• 제목/요약/키워드: Key Management Mechanism

검색결과 233건 처리시간 0.028초

무선 센서 네트워크에서 에너지 효율성과 보안성을 제공하기 위한 클러스터 기반의 Tributaries-Deltas (Clustered Tributaries-Deltas Architecture for Energy Efficient and Secure Wireless Sensor Network)

  • 김은경;서재원;채기준;최두호;오경희
    • 정보처리학회논문지C
    • /
    • 제15C권5호
    • /
    • pp.329-342
    • /
    • 2008
  • 무선 센서 네트워크는 여러 가지 제약점을 가지고 있기 때문에 에너지 효율성과 보안성 제공은 중요한 이슈이다. 기존에 라우팅에 있어서 tree-based와 multipath-based라는 두 가지 접근법을 효과적으로 통합시킨 Tributaries and Deltas(TD)가 제안된 바가 있으며, 본 논문에서는 TD 구조에 계층성이 더해진 클러스터 기반의 TD를 제안하여 기존 TD보다 향상된 성능을 증명하였다. 클러스터 기반의 TD 구조는 두 가지 상황에서 기존의 TD보다 더 좋은 성능을 가짐을 보여 주었다. 하나는 베이스스테이션(BS)이 잘못된 정보를 받았다 판단하고 재전송을 요구할 때와, 또 다른 하나는 BS가 이동성을 가지고 있을 때이다. 또한 제안된 구조에 적합한 키 설립 메커니즘을 제안하여 에너지 효율성뿐만 아니라 보안성도 고려한 새로운 센서 네트워크 구조를 제안하였고 TinyOS 2.0을 기반으로 TmoteSKY 센서 보드에 구현하여 실제 네트워크에서의 응용 가능성을 입증하였다.

Cost-Per-Action 광고 방법을 이용한 Conversion Action Data 메커니즘의 평가 (Evaluation of Conversion Action Data Mechanisms in Cost- Per-Action Advertising)

  • 이첨;이경전
    • 경영정보학연구
    • /
    • 제10권2호
    • /
    • pp.123-135
    • /
    • 2008
  • 온라인 광고모델의 기본 모델은 CPM (cost-per-mille) 기반 모델에서 CPC (cost-per-click) 기반 모델로 변화해왔으며, CPA (cost-per-action) 모델이 온라인 광고산업의 새로운 대안 모델로 제시되고 있다. CPA 모델에서는 사용자가 어떤 광고를 클릭 했는지에 관한 정보를 퍼블리셔(Publisher)가 보유할 수 있어야 하며, 그래서, CPA 모델의 핵심은 Conversation Action Data를 확보하는 것이다. 이 논문에서는 이를 획득하는 두 가지 기존 메커니즘을 소개하고, 이들의 특징을 비교하고, 각 메커니즘의 한계를 분석한다. 그 다음에 두 가지 새로운 메커니즘을 설계하고, 작동 요건을 분석하고, 실용성을 평가한다. 마지막으로, 기존의 메커니즘들과 새로운 메커니즘들의 특징을 비교하고, 각 메커니즘의 비즈니스 가치와 유용성, 응용 범위를 분석한다. 이 논문에서 제안된 2가지의 새로운 메커니즘과 기존 메커니즘과 비교 분석을 통해 퍼블리셔에게 최적 CPA 메커니즘에 관한 판단정보를 제공할 수 있을 것으로 판단된다.

전방향 안전성을 보장하는 공개키 브로드캐스트 암호 기법 (Forward-Secure Public Key Broadcast Encryption)

  • 박종환;윤석구
    • 방송공학회논문지
    • /
    • 제13권1호
    • /
    • pp.53-61
    • /
    • 2008
  • 본 논문에서는 전방향 안전성(forward-secrecy)을 보장하는 공개키 브로드캐스트 암호 기법을 제안한다. 공개키 브로드캐스트 암호는 공개키를 이용하여 구성원 누구나 메시지를 전송할 수 있고, 탈퇴자 그룹을 효율적으로 배제(revocation)할 수 있는 기법이다. 여기에 전방향 안전성을 보장하려는데, 전방향 안전성은 사용자의 비밀키가 노출되더라도 그 노출된 시점 이전의 암호문을 쉽게 복호화 할 수 없도록 하는 것이다. 이러한 기능이 없다면 권한 없는 수신자가 과거의 방송을 수집하고 이후 정당한 비밀키를 받아서 과거의 방송을 복호화할 수 있는 문제가 발생한다. 전방향 안전성은 특히 유료 방송 등의 환경에서 요구된다. 본 논문에서 제안되는 기법은 2005년 Boneh-Boyen-Goh가 제시한 계층구조의 신원 기반 암호기법을 변형하여 설계된다. 먼저 BBG기법을 사용하여 새로운 공개키 브로드캐스트 암호기법을 설계하고, 다시 BBG 기법에서 사용된 하위레벨 비밀키 생성 알고리즘을 사용하여 전방향 안전성을 부여한다. 제안되는 기법은 타원곡선 위의 페어링(pairing)을 이용하여 설계되며, 전체 사용자 n에 대하여 $O(\sqrt{n})$ 사이즈의 통신량과 비밀키 저장량을 가진다. 특히 비밀키 저장량은 탈퇴자 수가 증가할수록 줄어드는 장점을 가진다. 통신량이 중요한 환경에서는 이전에 제시된 기법보다 본 논문에서 제안된 기법을 사용하는 것이 더 바람직한데, 이는 통신량은 동일하지만 비밀키 저장량이 더 적기 때문이다. 제안된 기법은 Bilinear Diffie-Hellman Exponent 가정 하에서 선택 암호문 공격에 안전하도록 설계되며, 그 증명은 랜덤 오라클을 사용하지 않는다.

WiMAX 환경에서 악의적 노드 예방을 위한 보안 기법 (Security Scheme for Prevent malicious Nodes in WiMAX Environment)

  • 정윤수;김용태;박길철;이상호
    • 한국정보통신학회논문지
    • /
    • 제13권2호
    • /
    • pp.382-389
    • /
    • 2009
  • 이동 단말기의 사용이 일반화되면서 최근 WiMAX 기술의 다양한 서비스 요구가 점점 증가하여 보안의 중요성이 점점대두되고 있다. 이러한 보안 요구사항을 충족시키기 위해서 WiMAX에 전통적인 1 홉 네트워크 보안기법이 적용되더라도 이동 WiMAX에서는 이웃 링크 설립과정과 TEK 교환 과정사이에 비연결적으로 동작이 이루어져서 악의적이 공격에 쉽게 공격당할 수 있는 문제점을 가지고 있다. 이 논문에서는 이동 WiMAX의 보안 요구사항을 충족하기 위해 IEEE 802.16e 표준에서 제공하는 기본 기능이외에 WiMAX의 이웃 링크 설립 과정과 TEK 교환 과정 사이를 안전하게 연결하는 보안 연계 메커니즘을 제안한다. 제안 메카니즘에서는 SS와 BS가 생성한 임의의 난수와 비밀값을 이웃 링크 설립과 TEK 교환 과정의 암호학적 연결을 통해 TEK 요청에서 발생할 수 있는 man-in-the-middle 공격과 같은 내부 공격을 예방할 수 있다.

Seamless and Secure Mobility Management with Location-Aware Service (LAS) Broker for Future Mobile Interworking Networks

  • Lee Minsoo;Kim Gwanyeon;Park Sehyun
    • Journal of Communications and Networks
    • /
    • 제7권2호
    • /
    • pp.207-221
    • /
    • 2005
  • The proliferation of wireless local area networks (WLANs) offering high data rate in hot spot area have spurred the demand for possible WLANs and third-generation (3G) cellular network integration solutions as the initiative step towards 4G systems. This paper provides a novel architecture for seamless location-aware integration of WLANs into 3G cellular networks and also an analysis for the efficient handover techniques. We introduce location as a key context in secure roaming mechanism for context-aware interworking in 4G systems. The fast secure roaming with location-aware authentication is implemented at an entity called location-aware service (LAS) broker that utilizes the concepts of direction of user and pre-warming zone. The location-ware interworking architecture supports seamless roaming services among heterogeneous wireless networks including WLANs, wireless metropolitan area networks (WMANs), and 3G cellular networks. This paper also includes a description of procedures needed to implement efficient mobility and location management. We show how the LAS broker with pre-warming and context transfer can obtain significant lower latency in the vertical handover.

Corporate Social Responsibility and Unsecured Debt: Evidence from China

  • CHEN, Xia;MA, Zhe;SHI, Jiayu;TU, Bingyan;XU, Songtao
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제7권11호
    • /
    • pp.1-11
    • /
    • 2020
  • This study aims to investigate whether Corporate Social Responsibility (CSR) performance can help companies gain more bank unsecured loans. Additionally, this study analyzes the moderating effect of firm size and industry characteristics. Data was collected through the case of companies listed on the Shanghai Stock Exchange or the Shenzhen Stock Exchange in China between 2009 and 2018 with 5373 firm-year observations. The results of multivariable regression analysis show that good CSR performance exhibits a strong positive impact on unsecured debt, including short-term, long-term, and total unsecured debt, which indicates that corporate with good CSR performance can borrow more unsecured debt. further research shows that this effect is more pronounced for small enterprises and firms operating in heavy-polluting industries. Additionally, research on the impact mechanism finds that good CSR performance can help mitigate information asymmetry between borrower and lender, reduce moral hazard of borrower, and obtain support from key stakeholders, and therefore reduces the risk of default. The findings of this study suggest that firms with good CSR performance exhibit a preference for unsecured debt, but decline to provide collateral for debt. Overall, we emphasize and illustrate the important role of corporate CSR in bank credit financing.

The Impact of Information Technology on Organizational Performance: The Mediating Effect of Organizational Learning

  • KHAN, Umair;ZHANG, Yongan;SALIK, Madiha
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제7권11호
    • /
    • pp.987-998
    • /
    • 2020
  • This study aims to examine OL as a potential mediating variable in the relationship between IT and organizational performance. Organizational learning (OL) has been proposed as the mechanism to accomplish this task. Existing empirical research demonstrates that OL may indeed act as a mediator for the effect of IT on organizational outcomes. Also, existing literature discusses the use of technology in the organization, and the case for OL as the key knowledge process, and the intersection between technology and OL as a knowledge-based means for improving organizational performance. Many studies use a descriptive measure of OL despite the theory suggesting that a normative measure may be more appropriate. This study aims to address these concerns in a setting by using structural equation modelling (SEM) to compare the effectiveness of descriptive and normative measures of OL as mediating variables in knowledge-intensive organizations. Survey results support OL as a mediator between IT and organizational performance in addition to normative measures of OL outperforming descriptive measures. Implications for research and practice are discussed. To test the model, we will apply (SEM) structural equation modeling in the analysis of a moment structures (AMOS) on the empirical evidence collected from 218 Pakistani CEOs and top managers.

Auto Configuration Module for Logstash in Elasticsearch Ecosystem

  • Ahmed, Hammad;Park, Yoosang;Choi, Jongsun;Choi, Jaeyoung
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2018년도 추계학술발표대회
    • /
    • pp.39-42
    • /
    • 2018
  • Log analysis and monitoring have a significant importance in most of the systems. Log management has core importance in applications like distributed applications, cloud based applications, and applications designed for big data. These applications produce a large number of log files which contain essential information. This information can be used for log analytics to understand the relevant patterns from varying log data. However, they need some tools for the purpose of parsing, storing, and visualizing log informations. "Elasticsearch, Logstash, and Kibana"(ELK Stack) is one of the most popular analyzing tools for log management. For the ingestion of log files configuration files have a key importance, as they cover all the services needed to input, process, and output the log files. However, creating configuration files is sometimes very complicated and time consuming in many applications as it requires domain expertise and manual creation. In this paper, an auto configuration module for Logstash is proposed which aims to auto generate the configuration files for Logstash. The primary purpose of this paper is to provide a mechanism, which can be used to auto generate the configuration files for corresponding log files in less time. The proposed module aims to provide an overall efficiency in the log management system.

Bank Liquidity and Economic Development in Underdeveloped Regions: An Empirical Study in Indonesia

  • JUMONO, Sapto;ISKANDAR, Muhammad Dhafi;ADHIKARA, Muhammad Fachrudin Arrozi;MALA, Chajar Matari Fath
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제8권7호
    • /
    • pp.31-42
    • /
    • 2021
  • This study aims to determine the relation between the real sector and the financial sector in underdeveloped areas in Nusa Tenggara, Indonesia. To facilitate understanding of these linkages, researchers use the logic of credit channel mechanism of monetary policy, financial intermediation, as well as supply leading and demand following theories. The research variables include economic growth, inflation, liquidity, and NPL at the provincial level, with a data sample from 2008 to 2019. This research uses VAR/VECM as the analysis tools. The findings of the long-term analysis in East Nusa Tenggara show there is a phenomenon of cost-push inflation as well as the negative relation between inflation and economic growth. The impact of liquidity on inflation is positive, while the impact of economic growth on inflation is negative. Meanwhile, in West Nusa Tenggara, the impact of economic growth on inflation is positive. On the other hand, the impact of liquidity and NPL on inflation and economic growth is negative. In conclusion, generally, the economy in West Nusa Tenggara is better than the East Nusa Tenggara. The key to improving the economy of Nusa Tenggara is by improving its liquidity. This can be done by increasing the volume of public savings to increase bank credit capacity.

Blockchain-Assisted Trust Management Scheme for Securing VANETs

  • Ahmed, Waheeb;Wu, Di;Mukathie, Daniel
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권2호
    • /
    • pp.609-631
    • /
    • 2022
  • The main goal of VANETs is to improve the safety of all road users. Therefore, the accuracy and trustworthiness of messages transmitted in VANETs are essential, given that life may rely on them. VANETs are provided with basic security services through the use of public key infrastructure-based authentication. However, the trust of users is still an open issue in VANETs. It is important to prevent bogus message attacks from internal vehicles as well as protect vehicle privacy. In this paper, we propose a trust management scheme that ensures trust in VANETs while maintaining vehicle privacy. The trust scheme establishes trust between vehicles where a trust value is assigned to every vehicle based on its behavior and messages are accepted only from vehicles whose trust value is greater than a threshold, therefore, protecting VANETs from malicious vehicles and eliminating bogus messages. If a traffic event happens, vehicles upload event messages to the reachable roadside unit (RSU). Once the RSU has confirmed that the event happened, it announces the event to vehicles in its vicinity and records it into the blockchain. Using this mechanism, RSUs are prevented from sending fake or unverified event notifications. Simulations are carried out in the context of bogus message attacks to evaluate the trust scheme's reliability and efficiency. The results of the simulation indicate that the proposed scheme outperforms the compared schemes and is highly resistant to bogus message attacks.