• Title/Summary/Keyword: Key Exchange System

검색결과 228건 처리시간 0.023초

A novel ID-based multi-domain handover protocol for mesh points in WMNs

  • Zhang, Xue;Li, Guangsong;Han, Wenbao;Ji, Huifang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권7호
    • /
    • pp.2512-2529
    • /
    • 2015
  • Wireless mesh networks (WMNs) provide an efficient and flexible method to the field of wireless networking, but also bring many security issues. A mesh point may lose all of its available links during its movement. Thus, the mesh point needs to handover to a new mesh point in order to obtain access to the network again. For multi-domain WMNs, we proposed a new ID-based signcryption scheme and accordingly present a novel ID-based handover protocol for mesh points. The mutual authentication and key establishment of two mesh points which belong to different trust domains can be achieved by using a single one-round message exchange during the authentication phase. The authentication server is not involved in our handover authentication protocol so that mutual authentication can be completed directly by the mesh points. Meanwhile, the data transmitted between the two mesh points can be carried by the authentication messages. Moreover, there are no restrictions on the PKG system parameters in our proposed multi-domain ID-based signcryption scheme so our handover scheme can be easily applied to real WMNs circumstances. Security of the signcryption scheme is proved in the random oracle model. It shows that our protocol satisfies the basic security requirements and is resistant to existing attacks based on the security of the signcryption. The analysis of the performance demonstrates that the protocol is efficient and suitable for the multi-domain WMNs environment.

A Lightweight Hardware Accelerator for Public-Key Cryptography (공개키 암호 구현을 위한 경량 하드웨어 가속기)

  • Sung, Byung-Yoon;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • 제23권12호
    • /
    • pp.1609-1617
    • /
    • 2019
  • Described in this paper is a design of hardware accelerator for implementing public-key cryptographic protocols (PKCPs) based on Elliptic Curve Cryptography (ECC) and RSA. It supports five elliptic curves (ECs) over GF(p) and three key lengths of RSA that are defined by NIST standard. It was designed to support four point operations over ECs and six modular arithmetic operations, making it suitable for hardware implementation of ECC- and RSA-based PKCPs. In order to achieve small-area implementation, a finite field arithmetic circuit was designed with 32-bit data-path, and it adopted word-based Montgomery multiplication algorithm, the Jacobian coordinate system for EC point operations, and the Fermat's little theorem for modular multiplicative inverse. The hardware operation was verified with FPGA device by implementing EC-DH key exchange protocol and RSA operations. It occupied 20,800 gate equivalents and 28 kbits of RAM at 50 MHz clock frequency with 180-nm CMOS cell library, and 1,503 slices and 2 BRAMs in Virtex-5 FPGA device.

Concurrent Engineering System for an Automation of Wiring Harness Design (전장 설계 자동화를 위한 동시공학 시스템)

  • 이수홍;최두선
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • 제4권2호
    • /
    • pp.32-49
    • /
    • 1996
  • An approach to providing computational support for concurrent design is discussed in the context of an automobile wiring harness design problem. Key issues include the development of an architecture that supports collaboration among specialists, the development of hierarchical representations that capture different characteristics of the design, and decomposition of tasks to achieve a tradeoff between efficiency and robustness of the system. We present an architecture in which the main design tasks are supported by agents-asynchronous and semi-autonomous modules that automate routine design tasks and provide specialized interfaces for working on particular aspects of the design. The agent communication and coordination mechanisms permit members of an engineering team to work concurrently, at different levels of detail and of different versions of the design. The design is represented hierarchically, with detailed models maintained by the participating agents. In conjunction with the architecture and design representations, issues pertaining to the exchange of information among different views of the design, management of dependencies and constraints, and propagation of design changes are discussed.

  • PDF

First Principles Computational Study of Surface Reactions Toward Design Concepts of High Functional Electrocatalysts for Oxygen Reduction Reaction in a Fuel Cell System

  • Hwang, Jeemin;Noh, Seunghyo;Kang, Joonhee;Han, Byungchan
    • Journal of Surface Science and Engineering
    • /
    • 제50권1호
    • /
    • pp.1-9
    • /
    • 2017
  • Design of novel materials in renewable energy systems plays a key role in powering transportation vehicles and portable electronics. This review introduces the research work of first principles-based computational design for the materials over the last decade to accomplish the goal with less financial and temporal cost beyond the conventional approach, especially, focusing on electrocatalyst toward a proton exchange membrane fuel cell (PEMFC). It is proposed that the new method combined with experimental validation, can provide fundamental descriptors and mechanical understanding for optimal efficiency control of a whole system. Advancing these methods can even realize a computational platform of the materials genome, which can substantially reduce the time period from discovery to commercialization into markets of new materials.

Using Double Photon Transmission of Quantum Cryptography (이중광자 전송을 통한 양자비밀통신)

  • Seol, Jung-Ja;Rim, Kwang-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • 제17권8호
    • /
    • pp.1857-1864
    • /
    • 2013
  • In this paper, we improve the quantum cryptography system using a dual photon transmission plaintext user password algorithmwas designed to implementthe exchange. Existing quantum cryptographic key transport protocols, algorithms, mainly as a quantum cryptography system using the paper, but it improved the way the dual photon transmission through the quantum algorithm re not getting transmitted plaintext.

RISK ASSESSMENT USING BIM BASED SAFETY MANAGEMENT SYSTEM

  • Hongseob Ahn;Hyunjoo Kim;Wooyoung Kim
    • International conference on construction engineering and project management
    • /
    • The 4th International Conference on Construction Engineering and Project Management Organized by the University of New South Wales
    • /
    • pp.107-110
    • /
    • 2011
  • The key role in safety management is to identify any possible hazard before it occurs by identifying any possible risk factors which are critical to risk assessment. This planning/assessment process is considered to be tedious and requires a lot of attention due to the following reasons: firstly, falsework (temporary structures) in construction projects is fundamentally important. However, the installation and dismantling of those facilities are one of the high risk activities in the job sites. Secondly, temporary facilities are generally not clearly delineated on the building drawings. It is our strong belief that safety tools have to be simple and convenient enough for the jobsite people to manage them easily and be flexible for any occasions to be occurred at various degrees. In order to develop the safety assessment system, this research utilizes the BIM technology and collects important information by importing data from BIM models and use it in the planning stage.

  • PDF

Control of Small PEM Fuel Cell Stack by a Microprocessor (마이크로프로세서를 이용한 소형 PEM 연료전지 스택의 제어)

  • Kim, Tae-Hoon;Choi, Woo-Jin
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • 제13권6호
    • /
    • pp.469-475
    • /
    • 2008
  • In this paper, control of small PEM(Proton Exchange Membrane) fuel cell stack by a microprocessor is introduced. The water management of fuel cell stack inside, a key technique in fuel cell control, can be achieved by adjusting the required air flow for fuel and cooling, and by purging the excessive water from the stack. It is very important to precisely control the BOS(Balance of Stack) since the stable operation of the fuel cell system mainly depends on it. In this study the fuel efficiency of the system is improved by the control of the system based on the measured air flow and purge cycle during the optimal operation and its effectiveness is proved by the experiments. The operating stability of the system is improved by the developed controller using a microprocessor and it is expected to be widely used for the control of small PEM fuel cell stack.

Integrity Guarantee System in IoT Virtual Environment Platform: Through Hyperedfger Indy and MQTT (IoT 가상환경 플랫폼에서의 무결성 보장 시스템:Hyperledger Indy와 MQTT를 통하여)

  • Yoosung Hong;Geun-Hyung Kim
    • Smart Media Journal
    • /
    • 제13권4호
    • /
    • pp.76-85
    • /
    • 2024
  • In this paper, we propose a system that improves the data integrity of IoT(Internet of Things) devices in the virtual environment by combining Hyperledger Indy and MQTT(Message Queuing Telemetry Transport). The system complements the limitations of the centralized system by realizing a DPKI(Decentralized Public Key Infrastructure) structure that utilizes a distributed network in publish-subscribe(pub/sub) pattern communication. Digital signature technology was applied to ensure the data integrity of IoT devices and communication scenarios between the four core components of the client, IoT device, broker, and blockchain, as well as a topic structure using a decentralized identifier to ensure safety in the virtual environment. We present a systematic method for transparent data exchange. To prove the performance of the proposed system, this paper conducted experiments on four scenarios and evaluated communication performance in a virtual environment. The experimental results confirmed that the proposed system provides a reliable IoT data communication structure in a virtual environment.

A User Authentication Scheme using Blockchain in Smart Grid-based Edge Computing Environments (스마트 그리드 기반 엣지 컴퓨팅 환경에서 블록체인을 이용한 사용자 인증 기법)

  • Hakjun Lee;Youngsook Lee
    • Convergence Security Journal
    • /
    • 제22권1호
    • /
    • pp.71-79
    • /
    • 2022
  • The smart grid system has emerged to maximize energy efficiency through real-time information exchange between power providers and consumers by combining information technology and power supply systems. The authentication schemes using blockchain in a smart grid system have been proposed, which utilize an edge server's architecture to collect and store electric power-related information and process data between a central cloud server and smart grid-IoT devices. Although authentication schemes are being proposed to enhance security in the smart grid environment, many vulnerabilities are still reported. This paper presents a new mutual authentication scheme to guarantee users' privacy and anonymity in a smart grid based on edge computing using blockchain. In the proposed scheme, we use the smart contract for the key management's efficiency, such as updating and discarding key materials. Finally, we prove that the proposed scheme not only securely establishes a session key between the smart grid-IoT device of the user and the edge server but also guarantees anonymity.

The Effects of Franchise Customers' Acquisition Utility and Exchange Utility on Customer Loyalty and Customer Citizenship Behavior (외식 프랜차이즈 고객의 획득효용과 교환효용이 고객충성도와 고객시민행동에 미치는 영향)

  • Kim, Sang-Duck;Im, Hyang-Mi;Seo, Ki-Hong;Yoon, Ok-Sook;Kim, Jong-Hun
    • The Journal of Industrial Distribution & Business
    • /
    • 제10권2호
    • /
    • pp.39-49
    • /
    • 2019
  • Purpose - Customer loyalty and citizenship behavior are key success factors of franchise system. They make the management of franchisee more effective and efficient. Prior studies, however, mainly dealt with only acquisition utility of customer, such as perceived product/service quality and brand reputation to explain customer loyalty and citizenship behavior, which explains only on one side. We tried to investigate the effect of exchange utility of customer, such as relationship strength and psychological obligation together with the acquisition utility. In addition, we tried to investigate the relationship between customer loyalty and citizenship behavior in franchise context. Research design, data, and methodology - This study used data collected from the dining franchisee managers of 342 franchisors in South Korea. The franchisors consist of more than ten franchisees, the majority of which participated directly in the transaction with franchisor and have worked for more than six months. To test the hypotheses, the study used structural equation model analysis. Results - H1-1, 1-2, 1-3 predicted that acquisition utility would increase customer loyalty to franchisee. In support of H1-1, 1-2, 1-3, the results indicated that acquisition utilities such as perceived product value, perceived service value, and franchise brand reputation had positive effects on customer loyalty. H2-1, 2-2 predicted that exchange utility would increase customer loyalty to franchisee. In support of H2-2, the result indicated that psychological obligation had positive effects on customer loyalty like other acquisition utilities. However, H2-1 was not supported. Relationship strength had no significant effect on customer loyalty. H3 predicted that customer loyalty would increase customer citizenship behavior. In support of H3, the results indicated that customer loyalty had positive effect on customer citizenship behavior. Overall, the evidences generally supported the hypotheses. Conclusion - The results of the study show that not only acquisition utility but also exchange utility increases customer loyalty to franchisee and also show that customer loyalty increases customer citizenship behavior. Interestingly, however, relationship strength has no significant effect on customer loyalty. These results have two implications. The one is that increasing exchange utility can improve customer loyalty as acquisition utility can. The other one is that both of customer utilities can improve customer citizenship via customer loyalty.