• Title/Summary/Keyword: Key distribution

Search Result 2,530, Processing Time 0.032 seconds

Design and Implementation of Dynamic Group Key Management Protocol for Multicast Information Security (전자상거래를 위한 멀티캐스트 그를 키 관리 프로토콜 설계 및 구현)

  • 홍종준;김태우
    • Convergence Security Journal
    • /
    • v.2 no.1
    • /
    • pp.99-107
    • /
    • 2002
  • This paper proposes a group key management protocol for a secure of all the multicast user in PIM-SM multicast group communication under electronic commerce. Each subgroup manager gives a secure key to it's own transmitter and the transmitter compress the data with it's own secure key from the subgroup manager. Before the transmitter send the data to receiver, the transmitter prepares to encrypt a user's service by sending a encryption key to the receiver though the secure channel, after checking the user's validity through the secure channel. As the transmitter sending a data after then, the architecture is designed that the receiver will decode the received data with the transmitter's group key. Therefore, transmission time is shortened because there is no need to data translation by the group key on data sending and the data transmition is possible without new key distribution at path change to shortest path of the router characteristic.

  • PDF

Precise Distribution Simulation of Scattered Submunitions Based on Flight Test Data

  • Yun, Sangyong;Hwang, Junsik;Suk, Jinyoung
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.18 no.1
    • /
    • pp.108-117
    • /
    • 2017
  • This paper presents a distribution simulation model for dual purpose improved conventional munitions based on flight test data. A systematic procedure for designing a dispersion simulation model is proposed. A new accumulated broken line graph was suggested for designing the distribution shape. In the process of verification and simulation for the distribution simulation model, verification was performed by first comparing data with firing test results, and an application simulation was then conducted. The Monte Carlo method was used in the simulations, which reflected the relationship between ejection conditions and real distribution data. Before establishing the simulation algorithm, the dominant ejection parameter of the submunitions was examined. The relationships between ejection conditions and distribution results were investigated. Five key distribution parameters were analyzed with respect to the ejection conditions. They reflect the characteristics of clustered particle dynamics and aerodynamics.

Species Diversity of Hypogeous Ascomycetes in Israel

  • Barseghyan, Gayane S.;Wasser, Solomon P.
    • Mycobiology
    • /
    • v.38 no.3
    • /
    • pp.159-165
    • /
    • 2010
  • We conducted a species diversity study of the hypogeous Ascomycetes of Israel. The hypogeous Ascomycetes in Israel include members of the families Pyronemataceae, Pezizaceae, and Tuberaceae, which are represented by seven species: Hydnocystis piligera, Terfezia arenaria, T. claveryi, T. oligosperma, Tirmania africana, Tuber asa, and T. nitidum; only T. asa is new to Israeli mycobiota. Synonymy, locations, collection data, general distribution, distribution in Israel, descriptions, a key to identification, illustrations, and taxonomic remarks are provided.

A Flexibility Analysis of Depots Location Considering Physical Distribution Design (판매물류시스템 설계상 Depots 입지선정의 유연성 분석)

  • 강인선
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.24 no.65
    • /
    • pp.81-88
    • /
    • 2001
  • In logistics decision making, Key elements in the design of any physical distribution are the location of depots and the distribution of goods from the depots to the customers. Considering open and close the depots, This paper presents a flexible analysis on the combined location-routing problem(LRP) the case for variation capacity of vehicle and customers demands each. The scenario examples are given the use of heuristic(Saving-Drop) in LRP types. The results is useful in apply to the logistics environment changes.

  • PDF

Key Re-distribution Scheme of Dynamic Filtering Utilizing Attack Information for Improving Energy Efficiency in WSNs (무선 센서 네트워크에서 에너지 효율성 향상을 위해 공격정보를 활용한 동적 여과 기법의 키 재분배 기법)

  • Park, Dong-Jin;Cho, Tae-Ho
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.26 no.2
    • /
    • pp.113-119
    • /
    • 2016
  • Wireless sensor networks are vulnerable to an adversary due to scarce resources and wireless communication. An adversary can compromise a sensor node and launch a variety of attacks such as false report injection attacks. This attack may cause monetary damage resulting in energy drain by forwarding the false reports and false alarms at the base station. In order to address this problem, a number of en-route filtering schemes has been proposed. Notably, a dynamic en-route filtering scheme can save energy by filtering of the false report. In the key dissemination phase of the existing scheme, the nodes closer to the source node may not have matching keys to detect the false report. Therefore, continuous attacks may result in unnecessary energy wastage. In this paper, we propose a key re-distribution scheme to solve this issue. The proposed scheme early detects the false report injection attacks using initially assigned secret keys in the phase of the key pre-distribution. The experimental results demonstrate the validity of our scheme with energy efficiency of up to 26.63% and filtering capacity up to 15.92% as compared to the existing scheme.

Key Management for Secure Internet of Things(IoT) Data in Cloud Computing (클라우드 컴퓨팅에서 안전한 사물인터넷 데이터를 위한 키 관리)

  • Sung, Soon-hwa
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.353-360
    • /
    • 2017
  • The Internet of Things(IoT) security has more need than a technical problem as it needs series of regulations and faultless security system for common purposes. So, this study proposes an efficient key management in order that can be trusted IoT data in cloud computing. In contrast with a key distribution center of existing sensor networks, the proposed a federation key management of cloud proxy key server is not central point of administration and enables an active key recovery and update. The proposed key management is not a method of predetermined secret keys but sharing key information of a cloud proxy key server in autonomous cloud, which can reduce key generation and space complexity. In addition, In contrast with previous IoT key researches, a federation key of cloud proxy key server provides an extraction ability from meaningful information while moving data.

Key Success Factors of Blockchain Platform for Micro-enterprises

  • YANG, Mei-Hsiang;LEE, Tzong-Ru;CHANG, Tin-Chang
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.6 no.3
    • /
    • pp.283-293
    • /
    • 2019
  • The purposes of the study are threefold: (1) develop key successful factors of blockchain platform for micro-enterprises based on Balanced Scorecard (BSC), (2) find out the correlation between the key successful factors of blockchain platform for micro-enterprises, and (3) understand the perception of micro-enterprise blockchain and the difference between theoretical guidance and practical application. This study combines Interpretative Structural Modeling Method, (ISM) and Decision-Making Trial and Evaluation Laboratory (DEMATEL) to analyze the causal relationships and hierarchical structures of the 12 key successful factors of blockchain platform for micro-enterprises and understand the correlation between factors. The 12 key successful factors developed based on the four perspectives of the Balanced Scorecard, and the questionnaire designs based on the concept of DEMATEL, and then analyzed data by DEMATEL and ISM methods to understand the correlation between key factors. The research results show that the key successful factors of blockchain platform for micro-enterprises include "brand equity", "security and anti-counterfeiting", "sales growth", "transparency and clear", "trust", "consensus mechanism", "traceability", "consistency", "tracking", "innovation management", "international", "organizational adaptation", in which consumer "trust" plays an important role. Micro-enterprises can use blockchain to expand the market, provide customers with better service quality, and bring sales growth to micro-enterprises.

An ID-based entity-authentication and authenicated key exchange protocol with ECDSA (ECDSA를 적용한 ID 기반의 사용자 인증 및 키 교환 프로토콜)

  • 박영호;박호상;정수환
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.1
    • /
    • pp.3-10
    • /
    • 2002
  • This paper proposes an ID-based entity-aunthentication and authenticated key exchange protocol with ECC via two-pass communications between two parties who airs registered to the trusted third-party KC in advance. The proposed protocol developed by applying ECDSA and Diffie-Hellman key exchange scheme to the ID-based key distribution scheme over ECC proposed by H. Sakazaki, E. Okamoto and M. Mambo(SOM scheme). The security of this protocol is based on the Elliptic Curve Discrete Logarithm Problem(ECDLP) and the Elliptic Curve Diffie-Hellman Problem(ECDHP). It is strong against unknown key share attack and it provides the perfect forward secrecy, which makes up for the weakness in SOM scheme,

Analysis of key elements of single-layer dome structures against progressive collapse

  • Zhang, Qian;Huang, Wenxing;Xu, Yixiang;Cai, Jianguo;Wang, Fang;Feng, Jian
    • Steel and Composite Structures
    • /
    • v.42 no.2
    • /
    • pp.257-264
    • /
    • 2022
  • The analysis of the progressive collapse resistance of structures is a well-known issue among structural engineers. Large-span reticulated dome structures are commonly utilized in large public buildings, necessitating research into their progressive collapse resistance to assure user safety. The most significant part of improving the structural resilience of reticulated domes is to evaluate their key elements. Based on a stiffness-based evaluation approach, this work offers a calculating procedure for element importance coefficient. For both original and damaged structures, evaluations are carried out using the global stiffness matrix and the determinant. The Kiewitt, Schwedler, and Sunflower reticulated domes are investigated to explore the distribution characteristic of element importance coefficients in the single-layer dome structures. Moreover, the influences of the load levels, load distributions, geometric parameters and topological features are also discussed. The results can be regarded as the initial concept design reference for single-layer reticulated domes.

Relative Abundance of a Vector of Scrub Typhus, Leptotrombidium sialkotense, in Southern Yunnan Province, China

  • Lv, Yan;Guo, Xian-Guo;Jin, Dao-Chao;Song, Wen-Yu;Fan, Rong;Zhao, Cheng-Fu;Zhang, Zhi-Wei;Mao, Ke-Yu;Zou, Yun-Ji;Yang, Zhi-Hua
    • Parasites, Hosts and Diseases
    • /
    • v.58 no.2
    • /
    • pp.153-159
    • /
    • 2020
  • The chigger mite Leptotrombidium sialkotense is one of the 6 main vectors of scrub typhus in China. Before present study, L. sialkotense was found in some parts of Hunan province, China with a narrow geographical distribution. During field investigation 2016-2017, we found L. sialkotense in Jingha, southern Yunnan, China. Of 15 small mammal host species, L. sialkotense were collected from 6 species of the hosts. Rattus brunneusculus was a dominant host of L. sialkotense, from which 98.3% of the mites were collected. The chigger mite showed a relatively high infestation prevalence (PM =11.7%) and mean abundance (MA=0.5) in comparison with the rest 5 host species. These results reveal a certain host specificity of L. sialkotense to a rat R. brunneusculus. The mite L. sialkotense showed an aggregated distribution on the host (P<0.05). A positive correlation observed between L. sialkotense and the body length of hosts. There was a positive interspecific association between L. sialkotense and 2 other dominant vectors, L. deliense and L. scutellare.