• Title/Summary/Keyword: Key distribution

Search Result 2,530, Processing Time 0.033 seconds

A combined stochastic diffusion and mean-field model for grain growth

  • Zheng, Y.G.;Zhang, H.W.;Chen, Z.
    • Interaction and multiscale mechanics
    • /
    • v.1 no.3
    • /
    • pp.369-379
    • /
    • 2008
  • A combined stochastic diffusion and mean-field model is developed for a systematic study of the grain growth in a pure single-phase polycrystalline material. A corresponding Fokker-Planck continuity equation is formulated, and the interplay/competition of stochastic and curvature-driven mechanisms is investigated. Finite difference results show that the stochastic diffusion coefficient has a strong effect on the growth of small grains in the early stage in both two-dimensional columnar and three-dimensional grain systems, and the corresponding growth exponents are ~0.33 and ~0.25, respectively. With the increase in grain size, the deterministic curvature-driven mechanism becomes dominant and the growth exponent is close to 0.5. The transition ranges between these two mechanisms are about 2-26 and 2-15 nm with boundary energy of 0.01-1 J $m^{-2}$ in two- and three-dimensional systems, respectively. The grain size distribution of a three-dimensional system changes dramatically with increasing time, while it changes a little in a two-dimensional system. The grain size distribution from the combined model is consistent with experimental data available.

Efficient Post-Processing for Quantum Communication Systems (양자 통신 시스템의 효율적 후처리 방식)

  • Lee, Sun Yui;Jung, Kuk Hyun;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.4
    • /
    • pp.7-12
    • /
    • 2014
  • Quantum cryptography is one of the most feasible fields using quantum mechanics. Therefore, quantum cryptography has consistently been researched, and a variety of cryptographic exchange method has been developed, such as BB84, etc. This paper explains a basic concept of quantum communications and quantum key distribution systems using quantum mechanics. Also, it introduces a reason of the development of quantum cryptography and attack scenarios which threaten the security of QKD. Finally, the experiment of this paper simulates quantum key attack by estimating qubit phases through a modeled quantum channel, and discusses needs of post-processing methods for overcoming eavesdropping.

WiBro Network Authentication and TEK establishment using DH key distribution on PKMv2 RSA based authentication (PKMv2 RSA 기반 인증에서의 DH키 분배를 적용한 WiBro 무선네트워크의 인증 및 TEK 생성)

  • Lee, Hyoung Seob;Cho, Chi Hyun;Kim, Kyung Tae;Youn, Hee Yong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.1010-1013
    • /
    • 2007
  • 와이브로 서비스는 고속 이동 인터넷 환경 속에서 고속으로 무선 인터넷 서비스를 제공하는 기술이다. 기존의 무선인터넷 서비스와 달리 이동성을 제공한다는 점에서 차별화를 제공한다. 이렇게 이동하는 단말에게 양질의 데이터를 안전하게 전송하기 위해서는 보안기술이 중요한 요소로 작용한다. 서비스를 제공하기 전에 단말(Mobile Station)과 RAS(Radio Access Stations)간의 인증을 바탕으로 상호 키(TEK:Traffic Encryption Key)를 분배하고 TEK를 바탕으로 데이터를 암호화해서 전송하게 된다. 기존의 인증 프로토콜에서는 RAS에서 단독으로 키를 생성하는 방식이지만, 본 논문에서는 기존의 프로토콜의 문제점으로 지적된 Replay Attack에 대해 DH(Diffie-Hellman) 키 분배(Key Distribution) 방식을 적용하는 프로토콜을 제안함으로써 취약점에 대비 하였다. 이를 통해 RAS에 집중되는 키 생성에 대한 오버헤드를 단말에 분산 시킬 수 있다. 이로써 제안된 프로토콜을 사용해서 기존의 프로토콜을 사용했을 때보다 보안강도를 높일 수 있다.

  • PDF

Review of Revenue Sharing Contract: Evaluating its Role for Supply Chain Coordination

  • RYU, Chungsuk
    • The Journal of Industrial Distribution & Business
    • /
    • v.13 no.3
    • /
    • pp.1-12
    • /
    • 2022
  • Purpose: The revenue sharing contract has been widely used in industries, and its ability to coordinate the supply chain system has been studied by numerous researchers. By reviewing the representative studies on the revenue sharing contract, this study intends to analyze the key features of this coordinating contract and identify its potential to be a more advanced coordination program than the original contract. Research design, data, and methodology: This study reviews past studies on the revenue sharing contract. The selected studies are investigated with a focus on how this contract is described to realize the supply chain coordination and the key issues that they address. Results: The literature review reveals that the revenue sharing contract requires standardized details about what and how to share. This study also finds additional issues that need to be addressed by researchers to improve this coordinating contract. Conclusions: Future researchers are advised to unify the detailed contents of the revenue sharing contract to confirm that it successfully coordinates the supply chain system. In addition, this study proposes key research issues that would enhance the role of revenue sharing contract as a supply chain coordination program.

Localized reliability analysis on a large-span rigid frame bridge based on monitored strains from the long-term SHM system

  • Liu, Zejia;Li, Yinghua;Tang, Liqun;Liu, Yiping;Jiang, Zhenyu;Fang, Daining
    • Smart Structures and Systems
    • /
    • v.14 no.2
    • /
    • pp.209-224
    • /
    • 2014
  • With more and more built long-term structural health monitoring (SHM) systems, it has been considered to apply monitored data to learn the reliability of bridges. In this paper, based on a long-term SHM system, especially in which the sensors were embedded from the beginning of the construction of the bridge, a method to calculate the localized reliability around an embedded sensor is recommended and implemented. In the reliability analysis, the probability distribution of loading can be the statistics of stress transferred from the monitored strain which covered the effects of both the live and dead loads directly, and it means that the mean value and deviation of loads are fully derived from the monitored data. The probability distribution of resistance may be the statistics of strength of the material of the bridge accordingly. With five years' monitored strains, the localized reliabilities around the monitoring sensors of a bridge were computed by the method. Further, the monitored stresses are classified into two time segments in one year period to count the loading probability distribution according to the local climate conditions, which helps us to learn the reliability in different time segments and their evolvement trends. The results show that reliabilities and their evolvement trends in different parts of the bridge are different though they are all reliable yet. The method recommended in this paper is feasible to learn the localized reliabilities revealed from monitored data of a long-term SHM system of bridges, which would help bridge engineers and managers to decide a bridge inspection or maintenance strategy.

A Study of Key Pre-distribution Scheme in Hierarchical Sensor Networks (계층적 클러스터 센서 네트워크의 키 사전 분배 기법에 대한 연구)

  • Choi, Dong-Min;Shin, Jian;Chung, Il-Yong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.43-56
    • /
    • 2012
  • Wireless sensor networks consist of numerous small-sized nodes equipped with limited computing power and storage as well as energy-limited disposable batteries. In this networks, nodes are deployed in a large given area and communicate with each other in short distances via wireless links. For energy efficient networks, dynamic clustering protocol is an effective technique to achieve prolonged network lifetime, scalability, and load balancing which are known as important requirements. this technique has a characteristic that sensing data which gathered by many nodes are aggregated by cluster head node. In the case of cluster head node is exposed by attacker, there is no guarantee of safe and stable network. Therefore, for secure communications in such a sensor network, it is important to be able to encrypt the messages transmitted by sensor nodes. Especially, cluster based sensor networks that are designed for energy efficient, strongly recommended suitable key management and authentication methods to guarantee optimal stability. To achieve secured network, we propose a key management scheme which is appropriate for hierarchical sensor networks. Proposed scheme is based on polynomial key pool pre-distribution scheme, and sustain a stable network through key authentication process.

The development of high fidelity Steam Generator three dimensional thermal hydraulic coupling code: STAF-CT

  • Zhao, Xiaohan;Wang, Mingjun;Wu, Ge;Zhang, Jing;Tian, Wenxi;Qiu, Suizheng;Su, G.H.
    • Nuclear Engineering and Technology
    • /
    • v.53 no.3
    • /
    • pp.763-775
    • /
    • 2021
  • The thermal hydraulic performances of Steam Generator (SG) under both steady and transient operation conditions are of great importance for the safety and economy in nuclear power plants. In this paper, based on our self-developed SG thermal hydraulic analysis code STAF (Steam-generator Thermalhydraulic Analysis code based on Fluent), an improved new version STAF-CT (fully Coupling and Transient) is developed and introduced. Compared with original STAF, the new version code STAF-CT has two main functional improvements including "Transient" and "Fully Three Dimensional Coupling" features. In STAF-CT, a three dimensional energy transferring module is established which can achieve energy exchange computing function at the corresponding position between two sides of SG. The STAF-CT is validated against the international benchmark experiment data and the results show great agreement. Then the U-shaped SG in AP1000 nuclear power plant is modeled and simulated using STAF-CT. The results show that three dimensional flow fields in the primary side make significant effect on the energy source distribution between two sides. The development of code STAF-CT in this paper can provide an effective method for further SG high fidelity research in the nuclear reactor system.

Impact of Outdated CSI on the Performance of Incremental Amplify-and-Forward Opportunistic Relaying

  • Zhou, Tsingsong;Gao, Qiang;Fei, Li
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.6
    • /
    • pp.2567-2582
    • /
    • 2016
  • This paper investigates the impact of outdated channel state information (CSI) on the performance of the incremental amplify-and-forward (AF) opportunistic relaying (OR) over dual-hop Rayleigh fading channels. According to the definition of distribution function, we obtain the cumulative distribution function (CDF) of the actual combined signal-to-noise ratio (SNR) received at the destination. Based on this CDF, the closed-form expressions of the average spectral efficiency and outage probability are derived for the incremental AF OR under outdated CSI. Numerical results show that in the low region of the average SNR of the direct link, outdated CSI deteriorates the system performance, whereas in the high region, outdated CSI has almost no impact on the system performance.

Notes on Lichen Genus Buellia De Not. (lichenized Ascomycetes) from South Korea

  • Joshi, Yogesh;Wang, Xin Yu;Lokos, Laszlo;Koh, Young-Jin;Hur, Jae-Seoun
    • Mycobiology
    • /
    • v.38 no.1
    • /
    • pp.65-69
    • /
    • 2010
  • Based on a literature survey and assessment of the important features of lichen genus Buellia (spore shape and size, anatomy of the exciple as well as analysis of the lichen substances), the present paper describes four new records of B. maritima, B. polyspora, B. spuria and B. stellulata from South Korea. Among them, B. maritima and B. polyspora are firstly reported in East Asia including in China, the Korean Peninsula and Japan. Brief description of all the new records along with earlier described species placed under genus Amandinea and Hafellia are provided with their distribution and chemistry. A key to all the Buellia species reported so far from South Korea is also provided.

A Reliable 2-mode Authentication Framework for Wireless Sensor Network (무선 센서네트워크를 위한 신뢰성 있는 2-모드 인증 프레임워크)

  • Huyen, Nguyen Thi Thanh;Huh, Eui-Nam
    • Journal of Internet Computing and Services
    • /
    • v.10 no.3
    • /
    • pp.51-60
    • /
    • 2009
  • This paper proposes a reliable 2-mode authentication framework for probabilistic key pre-distribution in Wireless Sensor Network (WSN) that guarantees the safe defense against different kinds of attacks: Hello flood attacks, Wormhole attacks, Sinkhole attack, location deployment attacks, and Man in the middle attack. The mechanism storing the trust neighbor IDs reduces the dependence on the cluster head and as the result; it saves the power energy for the authentication process as well as provides peer-to-peer communication.

  • PDF