• Title/Summary/Keyword: Dynamic Trust

Search Result 103, Processing Time 0.027 seconds

A Study on Hierarchy-based Secure Encryption Protocol for Trust Improvement on Multicast Environment of MANET (MANET의 멀티캐스트 환경에서 신뢰성 향상을 위한 계층기반 암호 프로토콜 기법 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.3
    • /
    • pp.43-51
    • /
    • 2017
  • MANET consists of only wireless nodes having limited processing capability. It processes routing and data transmission through cooperation among each other. And it is exposed to many attack threats due to the dynamic topology by movement of nodes and multi-hop communication. Therefore, the reliability of transmitted data between nodes must be improved and security of integrity must be high. In this paper, we propose a method to increase the reliability of transmitted data by providing a secure cryptography protocol. The proposed method used a hierarchical structure to provide smooth cryptographic services. The cluster authentication node issues the cluster authentication key pair and unique key to the nodes. The nodes performs the encryption through two steps of encryption using cluster public key and block encryption using unique key. Because of this, the robustness against data forgery attacks was heightened. The superior performance of the proposed method can be confirmed through comparative experiment with the existing security routing method.

Entrepreneur, Environment, Strategy, Structure, and Performance Changes of High-Tech Ventures (벤처기업의 기업가, 환경, 전략, 그리고 조직구조 특성과 성과변화)

  • 장수덕;이장우
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.28 no.2
    • /
    • pp.35-59
    • /
    • 2003
  • Generally high-tech ventures have few resources with which to withstand unpredictable environmental jolts. Therefore environmental changes may have severe effects on the performance of high-tech ventures. Unfortunately previous empirical studies for predicting the performance of ventures hardly deal with such dynamic changes of performance. We try to examine the performance changes of ventures through a longitudinal study before and after severe environmental changes, namely IMF Bailout Memorandum. For the empirical study, we classified venture firms into four types based on entrepreneur's assessment of their performance changes and investigated how these four types differ in characteristics of entrepreneurs, environment, strategy, and organizational features. We found that differentiation strategies, fit between strategy and environmental changes, entrepreneur's trust and activities such as networking and knowledge accumulation about customers, and decentralized organizational structure were important to the performance changes of high-tech ventures.

A case study on revitalization scheme for small and medium enterprises hybrid business association (중소기업 신제품 개발 협력방안)

  • Park, No-Guk
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2006.11a
    • /
    • pp.269-278
    • /
    • 2006
  • Ten years have passed since the establishment of KOSHBA(Korea Small and medium enterprises Hybrid Business Association), KOSHBA is composed of over 400 regional groups; over 4,000 enterprises are participating in the association. This paper deals with a survey on the present status of the participating companies in HBA of Kangwon province including the motivation of participation, participating period, and the purpose of participation. The survey results show that they are participating in HBA for manpower interchange, information gathering, mutual utilization of management resources, and their company's growth. To become a dynamic and vital association, it is necessary to share, learn, and discuss their managerial problems based on mutual trust and respect at the regular monthly meeting.

  • PDF

A method for preventing online games hacking using memory monitoring

  • Lee, Chang Seon;Kim, Huy Kang;Won, Hey Rin;Kim, Kyounggon
    • ETRI Journal
    • /
    • v.43 no.1
    • /
    • pp.141-151
    • /
    • 2021
  • Several methods exist for detecting hacking programs operating within online games. However, a significant amount of computational power is required to detect the illegal access of a hacking program in game clients. In this study, we propose a novel detection method that analyzes the protected memory area and the hacking program's process in real time. Our proposed method is composed of a three-step process: the collection of information from each PC, separation of the collected information according to OS and version, and analysis of the separated memory information. As a result, we successfully detect malicious injected dynamic link libraries in the normal memory space.

An Analysis Of Entrepreneurship Programs at U.S. College and Universities: Focusing on Implications for Entrepreneurship Ecosystem of Korean Universities (미국 주요대학들의 창업 프로그램 분석: 한국 대학의 창업생태계 구축의 시사점 연구)

  • Lee, Tae Hyun;Kim, Hui Taek;Kim, Yoon Kyoung
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.10 no.1
    • /
    • pp.175-185
    • /
    • 2015
  • This article focuses on an analysis of entrepreneurship education programs at U.S. college and universities in order to determine distinctive features of those programs. To this end, we delved into the entrepreneurship programs including Martin Trust Center for MIT, Harvard University VIP program, Polsky Center of Chicago University and Stanford University program. By analyzing major roles, curriculums, and characteristics of the programs, three types of distinctive features emerged. The first feature is dynamic education-focused programs, which provide students with opportunities for applying what they have learned through startup competitions. The second is local-based programs, which take the lead in local startups by focusing on the local industry. The third is the programs with support and encouragement for startups. Based on the three types of features, we suggested critical factors for successful entrepreneurship education.

  • PDF

Identification Technition of Malicious Behavior node Based on Collaboration in MANET (MANET에서 협업기반의 악의적인 노드 행위 식별기법)

  • Jeon, Seo-In;Ryu, Keun-Ho
    • The KIPS Transactions:PartC
    • /
    • v.19C no.2
    • /
    • pp.83-90
    • /
    • 2012
  • MANET(Mobile Ad-Hoc Network) has a weakness from a security aspect because it operates where no wired network is built, which causes the exposed media, dynamic topology, and the lack of both central monitoring and management. It is especially difficult to detect and mitigate a malicious node because there is not a mediator which controls the network. This kind of malicious node is closely connected to the routing in the field of study of Ad-Hoc security. Accordingly this paper proposes the method on how to enhance the security for the safe and effective routing by detecting the malicious node. We propose MBC(Identification technition of Malicious Behavior node based on Collaboration in MANET) that can effectively cope with malicious behavior though double detecting the node executing the malicious behavior by the collaboration between individual node and the neighbor, and also managing the individual nodes in accordance with the trust level obtained. The simulation test results show that MBC can find the malicious nodes more accurately and promptly that leads to the more effectively secure routing than the existing method.

ASSESSMENT OF CFD CODES USED IN NUCLEAR REACTOR SAFETY SIMULATIONS

  • Smith, Brian L.
    • Nuclear Engineering and Technology
    • /
    • v.42 no.4
    • /
    • pp.339-364
    • /
    • 2010
  • Following a joint OECD/NEA-IAEA-sponsored meeting to define the current role and future perspectives of the application of Computational Fluid Dynamics (CFD) to nuclear reactor safety problems, three Writing Groups were created, under the auspices of the NEA working group WGAMA, to produce state-of-the-art reports on different aspects of the subject. The work of the second group, WG2, was to document the existing assessment databases for CFD simulation in the context of Nuclear Reactor Safety (NRS) analysis, to gain a measure of the degree of quality and trust in CFD as a numerical analysis tool, and to take initiatives to extend the existing databases. The group worked over the period of 2003-2007 and produced a final state-of-the-art report. The present paper summarises the material gathered during the study, illustrating the points with a few highlights. A total of 22 safety issues were identified for which the application of CFD was considered to potentially bring real benefits in terms of better understanding and increased safety. A list of the existing databases was drawn up and synthesised, both from the nuclear area and from other parallel, non-nuclear, industrial activities. The gaps in the technology base were also identified and discussed. In order to initiate new ways of bringing experimentalists and numerical analysts together, an international workshop -- CFD4NRS (the first in a series) -- was organised, a new blind benchmark activity was set up based on turbulent mixing in T-junctions, and a Wiki-type web portal was created to offer online access to the material put together by the group giving the reader the opportunity to update and extend the contents to keep the information source topical and dynamic.

Secure and Efficient Cooperative Spectrum Sensing Against Byzantine Attack for Interweave Cognitive Radio System

  • Wu, Jun;Chen, Ze;Bao, Jianrong;Gan, Jipeng;Chen, Zehao;Zhang, Jia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.11
    • /
    • pp.3738-3760
    • /
    • 2022
  • Due to increasing spectrum demand for new wireless devices applications, cooperative spectrum sensing (CSS) paradigm is the most promising solution to alleviate the spectrum shortage problem. However, in the interweave cognitive radio (CR) system, the inherent nature of CSS opens a hole to Byzantine attack, thereby resulting in a significant drop of the CSS security and efficiency. In view of this, a weighted differential sequential single symbol (WD3S) algorithm based on MATLAB platform is developed to accurately identify malicious users (MUs) and benefit useful sensing information from their malicious reports in this paper. In order to achieve this, a dynamic Byzantine attack model is proposed to describe malicious behaviors for MUs in an interweave CR system. On the basis of this, a method of data transmission consistency verification is formulated to evaluate the global decision's correctness and update the trust value (TrV) of secondary users (SUs), thereby accurately identifying MUs. Then, we innovatively reuse malicious sensing information from MUs by the weight allocation scheme. In addition, considering a high spectrum usage of primary network, a sequential and differential reporting way based on a single symbol is also proposed in the process of the sensing information submission. Finally, under various Byzantine attack types, we provide in-depth simulations to demonstrate the efficiency and security of the proposed WD3S.

The Effects of Environmental Dynamism on Relationship Characteristics, Credibility, and Benevolence in Distribution Channel System (환경의 동태성이 유통경로 시스템에서 관계특성, 그리고 신용과 호의에 미치는 영향)

  • Lee, Jong-Tae;Oh, Se-Jo;Sung, Min
    • Journal of Distribution Research
    • /
    • v.11 no.2
    • /
    • pp.29-57
    • /
    • 2006
  • While a number of studies have recognized the importance of environment of channel systems and consequences of changed environment, only limited studies have dealt with this issue theoretically and practically. The purpose of this study is to empirically validate whether one dimension of environment, called dynamism, has an influence on the relationship characteristics such as transaction specific investment opportunism and conflict or not: further, it is designed to delve into whether these relationship characteristics have any influence on one crucial relationship quality, 'trust' and its two constituent dimensions - credibility and benevolence. In order to provide empirical validation, a survey was conducted to 163 sales office managers at a major newspaper publisher in Korea. An analysis of the data retrieved from this survey indicated that while environmental dynamism has a positive influence on the publisher's opportunism and conflict perceived by the sales office managers, it did not show a direct influence on the transaction specific investment made by the publisher. Furthermore, while publisher's transaction specific investment had a positive influence on the credibility and the benevolence respectively, publisher's opportunism and level of sales office conflict had a negative influence on the credibility and the benevolence respectively. Currently, a publisher is facing an unprecedentedly dynamic environment. This study should provide ample implications for the publisher in establishing trust, which is a crucial condition in developing and maintaining a long-term successful relationship with its sales offices.

  • PDF

Fuzzy Inference-based Replication Scheme for Result Verification in Desktop Grids (데스크톱 그리드에서 결과 검증을 위한 퍼지 추론 기반 복제 기법)

  • Gil, Joon-Min;Kim, Hong-Soo;Jung, Soon Young
    • The Journal of Korean Association of Computer Education
    • /
    • v.12 no.4
    • /
    • pp.65-75
    • /
    • 2009
  • The result verification is necessary to support a guarantee for the correctness of the task results be executed by any unspecified resources in desktop grid environments. Typically, voting-based and trust-based result verification schemes have been used in the environments. However, these suffer from two potential problems: waste of resources due to redundant replicas of each task and increase in turnaround time due to the inability to deal with a dynamic changeable execution environment. To overcome these problems, we propose a fuzzy inference-based replication scheme which can adaptively determine the number of replicas per task by using both trusty degree and result return probability of resources. Therefore our proposal can reduce waste of resources by determining the number of replicas meeting with a dynamic execution environment of desktop grids, not to mention an enhancement of turnaround time for entire asks. Simulation results show that our scheme is superior to other ones in terms of turnaround time, the waste of resources, and the number of re-replications per task.

  • PDF