• Title/Summary/Keyword: Chaining

Search Result 177, Processing Time 0.022 seconds

Bitcoin Cryptocurrency: Its Cryptographic Weaknesses and Remedies

  • Anindya Kumar Biswas;Mou Dasgupta
    • Asia pacific journal of information systems
    • /
    • v.30 no.1
    • /
    • pp.21-30
    • /
    • 2020
  • Bitcoin (BTC) is a type of cryptocurrency that supports transaction/payment of virtual money between BTC users without the presence of a central authority or any third party like bank. It uses some cryptographic techniques namely public- and private-keys, digital signature and cryptographic-hash functions, and they are used for making secure transactions and maintaining distributed public ledger called blockchain. In BTC system, each transaction signed by sender is broadcasted over the P2P (Peer-to-Peer) Bitcoin network and a set of such transactions collected over a period is hashed together with the previous block/other values to form a block known as candidate block, where the first block known as genesis-block was created independently. Before a candidate block to be the part of existing blockchain (chaining of blocks), a computation-intensive hard problem needs to be solved. A number of miners try to solve it and a winner earns some BTCs as inspiration. The miners have high computing and hardware resources, and they play key roles in BTC for blockchain formation. This paper mainly analyses the underlying cryptographic techniques, identifies some weaknesses and proposes their enhancements. For these, two modifications of BTC are suggested ― (i) All BTC users must use digital certificates for their authentication and (ii) Winning miner must give signature on the compressed data of a block for authentication of public blocks/blockchain.

Advanced Adaptive Chain-Based EEACP Protocol Improvement Centered on Energy Efficiency in WSN Environment (WSN 환경에서 에너지 효율을 중심으로 한 적응형 체인 기반 EEACP 프로토콜 개선)

  • DaeKyun Cho;YeongWan Kim;GunWoo Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.879-884
    • /
    • 2024
  • Wireless sensor network technology is becoming increasingly important with the advancement of the Fourth Industrial Revolution. Consequently, various protocols such as LEACH, PEGASIS, and EEACP have been developed in an attempt to increase energy efficiency. However, the EEACP protocol still has room for improvement in terms of energy consumption during transmission. Particularly, inefficient paths associated with data reception settings may compromise the network's survivability. The proposed A-EEACP protocol optimizes data transmission direction around the sink node to reduce energy consumption and enhance the network's survivability.

Design and Implementation of Rule-based Routing Configuration Fault Management System (규칙 기반 라우팅 구성 장애 관리 시스템의 설계 및 구현)

  • 황태인;황태인;안성진
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.8A
    • /
    • pp.1085-1095
    • /
    • 2000
  • In this paper, we have defined the rules and the algorithm for diagnosis and recovery of routing configuration fault on a system. By using them, we have implemented the Java-based system that can manage routing configuration fault automatically. To manage routing configuration fault, the production rule for network configuration management, the production rule for routing configuration fault diagnosis, and the production rule for routing configuration fault recovery have been proposed. Rule-based routing configuration fault management system has been implemented on the basis of backward chaining algorithm and applied for meta rules for the purpose of interconnecting the production rules. We have derived the experimental result from transition process of the rules, the Blackboard, the goals based on scenarios. Through the implementation of dynamically applicable system in heterogeneous and rapidly changing network environments, we have proposed the methodology for network configuration fault management. Also, we expect that network configuration manager can reduce time and cost wasted for routing configuration fault management.

  • PDF

The Effect of Lubricity Improvement by Biodiesel Components (바이오디젤 구성성분에 따른 윤활성향상 효과)

  • Lim, Young-Kwan;Park, So-Ra;Kim, Jong-Ryeol;Yim, Eui-Soon;Jung, Choong-Sub
    • Applied Chemistry for Engineering
    • /
    • v.21 no.6
    • /
    • pp.684-688
    • /
    • 2010
  • Biodiesel produced from the reaction of methanol and triglyceride which is the main component of animal fats and vegetable oils is known for remarkable lubricity. In this study, the lubricity of 3 kinds of biodiesel came from vegetable oils such as soybean oil, palm oil, and perilla oil and 2 kind of biodiesel which were produced from beef tallow and pork lard were analyzed using HFRR (High frequency reciprocating rig). In HFRR test result, the lubricity of perilla and soybean's biodiesel was higher than other biodiesels. After analysis of biodiesel components by GC-MS and determination of the lubricity of pure biodiesel components using HFRR, it was found that a higher olefin content and long alkyl chaining biodiesel had an excellent lubricity property.

S-FEAR: Secure-Fuzzy Energy Aware Routing Protocol for Wireless Sensor Networks

  • Almomani, Iman;Saadeh, Maha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1436-1457
    • /
    • 2018
  • Secure routing services in Wireless Sensor Networks (WSNs) are essential, especially in mission critical fields such as the military and in medical applications. Additionally, they play a vital role in the current and future Internet of Things (IoT) services. Lightness and efficiency of a routing protocol are not the only requirements that guarantee success; security assurance also needs to be enforced. This paper proposes a Secure-Fuzzy Energy Aware Routing Protocol (S-FEAR) for WSNs. S-FEAR applies a security model to an existing energy efficient FEAR protocol. As part of this research, the S-FEAR protocol has been analyzed in terms of the communication and processing costs associated with building and applying this model, regardless of the security techniques used. Moreover, the Qualnet network simulator was used to implement both FEAR and S-FEAR after carefully selecting the following security techniques to achieve both authentication and data integrity: the Cipher Block Chaining-Message Authentication Code (CBC-MAC) and the Elliptic Curve Digital Signature Algorithm (ECDSA). The performance of both protocols was assessed in terms of complexity and energy consumption. The results reveal that achieving authentication and data integrity successfully excluded all attackers from the network topology regardless of the percentage of attackers. Consequently, the constructed topology is secure and thus, safe data transmission over the network is ensured. Simulation results show that using CBC-MAC for example, costs 0.00064% of network energy while ECDSA costs about 0.0091%. On the other hand, attacks cost the network about 4.7 times the cost of applying these techniques.

Development of Expert System For Designing Power Transmission Gears(I) -Diagnosis of the Causes and Remedies of Gear Failures- (동력전달용 치차설계 전문가 시스템 개발연구(I) -치차파손의 원인과 대책의 진단-)

  • 정태형;변준형;이규호
    • Transactions of the Korean Society of Mechanical Engineers
    • /
    • v.15 no.6
    • /
    • pp.2026-2036
    • /
    • 1991
  • An expert system is developed which can diagnose the causes and remedies of the failures of power transmission gears. The basic components of the expert system are knowledge base, inference engine, and working memory. The knowledges in knowledge base are classified into the knowledges for determining the failure types and for diagnosis of causes and remedies of the failures. The former is represented hierarchically into the main category of eleven groups by rules and the sub category of twenty four groups by facts, while the later is represented by facts according to the each group of knowledges. In the inference engine some considerations are implemented, i.e., the backward chaining method and depth first search to determine the category of the failures, the meta-knowledges to shorten the search space, the certainty factor to evaluate the reliability of result, and the unification strategy to diagnose the causes and remedies of the failures. The working memory is established to hold the results during inference temporarily. In addition, knowledge acquisition facility, explanation facility, and user interface are included for the usefulness of user. This expert system is written with the PROLOG programming language on IBM-PC compatible computer operated by MS-DOS and be executed alone.

On Indexing Method for Current Positions of Moving Objects (이동 객체의 현재 위치 색인 기법)

  • Park, Hyun-Kyoo;Kang, Sung-Tak;Kim, Myoung-Ho;Min, Kyoung-Wook
    • Journal of Korea Spatial Information System Society
    • /
    • v.5 no.1 s.9
    • /
    • pp.65-74
    • /
    • 2003
  • Location-based service is an important spatiotemporal database application area that provides the location-aware information of wireless terminals via positioning devices such as GPS. With the rapid advances of wireless communication systems, the requirement of mobile application areas including traffic, mobile commerce and supply chaining management became the center of attention for various research issues in spatiotemporal databases. In this paper we present the A-Quadtree, an efficient indexing method for answering location-based queries where the movement vector information (e.g., speed and velocity) is not presented. We implement the A-Quadtree with an index structure for object identifiers as a.Net component to apply the component to multiplatforms. We present our approach and describe the performance evaluation through various experiments. In our experiments, we compare the performance with previous approaches and show the enhanced efficiency of our method.

  • PDF

Symmetric structured SHACAL-1 block cipher algorithm (대칭구조 SHACAL-1 블록 암호 알고리즘)

  • Kim, Gil-Ho;Park, Chang-Su;Kim, Jong-Nam;Jo, Gyeong-Yeon
    • Journal of the Korea Computer Industry Society
    • /
    • v.10 no.4
    • /
    • pp.167-176
    • /
    • 2009
  • In this paper, we propose an improved SHACAL-1 of the same encryption and decryption with a simple symmetric layer. SHACAL-1 has 4 rounds, and each round has 20 steps. Decryption is becoming inverse function of encryption, In this paper, we proposed SHACAL-1 are composed of the first half, symmetry layer and the last half. The first half with SHACAL-1 encryption algorithm 1 round does with 10 steps and composes of 4 round. The last half identically with SHACAL-1 decryption algorithm, has a structure. On the center inserts a symmetry layer, encryption and decryption algorithm identically, composes. In the experiments, the proposed SHACAL-1 algorithm showed similar execution time to that of the SHACAL-1. Thanks to the symmetric layer, the proposed algorithm makes it difficult for the attacks which take advantages of high probability path such as the linear cryptanalysis, differential cryptanalysis. The proposed algorithm can be applicable to the other block cipher algorithms which have different encryption and decryption and useful for designing a new block cipher algorithm.

  • PDF

Design and Implementation of Efficient Mitigation against Return-oriented Programming (반환 지향 프로그래밍 공격에 대한 효율적인 방어 기법 설계 및 구현)

  • Kim, Jeehong;Kim, Inhyeok;Min, Changwoo;Eom, Young Ik
    • Journal of KIISE
    • /
    • v.41 no.12
    • /
    • pp.1018-1025
    • /
    • 2014
  • An ROP attack creates gadget sequences which consist of existing code snippets in a program, and hijacks the control flow of a program by chaining and executing gadget sequences consecutively. Existing defense schemes have limitations in that they cause high execution overhead, an increase in the binary size overhead, and a low applicability. In this paper, we solve these problems by introducing zero-sum defender, which is a fast and space-efficient mitigation scheme against ROP attacks. We find a fundamental property of gadget execution in which control flow starts in the middle of a function without a call instruction and ends with a return instruction. So, we exploit this property by monitoring whether the execution is abused by ROP attacks. We achieve a very low runtime overhead with a very small increase in the binary size. In our experimental results, we verified that our defense scheme prevents real world ROP attacks, and we showed that there is only a 2% performance overhead and a 1% binary size increase overhead in several benchmarks.

Analysis of Tour Information Services using Agent-based Simulation (시뮬레이션 모형을 통한 관광정보서비스 효과 분석)

  • Kim, Hyeon-Myeong;O, Jun-Seok
    • Journal of Korean Society of Transportation
    • /
    • v.24 no.6 s.92
    • /
    • pp.103-117
    • /
    • 2006
  • This study develops an agent-based simulation model to evaluate tourist information systems under ubiquitous environment. In this study, individual tourist's activity chaining behavior is formulated as a utility maximization problem. The underlying assumption of the model is that tourists increase their activities within their time and budget constraints to maximize their utilities. The model seeks individual's optimal tour schedule by solving Prize-Collecting Multiple-Day Traveling Salesman Problem(PC MD TSP). The simulation-based evaluation framework allows investigating individual utility gains by their information type and the total expenditure at each tour attractions. The real-time tour activity scheduling system enables tourists to optimize their tour activities by minimizing their time loss and maximizing their opportunity to use high utility facilities.