• Title/Summary/Keyword: Key distribution

Search Result 2,539, Processing Time 0.024 seconds

A Group Key Management for Real-Time Multicasting Information Security (실시간 멀티캐스팅 정보보안을 위한 그룹키 관리)

  • Hong, Jong-Joon;Hwang, Kyo-Chul
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.809-814
    • /
    • 2003
  • The multicast transmitting the real-time data to groups may easily have many attacks from abnormal attacks because it has many links as compared to the unicast. The existing group key management architectures for preventing these problems are designed for protocols suitable for a large scale. Thus these architectures applied to a small scale routing protocols may have many overheads with key distribution and a constant core tree. Therefore this paper proposes a groups key management protocol for a secure multicast in PIM-SM multicast group communication. The proposed method divide multicast groups with RO(Rendezvous-Point), and subgroup key managers are established in each RP and can be transmitted groups keys between senders and receivers, so the security cannel is set up for secure data transfer, And this does not have needs of the data translation for group keys and the new key distribution for path change. As a result of this, the data transmission time can be reduced.

Decentralized Group Key Management for Untrusted Dynamic Networks (신뢰할 수 없는 동적 네트워크 환경을 위한 비중앙화 그룹키 관리 기법)

  • Hur, Jun-Beom;Yoon, Hyun-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.4
    • /
    • pp.263-274
    • /
    • 2009
  • Decentralized group key management mechanisms offer beneficial solutions to enhance the scalability and reliability of a secure multicast framework by confining the impact of a membership change in a local area. However, many of the previous decentralized solutions reveal the plaintext to the intermediate relaying proxies, or require the key distribution center to coordinate secure group communications between subgroups. In this study, we propose a decentralized group key management scheme that features a mechanism allowing a service provider to deliver the group key to valid members in a distributed manner using the proxy cryptography. In the proposed scheme, the key distribution center is eliminated while data confidentiality of the transmitted message is provided during the message delivery process. The proposed scheme can support a secure group communication in dynamic network environments where there is no trusted central controller for the whole network and the network topology changes frequently.

Hybrid Cryptosystem providing Implicit Authentication for sender (송신자에 대한 묵시적 인증을 제공하는 하이브리드 암호 시스템)

  • Oh, Soo-Hyun;Kwak, Jin;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.6
    • /
    • pp.71-80
    • /
    • 2002
  • To provide the confidentiality of messages transmitted over the network, the use of cryptographic system is increasing gradually and the hybrid cryptosystem, which combines the advantages of the symmetric cryptosystem and the public key cryptosystem is widely used. In this paper, we proposes a new hybrid cryptosystem capable of providing implicit authentication for the sender of the ciphertext by means of the 1-pass key distribution protocol that offers implicit key authentication, hash function and symmetric cryptosystem. Also, we describe some examples such as the Diffie-Hellman based system and the Nyberg-Ruppel based system. The proposed hybrid cryptosystem is an efficient more than general public key cryptosystems in the aspect of computation work and provides implicit authentication for the sender without additional increase of the communication overhead.

Reducing Cybersecurity Risks in Cloud Computing Using A Distributed Key Mechanism

  • Altowaijri, Saleh M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.1-10
    • /
    • 2021
  • The Internet of things (IoT) is the main advancement in data processing and communication technologies. In IoT, intelligent devices play an exciting role in wireless communication. Although, sensor nodes are low-cost devices for communication and data gathering. However, sensor nodes are more vulnerable to different security threats because these nodes have continuous access to the internet. Therefore, the multiparty security credential-based key generation mechanism provides effective security against several attacks. The key generation-based methods are implemented at sensor nodes, edge nodes, and also at server nodes for secure communication. The main challenging issue in a collaborative key generation scheme is the extensive multiplication. When the number of parties increased the multiplications are more complex. Thus, the computational cost of batch key and multiparty key-based schemes is high. This paper presents a Secure Multipart Key Distribution scheme (SMKD) that provides secure communication among the nodes by generating a multiparty secure key for communication. In this paper, we provide node authentication and session key generation mechanism among mobile nodes, head nodes, and trusted servers. We analyzed the achievements of the SMKD scheme against SPPDA, PPDAS, and PFDA schemes. Thus, the simulation environment is established by employing an NS 2. Simulation results prove that the performance of SMKD is better in terms of communication cost, computational cost, and energy consumption.

A comprehensive high Reynolds number effects simulation method for wind pressures on cooling tower models

  • Cheng, X.X.;Zhao, L.;Ge, Y.J.;Dong, J.;Demartino, C.
    • Wind and Structures
    • /
    • v.24 no.2
    • /
    • pp.119-144
    • /
    • 2017
  • The traditional method for the simulation of high Reynolds number (Re) effects on wind loads on cooling tower models in wind tunnels focuses only on the mean wind pressure distribution. Based on observed effects of some key factors on static/dynamic flow characteristics around cooling towers, the study reported in this paper describes a comprehensive simulation method using both mean and fluctuating wind pressure distributions at high Re as simulation targets, which is indispensable for obtaining the complete full-scale wind effects in wind tunnels. After being presented in this paper using a case study, the proposed method is examined by comparing the full covariance matrices and the cross-spectral densities of the simulated cases with those of the full-scale case. Besides, the cooling tower's dynamic structural responses obtained using the simulated wind pressure fields are compared with those obtained by using the full-scale one. Through these works, the applicability and superiority of the proposed method is validated.

Accurate Range-free Localization Based on Quantum Particle Swarm Optimization in Heterogeneous Wireless Sensor Networks

  • Wu, Wenlan;Wen, Xianbin;Xu, Haixia;Yuan, Liming;Meng, Qingxia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.3
    • /
    • pp.1083-1097
    • /
    • 2018
  • This paper presents a novel range-free localization algorithm based on quantum particle swarm optimization. The proposed algorithm is capable of estimating the distance between two non-neighboring sensors for multi-hop heterogeneous wireless sensor networks where all nodes' communication ranges are different. Firstly, we construct a new cumulative distribution function of expected hop progress for sensor nodes with different transmission capability. Then, the distance between any two nodes can be computed accurately and effectively by deriving the mathematical expectation of cumulative distribution function. Finally, quantum particle swarm optimization algorithm is used to improve the positioning accuracy. Simulation results show that the proposed algorithm is superior in the localization accuracy and efficiency when used in random and uniform placement of nodes for heterogeneous wireless sensor networks.

Will My Customers Come Back? A Study of Beauty Salons in Taiwan

  • Lin, Yun-Yung;Lee, Tzong-Ru (Jiun-Shen);Lean, Hooi Hooi;Lan, Hsiang-Ying
    • Journal of Distribution Science
    • /
    • v.16 no.1
    • /
    • pp.73-85
    • /
    • 2018
  • Purpose - The beauty salon industry is a highly competitive market. Every beauty salon shop aims to keep its customers satisfied and hopes that they will revisit several times. Hence, this paper investigates the key factors affecting the repurchase intention of consumers in the beauty salon industry in Taiwan. Research design, data, and methodology - We first use the content analysis of free-response narratives from beauticians to classify the key factors objectively and develop the questionnaire accordingly. We then distribute the questionnaire to 130 beauty salon consumers to complete the questionnaire. Next, the Grey Relation Analysis is employed to identify the key factors that affect the repurchase intention of consumers in the beauty salon industry. Results - From the perspectives of the beauty salon customers, the factors affecting the repurchase intention of consumers are (1) obvious treatment results, (2) the treatment space considers personal privacy, (3) the offer of promotional prices for treatment/product trials, and (4) the product knowledge of the beauticians. From the perspectives of the beauticians, the factors include (1) the treatment space is well-designed and makes the customers feel relaxed, (2) enhancement of the customer relationship, (3) the treatment space considers personal privacy, and (4) the positive service attitude of the beauticians. Conclusions - We analyze all the key factors and offer some suggestions as a conclusion.

Key Factors Affecting Intention to Order Online Food Delivery (OFD)

  • SAN, Sing Su;DASTANE, Omkar
    • The Journal of Industrial Distribution & Business
    • /
    • v.12 no.2
    • /
    • pp.19-27
    • /
    • 2021
  • Purpose: This study investigated the impact of key factors such as service quality, perceived benefit and brand familiarity on a consumer's intention to order online food delivery (OFD). In addition, mediating effect of electronic word of mouth (e-WOM) between relationships among selected key variables and OFD purchase intention is also assessed. Research design, data and methodology: This explanatory, quantitative study employed convenience sampling and collected data through online structured questionnaire from 304 respondents who are users of OFD apps based in greater Klang valley region of Malaysia. The data was then subjected to normality and reliability assessment followed by confirmatory factor analysis, validity assessment and structural equation modelling using IBM SPSS AMOS 24.0. Results: Findings revealed that service quality, perceived benefits and brand familiarity affects purchase intention positively and significantly. Perceived benefits demonstrated highest impact on purchase intention followed by brand familiarity and service quality. Findings also suggest that e-WOM fully mediates relationship between brand familiarity and purchase intention, however, the same was not observed for remaining two variables. Conclusions: The study has enriched OFD literature by investigating impact of selected key factors on purchase intention in the context of OFD. Implications, limitations and future research avenues are then discussed.

Crosstalk evaluation in multiview autostereoscopic three-dimensional displays with an optimized diaphragm applied

  • Peng, Yi-Fan;Li, Hai-Feng;Zheng, Zhen-Rong;Xia, Xin-Xing;Yao, Zhi;Liu, Xu
    • Journal of Information Display
    • /
    • v.13 no.2
    • /
    • pp.83-89
    • /
    • 2012
  • The crosstalk evaluation of multiview autostereoscopic three-dimensional (3D) displays is discussed, with both the human and technical factors investigated via image quality assessment. In the imaging performance measurements and analysis for a multiview autostereoscopic display prototype equipment, it was inferred that crosstalk would have both a positive and a negative effect on the imaging performance of the equipment. The importance of the attached diaphragm in the crosstalk evaluation was proposed and then experimentally verified, using the developed prototype equipment. The luminance distribution and crosstalk situation were given, with two different diaphragm arrays applied. The analysis results showed that the imaging performance of this 3D display system can be improved with minimum changes to the system structure.

Study on Problems and Its Improvements of Legislation for Shop Key Money (상가권리금 법제화의 문제점과 개선방안 연구)

  • No, Han-Jang
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.11
    • /
    • pp.410-421
    • /
    • 2015
  • The purpose of this study is to review the contents of the legislation(2015.5.12.) for shop key money concretely and to find an effective way in making an improvement of practical protection in the process of tenant's shop key money collection. From this point of view, this study tries to make some legislative suggestions as follows. First of all, the code of conflicting definition between 'shop key money' and 'shop key money contract' in the amended Commercial Building Lease Protection Act need to be harmonized with each other because they are likely to face potential problems in the protection of tenant's shop key money collction as well as risks for confusion. In the second place, it requires to strengthen the protection of tenant's shop key money collection by approval of direct opposing power of shop key money itself on condition that it satisfies a certain prerequisites. In addition, the ambiguous codes related to the landlord's disturbance should be distinctly arranged and the distribution principle of demonstration about landlord's disturbance on tenant's shop key money collection also should be made clear. Finally, the standard level of shop key money by region, business district, and category of business should be set and announced by Ministry of Land and Transport.