• Title/Summary/Keyword: Key distribution

Search Result 2,530, Processing Time 0.026 seconds

Effective group key management protocol for secure multicast communication (안전한 멀티캐스트 통신을 위한 효율적인 그룹키 관리 프로토콜)

  • 이현종;김진철;오영환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.7C
    • /
    • pp.733-742
    • /
    • 2003
  • Unlikely unicast transmission, there are many elements that threaten security. Thus, key management of creating and distributing group keys to authorized group members is a critical aspect of secure multicast operations. To offer security in multicast environment, the recent researches are related to most group key distribution. In this thesis, we propose a group key management protocol for efficient, scalable, and multicast operation. This proposed protocol architecture can distribute traffic centralized to the key server. since the group key rekeyed by sub-group manager. The detailed simulation compared with other group key management protocol show that the proposed group key management protocol is better for join, leave, and data latency.

Design Self-Organization Routing Protocol for supporting Data Security in Healthcare Sensor Network (헬스케어 센서 네트워크에서 데이터 보안을 지원한 자기구성 라우팅 프로토콜 설계)

  • Nam, Jin-Woo;Chung, Yeong-Jee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.517-520
    • /
    • 2008
  • Wireless sensor network supporting healthcare environment should provide customized service in accordance with context information such as continuous location change and status information for people or movable object. In addition, we should consider data transmission guarantees a person's bio information and privacy security provided through sensor network. In this paper analyzes LEACH protocol which guarantees the dynamic self-configuration, energy efficiency through configuration of inter-node hierarchical cluster between nodes and key distribution protocol used for security for data transmission between nodes. Based on this analysis result, we suggested self-configuration routing protocol supporting node mobility which is weakness of the existing LEACH protocol and data transmission method by applying key-pool pre-distribution method whose memory consumption is low, cluster unit public key method to sensor node.

  • PDF

Mechanical analysis for prestressed concrete containment vessels under loss of coolant accident

  • Zhou, Zhen;Wu, Chang;Meng, Shao-ping;Wu, Jing
    • Computers and Concrete
    • /
    • v.14 no.2
    • /
    • pp.127-143
    • /
    • 2014
  • LOCA (Loss Of Coolant Accident) is one of the most important utmost accidents for Prestressed Concrete Containment Vessel (PCCV) due to its coupled effect of high temperature and inner pressure. In this paper, heat conduction analysis is used to obtain the LOCA temperature distribution of PCCV. Then the elastic internal force of PCCV under LOCA temperature is analyzed by using both simplified theoretical method and FEM (finite element methods) method. Considering the coupled effect of LOCA temperature, a nonlinear elasto-plasitic analysis is conducted for PCCV under utmost internal pressure considering three failure criteria. Results show that the LOCA temperature distribution is strongly nonlinear along the shell thickness at the early time; the moment result of simplified analysis is well coincident with the one of numerical analysis at weak constraint area; while in the strong constrained area, the value of moments and membrane forces fluctuate dramatically; the simplified and numerical analysis both show that the maximum moment occurs at 6hrs after LOCA.; the strain of PCCV under LOCA temperature is larger than the one of no temperature under elasto-plastic analysis; the LOCA temperature of 6hrs has the greatest influence on the ultimate bearing capacity with 8.43% decrease for failure criteria 1 and 2.65% decrease for failure criteria 3.

Equivalent static wind loads analysis of tall television towers considering terrain factors of hilltops based on force measurement experiment

  • Ke, Shitang;Wang, Hao;Ge, Yaojun;Zhao, Lin;Cao, Shuyang
    • Structural Engineering and Mechanics
    • /
    • v.63 no.4
    • /
    • pp.509-519
    • /
    • 2017
  • Wind field in mountainous regions demonstrates unique distribution characteristic as compared with the wind field of the flat area, wind load and wind effect are the key considerations in structural design of television towers situated in mountainous regions. The television tower to be constructed is located at the top of Xiushan Mountain in Nanjing, China. In order to investigate the impact of terrain factors of hilltops on wind loads, firstly a wind tunnel test was performed for the mountainous area within 800m from the television tower. Then the tower basal forces such as bending moments and shear strength were obtained based on high frequency force balance (HFFB) test. Based on the experiments, the improved method for determining the load combinations was applied to extract the response distribution patterns of foundation internal force and peak acceleration of the tower top, then the equivalent static wind loads were computed under different wind angles, load conditions and equivalent goals. The impact of terrain factors, damping ratio and equivalent goals on the wind load distribution of a television tower was discussed. Finally the equivalent static wind loads of the television tower under the 5 most adverse wind angles and 5 most adverse load conditions were computed. The experimental method, computations and research findings provide important references for the anti-wind design of high-rise structure built on hilltops.

USING SATELLITE SYNTHETIC APERTURE RADAR IMAGERY TO MAP OIL SPILLS IN THE EAST CHINA SEA

  • Shi, Lijian;Ivanov, Andrei Yu.;He, Mingxia;Zhao, Chaofang
    • Proceedings of the KSRS Conference
    • /
    • v.2
    • /
    • pp.981-984
    • /
    • 2006
  • Oil pollution of the ocean is a major environmental problem, especially in its coastal zones. Synthetic aperture radar (SAR) flown on satellites, such as ERS-2 and Envisat, has been proved to be a useful tool in oil spill monitoring due to its wide coverage, day and night, and all-weather capability. The total 120 SAR images containing oil spill over the East China Sea were collected and analyzed, ranging in date from July 23, 2002 to November 11, 2005. After preprocessed, SAR images were segmented by adaptive threshold method. The oil spill images were incorporated into GIS after distinguished from look-like phenomena, finally we presented the oil spills distribution map for the East China Sea. The wide-swath and quick-looks SAR imagery for mapping of oil spill distribution over large marine areas were proved to be useful when full resolution data are not available. After the temporal and spatial distribution of the oil spills were analyzed, we found that most of oil spills were distributed along the main ship routes, which means the illegal discharge by ships, and the occurrence of oil spill detected on SAR images acquired during morning and summer is much higher than during evening and winter.

  • PDF

PPNC: Privacy Preserving Scheme for Random Linear Network Coding in Smart Grid

  • He, Shiming;Zeng, Weini;Xie, Kun;Yang, Hongming;Lai, Mingyong;Su, Xin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.3
    • /
    • pp.1510-1532
    • /
    • 2017
  • In smart grid, privacy implications to individuals and their families are an important issue because of the fine-grained usage data collection. Wireless communications are utilized by many utility companies to obtain information. Network coding is exploited in smart grids, to enhance network performance in terms of throughput, delay, robustness, and energy consumption. However, random linear network coding introduces a new challenge for privacy preserving due to the encoding of data and updating of coefficients in forwarder nodes. We propose a distributed privacy preserving scheme for random linear network coding in smart grid that considers the converged flows character of the smart grid and exploits a homomorphic encryption function to decrease the complexities in the forwarder node. It offers a data confidentiality privacy preserving feature, which can efficiently thwart traffic analysis. The data of the packet is encrypted and the tag of the packet is encrypted by a homomorphic encryption function. The forwarder node random linearly codes the encrypted data and directly processes the cryptotext tags based on the homomorphism feature. Extensive security analysis and performance evaluations demonstrate the validity and efficiency of the proposed scheme.

Study of Document Distribution System Architecture for Digital Secret Document Leakage Prevention (전자기밀문서 유출봉쇄 유통시스템 구조 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.143-158
    • /
    • 2010
  • The illegal leakage of enterprise digital confidential information will threaten the enterprise with bankruptcy. Today since most small-and-medium companies have no capability to fight against illegally compromising their critically confidential documents in spite of knowing the leakage of them, strongly safe distribution system of the digital confidential documents should be designed so in secure as to prevent any malicious intent of embezzlement from accessing the critical information. Current DRM-based protection system is not always perfect to protect the digital secrets, even seems to leave the secrets open. Therefore our study has analyzed the illegal leakage paths that hackers attack against and the vulnerability of the current protection systems. As result, we study the group communication based system architecture satisfying the security conditions to make even legitimate working employee keep out of the confidential documents, without performance degradation. The main idea of this architecture is to stay every secrets in encrypted form; to isolate the encrypted documents from the crypto-key; to associate every entity with one activity and to authenticate every entity with DSA-based public key system; multiple authentication method make hackers too busy to get a privilege to access the secrets with too many puzzle pieces. This paper deal with the basic architectural structure for the above issues.

An Efficient and Secure Group Key Distribution Protocol for IP-based Pay-TV Systems (IP기반의 Pay-TV 시스템을 위한 안전하고 효율적인 그룹 키 분배 프로토콜)

  • Kim, Jung-Yoon;Choi, Hyoung-Kee
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.199-208
    • /
    • 2009
  • Recently,IP-based broadcasting systems,such as Mobile-TV and IP-TV, have been widely deployed. These systems require a security system to allow only authorized subscribers access to broadcasting services. We analyzed the Conditional Access System, which is a security system used in the IP-based Pay-TV systems. A weakness of the system is that it does not scale well when the system experiences frequent membership changes. In this paper, we propose a group key distribution protocol which overcomes the scalability problem by reducing communication and computation overheads without loss of security strength. Our experimental results show that computation delay of the proposed protocol is smaller than one of the Conditional Access System. This is attributed to the fact that the proposed protocol replaces expensive encryption and decryption with relatively inexpensive arithmetic operations. In addition, the proposed protocol can help to set up a secure channel between a server and a client with the minimum additional overhead.

A Key distribution Scheme for Information Security at Wireless Sensor Networks (무선 센서 네트워크에서 정보 보호를 위한 키 분배 기법)

  • Kim, Hoi-Bok;Shin, Jung-Hoon;Kim, Hyoung-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.6
    • /
    • pp.51-57
    • /
    • 2009
  • Wireless sensor networks consist of numerous sensor nodes that have inexpensive and limited resources. Generally, most of the sensors are assigned to the hazardous or uncontrollable environments. If the sensor nodes are randomly assigned to the wide target area, it is very hard to see the accurate locations of sensor nodes. Therefore, this study provides an efficient key distribution scheme to solve these problems. Based on the provided scheme, the study enabled the closely neighboring nodes to exchange information with each other after securing safe links by using the pre-distributed keys. At the same time, the provided scheme could increase the probability of multiparty key detection among nodes by using the location information of sensor node. Lastly, the study intended to show the superiority of the limitation method through a performance test.

Wind-sand coupling movement induced by strong typhoon and its influences on aerodynamic force distribution of the wind turbine

  • Ke, Shitang;Dong, Yifan;Zhu, Rongkuan;Wang, Tongguang
    • Wind and Structures
    • /
    • v.30 no.4
    • /
    • pp.433-450
    • /
    • 2020
  • The strong turbulence characteristic of typhoon not only will significantly change flow field characteristics surrounding the large-scale wind turbine and aerodynamic force distribution on surface, but also may cause morphological evolution of coast dune and thereby form sand storms. A 5MW horizontal-axis wind turbine in a wind power plant of southeastern coastal areas in China was chosen to investigate the distribution law of additional loads caused by wind-sand coupling movement of coast dune at landing of strong typhoons. Firstly, a mesoscale Weather Research and Forecasting (WRF) mode was introduced in for high spatial resolution simulation of typhoon "Megi". Wind speed profile on the boundary layer of typhoon was gained through fitting based on nonlinear least squares and then it was integrated into the user-defined function (UDF) as an entry condition of small-scaled CFD numerical simulation. On this basis, a synchronous iterative modeling of wind field and sand particle combination was carried out by using a continuous phase and discrete phase. Influencing laws of typhoon and normal wind on moving characteristics of sand particles, equivalent pressure distribution mode of structural surface and characteristics of lift resistance coefficient were compared. Results demonstrated that: Compared with normal wind, mesoscale typhoon intensifies the 3D aerodynamic distribution mode on structural surface of wind turbine significantly. Different from wind loads, sand loads mainly impact on 30° ranges at two sides of the lower windward region on the tower. The ratio between sand loads and wind load reaches 3.937% and the maximum sand pressure coefficient is 0.09. The coupling impact effect of strong typhoon and large sand particles is more significant, in which the resistance coefficient of tower is increased by 9.80% to the maximum extent. The maximum resistance coefficient in typhoon field is 13.79% higher than that in the normal wind field.