• 제목/요약/키워드: Internet Key Exchange

검색결과 118건 처리시간 0.032초

Degrees of Freedom of Y Channel with Single-Antenna Users: Transmission Scheme and Beamforming Optimization

  • Long, Wei;Gao, Hui;Lv, Tiejun;Yuen, Chau
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권12호
    • /
    • pp.4305-4323
    • /
    • 2014
  • In this paper, we investigate the degrees of freedom (DOF) of the Y channel consisting of three single-antenna users and a two-antenna common access relay, where each user intends to exchange independent messages with the other two users with the assistance of the relay. We show that the DOF of this particular scenario is 1.5. In order to prove this result, we firstly derive a DOF upper bound based on cut-set bound by allowing cooperation among users, which shows that the total DOF is upper bounded by 1.5. Then we propose a novel transmission scheme based on asymmetric signal space alignment (ASSA) to demonstrate the achievability of the upper bound. Theoretical evaluation and numerical results confirm that the upper bound can be achieved by utilizing ASSA, which also proves the optimality of the ASSA-based scheme in terms of DOF. Combining the upper bound and achievability, we conclude that the exact DOF is 1.5. Moreover, we present a novel iterative joint beamforming optimization (I-JBO) algorithm to further improve the sum rate. Numerical simulations have been provided to demonstrate the convergence speed and performance advantage of the I-JBO algorithm.

사물인터넷에서 시각 정보 관리 체계 (A Framework for Time Awareness System in the Internet of Things)

  • 황소영
    • 한국정보통신학회논문지
    • /
    • 제20권6호
    • /
    • pp.1069-1073
    • /
    • 2016
  • 사물인터넷 (Internet of Things: IoT)은 기존의 유선통신을 기반으로 한 인터넷이나 모바일 인터넷보다 진화된 단계로 인터넷에 연결된 기기가 사람의 개입 없이 상호간에 알아서 정보를 주고받아 처리한다. 이를 구현하기 위한 기술 요소로는 유형의 사물과 주위 환경으로부터 정보를 얻는 센싱 기술, 사물이 인터넷에 연결되도록 지원하는 유무선 통신 및 네트워크 인프라 기술, 각종 서비스 분야와 형태에 적합하게 정보를 가공하고 처리하거나 기술을 융합하는 서비스 인터페이스 기술이 핵심이며 이러한 기술을 실현하는데 있어 시각 정보 및 시각 동기 기술은 필수적이라 할 수 있다. 본 논문에서는 컴퓨터 시스템과 기존 인터넷에서 시각 유지 기법을 분석하고 사물인터넷에서 시각 정보 관리에 필요한 요소 기술과 시각 관리 체계를 제시한다.

PCS의 호처리를 이용한 인증서 상태검증 모델 제안 (A Proposal for Certificate Status Validation Using the Call Processing of PCS)

  • 이영숙;원동호;이영교
    • 한국콘텐츠학회논문지
    • /
    • 제5권1호
    • /
    • pp.45-53
    • /
    • 2005
  • 이동통신 사용자들은 PKI를 기반으로 무선 인터넷을 통한 뱅킹, 증권거래, 전자 지불 등의 다양한 서비스를 이용하고 있다. 또한 이동통신 사용자간의 데이터 통신에 대한 필요성도 점차 증가하고 있다. 무선 PKI 환경에서 사용자들은 인증서를 이용하여 사용자 인증, 키 분배, 암 복호화 등을 수행할 수 있으며 그에 따라 이동통신 사용자간의 인증서상태 검증과정도 필요하게 되었다. 이미 개발되어 상용화되어 있는 이동통신용 교환기는 음성 통화를 위주로 설계되었으므로 이를 이용하여 데이터 통신을 하기 위해서는 음성호의 호처리 절차를 이용하여야 한다. 따라서 본 연구에서는 무선 PKI 환경을 이용한 이동통신 사용자간의 데이터 통신에 필요한 인증서상태 검증작업을 호처리 과정 내에서 효율적으로 처리할 수 있는 모델을 PCS(Personal Communication System)를 중심으로 제안하고자 한다.

  • PDF

Financial and Economic Risk Prevention and Countermeasures Based on Big Data and Internet of Things

  • Songyan Liu;Pengfei Liu;Hecheng Wang
    • Journal of Information Processing Systems
    • /
    • 제20권3호
    • /
    • pp.391-398
    • /
    • 2024
  • Given the further promotion of economic globalization, China's financial market has also expanded. However, at present, this market faces substantial risks. The main financial and economic risks in China are in the areas of policy, credit, exchange rates, accounting, and interest rates. The current status of China's financial market is as follows: insufficient attention from upper management; insufficient innovation in the development of the financial economy; and lack of a sound financial and economic risk protection system. To further understand the current situation of China's financial market, we conducted a questionnaire survey on the financial market and reached the following conclusions. A comprehensive enterprise questionnaire from the government's perspective, the enterprise's perspective and the individual's perspective showed that the following problems exist in the financial and economic risk prevention aspects of big data and Internet of Things in China. The political system at the country's grassroots level is not comprehensive enough. The legal regulatory system is not comprehensive enough, leading to serious incidents of loan fraud. The top management of enterprises does not pay enough attention to financial risk prevention. Therefore, we constructed a financial and economic risk prevention model based on big data and Internet of Things that has effective preventive capabilities for both enterprises and individuals. The concept reflected in the model is to obtain data through Internet of Things, use big data for screening, and then pass these data to the big data analysis system at the grassroots level for analysis. The data initially screened as big data are analyzed in depth, and we obtain the original data that can be used to make decisions. Finally, we put forward the corresponding opinions, and their main contents represent the following points: the key is to build a sound national financial and economic risk prevention and assessment system, the guarantee is to strengthen the supervision of national financial risks, and the purpose is to promote the marketization of financial interest rates.

증권거래 패킷의 암복호화와 통합보안관제 분석 (Encryption/Decryption and Enterprise Security Management of Stock Trading Packets)

  • 오원겸;박대우
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2013년도 춘계학술대회
    • /
    • pp.227-230
    • /
    • 2013
  • 인터넷과 모바일 단말기를 이용한 금융거래가 활성화되면서, 인터넷과 모바일기기를 이용한 증권거래가 활성화되고 있다. 증권거래 관련 IT업무를 담당하고 있는 코스콤(증권ISAC)에서는 증권거래와 관련된 정보보안관련 취약점을 분석하며, 통합보안관제시스템을 가동하여 대응하고 있다. 온라인 증권거래는 개인정보보호법의 적용대상이며, 이와 관련 전산시스템들은 주요정보통신기반 시설로 지정되어 있으나, 사용자 부주의, 해킹 등으로 인한 금융상의 피해가 예상된다. 이에 따라 증권거래 패킷의 암복호화, 통합보안관제 및 보안이벤트에 대한 분석을 통해 증권업무와 관련된 정보보안 분야의 주요 취약점에 대한 연구가 필요하다.

  • PDF

Improved Preimage Attacks on RIPEMD-160 and HAS-160

  • Shen, Yanzhao;Wang, Gaoli
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권2호
    • /
    • pp.727-746
    • /
    • 2018
  • The hash function RIPEMD-160 is a worldwide ISO/IEC standard and the hash function HAS-160 is the Korean hash standard and is widely used in Korea. On the basis of differential meet-in-the-middle attack and biclique technique, a preimage attack on 34-step RIPEMD-160 with message padding and a pseudo-preimage attack on 71-step HAS-160 without message padding are proposed. The former is the first preimage attack from the first step, the latter increases the best pseudo-preimage attack from the first step by 5 steps. Furthermore, we locate the linear spaces in another message words and exchange the bicliques construction process and the mask vector search process. A preimage attack on 35-step RIPEMD-160 and a preimage attack on 71-step HAS-160 are presented. Both of the attacks are from the intermediate step and satisfy the message padding. They improve the best preimage attacks from the intermediate step on step-reduced RIPEMD-160 and HAS-160 by 4 and 3 steps respectively. As far as we know, they are the best preimage and pseudo-preimage attacks on step-reduced RIPEMD-160 and HAS-160 respectively in terms of number of steps.

인터넷 패션쇼핑몰의 e-서비스스케이프가 구매의도에 미치는 영향 (Effects of E-servicescape and Positive Emotion on Purchase Intention for Fashion Products)

  • 이채연;박은주
    • 한국생활과학회지
    • /
    • 제22권1호
    • /
    • pp.157-166
    • /
    • 2013
  • The purpose of this paper is to develop and test a conceptual model of purchase intentions, positive emotion, and e-servicescape that is defined as the online environment factors that exist during service delivery. Survey research method was used to gather data regarding consumers' perceptions of e-servicescape. Surveys were administered to 681 college students who experienced purchasing fashion products on the Internet. The results showed that e-servicescapes perceived by fashion consumers were composed of three dimensions: (1) Aesthetic appeal, (2) Ambient conditions, and (3) Layout & functionality. These dimensions of e-servicescape influenced consumers to lead positive emotions and purchase intentions. Additionally, positive emotions constituted a key variable for the purchase intention of fashion products during online exchange. The study revealed that consumers' interpretations of online environments exerted a powerful influence over positive emotion and purchase intentions. Also, it strongly endorsed the view that the purchase intentions of customers were linked to the extent to which they feel positive emotions by the e-service provider. This study provides insights into how consumers' interpretations of e-servicescape affect their subsequent positive emotions and ultimately their intentions to purchase. The findings of this study also have numerous implications for both services managers and internet developers related to fashion products.

IP Security 엔진을 위한 규칙기반 보안평가 시스템의 설계 및 구현 (A Design and Implementation of A Rule-based Security Evaluation System for W Security Engine)

  • 권혁찬;현정식;김상춘;나재훈;손승원
    • 정보처리학회논문지C
    • /
    • 제9C권3호
    • /
    • pp.367-374
    • /
    • 2002
  • IPsec은 인터넷에서 필수적인 암호와 인증 서비스를 구조적으로 제공하며, 동시에 안전한 키교환이나 재현공격 등을 방어할 수 있는 메커니즘을 제공하는 프로토콜로서, 현재 다양한 플랫폼에서 구현 중에 있다. 그러나 현재가지 IPsec엔진이 탑재된 서버들이 제대로 동작하는지 그리고 보안서비스를 적절히 제공하는지를 평가하기 위한 도구는 존재하지 않고 있다. 따라서 본 논문에서는 IPsec엔진의 보안성을 평가하기 위한 자동화된 규칙기반 보안평가 시스템을 설계 및 구현하였다. 본 시스템은 Widows와 UNIX 환경에서 수행이 가능하며 Java와 C언어로 구현되었다.

Lightweight and adaptable solution for security agility

  • Vasic, Valter;Mikuc, Miljenko;Vukovic, Marin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권3호
    • /
    • pp.1212-1228
    • /
    • 2016
  • Secure communication is an important aspect of today's interconnected environments and it can be achieved by the use of cryptographic algorithms and protocols. However, many existing cryptographic mechanisms are tightly integrated into communication protocols. Issues emerge when security vulnerabilities are discovered in cryptographic mechanisms because their replacement would eventually require replacing deployed protocols. The concept of cryptographic agility is the solution to these issues because it allows dynamic switching of cryptographic algorithms and keys prior to and during the communication. Most of today's secure protocols implement cryptographic agility (IPsec, SSL/TLS, SSH), but cryptographic agility mechanisms cannot be used in a standalone manner. In order to deal with the aforementioned limitations, we propose a lightweight cryptographically agile agreement model, which is formally verified. We also present a solution in the Agile Cryptographic Agreement Protocol (ACAP) that can be adapted on various network layers, architectures and devices. The proposed solution is able to provide existing and new communication protocols with secure communication prerequisites in a straightforward way without adding substantial communication overhead. Furthermore, it can be used between previously unknown parties in an opportunistic environment. The proposed model is formally verified, followed by a comprehensive discussion about security considerations. A prototype implementation of the proposed model is demonstrated and evaluated.

Intermedia Synchronization Protocol for Continuous Media Using MPEG-4 in Mobile Distributed Systems

  • Dominguez, Eduardo Lopez;Hernandez, Saul Eduardo Pomares;Gil, Pilar Gomez;Calleja, Jorge De La;Benitez, Antonio;Marin-Hernandez, Antonio
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권6호
    • /
    • pp.1689-1706
    • /
    • 2012
  • The preservation of temporal dependencies among a group of processes that exchange continuous media at runtime is a key issue for emerging mobile distributed systems (MDS), such as monitoring of biosignals and interactive multiuser games. Although several works are oriented to satisfy temporal dependencies, most of them are not suitable for MDSs. In general, an MDS is characterized by the absence of global references (e.g. shared memory and wall clock), host mobility, limited processing and storage capabilities in mobile hosts, and limited bandwidth on wireless communication channels. This paper proposes an asymmetric synchronization protocol to be used at runtime in an MDS without using a common reference. One main aspect of our synchronization protocol is that it translates temporal constraints to causal dependencies of the continuous media data as seen by the mobile hosts. We simulate the protocol by considering a cellular network environment and by using MPEG-4 encoders. The simulation results show that our protocol is effective in reducing the synchronization error. In addition, the protocol is efficient in terms of processing and storage costs at the mobile devices, as well as in the overhead attached per message across the wired and wireless channels.