• Title/Summary/Keyword: Group Key Distribution

Search Result 229, Processing Time 0.027 seconds

The Design and Verification of Multicast Key Distribution Protocol for Group Communication (그룹 통신을 위한 멀티캐스트 키 분배 프로토콜 설계 및 검증)

  • 김봉한
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.2
    • /
    • pp.31-42
    • /
    • 2000
  • 특성 사용자 그룹에게만 음성과 영상 데이터를 전송할 수 있는 통신 메커니즘을 가진 멀티캐스트는 유니캐스트와 비교해서 통신 링크의 수가 상당히 많으므로 부당한 공격자로부터 신분위장 서비스 부인 공격과 재전송 공격 부인, 트래픽 관찰 공격을 받기가 쉽다. 그러므로 본논문에서는 현재 멀티캐스트 통신을 위해서 제안 및 사용되고 있는 여러 가지 멀티캐스트 라우팅 프로토콜 중에서 보다 효율적인 보안 체계를 구성할 수 있는 공유 트리를 기반으로 하는 코어 기반 트리(CBT: Core Based Tree)를 이용하여 3개로 구성된 그룹키 KEK TEK을 획득함으로서 안전한 멀티캐스트 통신이 가능한 키 분배 프로토콜을 설계하였다 그리고 패트리넷을 이용하여 안전성을 검증하였다.

Secure and Energy-Efficient Join-Leave Operations in ZigBee Network

  • Kim, Bong-Whan;Park, Chang-Seop
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.11
    • /
    • pp.2874-2892
    • /
    • 2013
  • Since security plays an important role in several ZigBee applications, such as Smart Energy and medical sensor applications, ZigBee Specification includes various security mechanisms to protect ZigBee frames and infrastructure. Among them, the Join and Leave operations of ZigBee are investigated in this paper. The current Join-Leave operation is protected by the network key (a kind of group key). We claim it is not adequate to employ the network key for such purpose, and propose a new Join-Leave operation protected by the application link key (a kind of pairwise key), which is based on a more efficient key management scheme than that of ZigBee. Hence, the original Join operation consists of a total of 12 command frames, while the new Join operation consists of only 6 command frames. In particular, the security of the proposed Join-Leave operation is equivalent to or better than that of the original Join-Leave operation. The new Join-Leave operation is extensively analyzed in terms of security and efficiency, and compared with the original Join-Leave operation of ZigBee.

Effects of Three Feeding Systems on Production Performance, Rumen Fermentation and Rumen Digesta Particle Structure of Beef Cattle

  • Liu, Y.F.;Sun, F.F.;Wan, F.C.;Zhao, H.B.;Liu, X.M.;You, W.;Cheng, H.J.;Liu, G.F.;Tan, X.W.;Song, E.L.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.29 no.5
    • /
    • pp.659-665
    • /
    • 2016
  • The effects of three different feeding systems on beef cattle production performance, rumen fermentation, and rumen digesta particle structure were investigated by using 18 Limousin (steers) with a similar body weight ($575{\pm}10kg$) in a 80-d experiment. The animals were equally and randomly divided into three treatment groups, namely, total mixed ration group (cattle fed TMR), SI1 group (cattle fed concentrate firstly then roughage), and SI2 group (cattle fed roughage firstly then concentrate). The results showed that the average daily gain was significantly higher in cattle receiving TMR than in those receiving SI1 and SI2 (p<0.05). Consumption per kg weight gain of concentrate, silage, and combined net energy (NEmf) were significantly decreased when cattle received TMR, unlike when they received SI1 and SI2 (p<0.05), indicating that the feed efficiency of TMR was the highest. Blood urea nitrogen (BUN) was significantly decreased when cattle received TMR compared with that in cattle receiving SI1 (p<0.05), whereas there was no difference compared with that in cattle receiving SI2. Ammonia nitrogen concentration was significantly lower in cattle receiving TMR than in those receiving SI1 and SI2 (p<0.05). The rumen area of cattle that received TMR was significantly larger than that of cattle receiving SI1 (p<0.05), but there was no difference compared with that of cattle receiving SI2. Although there was no significant difference among the three feeding systems in rumen digesta particle distribution, the TMR group trended to have fewer large- and medium-sized particles and more small-sized particles than those in the SI1 and SI2 groups. In conclusion, cattle with dietary TMR showed increased weight gain and ruminal development and decreased BUN. This indicated that TMR feeding was more conducive toward improving the production performance and rumen fermentation of beef cattle.

Study of Document Distribution System Architecture for Digital Secret Document Leakage Prevention (전자기밀문서 유출봉쇄 유통시스템 구조 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.143-158
    • /
    • 2010
  • The illegal leakage of enterprise digital confidential information will threaten the enterprise with bankruptcy. Today since most small-and-medium companies have no capability to fight against illegally compromising their critically confidential documents in spite of knowing the leakage of them, strongly safe distribution system of the digital confidential documents should be designed so in secure as to prevent any malicious intent of embezzlement from accessing the critical information. Current DRM-based protection system is not always perfect to protect the digital secrets, even seems to leave the secrets open. Therefore our study has analyzed the illegal leakage paths that hackers attack against and the vulnerability of the current protection systems. As result, we study the group communication based system architecture satisfying the security conditions to make even legitimate working employee keep out of the confidential documents, without performance degradation. The main idea of this architecture is to stay every secrets in encrypted form; to isolate the encrypted documents from the crypto-key; to associate every entity with one activity and to authenticate every entity with DSA-based public key system; multiple authentication method make hackers too busy to get a privilege to access the secrets with too many puzzle pieces. This paper deal with the basic architectural structure for the above issues.

2-Layered Group Key Management Structure and Protocols using Multi-Core Based Tree (다중 코어 기반 트리를 이용한 2계층 그룹키 관리 구조 및 프로토콜)

  • Cho, Tac-Nam;Kim, Sang-Hee;Eun, Sang-A;Lee, Sang-Ho;Chae, Ki-Joon;Park, Won-Joo;Nah, Jae-Hoon
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.5
    • /
    • pp.583-594
    • /
    • 2002
  • Assuring the security of group communications such as tole-conference and software distribution requires a common group key be shared among the legal members in a secure manner. Especially for large groups with frequent membership change, efficient rekey mechanism is essential for scalability. One of the most popular ways to provide sealable rekey is to partition the group into several subgroups. In this paper, we propose a two-layered key management scheme which combines DEP and CBT, a protocol in which subgroup manager cannot access the multicast data and another that has a multi-core, respectively. We also select sub-group key management protocols suitable for our structure and design new rekey protocols to exclude the subgroup managers from the multicast data. Compared to previous protocols based on CBT, our scheme provides forward secrecy, backward secrecy and scalability. This would reduce the number of encryption and decryption for a rekey message and would improve the efficiency number of rekey messages and the amount of information related to group members that group managers must maintain compared to DEP.

A Clinical Database of Breast Cancer Patients Reveals Distinctive Clinico-pathological Characteristics: a Study From Central China

  • Wang, Lin-Wei;Yang, Gui-Fang;Chen, Jia-Mei;Yang, Fang;Yuan, Jing-Ping;Sun, Sheng-Rong;Chen, Chuang;Hu, Ming-Bai;Li, Yan
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.4
    • /
    • pp.1621-1626
    • /
    • 2014
  • Background: Breast cancer is the most common malignant tumor in females worldwide. Many differences exist in clinico-pathological characteristics of breast cancer patients between China and Western countries. This study aimed to analyze clinico-pathological characteristics of breast cancer from central China. Methods: Clinico-pathological information on breast cancer from three hospitals in central China was collected and analyzed. Results: From 1994 to 2012, 2,525 patients with a median age 50 years were included in this study. The 45-49-year age group and invasive ductal carcinoma not otherwise specified accounted for the highest proportions (19.1%, 480/2,525 and 81.0%, 1,982/2,446). Stages 0-I, II and III accounted for 28.0% (682/2,441), 48.4% (1,180/2,441), and 23.7% (578/2,441), respectively. Distribution of N stage showed that N0 accounted for 53.2% (1,344/2,525), and proportion of N0 rose from 51.1% (157/307) in 30-39-year age group to 64.3% (110/171) in ${\geq}$ 70-year age group, with an average increase of 2.1% in each age group. Modified radical mastectomy, radical mastectomy, breast-conserving surgery and simple mastectomy were performed for 71.8% (1,812/2,525), 18.0% (454/2,525), 5.2% (131/2,525) and 2.6% (66/2,525), respectively. Proportions of breast-conserving surgery in age ${\leq}$ 44-year group (68/132, 51.5%) and simple mastectomy in age ${\geq}$ 60-year group (57/89, 64.0%) were higher than in the other age groups. Breast cancers positive for estrogen receptor accounted for 53.0% (1,107/ 2,112). The comparisons among this study and other reports showed higher proportion of younger patients, lower proportion of breast-conserving surgery and positive estrogen receptor patients in China than western countries. Conclusions: Clinico-pathological characteristics in this study demonstrated clear differences between the center of China than Western countries. Additional classification systems should be developed to guide grading of early breast cancer more accurately, especially for N0 patients. Invasive ductal carcinoma is a focus for intensive research.

A Multi-Level Access Control Scheme on Dynamic Multicast Services (동적 멀티캐스트 서비스상의 다단계 접근통제 기법)

  • 신동명;박희운;최용락
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.6
    • /
    • pp.47-58
    • /
    • 2002
  • The access control techniques, which can control unauthorized members to access to multicast service, have not been studied very often while there are a lot of on-going study on secure multicast architecture, multicast key distribution and sender authentication scheme have been studied. Multi level access control scheme in multicast can be used in a remote secure conference or to provide graduated multimedia services to each customers. In fact, multicast network has its own virtual networks according to different security levels. However, Early schemes are not effective when it protects unauthorized access in multi-access network environment. Furthermore this scheme does not provide us with hierarchical access control mechanism. This paper, therefore, proposes hierarchical access control scheme to provide the effectiveness in network layer by security level comparison. And we also suggests hierarchical key distribution scheme for multi level access control in application layer and effective hierarchical key renewal scheme in dynamic multicast environment which is easy to join and leaving the multicast group.

On the Public Key Cryptosystems over Imaginary Quadratic Fields (복소 이차체위에서의 공개키 암호계에 관한 소고)

  • Kim, Yong-Tae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.4 no.4
    • /
    • pp.270-273
    • /
    • 2009
  • In 1988, Buchmann et al. proposed a public key cryptosystem making use of ideals of the maximal orders in quadra tic fields which may pave the way for a public key cryptosystem using imaginary quadratic non-invertible ideals as generators. Next year, H$\ddot{u}$hnlein, Tagaki et al. published the cryptosystem with trapdoor and conductor prime p over non-maximal orders. On the other hand Kim and Moon proposed a public key cryptosystrem and a key distribution cry ptotsystem over class semigroup in 2003. We, in this paper, introduce and analyze the cryptotsystems mentioned above.

  • PDF

A stress model reflecting the effect of the friction angle on rockbursts in coal mines

  • Fan, Jinyang;Chen, Jie;Jiang, Deyi;Wu, Jianxun;Shu, Cai;Liu, Wei
    • Geomechanics and Engineering
    • /
    • v.18 no.1
    • /
    • pp.21-27
    • /
    • 2019
  • Rockburst disasters pose serious threat to mining safety and underground excavation, especially in China, resulting in massive life-wealth loss and even compulsive closed-down of some coal mines. To investigate the mechanism of rockbursts that occur under a state of static forces, a stress model with sidewall as prototype was developed and verified by a group of laboratory experiments and numerical simulations. In this model, roadway sidewall was simplified as a square plate with axial compression and end (horizontal) restraints. The stress field was solved via the Airy stress function. To track the "closeness degree" of the stress state approaching the yield limit, an unbalanced force F was defined based on the Mohr-Coulomb yield criterion. The distribution of the unbalanced force in the plane model indicated that only the friction angle above a critical value could cause the first failure on the coal in the deeper of the sidewall, inducing the occurrence of rockbursts. The laboratory tests reproduced the rockburst process, which was similar to the prediction from the theoretical model, numerical simulation and some disaster scenes.

Laser decontamination for radioactive contaminated metal surface: A review

  • Qian Wang;Feisen Wang;Chuang Cai;Hui Chen;Fei Ji;Chen Yong;Dasong Liao
    • Nuclear Engineering and Technology
    • /
    • v.55 no.1
    • /
    • pp.12-24
    • /
    • 2023
  • With the improvement of laser technology, the strategic needs of efficient and precise decontamination of various components in nuclear application units can be fulfilled by laser decontamination. The surface contaminants of nuclear facilities mainly exist both as loose contaminated layer and fixed oxide layer. The types of radionuclides and contamination layer thickness are closely related to the operation status of nuclear facilities, which have an important influence on the laser decontamination process. This study reviewed the mechanism of laser surface treatment and the influence of laser process parameters on the decontamination thickness, decontamination factor, decontamination efficiency and the distribution of aerosol particle. Although multiple studies have been performed on the mechanism of laser processing and laser decontamination process, there are few studies on the microscopic process mechanism of laser decontamination and the influence of laser decontamination on surface properties. In particular, the interaction between laser and radioactive contaminants needs more research in the future.