncertainties of an atmospheric re-entry flight with respect to stability and controllability are aerodynamic error, measurement error of the angle of attack, variation of dynamic pressure, wind, and trim position of the control surfaces, etc. During hypersonic flight, a future angle of attack is biased from a nominal schedule. In order words, because the angle of attack is estimated from the navigation data, estimation error occurs due to wind, atmospheric density variation, etc. Error models used in this study, include a standard deviation of +-3 sigma, and are the normal distribution of statistics. This paper shows the appraisement of tracking performance onto the reference trajectory, satisfaction of the initial condition of TAEM about the re-entry system.

  • PDF

A Computational Study of the Vortical Flows over a Delta Wing At High-Angle of Attack (고영각의 델타익에서 발생하는 와유동에 관한 수치해석적 연구)

  • Kim Hyun-Sub;Kweon Yong-Hun;Kim Heuy-Dong;Shon Myong-Hwan
    • Proceedings of the KSME Conference
    • /
    • 2002.08a
    • /
    • pp.795-798
    • /
    • 2002
  • This paper dispicts the vortical flow characteristics over a delta wing using a computational analysis for the purpose of investigating and visualizing the effect of the angle of attack and fee stream velocity on the low-speed delta wing aerodynamics. Computations are applied to the full, 3-dimensional, compressible, Navier-Stokes Equations. In computations, the free stream velocity is changed between 20m/s and 60m/s and the angle of attack of the delta wing is changed between $16^{\circ}\;and\;28^{\circ}$. For the correct prediction of the major features associated with the delta wing vortex flows, various turbulence models are tested. The standard $k-{\varepsilon}$ turbulence model predict well the vertical flows over the delta wing. Computational results are compared with the previous experimental ones. It is found that the present CFD results predict the vortical flow characteristics over the delta wing, and with an increase in the free steam velocity, the leading edge vortex moves outboard and its streangth is increased.

  • PDF

Quasi Steady Stall Modelling of Aircraft Using Least-Square Method

  • Verma, Hari Om;Peyada, N.K.
    • International Journal of Aerospace System Engineering
    • /
    • v.7 no.1
    • /
    • pp.21-27
    • /
    • 2020
  • Quasi steady stall is a phenomenon to characterize the aerodynamic behavior of aircraft at high angle of attack region. Generally, it is exercised from a steady state level flight to stall and its recovery to the initial flight in a calm weather. For a theoretical study, such maneuver is demonstrated in the form of aerodynamic model which consists of aircraft's stability and control derivatives. The current research paper is focused on the appropriate selection of aerodynamic model for the maneuver and estimation of the unknown model coefficients using least-square method. The statistical accuracy of the estimated parameters is presented in terms of standard deviations. Finally, the validation has been presented by comparing the measured data to the simulated data from different models.

Power analysis attack resilient block cipher implementation based on 1-of-4 data encoding

  • Shanmugham, Shanthi Rekha;Paramasivam, Saravanan
    • ETRI Journal
    • /
    • v.43 no.4
    • /
    • pp.746-757
    • /
    • 2021
  • Side-channel attacks pose an inevitable challenge to the implementation of cryptographic algorithms, and it is important to mitigate them. This work identifies a novel data encoding technique based on 1-of-4 codes to resist differential power analysis attacks, which is the most investigated category of side-channel attacks. The four code words of the 1-of-4 codes, namely (0001, 0010, 1000, and 0100), are split into two sets: set-0 and set-1. Using a select signal, the data processed in hardware is switched between the two encoding sets alternately such that the Hamming weight and Hamming distance are equalized. As a case study, the proposed technique is validated for the NIST standard AES-128 cipher. The proposed technique resists differential power analysis performed using statistical methods, namely correlation, mutual information, difference of means, and Welch's t-test based on the Hamming weight and distance models. The experimental results show that the proposed countermeasure has an area overhead of 2.3× with no performance degradation comparatively.

Computational study of a small scale vertical axis wind turbine (VAWT): comparative performance of various turbulence models

  • Aresti, Lazaros;Tutar, Mustafa;Chen, Yong;Calay, Rajnish K.
    • Wind and Structures
    • /
    • v.17 no.6
    • /
    • pp.647-670
    • /
    • 2013
  • The paper presents a numerical approach to study of fluid flow characteristics and to predict performance of wind turbines. The numerical model is based on Finite-volume method (FVM) discretization of unsteady Reynolds-averaged Navier-Stokes (URANS) equations. The movement of turbine blades is modeled using moving mesh technique. The turbulence is modeled using commonly used turbulence models: Renormalization Group (RNG) k-${\varepsilon}$ turbulence model and the standard k-${\varepsilon}$ and k-${\omega}$ turbulence models. The model is validated with the experimental data over a large range of tip-speed to wind ratio (TSR) and blade pitch angles. In order to demonstrate the use of numerical method as a tool for designing wind turbines, two dimensional (2-D) and three-dimensional (3-D) simulations are carried out to study the flow through a small scale Darrieus type H-rotor Vertical Axis Wind Turbine (VAWT). The flows predictions are used to determine the performance of the turbine. The turbine consists of 3-symmetrical NACA0022 blades. A number of simulations are performed for a range of approaching angles and wind speeds. This numerical study highlights the concerns with the self-starting capabilities of the present VAWT turbine. However results also indicate that self-starting capabilities of the turbine can be increased when the mounted angle of attack of the blades is increased. The 2-D simulations using the presented model can successfully be used at preliminary stage of turbine design to compare performance of the turbine for different design and operating parameters, whereas 3-D studies are preferred for the final design.

A Study on the Security analysis and Applications of Standard Key agreement protocols based on Elliptic curve cryptosystem (타원 곡선에 기반한 표준 키 분배 프로토콜의 안전성 분석 및 응용 분야에 관한 연구)

  • 오수현;이승우;심경아;양형규;원동호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.3
    • /
    • pp.103-118
    • /
    • 2002
  • To provide the privacy of transmitted message over network the use of cryptographic system is increasing gradually. Because the security and reliability of the cryptographic system is totally rely on the key, the key management is the most important part of the cryptographic system. Although there are a lot of security products providing encryption, the security of the key exchange protocols used in the product are not mostly proved yet. Therefore, we have to study properties and operation of key agreement protocols based on elliptic curve in ANSI X9.63. furthermore, we analyze the security of their protocols under passive and active attacker models and propose the most suitable application field taking the feature of the protocols into account.