• Title/Summary/Keyword: Collision power analysis

Search Result 79, Processing Time 0.027 seconds

An Approach on the Global Commerce Activation Regarding Culture Collision by the Use of M&A (M&A 협상성과에 기업간 문화차이가 미치는 영향에 관한 연구)

  • Park, Chong-Don
    • International Commerce and Information Review
    • /
    • v.8 no.2
    • /
    • pp.229-247
    • /
    • 2006
  • The company culture is becoming usual term in business management field. That organization culture of these phenomenon becomes resource of company competitive power indeed, it is basing to logic for important leading person for elevation with systemicity. also, great many scholars do research to subject that is change management of company administration and there are not much example that companies succeed in change actually despite had announced treatise etc. This research tries to synthesize several research subjects by single model regarding confrontation(culture collision) phenomenon between culture that can happen in company through literature research and example analysis basically. Specially, try to classify and divide this by specific developing and arrange in each type with using much this culture analysis in negotiation analytics. Through this problem and suggestion point by this confrontation way in this culture negotiation side and culture risk management side of administration make try to.

  • PDF

Side-Channel Analysis Based on Input Collisions in Modular Multiplications and its Countermeasure (모듈라 곱셈의 충돌 입력에 기반한 부채널 공격 및 대응책)

  • Choi, Yongje;Choi, Dooho;Ha, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1091-1102
    • /
    • 2014
  • The power analysis attack is a cryptanalytic technique to retrieve an user's secret key using the side-channel power leakage occurred during the execution of cryptographic algorithm embedded on a physical device. Especially, many power analysis attacks have targeted on an exponentiation algorithm which is composed of hundreds of squarings and multiplications and adopted in public key cryptosystem such as RSA. Recently, a new correlation power attack, which is tried when two modular multiplications have a same input, is proposed in order to recover secret key. In this paper, after reviewing the principle of side-channel attack based on input collisions in modular multiplications, we analyze the vulnerability of some exponentiation algorithms having regularity property. Furthermore, we present an improved exponentiation countermeasure to resist against the input collision-based CPA(Correlation Power Analysis) attack and existing side channel attacks and compare its security with other countermeasures.

Performance Modeling and Evaluation of IEEE 802.15.4 Collision Free Period for Batch Traffic (배치 트래픽 특성을 고려한 IEEE 802.15.4 비경합구간 성능 모델링 및 평가)

  • Kim, Tae-Suk;Choi, Duke Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.11
    • /
    • pp.83-90
    • /
    • 2016
  • In this paper, we performed the analysis of transmission performance for Collision Free Period(CFP) supported by the low-power communication technology, IEEE 802.15.4 MAC (Media Access Control). For the analysis, periodic traffic, original service target of CFP, is considered and, according to the Quality of Service required, packet arrival pattern to MAC layer is categorized as batch and non-batch, and analysis on throughput, delay, and energy is performed for those patterns. On the basis of the obtained analysis, performance comparison with Collision Avoidance Period(CAP) is carried out for the health care applications that generate periodic traffic such as Pedometer, ECG, EMG. The evaluation confirms that CFP is more energy efficient for healthcare applications that generate periodic and time-critical traffic and moreover for the application with high bandwidth requirement CFP achieves up to 46% energy savings compared to CAP.

Study for improving attack Complexity against RSA Collision Analysis (RSA 충돌 분석 공격 복잡도 향상을 위한 연구)

  • Sim, Bo-Youn;Won, Yoo-Seung;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.261-270
    • /
    • 2015
  • In information security devices, such as Smart Cards, vulnerabilities of the RSA algorithm which is used to protect the data were found in the Side Channel Analysis. The RSA is especially vulnerable to Power Analysis which uses power consumption when the algorithm is working. Typically Power Analysis is divided into SPA(Simple Power Analysis) and DPA(Differential Power Analysis). On top of this, there is a CA(Collision Analysis) which is a very powerful attack. CA makes it possible to attack using a single waveform, even if the algorithm is designed to secure against SPA and DPA. So Message blinding, which applies the window method, was considered as a countermeasure. But, this method does not provide sufficient safety when the window size is small. Therefore, in this paper, we propose a new countermeasure that provides higher safety against CA. Our countermeasure is a combination of message and exponent blinding which is applied to the window method. In addition, through experiments, we have shown that our countermeasure provides approximately 124% higher attack complexity when the window size is small. Thus it can provide higher safety against CA.

Performance Analysis of Multiple-Hop Wireless Body Area Network

  • Hiep, Pham Thanh;Hoang, Nguyen Huy;Kohno, Ryuji
    • Journal of Communications and Networks
    • /
    • v.17 no.4
    • /
    • pp.419-427
    • /
    • 2015
  • There have been increases in the elderly population worldwide, and this has been accompanied by rapid growth in the health-care market, as there is an ongoing need to monitor the health of individuals. Wireless body area networks (WBANs) consist of wireless sensors attached on or inside the human body to monitor vital health-related problems, e.g., electrocardiograms (ECGs), electroencephalograms (EEGs), and electronystagmograms (ENGs). With WBANs, patients' vital signs are recorded by each sensor and sent to a coordinator. However, because of obstructions by the human body, sensors cannot always send the data to the coordinator, requiring them to transmit at higher power. Therefore, we need to consider the lifetime of the sensors given their required transmit power. In the IEEE 802.15.6 standard, the transmission topology functions as a one-hop star plus one topology. In order to obtain a high throughput, we reduce the transmit power of the sensors and maintain equity for all sensors. We propose the multiple-hop transmission for WBANs based on the IEEE 802.15.6 carrier-sense multiple-access with collision avoidance (CSMA/CA) protocol. We calculate the throughput and variance of the transmit power by performing simulations, and we discuss the results obtained using the proposed theorems.

An Analysis for the Dynamics of a Pico Slider during the Ramp Loading Process (Ramp Loading 피코 슬라이더의 거동 해석)

  • Kim Bum-Joon;Cho Kwang-Pyo;Rhim Yoon-Chul
    • Proceedings of the Korean Society of Tribologists and Lubrication Engineers Conference
    • /
    • 2003.11a
    • /
    • pp.291-298
    • /
    • 2003
  • Recently, load/unload(L/UL) process is applied to a computer information storage device due to its advantages such as lower power consumption, larger data zone, simpler fabrication of disk for no bumped parking zone, and rarer contact between the slider and media. An analysis of the transient motion for the slider is very important to design an air bearing surface (ABS) of the slider to secure the stable performance of the system. During the L/UL process, however, there are several issues occurred such as contact or collision between slider and media. Sometimes this will cause the system failure. In this study, the dynamics of the slider during the loading process are investigated through a numerical simulation using FEM analysis and experiment.

  • PDF

An Analysis of Packet Collision Probability due to Inter-piconet Interference in the Bluetooth Low Energy Networks (저전력 블루투스 네트워크에서 피코넷 간 간섭으로 인한 패킷충돌 확률 분석)

  • Kim, Myoung Jin
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.8
    • /
    • pp.3-11
    • /
    • 2017
  • Research and development are being conducted to apply low-power Bluetooth (BLE) technology to IoT (Internet of Things) applications. The characteristic of this application environment is that many piconets can operate in the same space. Therefore, interference between homogeneous networks is likely to occur. In the BLE data channel, adaptive frequency hopping (AFH) scheme is used among the 37 frequency channels, and the master and the slave communicate while changing the carrier frequency. If there are multiple BLE piconets in the same space, there is a risk of frequency collision and packet errors will occur. In this paper, we analyze the packet collision probability due to cochannel interference in multiple asynchronous BLE piconet environments. Specifically, we analyzed packet collision probability according to the number of concurrently operating BLE piconets with the ratio of connection interval to connection event length as the main parameters. The analysis result can be used to set connection event related parameters for a desired packet collision probability according to the number of users having BLE devices in a given space.

Dynamics of a Pico Slider during the Ramp Loading Process (Ramp Loading 피코 슬라이더의 거동 해석)

  • Rhim Yoon-Chul;Kim Bum-Joon;Cho Kwang-Pyo
    • Tribology and Lubricants
    • /
    • v.20 no.6
    • /
    • pp.322-329
    • /
    • 2004
  • Recently, a load/unload(L/UL) system is adopted to the hard disk drive(HDD) due to its advantages such as lower power consumption, larger data zone, simpler fabrication of disk due to no bumped parking zone, and rarer contact between slider and media. An analysis of the transient motion for the slider is very important to design an air bearing surface(ABS) of the slider to secure the stable performance of the system. During the L/UL process, however, there are several issues occurred such as contact or collision between slider and media. Sometimes this will cause the system failure. In this study, the dynamics of a pico slider during the loading process are investigated through numerical simulation using FEM analysis and experiment. Ramp profile and angular velocity of the swing arm actuator are very important parameters for the design of L/UL system to avoid collision between slider and disk.

Car-door-controlled collision protection system using proximity sensor (근접센서를 이용한 차량 도어 제어 충돌 방지 시스템)

  • Lee S.H.;Cho H.S.;Heo J.K.;Lee J.H.;Kim W.K.
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2005.10a
    • /
    • pp.971-975
    • /
    • 2005
  • In this study, a car-door-controlled collision protection system using proximity sensor is proposed and its preliminary analysis and several preliminary experiments are conducted. The proposed system has three additional sub-components on the car-door that is, a pair of extra electro-magnetic actuator that are attached to the sliding bar of the open/close car-door four-bar mechanism, a proximity sensor that would be attached to the outside surface of the door which is likely to frequently contact to the object and a driving control circuit of the whole system. A proximity sensor is used to detect object close to the car-door, the driving control circuit provides actuating power command to the electro-magnets to generate braking force to stop the swing motion of the car-door. It is verified through kinematic analysis of the four-bar car-door open/close mechanism and through experiments that the magnitude of maximum electronic magnetic force could provide the braking force enough for this application. For this purpose, an electro-magnet driving circuit is implemented and tested. And also to increase the safety of the system a time delay circuit is implemented and tested.

  • PDF

Path Collision-aware Real-time Link Scheduling for TSCH Wireless Networks

  • Darbandi, Armaghan;Kim, Myung Kyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.9
    • /
    • pp.4429-4445
    • /
    • 2019
  • As low-power and low-rate WSNs are being widely used for industrial applications, the scheduling of such applications becomes a critical issue to guarantee meeting the stringent requirements of determinism and tight latencies. This paper studies the link scheduling problem for real-time industrial applications in time-slotted channel hopping (TSCH) networks. We propose a heuristic algorithm for centralized link scheduling referred to as path-collision aware least laxity first (PC-LLF) algorithm, which dynamically prioritizes the packets based on the laxity time to the end-to-end deadlines and the amount of collisions that messages might deal with along their designated paths to the destination device. We propose schedulability analysis of real-time applications scheduled under our prioritization approach over TSCH networks, based on the literature on real-time schedulability analysis of multiprocessors and distributed systems. We show that our methodology provides an improved schedulability condition with respect to the existing approaches. Performance evaluation studies quantify to quantify the performance of our proposed approach under a variety of scenarios.