• Title/Summary/Keyword: Group Key Agreement

Search Result 86, Processing Time 0.024 seconds

Security Issues on Machine to Machine Communications

  • Lai, Chengzhe;Li, Hui;Zhang, Yueyu;Cao, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.498-514
    • /
    • 2012
  • Machine to machine (M2M) communications is the hottest issue in the standardization and industry area, it is also defined as machine-type communication (MTC) in release 10 of the 3rd Generation Partnership Project (3GPP). Recently, most research have focused on congestion control, sensing, computing, and controlling technologies and resource management etc., but there are few studies on security aspects. In this paper, we first introduce the threats that exist in M2M system and corresponding solutions according to 3GPP. In addition, we present several new security issues including group access authentication, multiparty authentication and data authentication, and propose corresponding solutions through modifying existing authentication protocols and cryptographic algorithms, such as group authentication and key agreement protocol used to solve group access authentication of M2M, proxy signature for M2M system to tackle authentication issue among multiple entities and aggregate signature used to resolve security of small data transmission in M2M communications.

Removal of Uranium from Uranium Plant Wastewater Using Zero-Valent Iron in an Ultrasonic Field

  • Li, Jing;Zhang, Libo;Peng, Jinhui;Hu, Jinming;Yang, Lifeng;Ma, Aiyuan;Xia, Hongying;Guo, Wenqian;Yu, Xia
    • Nuclear Engineering and Technology
    • /
    • v.48 no.3
    • /
    • pp.744-750
    • /
    • 2016
  • Uranium removal from uranium plant wastewater using zero-valent iron in an ultrasonic field was investigated. Batch experiments designed by the response surface methodology (RSM) were conducted to study the effects of pH, ultrasonic reaction time, and dosage of zero-valent iron on uranium removal efficiency. From the experimental data obtained in this work, it was found that the ultrasonic method employing zero-valent iron powder effectively removes uranium from uranium plant wastewater with a uranium concentration of $2,772.23{\mu}g/L$. The pH ranges widely from 3 to 7 in the ultrasonic field, and the prediction model obtained by the RSM has good agreement with the experimental results.

Implementation of key establishment protocol using Signcryption for Secure RTP

  • Kim, Hyung-Chan;Kim, Jong-Won;Lee, Dong-Ik
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10c
    • /
    • pp.439-441
    • /
    • 2002
  • Real-time Transport Protocol (RTP) is widely used in VoIP stacks charging the multimedia data delivery. Concerning with payload protection of RTP packets, Secure RTP has been discussed in IETF AVT group to provide confidentiality and authentication features using block ciphering and message authentication coding. However, Secure RTP only concentrates on payload protection. Signcryption is a good candidate for key agreement. This paper proposes a key establishment protocol using Signcryption and shows example implementation of a secure VoIP application based on Secure RTP with the proposed scheme.

  • PDF

Profit-Maximizing Virtual Machine Provisioning Based on Workload Prediction in Computing Cloud

  • Li, Qing;Yang, Qinghai;He, Qingsu;Kwak, Kyung Sup
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.4950-4966
    • /
    • 2015
  • Cloud providers now face the problem of estimating the amount of computing resources required to satisfy a future workload. In this paper, a virtual machine provisioning (VMP) mechanism is designed to adapt workload fluctuation. The arrival rate of forthcoming jobs is predicted for acquiring the proper service rate by adopting an exponential smoothing (ES) method. The proper service rate is estimated to guarantee the service level agreement (SLA) constraints by using a diffusion approximation statistical model. The VMP problem is formulated as a facility location problem. Furthermore, it is characterized as the maximization of submodular function subject to the matroid constraints. A greedy-based VMP algorithm is designed to obtain the optimal virtual machine provision pattern. Simulation results illustrate that the proposed mechanism could increase the average profit efficiently without incurring significant quality of service (QoS) violations.

Mutual Authentication and Key Agreement Scheme between Lightweight Devices in Internet of Things (사물 인터넷 환경에서 경량화 장치 간 상호 인증 및 세션키 합의 기술)

  • Park, Jiye;Shin, Saemi;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.9
    • /
    • pp.707-714
    • /
    • 2013
  • IoT, which can be regarded as an enhanced version of M2M communication technology, was proposed to realize intelligent thing to thing communications by utilizing Internet connectivity. Things in IoT are generally heterogeneous and resource constrained. Also such things are connected with each other over LLN(low power and lossy Network). Confidentiality, mutual authentication and message origin authentication are required to make a secure service in IoT. Security protocols used in traditional IP Networks cannot be directly adopted to resource constrained devices in IoT. Under the respect, a IETF standard group proposes to use lightweight version of DTLS protocol for supporting security services in IoT environments. However, the protocol can not cover up all of very constrained devices. To solve the problem, we propose a scheme which tends to support mutual authentication and session key agreement between devices that contain only a single crypto primitive module such as hash function or cipher function because of resource constrained property. The proposed scheme enhances performance by pre-computing a session key and is able to defend various attacks.

Is the RCEP a Cornerstone or Just Collaboration? Regional General Equilibrium Model Based on GAMS

  • Ahmed, Yosri Nasr;Delin, Huang;Reeberg, Benito Giovanni;Shaker, Victor
    • Journal of Korea Trade
    • /
    • v.24 no.1
    • /
    • pp.171-207
    • /
    • 2020
  • Purpose - This paper investigates the potential effect of the Regional Comprehensive Economic Partnership (RCEP) on trade liberalization among member countries in order to answer key questions in our research on whether the RCEP will be a cornerstone or just collaboration. Furthermore, it aims to measure the likely magnitude of the economic impact it has on its members. Design/methodology - Toward achieving research objectives, we developed a regional CGE model based on the GTAP 9 database. Findings - The simulation results show Korea, Australia, India, and Japan ranked the top countries with an average growth in GDP of 0.38 %, 0.36%, 0.29%, and 0.23%, respectively. Moreover, China and New Zealand followed with a percentage of 0.12% each. The lower economic performing group is the ASEAN group due to a contraction in GDP by 0.13%. Accordingly, there was a positive impact of the RCEP agreement on all member states, as empirically demonstrated. Furthermore, Korea is one of the countries that will benefit most from joining this agreement. Finally, this agreement is important; it has many economic benefits to member states, but it is not a cornerstone. Originality/value - The examination of the quantitative effects of tariff removal among the RCEP's countries is its value. We will address all member countries of the convention simultaneously using a regional CGE model GAMS language, where we employed a Mathematical Programming System for General Equilibrium (MPSGE) to establish a Regional CGE model. This study is directed to policymakers looking at evaluating RCEP agreement.

MAC Layer Based Certificate Authentication for Multiple Certification Authority in MANET

  • Sekhar, J. Chandra;Prasad, Ramineni Sivarama
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.3 no.5
    • /
    • pp.298-305
    • /
    • 2014
  • In this study, a novel Randomly Shifted Certification Authority Authentication protocol was used in ad hoc networks to provide authentication by considering the MAC layer characteristics. The nodes achieve authentication through the use of public key certificates issued by a CA, which assures the certificate's ownership. As a part of providing key management, the active CA node transfers the image of the stored public keys to other idle CA nodes. Finally the current active CA randomly selects the ID of the available idle CA and shifts the CA ownership by transferring it. Revoking is done if any counterfeit or duplicate non CA node ID is found. Authentication and integrity is provided by preventing MAC control packets, and Enhanced Hash Message Authentication Code (EHMAC) can be used. Here EHMAC with various outputs is introduced in all control packets. When a node transmits a packet to a node with EHMAC, verification is conducted and the node replies with the transmitter address and EHMAC in the acknowledgement.

An Group-based Security Protocol for Machine Type Communications in LTE-Advanced (LTE-Advanced에서의 Machine Type Communications을 위한 그룹 기반 보안 프로토콜)

  • Choi, Dae-Sung;Choi, Hyoung-Kee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.885-896
    • /
    • 2013
  • MTC(Machine Type Communications), providing a variety of services anytime and anywhere by connecting the cellular network to the machine and things without human intervention, is being considered as a major challenge of the next-generation communications. Currently, When a massive MTC devices simultaneously connect to the network, each MTC device needs an independent access authentication process. Because of this process, authentication signaling congestion and overload problems will cause in LTE-Advanced. In this paper, we propose a group-based authentication protocol and a key management protocol. For managing the MTC devices as group units, the proposed protocol elects a group leader and authentications only once with the core network. After the authentication is completed, a group leader manages the rest members and MME(Mobility Management Entity) by constructing a binary tree. Finally, the propose protocol analysis show that the proposed protocol not only can reduces the authentication signaling which generated in between the MTC devices and the core network but also can manages the MTC devices, efficiently.

An Efficient Group Key Agreement Protocol using a Tree (트리를 이용한 효율적인 그룹키 동의 프로토콜)

  • 박영희;정병천;윤현수
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.77-80
    • /
    • 2002
  • 그룹에 속한 멤버들만이 통신하고자 하는 그룹웨어 응용프로그램이 보안상 중요한 문제로 인식되면서, 그룹키를 안전하게 생성하여 나누어 갖는 것이 필요하게 되었다. 본 논문은 어떤 그룹에 속한 모든 멤버들이 잘 알려진 두 멤버간의 Diffie-Hellman의 키 교환 프로토콜을 이용하여, 모든 메시지들을 안전하게 전달함으로써 그룹키를 나누어 갖는 새로운 그룹키 동의 프로토콜을 제안한다. 이 프로토콜은 완전 이진 트리를 이용하여 기존의 많은 양의 모듈러 멱승 연산을 일부 곱셈 연산으로 전환함으로써, 그룹키를 만드는데 있이 모듈러 멱승 계산량을 줄이는데 효과적이다.

  • PDF

Theoretical Studies on Mechanism and Kinetics of the Hydrogen-Abstraction Reaction of CF3CH2CHO with OH Radicals

  • Ci, Cheng-Gang;Yu, Hong-Bo;Wan, Su-Qin;Liu, Jing-Yao;Sun, Chia-Chung
    • Bulletin of the Korean Chemical Society
    • /
    • v.32 no.4
    • /
    • pp.1187-1194
    • /
    • 2011
  • The hydrogen abstraction reaction of $CF_3CH_2CHO$ + OH has been studied theoretically by dual-level direct dynamics method. Two stable conformers, trans- and cis-$CF_3CH_2CHO$, have been located, and there are four distinct OH hydrogen-abstraction channels from t-$CF_3CH_2CHO$ and two channels from c-$CF_3CH_2CHO$. The required potential energy surface information for the kinetic calculation was obtained at the MCG3-MPWB//M06-2X/aug-cc-pVDZ level. The rate constants, which were calculated using improved canonical transitionstate theory with small-curvature tunneling correction (ICVT/SCT) were fitted by a four-parameter Arrhenius equation. It is shown that the reaction proceeds predominantly via the H-abstraction from the -CHO group over the temperature range 200-2000 K. The calculated rate constants were in good agreement with the experimental data between 263 and 358 K.