• Title/Summary/Keyword: Exchange & Communication

Search Result 1,204, Processing Time 0.032 seconds

A design of Key Exchange Protocol for User Centered Home Network (사용자 중심의 홈네트워크를 위한 키 교환 프로토콜 설계)

  • 정민아
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.3
    • /
    • pp.654-660
    • /
    • 2004
  • In this paper, we define that pervasive home network, which provides necessary services for user properties and removes distractions to improve the quality of human life. So, user can enjoy home network technology including devices and softwares at any place with no knowledge of networked home, devices, and softwares. In this home network, a mobile agent, called LAFA, can migrate to unfamiliar home network and control the necessary devices. For this environment, we design security management module for authenticating user and home server that access some other home networks, and for protecting text, multimedia data, and mobile agent that are transferred between home networks. The security management module is composed of a key exchange management module and an access control management module, for key exchange management module, we propose a key exchange protocol, which provides multimode of authentication mode and key exchange mode. One of these two modes is selected according to the data type.

Public Acceptance of a Health Information Exchange in Korea

  • Park, Hayoung;Park, Jong Son;Lee, Hye Rin;Kim, Soomin
    • Healthcare Informatics Research
    • /
    • v.24 no.4
    • /
    • pp.359-370
    • /
    • 2018
  • Objectives: We assessed the public acceptance of a health information exchange (HIE) and examined factors that influenced the acceptance and associations among constructs of the Technology Acceptance Model (TAM). Methods: We collected data from a survey of 1,000 individuals in Korea, which was administered through a structured questionnaire. We assessed the validity and reliability of the survey instrument with exploratory factor analysis and Cronbach's alpha coefficients. We computed descriptive statistics to assess the acceptance and performed regression analyses with a structural equation model to estimate the magnitude and significance of influences among constructs of TAM. Results: Eighty-seven percent of the respondents were willing to use the technology, and the average level of agreement with the need for the technology was 4.16 on a 5-point Likert scale. The perception of ease of use of the technology significantly influenced perceptions of usefulness and attitudes about the need for HIE. Perceptions of usefulness influenced attitude and behavioral intention to use HIE, and attitude influenced intention. Age showed a wide range of influences throughout the model, and experience with offline-based information exchange and health status also showed noteworthy influences. Conclusions: The public acceptance of HIE was high, and influences posited by TAM were mostly confirmed by the study results. The study findings indicated a need for an education and communication strategy tailored by population age, health status, and prior experience with offline-based exchange to gain public buy-in for a successful introduction of the technology.

Efficient RSA-Based PAKE Procotol for Low-Power Devices (저전력 장비에 적합한 효율적인 RSA 기반의 PAKE 프로토콜)

  • Lee, Se-Won;Youn, Taek-Young;Park, Yung-Ho;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.23-35
    • /
    • 2009
  • Password-Authenticated Key Exchange (PAKE) Protocol is a useful tool for secure communication conducted over open networks without sharing a common secret key or assuming the existence of the public key infrastructure (PKI). It seems difficult to design efficient PAKE protocols using RSA, and thus many PAKE protocols are designed based on the Diffie-Hellman key exchange (DH-PAKE). Therefore it is important to design an efficient PAKE based on RSA function since the function is suitable for designing a PAKE protocol for imbalanced communication environment. In this paper, we propose a computationally-efficient key exchange protocol based on the RSA function that is suitable for low-power devices in imbalanced environment. Our protocol is more efficient than previous RSA-PAKE protocols, required theoretical computation and experiment time in the same environment. Our protocol can provide that it is more 84% efficiency key exchange than secure and the most efficient RSA-PAKE protocol CEPEK. We can improve the performance of our protocol by computing some costly operations in offline step. We prove the security of our protocol under firmly formalized security model in the random oracle model.

Cancer Control and the Communication Innovation in South Korea: Implications for Cancer Disparities

  • Jung, Minsoo
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.14 no.6
    • /
    • pp.3411-3417
    • /
    • 2013
  • Over the last 10 years, the number of cancer survivors in South Korea has reached nearly one million with a survival rate of 49.4%. However, integrated supportive care for cancer survivors is lagging. One area in which the current cancer control policy needs updating is in the utilization of information and communication technology (ICT). The remarkable progress in the field of ICT over the past 10 years presents exciting new opportunities for health promotion. Recent communication innovations are conducive to the exchange of meta-information, giving rise to a new service area and transforming patients into active medical consumers. Consequently, such innovations encourage active participation in the mutual utilization and sharing of high-quality information. However, these benefits from new ICTs will almost certainly not be equally available to all, leading to so-called communication inequalities where cancer survivors from lower socioeconomic classes will likely have more limited access to the best means of making use of the health information. Therefore, most essentially, emphasis must be placed on helping cancer survivors and their caregivers utilize such advances in ICT to create a more efficient flow of health information, thereby reducing communication inequalities and expanding social support. Once we enhance access to health information and better manage the quality of information, as a matter of fact, we can expect an alleviation of the health inequalities faced by cancer survivors.

Lightweight and adaptable solution for security agility

  • Vasic, Valter;Mikuc, Miljenko;Vukovic, Marin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.1212-1228
    • /
    • 2016
  • Secure communication is an important aspect of today's interconnected environments and it can be achieved by the use of cryptographic algorithms and protocols. However, many existing cryptographic mechanisms are tightly integrated into communication protocols. Issues emerge when security vulnerabilities are discovered in cryptographic mechanisms because their replacement would eventually require replacing deployed protocols. The concept of cryptographic agility is the solution to these issues because it allows dynamic switching of cryptographic algorithms and keys prior to and during the communication. Most of today's secure protocols implement cryptographic agility (IPsec, SSL/TLS, SSH), but cryptographic agility mechanisms cannot be used in a standalone manner. In order to deal with the aforementioned limitations, we propose a lightweight cryptographically agile agreement model, which is formally verified. We also present a solution in the Agile Cryptographic Agreement Protocol (ACAP) that can be adapted on various network layers, architectures and devices. The proposed solution is able to provide existing and new communication protocols with secure communication prerequisites in a straightforward way without adding substantial communication overhead. Furthermore, it can be used between previously unknown parties in an opportunistic environment. The proposed model is formally verified, followed by a comprehensive discussion about security considerations. A prototype implementation of the proposed model is demonstrated and evaluated.

A study on efficient integration model of satellite and underwater communication for improving throughput efficiency (전송효율 향상을 위한 위성 및 수중 통신의 효율적인 융합 모델 연구)

  • Baek, Chang-Uk;Jung, Ji-Won
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.40 no.6
    • /
    • pp.535-541
    • /
    • 2016
  • In this paper, we analyzed efficient decoding scheme with FTN(Faster than Nyquist) method that is transmission method faster than Nyquist theory and increase the throughput. Applying the FTN method to satellite and underwater communication, we proposed an efficient transceiver model. To minimize ISI(Inter-Symbol Interference) induced by FTN signal, turbo equalization algorithms that iteratively exchange probabilistic information between Viterbi equalizer based on BCJR algorithm and LDPC decoder are used in satellite communication. In others, for underwater communication, DFE equalizer and LDPC decoder are concatenated to improve performance.

Power Allocation for Half-duplex Relay-based D2D Communication with QoS guarantee

  • Dun, Hui;Ye, Fang;Jiao, Shuhong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1311-1324
    • /
    • 2019
  • In the traditional cellular network communication, the cellular user and the base station exchange information through the uplink channel and downlink channel. Meanwhile, device-to-device (D2D) users access the cellular network by reusing the channel resources of the cellular users. However, when cellular user channel conditions are poor, not only D2D user cannot reuse its channel resources to access the network, but also cellular user's communication needs cannot be met. To solve this problem, we introduced a novelty D2D communication mechanism in the downlink, which D2D transmitter users as half-duplex (HD) relays to assist the downlink transmission of cellular users with reusing corresponding spectrum. The optimization goal of the system is to make the cellular users in the bad channel state meet the minimum transmission rate requirement and at the same time maximize the throughput of the D2D users. In addition, i for the purpose of improving the efficiency of relay transmission, we use two-antenna architecture of D2D relay to enable receive and transmit signals at the same time. Then we optimized power of base station and D2D relay separately with consideration of backhaul interference caused by two-antenna architectures. The simulation results show that the proposed HD relay strategyis superior to existing HD and full-duplex (FD) models in the aspects of system throughput and power efficiency.

Secure Communication Schemes over ISO/IEEE 11073-20601 for Smart Healthcare Service

  • Kim, Sang Kon;Kim, Tae Kon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.7
    • /
    • pp.2225-2238
    • /
    • 2022
  • For advanced healthcare services, a variety of agents should maintain reliable connections with the manager and communicate personal health and medical information. The ISO/IEEE 11073 standards provide convenient interoperability and the optimized exchange protocol (OEP) supports efficient communication for devices. However, the standard does not specify secure communication, and sensitive personal information is easily exposed through attacks. Malicious attacks may lead to the worst results owing to service errors, service suspension, and deliberate delays. All possible attacks on the communication are analyzed in detail, and the damage is specifically identified. In this study, novel secure communication schemes over the 20601 OEP are proposed by introducing an authentication process while maintaining compatibility with existing devices. The agent performs a secure association with the manager for mutual authentication. However, communication with mutual authentication is not completely free from attacks. Message encryption schemes are proposed for concrete security. The authentication process and secure communication schemes between the secure registered agent (SRA) and the secure registered manager (SRM) are implemented and verified. The experimental analysis shows that the complexities of the SRA and SRM are not significantly different from those of the existing agent and manager.

A Study on Establishing Online Document Communication System by Means of Intranet Web Site (ODCS(Online Document Communication System)인트라넷 웹사이트 구축과정 및 사용자 효과 연구)

  • 양초산
    • Archives of design research
    • /
    • v.17 no.3
    • /
    • pp.167-178
    • /
    • 2004
  • The purpose of this treatise is to show merits and method of establishing Lotte department store design division Online Documents Communication System through illustration of examples of intranet in which internet environment convenient to use for its openness is applied for establishing Design Online Documents Communication System for fundamentals of organization. In this connection merits and effect attainable from establishing Design Outline Documents Communication System of the enterprise as found were as follows: Firstly, it brought about reduction in workload of staffs through sharing various existing resources. It reduced redundant works and enables speedy handling of works. Secondly, it was possible to exchange viewpoints and share information by pertinent parties. Thirdly, by expediting information exchange and communication among persons in charge it was possible to improve work efficiency. Fourthly, it was possible to build and operate such system at relatively low cost on the basis of web browser. Without using any other significant instrument or equipment but by linking it to business network and using existing computer system operation was possible. Fifthly, by common sharing of work exclusive to design room through on-line it was possible to improve professionalism and convenience in data preservation. Through this treatise and survey and study on process for establishing intranet it was possible to find that there were sharing work, improving work efficiency, reducing workload, saving cost and expediting communication to a significant degree.

  • PDF

Design of Integrated Medical Information System Based on The Cloud

  • Lee, Kwang-Cheol;Moon, Seok-Jae;Lee, Jong-Yong;Jung, KyeDong
    • International journal of advanced smart convergence
    • /
    • v.4 no.1
    • /
    • pp.88-92
    • /
    • 2015
  • Today, the medical information system has evolved in the way of integrated healthcare IT information systems. Therefore, it is trying to build advanced U-Healthcare service. Though the U-Healthcare environments is exchanged the information between systems in many cases, however since the each system is different, the integration and exchange of data is difficult. To overcome this problem, in this paper it proposes that we suggests a possible DBaaS(DataBase as a Service) for the heterogeneous integration of medical information management and data exchange. First, the proposed system builds DBaaS cloud by integrating the meta-DB Schema level and DB Schema for each hospital. And, the mapping the schema data and the existing hospital information system is possible using the International Standard HL7. By applying the proposed method to the hospital system, it comes true the efficient exchange of information between the patients, doctors, staffs through the data mapping of the one to multi-system.