• Title/Summary/Keyword: AKA

Search Result 82, Processing Time 0.027 seconds

Enhanced Secure Transaction Protocol for IoT Devices via LTE Network (LTE 네트워크에서의 IoT 장치를 위한 향상된 보안 거래)

  • AL-Alkeem, Ebrahim;Yeun, Chan Yeob;Hammadi, Yousef Al;Yeun, Hyun Ku;Byon, Young-Ji
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.66 no.12
    • /
    • pp.1921-1936
    • /
    • 2017
  • Internet of Thing (IoT) and NFC (Near Field Communication) have got a good adaptable structure that it can be easily combined with any wireless network. Since IoT/NFC can be used to communicate wirelessly with all the transactions that can be done remotely without any physical connections. In this paper, we propose an enhanced secure IoT/NFC protocol based on LTE network that enhances the original security level provided by the LTE. Our approach is new in a sense that it covers LTE in contrast to old networks like GSM and 3G, which substantially treated in the literature. Moreover, both GSM and 3G have several drawbacks when they are combined with the NFC technology, which has potential weakness in confidentiality, integrity, and authentication. Hence our new approach will resolve the security of the new LTE system. We expect that our protocol will result in new secure applications for the smart phone markets.

Design of Hot-spot generator for inserting content-based interactive advertising on DMB broadcasting

  • Park, Tae-Jin;Park, Se-Hyun;Lim, Soon-Bum;Choy, Yoon-Chul
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.12
    • /
    • pp.1765-1774
    • /
    • 2008
  • Due to recent increase of product placement(aka. PPL) in TV drama and entertainment program, the audience of these programs is exposed to the advertisement in the form of the props and backgrounds without discernment. Advancement in digital data broadcasting technology enabled advertisers to insert detailed information of the product or associated advertisement link into the content of the broadcast program as an interactive advertisement. With the interactive advertisement, the audience can focus on the content of the program and the advertiser can create an advertisement with a rich content through the interaction between the advertisement and the audience. It is possible because the interactive advertisement is dynamic advertisement behavior only activated by the audience's intention. In this research, we develop a Hot-spot generator to insert interactive advertisement in the DMB broadcast program. We also suggest dynamic Hot-spot generation technique that allows the Hot-spot object to follow not only the shape of the advertising object in the program, but also the movement of the object as the program progresses.

  • PDF

Effects of organic carbon and UV wavelength on the formation of dissolved gaseous mercury in water under a controlled environment

  • Lee, Jae-In;Yang, Ji-Hye;Kim, Pyung-Rae;Han, Young-Ji
    • Environmental Engineering Research
    • /
    • v.24 no.1
    • /
    • pp.54-62
    • /
    • 2019
  • The effects of UV wavelength and dissolved organic carbon (DOC) on the formation of dissolved gaseous mercury (DGM) were investigated in a controlled environment. To remove any other influences than UV wavelength and DOC, purified water was used as the working solution. DGM was instantly produced with irradiation of all UV lights even without DOC; whereas, there was no noticeable increase of DGM during irradiation of visible light. The amount of formed DGM increased as the DOC concentration increased even in dark conditions; however, UV-B irradiation significantly promoted DGM production with DOC present. The rate constants of reduction ranged from $1.4{\times}10^{-6}s^{-1}$ to $3.5{\times}10^{-5}s^{-1}$, with the lower values occurring under the dark condition without DOC and the higher values resulting under UV-B irradiation and high DOC concentration. However, DGM production was not linearly correlated with the DOC concentration at higher range of DOC in this study. Future studies should investigate the effects of DOC concentration on mercury (Hg) reduction over the broad range of DOC concentrations with different DOC structures and with other influencing parameters.

Efficient security mechanism in 3GPP-WLAN interworking (3GPP-WLAN interworking에서의 효율적인 보안 메커니즘)

  • 신상욱
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.137-144
    • /
    • 2004
  • 3GPP(3rd Generation Project Partnership)-WLAN(Wireless Local Area Network) interworking refers to the utilization of resources and access to services within the 3GPP system by the WLAN UE(User Equipment) and user respectively. The intent of 3GPP-WLAN Interworking is to extend 3GPP services and functionality to the WALN access environment. We propose an efficient mechanism for the setup of UE-initiated tunnels in 3GPP-WLAN interworking. The proposed mechanism is based on a secret key which is pre-distributed in the process of authentication and key agreement between UE and 3GPP AAA(Authentication, Authorization Accounting) server. Therefore it can avoid modular exponentiation and public key signature which need a large amount of computation in UE. Also the proposed scheme provides mutual authentication and session key establishment between UE and PDGW(Packet Data Gateway).

Protection of a Multicast Connection Request in an Elastic Optical Network Using Shared Protection

  • BODJRE, Aka Hugues Felix;ADEPO, Joel;COULIBALY, Adama;BABRI, Michel
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.119-124
    • /
    • 2021
  • Elastic Optical Networks (EONs) allow to solve the high demand for bandwidth due to the increase in the number of internet users and the explosion of multicast applications. To support multicast applications, network operator computes a tree-shaped path, which is a set of optical channels. Generally, the demand for bandwidth on an optical channel is enormous so that, if there is a single fiber failure, it could cause a serious interruption in data transmission and a huge loss of data. To avoid serious interruption in data transmission, the tree-shaped path of a multicast connection may be protected. Several works have been proposed methods to do this. But these works may cause the duplication of some resources after recovery due to a link failure. Therefore, this duplication can lead to inefficient use of network resources. Our work consists to propose a method of protection that eliminates the link that causes duplication so that, the final backup path structure after link failure is a tree. Evaluations and analyses have shown that our method uses less backup resources than methods for protection of a multicast connection.

A Study on Export Bond Insurance as a Security for Independent Bank Guarantee in International Transactions (국제거래에서 독립적 은행보증서에 대한 담보장치로서의 수출보증보험에 관한 연구)

  • Kim, Sang-Man
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.39
    • /
    • pp.59-85
    • /
    • 2008
  • An independent bank guarantee(aka an independent guarantee) is provided as an security on a principal obligor's performance of his obligation, and a guarantor should pay the guaranteed amount only upon a beneficiary's written demand. A standby letter of credit has been used in the United States, since it was construed that a bank should not issue a guarantee. There was wide misunderstanding that a standby letter of credit differs from an independent bank guarantee. However, a standby letter of credit is the same security as an independent bank guarantee, and in international business a standby letter of credit is not differentiated from a independent bank guarantee. An independent bank guarantee are independent from the underlying contract, unconditional, and irrevocable. And a guarantor should pay upon written demand without proving a principal obligor breaches the underlying contract. These features of an independent bank guarantee has been abused in international transactions. Thus it has been proposed that some exceptions to the features of an independent bank guarantee should be allowed. United Nations Convention on Independent Guarantees and Standby Letter of Credit(1995) stipulates some exceptions to payment obligation. Export bond insurance, a part of export insurances, operated by the Korea Export Insurance Corporation under the Export Insurance Act, is used as a security for unfair calling by a beneficiary under an independent bank guarantee. Most of the export subsides by the government are prohibited under WTO's Agreement on Subsidies and Countervailing Measures. However, as export insurance is allowed under the WTO, it operates a significant role in enhancing the export. In the event that export bond insurance is provided for a guarantor, an obligor who is subject to recourse by a guarantor, can be exempt from the recourse in case of unfair calling. The Korea Export Insurance Corporation, an insurer, bears unfair calling risk by a beneficiary. Generally it is understood that a demand shall be made before the expiry of an independent bank guarantee. However this is not absolutely true, it shall be decided by URDG, ISP98, the governing law.

  • PDF

An Assessment of the Deterioration of Fabricated Metal Thread with Light, and Temperature and Humidity Factors: A Focused Study of Asian Textile Collections at the Metropolitan Museum of Art, New York

  • Park, Hae Jin;Hwang, Minsun;Chung, Yong Jae
    • Journal of Conservation Science
    • /
    • v.34 no.4
    • /
    • pp.245-257
    • /
    • 2018
  • To investigate the deterioration of textiles with metal thread, I surveyed 40 textile objects, dating from the 11th to the 19th century from Korea, China, Japan, and Central Asia at the Metropolitan Museum of Art, New York. This survey included various types, widths, and thicknesses of metal thread. In addition, deterioration was examined under the microscope and color information was collected using the spectrophotometer. While investigating metal thread in the collections, I fabricated 12 different types of metal samples with metal leaf(24K gold, silver, and copper leaf), adhesive (hide animal glue and a mixture of hide animal glue and iron oxide red), and paper substrate(Korean mulberry and Taiwanese kozo paper). The accelerated deterioration process of those fabricated samples was carried out using a light box(UV and daylight), and a humidity cabinet. In the light experiment with blue scales textile fading card(aka, blue wool standard), the metal leaf began to peel off during the deterioration process with 756,000 lux-hours UV and daylight. In the temperature and humidity experiment, I could observe the reddish tarnish on copper, and some part of it began to peel off. Color reading on the light exposed samples showed that the degree of color change on the surface follows the amount of exposure as it increased over time. On the other hand, color change on the samples after artificial deterioration using temperature and humidity factors showed random change of color with occasional spikes. Distortion of original shape worsened in the samples exposed to temperature and humidity.

An Group-based Security Protocol for Machine Type Communications in LTE-Advanced (LTE-Advanced에서의 Machine Type Communications을 위한 그룹 기반 보안 프로토콜)

  • Choi, Dae-Sung;Choi, Hyoung-Kee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.885-896
    • /
    • 2013
  • MTC(Machine Type Communications), providing a variety of services anytime and anywhere by connecting the cellular network to the machine and things without human intervention, is being considered as a major challenge of the next-generation communications. Currently, When a massive MTC devices simultaneously connect to the network, each MTC device needs an independent access authentication process. Because of this process, authentication signaling congestion and overload problems will cause in LTE-Advanced. In this paper, we propose a group-based authentication protocol and a key management protocol. For managing the MTC devices as group units, the proposed protocol elects a group leader and authentications only once with the core network. After the authentication is completed, a group leader manages the rest members and MME(Mobility Management Entity) by constructing a binary tree. Finally, the propose protocol analysis show that the proposed protocol not only can reduces the authentication signaling which generated in between the MTC devices and the core network but also can manages the MTC devices, efficiently.

Predictive Value of Malignancy Risk Indices for Ovarian Masses in Premenopausal and Postmenopausal Women

  • Ertas, Sinem;Vural, Fisun;Tufekci, Ertugrul Can;Ertas, Ahmet Candost;Kose, Gultekin;Aka, Nurettin
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.17 no.4
    • /
    • pp.2177-2183
    • /
    • 2016
  • Background: To evaluate the predictive role of a risk of malignancy index in discriminating between benign and malignant adnexal masses preoperatively. Materials and Methods: A total of 408 patients with adnexal masses managed surgically between January 2010 and February 2014 were included. The risk of malignancy indices (RMI) 1, 2, 3 and 4 were calculated using findings for ultrasonography, menopausal status, and CA125 levels. Histopathologic results were the end point. ROC analysis was used for the sensitivity and the specificity of the models. Results: Some 37.6 % of the cases were malignant in the postmenopausal group while 7.9 % were malignant in the premenopausal group. Pelvic pain was the most common complaint, and the majority of the cases were diagnosed at stage 3. The RMI 1, 2, 3 and 4 yielded percentage sensitivities of 76.1, 79.1, 76.1 and 76.1 and specificities of 91.5, 89.1, 90.6, 88.6, respectively. RMI 1 was the most reliable test in the general population according to AUC levels and Kappa statistics. From ROC analysis results of post/premenopausal women, the RMI 1 (cut off: 200) yielded sensitivities of 84.0/60.9 and specificities of 87.7/92.5. With RMI 2 they were 88.6/60.9 and 80.0/91.0, with RMI 3 84.0/60.9 and 87.7/91.8, and with RMI 4 (cut off:400) 81.8/47.8 and 83.6 /44.0. Although test performance of RMI methods were good in a general population and postmenopausal women, the RMI inter-agreement validity was only moderate or fair in premenopausal women. Conclusions: Our study confirms the effectiveness of RMI algorithms in postmenopausal women. However, more sensitive tests are needed for premenopausal women.

A Design of MILENAGE Algorithm-based Mutual Authentication Protocol for The Protection of Initial Identifier in LTE (LTE 환경에서 초기 식별자를 보호하기 위한 MILENAGE 알고리즘 기반의 상호인증)

  • Yoo, Jae-hoe;Kim, Hyung-uk;Jung, Yong-hoon
    • Journal of Venture Innovation
    • /
    • v.2 no.1
    • /
    • pp.13-21
    • /
    • 2019
  • In LTE environment, which is 4th generation mobile communication systems, there is concern about private information exposure by transmitting initial identifier in plain text. This paper suggest mutual authentication protocol, which uses one-time password utilizing challenge-response and AES-based Milenage key generation algorithm, as solution for safe initial identification communication, preventing unique identification information leaking. Milenage key generation algorithm has been used in LTE Security protocol for generating Cipher key, Integrity key, Message Authentication Code. Performance analysis evaluates the suitability of LTE Security protocol and LTE network by comparing LTE Security protocol with proposed protocol about algorithm operation count and Latency.Thus, this paper figures out initial identification communication's weak points of currently used LTE security protocol and complements in accordance with traditional protocol. So, it can be applied for traditional LTE communication on account of providing additional confidentiality to initial identifier.