• Title/Summary/Keyword: Key distribution

Search Result 2,530, Processing Time 0.032 seconds

Efficient Fault Tolerant Key Agreement for Ad-Hoc (Ad-Hoc 네트워크에서 링크 장애를 고려한 효율적인 키 협정 방법)

  • Lee, Young-Jun;Min, Sung-Gi;Lee, Sung-Jun
    • The Journal of Korean Association of Computer Education
    • /
    • v.7 no.1
    • /
    • pp.45-53
    • /
    • 2004
  • Ad-Hoc network is wireless network architecture without infrastructure. We encounter new types of security problems in Ad-Hoc networks because such networks have little or no support from infrastructure. Thus, wireless communications need security mechanisms in order to guarantee the integrity and the privacy of the communication, as well as the authentication of the entities involved. Many practical systems have been proposed. The most familiar system is the Diffie-Hellman key distribution system. This algorithm allows the establishment of a cryptographic secret key between two entities. If more than two users want to compute a common key, then a group key agreement system is used. This paper discusses several group key agreement systems and presents two efficient fault tolerant methods to perform successful group key agreement.

  • PDF

A Renewal Mechanism of Group Key on Digital Mobile Communication Employing the Fiat-shamir Method (Fiat-Shamir 방식을 적용한 디지털 모바일 통신 그룹키 갱신 메카니즘)

  • Tak, Dong-Kil;Chung, Il-Yong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.3
    • /
    • pp.571-578
    • /
    • 2006
  • To renew the group key securing on the mobile communication needs that it can be not oかy re-shared by all members of the group with the exception of members excluded but also prevented from making a fraudulent use of a terminal's registered key because of a leakage of information from the loss of terminal. In this paper, we propose an efficient renewal mechanism of group key in order for all members of the group to be able to get digital information and to perform the renewal of group key in a small-scale conference employing the Fiat-Shamir method. It can guarantee the security of terminals, since a terminal generates security information needed for key renewal, and then renews the group key for mutual communication.

A Study on the Fingerprint-based User Authentication Protocol Considering both the Mobility and Security in the Telematics Environment (텔레메틱스 환경에서 이동성과 보안성을 고려한 지문정보를 이용한 사용자 인증 프로토콜에 관한 연구)

  • Kim, Tae-Sub;Oh, Ryong;Lee, Sang-Joon;Lee, Sung-Ju;Kim, Hak-Jae;Chung, Yong-Wha;Cho, Choong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.11A
    • /
    • pp.1128-1137
    • /
    • 2007
  • Recently, according to being advanced internet, mobile communication technique, Telematics environment which users in vehicle can use internet service in LAN(Local Area Network) via mobile device has being realized. In this paper, we propose the remote user authentication protocol to solve these issues. Additionally, we use biometrics(fingerprint) for our user authentication protocol cause it can provide to avoid critical weakness that can be lost, stolen, or forgotten and to make authentication easily. In our user authentication protocol, to protect the biometric we use session key which is generated from master key distributed in our key distribution protocol. In particular, we propose secure protocol between APs considering weakness of security in mobile environment. Based on implementation of our proposed protocol, we conform that our proposed protocols are secure from various attack methods and provide real-time authentication.

Optimization of the anti-snow performance of a high-speed train based on passive flow control

  • Gao, Guangjun;Tian, Zhen;Wang, Jiabin;Zhang, Yan;Su, Xinchao;Zhang, Jie
    • Wind and Structures
    • /
    • v.30 no.4
    • /
    • pp.325-338
    • /
    • 2020
  • In this paper, the improvement of the anti-snow performance of a high-speed train (HST) is studied using the unsteady Reynolds-Averaged Navier-Stokes simulations (URANS) coupled with the Discrete Phase Model (DPM). The influences of the proposed flow control scheme on the velocity distribution of the airflow and snow particles, snow concentration level and accumulated mass in the bogie cavities are analyzed. The results show that the front anti-snow structures can effectively deflect downward the airflow and snow particles at the entrance of the cavities and alleviate the strong impact on the bogie bottom, thereby decrease the local accumulated snow. The rotational rear plates with the deflecting angle of 45° are found to present well deflecting effect on the particles' trajectories and force more snow to flow out of the cavities, and thus significantly reduce the accretion distribution on the bogie top. Furthermore, running speeds of HST are shown to have a great effect on the snow-resistance capability of the flow control scheme. The proposed flow control scheme achieves more snow reduction for HST at higher train's running speed in the cold regions.

Design of Quantum Key Distribution System without Fixed Role of Cryptographic Applications (암호장치의 송·수신자 역할 설정이 없는 양자키분배 시스템 설계)

  • Ko, Haeng-Seok;Ji, Se-Wan;Jang, Jingak
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.771-780
    • /
    • 2020
  • QKD(Quantum Key Distribution) is one of the protocols that can make two distant parties safely share secure keys against the threat of quantum computer. Generally, cryptographic applications which are connected to the QKD device have fixed roles as a transmitter and a receiver due to the race condition and complexity of implementation. Because the conventional QKD system is mainly applied to the link encryptor, there are no problems even if the roles of the cryptographic devices are fixed. We propose a new scheme of QKD system and protocol that is easy to extend to the QKD network by eliminating quantum key dependency between cryptographic device and QKD node. The secure keys which are generated by the TRNG(True Random Number Generator) are provided to the cryptographic applications instead of quantum keys. We design an architecture to transmit safely the secure keys using the inbound and outbound quantum keys which are shared between two nodes. In this scheme, since the dependency of shared quantum keys between two QKD nodes is eliminated, all cryptographic applicatons can be a master or a slave depending on who initiates the cryptographic communications.

A Multi-Level Access Control Scheme on Dynamic Multicast Services (동적 멀티캐스트 서비스상의 다단계 접근통제 기법)

  • 신동명;박희운;최용락
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.6
    • /
    • pp.47-58
    • /
    • 2002
  • The access control techniques, which can control unauthorized members to access to multicast service, have not been studied very often while there are a lot of on-going study on secure multicast architecture, multicast key distribution and sender authentication scheme have been studied. Multi level access control scheme in multicast can be used in a remote secure conference or to provide graduated multimedia services to each customers. In fact, multicast network has its own virtual networks according to different security levels. However, Early schemes are not effective when it protects unauthorized access in multi-access network environment. Furthermore this scheme does not provide us with hierarchical access control mechanism. This paper, therefore, proposes hierarchical access control scheme to provide the effectiveness in network layer by security level comparison. And we also suggests hierarchical key distribution scheme for multi level access control in application layer and effective hierarchical key renewal scheme in dynamic multicast environment which is easy to join and leaving the multicast group.

Analysis of cavity expansion based on general strength criterion and energy theory

  • Chao Li;Meng-meng Lu;Bin Zhu;Chao Liu;Guo-Yao Li;Pin-Qiang Mo
    • Geomechanics and Engineering
    • /
    • v.37 no.1
    • /
    • pp.9-19
    • /
    • 2024
  • This study presents an energy analysis for large-strain cavity expansion problem based on the general strength criterion and energy theory. This study focuses on the energy dissipation problem during the cavity expansion process, dividing the soil mass around the cavity into an elastic region and a plastic region. Assuming compliance with the small deformation theory in the elastic region and the large deformation theory in the plastic region, combined with the general strength criterion of soil mass and energy theory, the energy dissipation solution for cavity expansion problem is derived. Firstly, from an energy perspective, the process of cavity expansion in soil mass is described as an energy conversion process. The energy dissipation mechanism is introduced into the traditional analysis of cavity expansion, and a general analytical solution for cavity expansion related to energy is derived. Subsequently, based on this general analytical solution of cavity expansion, the influence of different strength criterion, large-strain, expansion radius, cavity shape and characteristics of soil mass on the stress distribution, displacement field and energy evolution around the cavity is studied. Finally, the effectiveness and reliability of theoretical solution is verified by comparing the results of typical pressure-expansion curves with existing literature algorithms. The results indicate that different strength criterion have a relatively small impact on the displacement and strain field around the cavity, but a significant impact on the stress distribution and energy evolution around the cavity.

Quorum-based Key Management Scheme in Wireless Sensor Networks

  • Wuu, Lih-Chyau;Hung, Chi-Hsiang;Chang, Chia-Ming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2442-2454
    • /
    • 2012
  • To ensure the security of wireless sensor networks, it is important to have a robust key management scheme. In this paper, we propose a Quorum-based key management scheme. A specific sensor, called as key distribution server (KDS), generates a key matrix and establishes a quorum system from the key matrix. The quorum system is a set system of subsets that the intersection of any two subsets is non-empty. In our scheme, each sensor is assigned a subset of the quorum system as its pre-distributed keys. Whenever any two sensors need a shared key, they exchange their IDs, and then each sensor by itself finds a common key from its assigned subset. A shared key is then generated by the two sensors individually based on the common key. By our scheme, no key is needed to be refreshed as a sensor leaves the network. Upon a sensor joining the network, the KDS broadcasts a message containing the joining sensor ID. After receiving the broadcast message, each sensor updates the key which is in common with the new joining one. Only XOR and hash operations are required to be executed during key update process, and each sensor needs to update one key only. Furthermore, if multiple sensors would like to have a secure group communication, the KDS broadcasts a message containing the partial information of a group key, and then each sensor in the group by itself is able to restore the group key by using the secret sharing technique without cooperating with other sensors in the group.

Theoretical prediction on thickness distribution of cement paste among neighboring aggregates in concrete

  • Chen, Huisu;Sluys, Lambertus Johannes;Stroeven, Piet;Sun, Wei
    • Computers and Concrete
    • /
    • v.8 no.2
    • /
    • pp.163-176
    • /
    • 2011
  • By virtue of chord-length density function from the field of statistical physics, this paper introduced a quantitative approach to estimate the distribution of cement paste thickness between aggregates in concrete. Dynamics mixing method based on molecular dynamics was employed to generate one model structure, then image analysis algorithm was used to obtain the distribution of thickness of cement paste in model structure for the purpose of verification. By comparison of probability density curves and cumulative probability curves of the cement paste thickness among neighboring aggregates, it is found that the theoretical results are consistent with the simulation. Furthermore, for the model mortar and concrete mixtures with practical volume fraction of Fuller-type aggregate, this analytical formula was employed to predict the influence of aggregate volume fraction and aggregate fineness. And evolution of its mean values were also investigated with the variation of volume fraction of aggregate as well as the fineness of aggregates in model mortars and concretes.