• Title/Summary/Keyword: Application protocol

Search Result 1,497, Processing Time 0.027 seconds

A Study on the Security analysis and Applications of Standard Key agreement protocols based on Elliptic curve cryptosystem (타원 곡선에 기반한 표준 키 분배 프로토콜의 안전성 분석 및 응용 분야에 관한 연구)

  • 오수현;이승우;심경아;양형규;원동호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.3
    • /
    • pp.103-118
    • /
    • 2002
  • To provide the privacy of transmitted message over network the use of cryptographic system is increasing gradually. Because the security and reliability of the cryptographic system is totally rely on the key, the key management is the most important part of the cryptographic system. Although there are a lot of security products providing encryption, the security of the key exchange protocols used in the product are not mostly proved yet. Therefore, we have to study properties and operation of key agreement protocols based on elliptic curve in ANSI X9.63. furthermore, we analyze the security of their protocols under passive and active attacker models and propose the most suitable application field taking the feature of the protocols into account.

CRL Distribution Method based on the T-DMB Data Service for Vehicular Networks (차량통신에서 T-DMB 데이터 서비스에 기반한 인증서 취소 목록 배포 기법)

  • Kim, Hyun-Gon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.161-169
    • /
    • 2011
  • There is a consensus in the field of vehicular network security that public key cryptography should be used to secure communications. A certificate revocation list (CRL) should be distributed quickly to all the vehicles in the network to protect them from malicious users and malfunctioning equipment as well as to increase the overall security and safety of vehicular networks. Thus, a major challenge in vehicular networks is how to efficiently distribute CRLs. This paper proposes a CRL distribution method aided by terrestrial digital multimedia broadcasting (T-DMB). By using T-DMB data broadcasting channels as alternative communication channels, the proposed method can broaden the network coverage, achieve real-time delivery, and enhance transmission reliability. Even if roadside units are not deployed or only sparsely deployed, vehicles can obtain recent CRLs from the T-DMB infrastructure. A new transport protocol expert group (TPEG) CRL application was also designed for the purpose of broadcasting CRLs over the T-DMB infrastructure.

Object Tracking Framework of Video Surveillance System based on Non-overlapping Multi-camera (비겹침 다중 IP 카메라 기반 영상감시시스템의 객체추적 프레임워크)

  • Han, Min-Ho;Park, Su-Wan;Han, Jong-Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.6
    • /
    • pp.141-152
    • /
    • 2011
  • Growing efforts and interests of security techniques in a diverse surveillance environment, the intelligent surveillance system, which is capable of automatically detecting and tracking target objects in multi-cameras environment, is actively developing in a security community. In this paper, we propose an effective visual surveillance system that is avaliable to track objects continuously in multiple non-overlapped cameras. The proposed object tracking scheme consists of object tracking module and tracking management module, which are based on hand-off scheme and protocol. The object tracking module, runs on IP camera, provides object tracking information generation, object tracking information distribution and similarity comparison function. On the other hand, the tracking management module, runs on video control server, provides realtime object tracking reception, object tracking information retrieval and IP camera control functions. The proposed object tracking scheme allows comprehensive framework that can be used in a diverse range of application, because it doesn't rely on the particular surveillance system or object tracking techniques.

Analysis on Vulnerability and Establishing Countermeasure Methodologies for Privacy Protection in NFC Environments (NFC 환경에서 개인정보보호를 위한 취약점 분석 및 대책 수립 방법론)

  • Lee, Jae-Sik;Kim, Hyung-Joo;You, Han-Na;Park, Tae-Sung;Jun, Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.357-365
    • /
    • 2012
  • NFC(Near Field Communication),the short-distance communication protocol, is a technology with a wide range of application applied to smart phones. In particular, many of the services in NFC environments utilize users' privacy information. Privacy information used in such services leads to new vulnerability due to the very features of NFC technology and of NFC devices represented by smart phones. Therefore, the purpose of this study is to suggest a methodology that analyzes privacy vulnerability resulting from a NFC environments in technological, managerial and institutional aspects and a methodology aimed to establish a countermeasure to augment them. Also, this study will suggest vulnerability and countermeasures accordingly in domestic NFC service drawn out through the above methodologies and a countermeasure to improve the vulnerability. It is expected that various safe countermeasures for privacy protection in NFC environments will be established through the suggested methodologies.

A Study on the Zone-Key based Secure Routing Scheme in MANET (MANET에서 영역-키 기반 보안 라우팅 기법에 관한 연구)

  • Yang, Hwan Seok;Kim, Young Sun
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.33-39
    • /
    • 2020
  • In MANET consisting of only mobile nodes, all nodes serve as routes. However, the dynamic topology due to frequent movement of nodes degrades routing performance and is also cause of many security vulnerabilities. Therefore, security must be applied to routing techniques that can influence the performance of MANET. In this paper, we propose a technique for efficiently responding to various routing attacks and safe data transmission through application of zone-key based security routing techniques. A zone-based network structure was used, and a management node that manages member nodes in each zone was used in the proposed technique. In addition, the damage from the attacking node was minimized by issuing a key to each node and applying this to a routing technique. The zone management node issues a key for encryption routing information and manages the issuance information. A member node that wants to transmit data encrypts routing in formation using a key issued from the zone management node, and then performs path discovery using this. The improved performance of the proposed technique was confirmed through a comparative experiment with the CBSR and ARNA technique, excellent performance was confirmed through experiments.

Stochastic Mobility Model Design in Mobile WSN (WSN 노드 이동 환경에서 stochastic 모델 설계)

  • Yun, Dai Yeol;Yoon, Chang-Pyo;Hwang, Chi-Gon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.8
    • /
    • pp.1082-1087
    • /
    • 2021
  • In MANET(mobile ad hoc network), Mobility models vary according to the application-specific goals. The most widely used Random WayPoint Mobility Model(RWPMM) is advantageous because it is simple and easy to implement, but the random characteristic of nodes' movement is not enough to express the mobile characteristics of the entire sensor nodes' movements. The random mobility model is insufficient to express the inherent movement characteristics of the entire sensor nodes' movements. In the proposed Stochastic mobility model, To express the overall nodes movement characteristics of the network, the moving nodes are treated as random variables having a specific probability distribution characteristic. The proposed Stochastic mobility model is more stable and energy-efficient than the existing random mobility model applies to the routing protocol to ensure improved performances in terms of energy efficiency.

Development of a new mini straw for cryopreservation of boar semen

  • Almubarak, Areeg;Osman, Rana;Lee, Seongju;Yu, Iljeoung;Jeon, Yubyeol
    • Journal of Animal Reproduction and Biotechnology
    • /
    • v.37 no.2
    • /
    • pp.113-120
    • /
    • 2022
  • Sperm cryopreservation is a fundamental process for the long-term conservation of livestock genetic resources. Yet, the packaging method has been shown, among other factors, to affect the frozen-thawed (FT) sperm quality. This study aimed to develop a new mini-straw for sperm cryopreservation. In addition, the kinematic patterns, viability, acrosome integrity, and mitochondrial membrane potential (MMP) of boar spermatozoa frozen in the developed 0.25 mL straw, 0.25 mL (minitube, Germany), or 0.5 mL (IMV technologies, France) straws were assessed. Post-thaw kinematic parameters were not different (experiment 1: total motility (33.89%, 32.42%), progressive motility (19.13%, 19.09%), curvilinear velocity (42.32, 42.86), and average path velocity (33.40, 33.62) for minitube and the developed straws, respectively. Further, the viability (38.56%, 34.03%), acrosome integrity (53.38%, 48.88%), MMP (42.32%, 36.71%) of spermatozoa frozen using both straw were not differ statistically (p > 0.05). In experiment two, the quality parameters for semen frozen in the developed straw were compared with the 0.5 mL IMV straw. The total motility (41.26%, 39.1%), progressive motility (24.62%, 23.25%), curvilinear velocity (46.44, 48.25), and average path velocity (37.98, 39.12), respectively, for IMV and the developed straw, did not differ statistically. Additionally, there was no significant difference in the viability (39.60%, 33.17%), acrosome integrity (46.23%, 43.23%), and MMP (39.66, 32.51) for IMV and the developed straw, respectively. These results validate the safety and efficiency of the developed straw and highlight its great potential for clinical application. Moreover, both 0.25 mL and 0.5 mL straws fit the present protocol for cryopreservation of boar spermatozoa.

The efficacy of low-level diode laser versus laser acupuncture for the treatment of myofascial pain dysfunction syndrome (MPDS)

  • Khalighi, Hamid Reza;Mortazavi, Hamed;Mojahedi, Seyed Masoud;Azari-Marhabi, Saranaz;Parvaie, Parvin;Anbari, Fahimeh
    • Journal of Dental Anesthesia and Pain Medicine
    • /
    • v.22 no.1
    • /
    • pp.19-27
    • /
    • 2022
  • Background: Myofascial pain dysfunction syndrome (MPDS) is the most common type of temporomandibular disorder. This study compared the efficacies of low-level diode laser therapy (LLLT) and laser acupuncture therapy (LAT) in the treatment of MPDS. Methods: This double-blind randomized controlled clinical trial included 24 patients with MPDS who were randomly divided into two equally sized groups. Patients in the LLLT group received 12 sessions of low-level diode laser irradiation applied to the trigger points of the masticatory muscles during 1 month. The same protocol was also used in the LAT group according to the specific trigger points. We measured pain intensity and maximum mouth opening in both groups at baseline, during treatment, and 2 months after treatment completion. Results: The pain intensities decreased from 6.58±1.31 to 0.33±0.65 and from 7.08 ± 1.37 to 0 in the LLLT and LAT groups, respectively. The maximum mouth openings increased from 32.25 ± 8.78 mm to 42.58 ± 4.75 mm and from 33 ± 6.57 mm to 45.67 ± 3.86 mm in the LLLT and LAT groups, respectively. Pain intensity (P = 0.839) and level of maximum mouth opening (P = 0.790) did not differ significantly between the groups. Conclusion: Our results showed similar efficacy between LLLT and LAT in the treatment of MPDS signs and symptoms.

The Development of Automated Personalized Self-Care (APSC) Program for Patients with Type 2 Diabetes Mellitus (제2형 당뇨병 환자를 위한 자동 맞춤형 셀프케어 프로그램 개발)

  • Park, Gaeun;Lee, Haejung;Khang, Ah Reum
    • Journal of Korean Academy of Nursing
    • /
    • v.52 no.5
    • /
    • pp.535-549
    • /
    • 2022
  • Purpose: The study aimed to design and develop an automated personalized self-care (APSC) program for patients with type 2 diabetes mellitus. The secondary aim was to present a clinical protocol as a mixed-method research to test the program effects. Methods: The APSC program was developed in the order of analysis, design, implementation, and evaluation according to the software development life cycle, and was guided by the self-regulatory theory. The content validity, heuristics, and usability of the program were verified by experts and patients with type 2 diabetes mellitus. Results: The APSC program was developed based on goal setting, education, monitoring, and feedback components corresponding to the phases of forethought, performance/volitional control, and self-reflection of self-regulatory theory. Using the mobile application, the participants are able to learn from educational materials, monitor their health behaviors, receive weekly-automated personalized goals and feedback messages, and use an automated conversation system to solve the problems related to self-care. The ongoing two-year study utilizes a mixed method design, with 180 patients having type 2 diabetes mellitus randomized to receive either the intervention or usual care. The participants will be reviewed for self-care self-efficacy, health behaviors, and health outcomes at 6, 12, 18, and 24 months. Participants in the intervention group will be interviewed about their experiences. Conclusion: The APSC program can serve as an effective tool for facilitating diabetes health behaviors by improving patients' self-care self-efficacy and self-regulation for self-care. However, the clinical effectiveness of this program requires further investigation.

A sampling and estimation method for monitoring poultry red mite (Dermanyssus gallinae) infestation on caged-layer poultry farms

  • Oh, Sang-Ik;Park, Ki-Tae;Jung, Younghun;Do, Yoon Jung;Choe, Changyong;Cho, Ara;Kim, Suhee;Yoo, Jae Gyu
    • Journal of Veterinary Science
    • /
    • v.21 no.3
    • /
    • pp.41.1-41.12
    • /
    • 2020
  • Background: The poultry red mite, Dermanyssus gallinae, is a serious problem in the laying hen industry worldwide. Currently, the foremost control method for D. gallinae is the implementation of integrated pest management, the effective application of which necessitates a precise monitoring method. Objectives: The aim of the study was to propose an accurate monitoring method with a reliable protocol for caged-layer poultry farms, and to suggest an objective classification for assessing D. gallinae infestation on caged-layer poultry farms according to the number of mites collected using the developed monitoring method. Methods: We compared the numbers of mites collected from corrugated cardboard traps, regarding with length of sampling periods, sampling sites on cage, and sampling positions in farm buildings. The study also compared the mean numbers of mites collected by the developed method with the infestation levels using by the conventional monitoring methods in 37 caged-layer farm buildings. Results: The statistical validation provided the suitable monitoring method that the traps were installed for 2 days on feed boxes at 27 sampling points which included three vertical levels across nine equally divided zones of farms. Using this monitoring method, the D. gallinae infestation level can be assessed objectively on caged-layer poultry farms. Moreover, the method is more sensitive than the conventional method in detecting very small populations of mites. Conclusions: This method can be used to identify the initial stages of D. gallinae infestation in the caged-layer poultry farms, and therefore, will contribute to establishment of effective control strategies for this mite.