• 제목/요약/키워드: Key Distribution Scheme

검색결과 197건 처리시간 0.026초

Secure and Energy-Efficient Join-Leave Operations in ZigBee Network

  • Kim, Bong-Whan;Park, Chang-Seop
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권11호
    • /
    • pp.2874-2892
    • /
    • 2013
  • Since security plays an important role in several ZigBee applications, such as Smart Energy and medical sensor applications, ZigBee Specification includes various security mechanisms to protect ZigBee frames and infrastructure. Among them, the Join and Leave operations of ZigBee are investigated in this paper. The current Join-Leave operation is protected by the network key (a kind of group key). We claim it is not adequate to employ the network key for such purpose, and propose a new Join-Leave operation protected by the application link key (a kind of pairwise key), which is based on a more efficient key management scheme than that of ZigBee. Hence, the original Join operation consists of a total of 12 command frames, while the new Join operation consists of only 6 command frames. In particular, the security of the proposed Join-Leave operation is equivalent to or better than that of the original Join-Leave operation. The new Join-Leave operation is extensively analyzed in terms of security and efficiency, and compared with the original Join-Leave operation of ZigBee.

A New Fuzzy Key Generation Method Based on PHY-Layer Fingerprints in Mobile Cognitive Radio Networks

  • Gao, Ning;Jing, Xiaojun;Sun, Songlin;Mu, Junsheng;Lu, Xiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권7호
    • /
    • pp.3414-3434
    • /
    • 2016
  • Classical key generation is complicated to update and key distribution generally requires fixed infrastructures. In order to eliminate these restrictions researchers have focused much attention on physical-layer (PHY-layer) based key generation methods. In this paper, we present a PHY-layer fingerprints based fuzzy key generation scheme, which works to prevent primary user emulation (PUE) attacks and spectrum sensing data falsification (SSDF) attacks, with multi-node collaborative defense strategies. We also propose two algorithms, the EA algorithm and the TA algorithm, to defend against eavesdropping attacks and tampering attacks in mobile cognitive radio networks (CRNs). We give security analyses of these algorithms in both the spatial and temporal domains, and prove the upper bound of the entropy loss in theory. We present a simulation result based on a MIMO-OFDM communication system which shows that the channel response characteristics received by legitimates tend to be consistent and phase characteristics are much more robust for key generation in mobile CRNs. In addition, NIST statistical tests show that the generated key in our proposed approach is secure and reliable.

Open IPTV 환경에서 재암호화 과정 없는 댁내 컨텐츠 분배를 위한 키관리 기법 (A Key Management Scheme without Re-encryption for Home-domain Contents Distribution in Open IPTV Environments)

  • 정서현;노효선;이현우;이정현;정수환
    • 한국컴퓨터정보학회논문지
    • /
    • 제15권7호
    • /
    • pp.57-66
    • /
    • 2010
  • 최근 IPTV 환경이 점차 개방형 IPTV로 발전함에 따라, 댁내에서 사용되는 IPTV 단말의 경우도 다양한 형태로 발전하고 있다. 이러한 환경에서 사용자는 노트북, 휴대폰, PDA와 같은 댁내에 존재하는 다양한 IPTV 서비스 가용 단말을 통해 IPTV를 시청할 수 있게 된다. 하지만, 방송 콘텐츠보호를 위해 셋탑박스 (STB)에 탑재된 CAS 기술로 인해 같은 댁내에서도 각 단말의 개수만큼의 STB를 필요로 하거나, STB에 연결가능한 모든 단말에는 CAS가 해제된 상태로 무제한 제공하여야 하는 것이 현재의 기술 수준이다. 본 논문에서는 추가적인 STB 설치 없이 댁내 사용자가 선택한 IPTV 가용 단말들로 컨텐츠를 재분배함과 동시에 서비스 사업자가 복수의 사용자 단말에 대하여 수신제어가 가능한 기술을 제안한다. 제안 기법은 RSA 서명의 개인키 분할 방식을 사용하여 STB에서 댁내 IPTV 단말로 전달되는 컨텐츠를 기존 CAS 시스템을 통해 스크램블링된 내용 그대로 재암호화과정 없이 전달할 수 있다. 따라서, 제안기법은 STB에서 사용자 단말 구간에 재암호화 기법을 활용하여 콘텐츠를 분배하는 기존 기법에 대비하여, 기존의 보안 수준을 유지하면서도 계산량 및 전송량 측면에서 기존 기술과 비교하여 많은 성능개선과 함께, 댁내에 재분배되는 컨텐츠에 대한 불법적인 유출을 방지하는 효과도 부수적으로 제공한다.

정적 무선 센서 네트워크를 위한 강한 연결성을 가진 계층적 그리드 기반의 키 선분배 기법 (Strongly-Connected Hierarchical Grid-Based Pairwise Key Predistribution Scheme for Static Wireless Sensor Networks)

  • 양대헌;모하이센 아브델아지즈
    • 대한전자공학회논문지TC
    • /
    • 제43권7호
    • /
    • pp.14-23
    • /
    • 2006
  • 무선 센서 네트워크(Wireless Sensor Network, WSN)는 작고 값이 싸지만 매우 제한된 자원을 가진 많은 수의 센서로 구성된다. 이러한 자원의 부종으로 인하여 공개키 암호화방식은 WSN에 사용하기 적합하지 않으며, 비밀키 암호화방식을 적용시키기 위하여는 키 관리와 선분배 기법이 필요하다. 많은 키 선분배 기법이 제안되었지만 대부분의 이러한 기법은 실제 WSN의 환경을 충분히 고려하지 않고 있다. 이 논문에서는 적당한 통신량과 연결을 고려한 WSN을 위하여 계층적 그리드(Grid)를 기반으로 하는 보안 프레임워크를 제안한다. 프레임워크의 보안성을 검증하기 위하여 간단한 키 개체 분배 기법을 적용하였으며, WSN에서 가능한 보안 위협에 대하여 분석하였다.

설명기반 유전자알고리즘을 활용한 경영성과 데이터베이스이 데이터마이닝 (Data-Mining in Business Performance Database Using Explanation-Based Genetic Algorithms)

  • 조성훈;정민용
    • 경영과학
    • /
    • 제18권1호
    • /
    • pp.135-145
    • /
    • 2001
  • In recent environment of dynamic management, there is growing recognition that information and knowledge management systems are essential for efficient/effective decision making by CEO. To cope with this situation, we suggest the Data-Miming scheme as a key component of integrated information and knowledge management system. The proposed system measures business performance by considering both VA(Value-Added), which represents stakeholder’s point of view and EVA (Economic Value-Added), which represents shareholder’s point of view. To mine the new information & Knowledge discovery, we applied the improved genetic algorithms that consider predictability, understandability (lucidity) and reasonability factors simultaneously, we use a linear combination model for GAs learning structure. Although this model’s predictability will be more decreased than non-linear model, this model can increase the knowledge’s understandability that is meaning of induced values. Moreover, we introduce a random variable scheme based on normal distribution for initial chromosomes in GAs, so we can expect to increase the knowledge’s reasonability that is degree of expert’s acceptability. the random variable scheme based on normal distribution uses statistical correlation/determination coefficient that is calculated with training data. To demonstrate the performance of the system, we conducted a case study using financial data of Korean automobile industry over 16 years from 1981 to 1996, which is taken from database of KISFAS (Korea Investors Services Financial Analysis System).

  • PDF

시간축 서브밴드 해석을 이용한 적응적 움직임 추정에 관한 연구 (An adaptive motion estimation based on the temporal subband analysis)

  • 임중곤;정재호
    • 한국통신학회논문지
    • /
    • 제21권6호
    • /
    • pp.1361-1369
    • /
    • 1996
  • Motion estimation is one of the key components for high quality video coding. In this paper, a new motion estimation scheme for MPEG-like video coder is suggested. The proposed temporally adaptive motion estimation scheme consists of five functional blocks: Temporal subband analysis (TSBA), extraction of temporal information, scene change detection (SCD), picture type replacement (PTR), and temporally adapted block matching algorithm (TABMA). Here all the functional components are based on the temporal subband analysis. In this papre, we applied the analysis part of subband decompostion to the temporal axis of moving picture sequence, newly defined the temporal activity distribution (TAD) and average TAD, and proposed the temporally adapted block matching algorithm, the scene change detection algorithm and picture type replacement algorithm which employed the results of the temporal subband analysis. A new block matching algorithm TABMA is capable of controlling the block matching area. According to the temporal activity distribution of objects, it allocates the search areas nonuniformly. The proposed SCD and PTR can prevent unavailable motion prediction for abrupt scene changes. Computer simulation results show that the proposed motion estimation scheme improve the quality of reconstructed sequence and reduces the number of block matching trials to 40% of the numbers of trials in conventional methods. The TSBA based scene change detection algorithm can detect the abruptly changed scenes in the intentionally combined sequence of this experiment without additional computations.

  • PDF

MEDICI 시뮬레이터를 이용한 DRAM의 Refresh 시간 개선에 관한 연구 (A Study on Refresh Time Improvement of DRAM using the MEDICI Simulator)

  • 이용희;이천희
    • 한국시뮬레이션학회논문지
    • /
    • 제9권4호
    • /
    • pp.51-58
    • /
    • 2000
  • The control of the data retention time is a main issue for realizing future high density dynamic random access memory. The novel junction process scheme in sub-micron DRAM cell with STI(Shallow Trench Isolation) has been investigated to improve the tail component in the retention time distribution which is of great importance in DRAM characteristics. In this' paper, we propose the new implantation scheme by gate-related ion beam shadowing effect and buffer-enhanced ${\Delta}Rp$ (projected standard deviation) increase using buffered N-implantation with tilt and 4X(4 times)-rotation that is designed on the basis of the local-field-enhancement model of the tail component. We report an excellent tail improvement of the retention time distribution attributed to the reduction of electric field across the cell junction due to the redistribution of N-concentration which is Intentionally caused by ion Beam Shadowing and Buffering Effect using tilt implantation with 4X-rotation. And also, we suggest the least requirements for adoption of this new implantation scheme and the method to optimize the key parameters such as tilt angle, rotation number, Rp compensation and Nd/Na ratio. We used MEDICI Simulator to confirm the junction device characteristics. And measured the refresh time using the ADVAN Probe tester.

  • PDF

무선 네트워크를 위한 분산형 비밀 키 추출 방식 (A Novel Distributed Secret Key Extraction Technique for Wireless Network)

  • 임상훈;전형석;하정석
    • 한국통신학회논문지
    • /
    • 제39A권12호
    • /
    • pp.708-717
    • /
    • 2014
  • 본 연구에서는 무선 네트워크를 위하여 키 분배 관리 기반구조에 의존하지 않으며 완전 자율적이고 분산 구조의 초경량 보안 키 분배 방식을 제안하였다. 제안된 방식은 밥과 엘리스라 불리는 두 명의 적법한 사용자(legitimate users)들이 시분할 이중통신 (TDD, Time Division Duplex)방식으로 통신을 수행한다고 가정하며 채널의 쌍대성(reciprocity)에 의하여 상관성 (correlation)이 큰 무선 채널 이득을 가지는 것으로 가정하였다. 이러한 무선채널 이득을 두 적법한 사용자가 각자 독립적으로 양자화하여 얻은 무작위 비트 배열의 쌍을 생성하고 이를 보안 키로 사용하는 방식을 제안한다. 특히, 본 논문에서는 이러한 키 분배 프로토콜을 위한 적응형 양자화 기법을 제안하였다. 제안된 기법은 채널의 변화에 따라 양자화 임계값을 조정함으로써 앨리스와 밥에 의해 생성된 비트 배열 사이의 불일치 확률을 줄일 수 있는 장점을 가지고 있다. 또한 BCH 부호와 같은 실용적인 저 복잡도 부호를 사용하여 비트 배열의 쌍 간의 불일치를 정정하고 앨리스와 밥이 공유하게 될 보안키를 생성한다. 비밀 키 추출효율을 최대화하기 위해 양자화 단계와 BCH 부호의 부호율을 최적화시켰으며, 제안된 보안키 추출 시스템을 802.11a 기반의 무선 네트워크 카드를 이용하여 구현하였다. 하드웨어 기반의 실험을 통해 실내 환경에서 초 당 1비트 이상의 보안 키를 획득하는 것이 가능함을 실험적으로 보였다.

Optimal layout of long-gauge sensors for deformation distribution identification

  • Zhang, Qingqing;Xia, Qi;Zhang, Jian;Wu, Zhishen
    • Smart Structures and Systems
    • /
    • 제18권3호
    • /
    • pp.389-403
    • /
    • 2016
  • Structural deflection can be identified from measured strains from long gague sensors, but the sensor layout scheme greatly influences on the accuracy of identified resutls. To determine the optimal sensor layout scheme for accurate deflection identification of the tied arch bridge, the method of optimal layout of long-gauge fiber optic sensors is studied, in which the characteristic curve is first developed by using the bending macro-strain curve under multiple target load conditions, then optimal sensor layout scheme with different number of sensors are determined. A tied arch bridge is studied as an example to verify the effectiveness and robustness of the proposed method for static and dynamic deflection identification.

DCT and Homomorphic Encryption based Watermarking Scheme in Buyer-seller Watermarking Protocol

  • Seong, Teak-Young;Kwon, Ki-Chang;Lee, Suk-Hwan;Moon, Kwang-Seok;Kwon, Ki-Ryong
    • 한국멀티미디어학회논문지
    • /
    • 제17권12호
    • /
    • pp.1402-1411
    • /
    • 2014
  • Buyer-seller watermarking protocol is defined as the practice of imperceptible altering a digital content to embed a message using watermarking in the encryption domain. This protocol is acknowledged as one kind of copyright protection techniques in electronic commerce. Buyer-seller watermarking protocol is fundamentally based on public-key cryptosystem that is operating using the algebraic property of an integer. However, in general usage, digital contents which are handled in watermarking scheme mostly exist as real numbers in frequency domain through DCT, DFT, DWT, etc. Therefore, in order to use the watermarking scheme in a cryptographic protocol, digital contents that exist as real number must be transformed into integer type through preprocessing beforehand. In this paper, we presented a new watermarking scheme in an encrypted domain in an image that is based on the block-DCT framework and homomorphic encryption method for buyer-seller watermarking protocol. We applied integral-processing in order to modify the decimal layer. And we designed a direction-adaptive watermarking scheme by analyzing distribution property of the frequency coefficients in a block using JND threshold. From the experimental results, the proposed scheme was confirmed to have a good robustness and invisibility.