• Title/Summary/Keyword: Key Exchange System

Search Result 228, Processing Time 0.024 seconds

Performance Analysis of Random Resource Selection in LTE D2D Discovery (LTE D2D 디스커버리에서 무작위 자원 선택 방법에 대한 성능 분석)

  • Park, Kyungwon;Kim, Joonyoung;Jeong, Byeong Kook;Lee, Kwang Bok;Choi, Sunghyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.3
    • /
    • pp.577-584
    • /
    • 2017
  • Long Term Evolution device-to-device (LTE D2D) is a key technology to mitigate data traffic load in a cellular system. It facilitates direct data exchange between neighboring users, which is preceded by D2D discovery. Each device advertises its presence to neighboring devices by broadcasting its discovery message. In this paper, we develop a mathematical analysis to assess the probability that discovery messages are successfully transmitted at the D2D discovery stage. We make use of stochastic geometry for modeling spatial statistics of nodes in a two dimensional space. It reflects signal to noise plus interference ratio (SINR) degradation due to resource collision and in-band emission, which leads to the discovery message reception probability being modeled as a function of the distance between the transmitter and the receiver. Numerical results verify that the newly developed analysis accurately estimates discovery message reception probabilities of nodes at the D2D discovery stage.

Study on the Improvement about User Authentication of Android Third Party Application Through the Vulnerability in Google Voice (구글 보이스 취약점을 통한 안드로이드 서드 파티 어플리케이션의 사용자 인증 개선방안 연구)

  • Lee, Seyeong;Park, Jaekyun;Hong, Sungdae;Choi, Hyoungki
    • Journal of KIISE
    • /
    • v.42 no.1
    • /
    • pp.23-32
    • /
    • 2015
  • In the Android market, a large portion of the market share consists of third party applications, but not much research has been performed in this respect. Of these applications, mobile Voice Over IP (VoIP) applications are one of the types of applications that are used the most. In this paper, we focus on user authentication methods for three representative applications of the Google Voice service, which is a famous mobile VoIP application. Then, with respect to the Android file system, we developed a method to store and to send user information for authentication. Finally, we demonstrate a vulnerability in the mechanism and propose an improved mechanism for user authentication by using hash chaining and an elliptic curve Diffie-Hellman key exchange.

The Impact of the Oceanic Biological Pump on Atmospheric CO2 and Its Link to Climate Change (해양 생물 펌프가 대기 중 이산화탄소에 미치는 영향 그리고 기후 변동과의 연관성)

  • Kwon, Eun Young;Cho, Yang-Ki
    • The Sea:JOURNAL OF THE KOREAN SOCIETY OF OCEANOGRAPHY
    • /
    • v.18 no.4
    • /
    • pp.266-276
    • /
    • 2013
  • The ocean is the largest reservoir of carbon in the climate system. Atmospheric $CO_2$ is efficiently transferred to the deep ocean by a process called the biological carbon pump: photosynthetic fixation of $CO_2$ at the sea surface and remineralization of sinking organic carbon at depths are main causes for the vertical contrast of carbon in the ocean. The sequestered carbon to the deep ocean returns to the sea surface by ocean circulation. Part of the upwelled $CO_2$ leaks into the atmosphere through air-sea gas exchange. It has been suggested that the air-sea partitioning of carbon has varied in concert with the glacial-interglacial climate variations, due partly to changes in ocean circulation. In this review paper, we briefly summarize key concepts of the oceanic carbon pump. We also discuss the response of the air-sea carbon partitioning to change in ocean circulation in the context of the glacial-interglacial climate change.

A Packet encryption scheme and extension of Cryptoki for connectionless packet network (고속 패킷 통신을 위한 패킷 암호 스킴과 Cryptoki 확장 방안)

  • Ko, Haeng-Seok;Park, Sang-Hyun;Kwon, Oh-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.83-92
    • /
    • 2007
  • In connectionless packet network, if a sender encrypts packets by block chaining mode and send it to receiver, the receiver should decrypt packets in encrypted order that is not received order. Therefore, the performance and efficiency are lowered for crypto communication system. To solve this problem, we propose packet encryption scheme for connectionless packet network that can decrypt the packets independently, even if the received order of packets are changed or packets are missed. The scheme makes new IV(Initial Vector) using IV that created by key exchange process and salt that made by random number. We propose extended Cryptoki API that added packet encryption/decryption functions and mechanism for improving convenience and performance. We implement the scheme and get result that the performance increased about $1.5{\sim}l5.6$ times compare with in case of implementing using Cryptoki API in the test environment.

A Study on IKE v2 Analysis Method for RealTime (NIKEv2 AR : IKE v2 실시간 분석 기술 연구)

  • Park, Junghyung;Ryu, Hyungyul;Ryou, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.4
    • /
    • pp.661-671
    • /
    • 2022
  • Due to the COVID-19 pandemic, remote working, e-learning, e-teaching and online collaboration have widely spread and become popular. Accordingly, the usage of IPsec VPN for security reasons has also dramatically increased. With the spread of VPN, VPN vulunerabilities are becoming an important target of attack for attackers, and many studies have been conducted on this. IKE v2 analysis is an essential process not only for developing and building IPsec VPN systems but also for security analysis. Network packet analysis tools such as Wireshark and Tcpdump are used for IKE v2 analysis. Wireshark is one of the most famous and widely-used network protocol analyzers and supports IKE v2 analysis. However Wireshark has many limitations, such as requiring system administrator privileges for IKE v2 analysis. In this paper, we describe Wireshark's limitations in detatil and propose a new analysis method. The proposed analysis method can analyze all encrypted IKE v2 messages in real time from the session key exchange In addition, the proposed analysis method is expected to be used for dynamic testing such as fuzzing as packet manipulation.

Design of dashboard conceptual model for digital twin based smart pipe health monitoring (디지털 트윈 기반 스마트 파이프 상태 감시를 위한 대시보드 개념모델 설계)

  • Hong, Phil-Doo;Kim, Nam-ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.389-391
    • /
    • 2022
  • Efforts by the Ministry of Environment and local governments in Korea are continuing to manage the aging of water supply and sewage buried underground. With the support of the Korea Institute of Environmental Industry and Technology's water and sewage innovation technology development project, it is conducting a project to predict and exchange accidents due to aging, and to apply smart functions to new buried pipes. As one of these studies, this paper proposes the design of a dashboard concept model for digital twin-based smart pipe health monitoring, one of the key features of the entire study. Since remote control and monitoring are one of the main functions, distributed transmission and reception agents are deployed to visualize monitoring situations in real time and to increase user affinity by deploying intuitive UI. To validate the design of this proposed special digital twin based smart pipe state monitoring, we construct the conceptual model level and measure the agent effectiveness to validate its excellence.

  • PDF

Policy Direction for The Farmland Sizing Suitable to Regional Trait (지역특성을 반영한 영농규모화사업의 발전방향-충남지역을 중심으로-)

  • Shim, Jae-Sung
    • The Journal of Natural Sciences
    • /
    • v.14 no.1
    • /
    • pp.83-121
    • /
    • 2004
  • This study was carried out to examine how solid the production foundation of rice in Chung-Nam Province is, and, if not, to probe alternative measures through the size of farms specializing in rice, of which direction would be a pivot of rice industry-oriented policy. The results obtained can be summarized as follows : 1. The amount of rice production in Chung-Nam Province is highest in Korea and the size of paddy field area is the second largest : This implying that the probability that rice production in Chung-Nam Province would be severely influenced by a global trend of market conditions. The number of farms specializing in rice becoming the core group of rice farming account for 7.7 percent of the total number of farm household in Korea. Average field area financial support which had been input to farm household by Government had a noticeable effect on the improvement of the policy of farm-size program. 2. Farm-size program in Chung-Nam Province established from 1980 to 2002 in creased the cultivation size of paddy field to 19,484 hectares, and this program enhanced the buying and selling of farmland and the number of farmland bargain reached 6,431 household and 16,517 hectares, respectively, in 1995-2002. Meanwhile, long-term letting and hiring of farmland appeared so active that the bargain acreage reached 6,970 hectares, and farm involved was 7,059 households, however, the farm-exchange-and-unity program did not satisfy our expectation, because the retirement farm operators reluctantly participated to sell their farms. Another reason that had delayed the bargain of farms rested on the general category of social complication attendant upon the exchange and unity operation for scattered farm. Such difficulties would work negative effects out to carry on the target of farm-size work in general. 3. The following measures were presented to propel the farm-size promotion program : a. Occupation shift project, followed by the social security program for retirement and elderly farm operators, should be promptly established and also a number of types of incentives for promoting the letting and hiring work and farm-exchange-and-unity program would also be set up. b. To establish the effective key system of rice production, all the farm operators should increase the unit area yield of rice and lower the production cost. To do so, a great deal of production teams of rice equipped with managerial techniques and capabilities need to be organized. And, also, there should be appropriate arrays of facilities including information system. This plan is desirable to be in line with a diversity of the structural implement of regional integration based on farm system building. c. To extend the size of farm and to improve farm management, we have to devise the enlargement of individual size of farm for maximized management and the utilization of farm-size grouping method. In conclusion, it can be said that the farm-size project in Chung-Nam Province which has continued since the 1980s was satisfactorily achieved. However, we still have a lot of problems to be solved to break down the barrier for attainment of the desirable farm-size operation work.. Farm-size project has fairly close relation with farm specialization in rice and, thus, the positive support for farm household including the integrated program for both retirement farmers and off-farm operators should be considered to pursue the progressive development of the farm-size program, which is key means to successful achievement of rice farming enforcement in Chung-Nam Province.

  • PDF

CARA: Collision-Aware Rate Adaptation for IEEE 802.11 WLANs (CARA: IEEE 802.11 무선랜에서 충돌을 인지한 적응적 전송속도 조절기법)

  • Kim, Jong-Seok;Kim, Seong-Kwan;Choi, Sung-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.2A
    • /
    • pp.154-167
    • /
    • 2006
  • Today's IEEE 802.11 WLANs(Wireless LANs) provide multiple transmission rates so that different rates can be exploited in an adaptive manner depending on the underlying channel condition in order to maximize the system performance. Many rate adaptation schemes have been proposed so far while most(if not all) of the commercial devices implement a simple open-loop rate adaptation scheme(i.e., without feedback from the receiver), called ARF(Automatic Rate Fallback) due to its simplicity. A key problem with such open-loop rate adaptation schemes is that they do not consider the collision effect, and hence, malfunction severely when many transmission failures are due to collisions. In this paper, we propose a novel rate-adaptation scheme, called CARA(Collision-Aware Rate Adaptation). The key idea of CARA is that the transmitter station combines adaptively the Request-to-Send/Clear-to-Send(RTS/CTS) exchange with the Clear Channel Assessment(CCA) functionality to differentiate frame collisions from frame transmission failures cause by channel errors. Therefore, compared with other open-loop rate adaptation schemes, CATA is more likely to make the correct rate adaptation decisions. Through extensive simulation runs, we evaluate our proposed scheme to show that our scheme yields significantly higher throughput performance than the existing schemes in both static and time-varying fading channel environments.

Scoping for Marine Environmental Impact Assessment of Tidal Power Plant Construction (조력에너지 개발사업의 해양환경영향평가 스코핑 방안)

  • Kam, Min-Jae;Kim, Gui-Young;Jeon, Kyeong-Am;Yu, Jun;Lee, Dae-In;Eom, Ki-Hyuk
    • Journal of the Korean Society for Marine Environment & Energy
    • /
    • v.15 no.1
    • /
    • pp.30-37
    • /
    • 2012
  • This paper assessed environmental impact of tidal power plant construction in the western sea of Korea, and diagnosed problems of the related assessment. We also proposed key assessment items (scoping) and system improvement for environmental impact assessment (EIA). The establishment of a broad consensus of the appropriateness and a clear purpose for business is an important aspect of the aptness of using the waters, and the aggressive collecting of opinions of the stakeholder and institutions will have to be fulfilled. In addition, we presented the following scoping plan in order to minimize the negative effects of the marine ecosystem and the conflict between the people who work in the fishing industry which result due to the construction of the tidal power plants. (1) the change in seawater exchange rates and the aspect of erosion/sedimentation which result from the change in the velocity of running fluid, (2) the destruction of spawns/habitats of fish due to the damage of tidal flats, (3) fishery resources, impacts of fishing grounds, and the spread of suspended sediments, etc. will have to be applied to the key assessment items(scoping). In addition, every citizen will have work hard for an establishment of an active plan which achieves the harmony and balance of environmental preservation and for the policy to be applied through changing their consciousness of environmental preservation.

A Study on the Collaborative Partnership Factors between Freight Forwarders and Consignors (국제물류주선업체와 화주기업의 협력적 파트너쉽 요인에 관한 연구)

  • Jun, Kyung Sook;Jang, Hyun Mi;Kim, Sang Youl
    • Journal of Korea Port Economic Association
    • /
    • v.30 no.4
    • /
    • pp.169-198
    • /
    • 2014
  • Due to the recent worldwide economic downturn, companies are required to put more effort into their innovation and quality improvement. In particular, business relationship is increasingly emphasized to be changed from a vertical relationship to a more horizontal relationship, such as collaborative partnership based on trust. In the logistics industry, through the collaboration, consignors can gain competitive advantages by focusing on their core capabilities, and freight forwarders also take advantages of securing stable cargoes and specialist expertise in distribution. Therefore, this study aims to identify key factors for developing a collaborative partnership between freight forwarders and consignors, and further examine the differences between the two groups empirically by using questionnaire survey. Based on the results, the main factors were found as follows: 1) Trust Building, 2) Competence Improvement, 3) Business Ecosystem and 4) Government Assistance. According to the analysis on sub-factors, first, among the four main factors, it turned out that trust is the most important variable. Specifically, the sub-factor of providing regular and stable service was revealed to be most critical. Second, it was found that forwarders need to improve services on 'Information Exchange System' and 'Electronic Data Interchange'. Finally, it is necessary for both consignors and forwarders to have better understanding of partnership. Key implications for both groups are highlighted based on the results.