• Title/Summary/Keyword: Key generation

Search Result 1,491, Processing Time 0.021 seconds

APPLICATION OF $(\upsilon,\kappa,\lambda)$-CONFIGURATION TO GENERATION OF A CONFERENCE KEY

  • Chung, Il-Yong
    • Journal of applied mathematics & informatics
    • /
    • v.8 no.2
    • /
    • pp.531-537
    • /
    • 2001
  • In order for all participants at video conference to communicate mutually, the conference key should be necessary. In this paper, we present the communication protocol that generates a conference key efficiently based on $(\upsilon,\kappa,\lambda)$-configuration, one class of block designs, which minimizes message transmission overhead needed for this key. Especially, in the case of ${\lambda}=1$, the protocol requires only $O(\sqrt[v]{v})$ messages, where v is the number of participants.

A Design of SWAD-KNH Scheme for Sensor Network Security (센서 네트워크 보안을 위한 SWAD-KNH 기법 설계)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.6
    • /
    • pp.1462-1470
    • /
    • 2013
  • This paper proposes an SWAD-KNH(Sybil & Wormhole Attack Detection using Key, Neighbor list and Hop count) technique which consists of an SWAD(Sybil & Wormhole Attack Detection) module detecting an Worm attack and a KGDC(Key Generation and Distribution based on Cluster) module generating and an sense node key and a Group key by the cluster and distributing them. The KGDC module generates a group key and an sense node key by using an ECDH algorithm, a hash function, and a key-chain technique and distributes them safely. An SWAD module strengthens the detection of an Sybil attack by accomplishing 2-step key acknowledgement procedure and detects a Wormhole attack by using the number of the common neighbor nodes and hop counts of an source and destination node. As the result of the SWAD-KNH technique shows an Sybil attack detection rate is 91.2% and its average FPR 3.82%, a Wormhole attack detection rate is 90%, and its average FPR 4.64%, Sybil and wormhole attack detection rate and its reliability are improved.

Analysis and Design of a Multi-resonant Converter with a Wide Output Voltage Range for EV Charger Applications

  • Sun, Wenjin;Jin, Xiang;Zhang, Li;Hu, Haibing;Xing, Yan
    • Journal of Power Electronics
    • /
    • v.17 no.4
    • /
    • pp.849-859
    • /
    • 2017
  • This paper illustrates the analysis and design of a multi-resonant converter applied to an electric vehicle (EV) charger. Thanks to the notch resonant characteristic, the multi-resonant converter achieve soft switching and operate with a narrowed switching frequency range even with a wide output voltage range. These advantages make it suitable for battery charging applications. With two more resonant elements, the design of the chosen converter is more complex than the conventional LLC resonant converter. However, there is not a distinct design outline for the multi-resonant converters in existing articles. According to the analysis in this paper, the normalized notch frequency $f_{r2n}$ and the second series resonant frequency $f_{r3n}$ are more sensitive to the notch capacitor ratio q than the notch inductor ratio k. Then resonant capacitors should be well-designed before the other resonant elements. The peak gain of the converter depends mainly on the magnetizing inductor ratio $L_n$ and the normalized load Q. And it requires a smaller $L_n$ and Q to provide a sufficient voltage gain $M_{max}$ at ($V_{o\_max}$, $P_{o\_max}$). However, the primary current increases with $(L_nQ)^{-1}$, and results in a low efficiency. Then a detailed design procedure for the multi-resonant converter has been provided. A 3.3kW prototype with an output voltage range of 50V to 500V dc and a peak efficiency of 97.3 % is built to verify the design and effectiveness of the converter.

The Proposed of the Encryption Method and Designed of the Secure Key Using Initial Bad Block Information Physical Address of NAND Flash Memory (NAND Flash Memory의 초기 Bad Block 정보 물리주소를 이용한 보안키 설계와 암호화 기법 제안)

  • Kim, Seong Ryeol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.12
    • /
    • pp.2282-2288
    • /
    • 2016
  • Security key generation method by hardware or software related techniques have been variously proposed. This study analyzed the existing security key generation techniques, and propose the design of a new NAND Bad block based security key(NBSK) using a Bad Block information in the NAND flash memory, and propose a new encryption method using the same. Bad Block present in the NAND flash memory is also generated during production and sometimes occur during operations. Initial Bad Block information generated during production is not changed, Bad Block information that may occur during operation has a characteristic that can be changed periodically. This study is designed of the new secure key using initial Bad Block information physical address generated during manufacturing a NAND flash memory, and proposed of the new encryption method. With the proposed key and method can satisfy the general security characteristics, such as the creation and distribution of the secure key authentication and confidentiality and the simplicity of the security key.

Efficient and Security Enhanced Evolved Packet System Authentication and Key Agreement Protocol

  • Shi, Shanyu;Choi, Seungwon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.87-101
    • /
    • 2017
  • As people increasingly rely on mobile networks in modern society, mobile communication security is becoming more and more important. In the Long Term Evolution/System Architecture Evolution (LTE/SAE) architecture, the 3rd Generation Partnership (3GPP) team has also developed the improved Evolved Packet System Authentication and Key Agreement (EPS AKA) protocol based on the 3rd Generation Authentication and Key Agreement (3G AKA) protocol in order to provide mutual authentication and secure communication between the user and the network. Unfortunately, the EPS AKA also has several vulnerabilities such as sending the International Mobile Subscriber Identity (IMSI) in plain text (which leads to disclosure of user identity and further causes location and tracing of the user, Mobility Management Entity (MME) attack), man-in-middle attack, etc. Hence, in this paper, we analyze the EPS AKA protocol and point out its deficiencies and then propose an Efficient and Security Enhanced Authentication and Key agreement (ESE-EPS AKA) protocol based on hybrid of Dynamic Pseudonym Mechanism (DPM) and Public Key Infrastructure (PKI) retaining the original framework and the infrastructure of the LTE network. Then, our evaluation proves that the proposed new ESE-EPS AKA protocol is relatively more efficient, secure and satisfies some of the security requirements such as confidentiality, integrity and authentication.

Design of User Authentication and DRM Security System Using Security Agent (시큐리티 에이전트를 이용한 사용자 인증과 DRM 보안시스템 설계)

  • Kim Jung-Jae;Lee Kyung-Seog;Jun Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.12C no.7 s.103
    • /
    • pp.973-980
    • /
    • 2005
  • This paper proposes the more various key generation algorithms than existing method and the DRM encryption system supporting the higher security than the existing systems which do not store a symmetric key made by the key generation algorithm in a server. Also, we propose a client security agent system which decrypts a data by analogized key. We designed and implemented the proposed system And, we tested the video data files with the various sizes to evaluate the performance of our system Our experiment results show that the delay time which includes an encryption and decryption time was significantly reduced through our proposed scheme.

Submodule Level Distributed Maximum Power Point Tracking PV Optimizer with an Integrated Architecture

  • Wang, Feng;Zhu, Tianhua;Zhuo, Fang;Yi, Hao;Shi, Shuhuai
    • Journal of Power Electronics
    • /
    • v.17 no.5
    • /
    • pp.1308-1316
    • /
    • 2017
  • The distributed maximum power point tracking (DMPPT) concept is widely adopted in photovoltaic systems to avoid mismatch loss. However, the high cost and complexity of DMPPT hinder its further promotion in practice. Based on the concept of DMPPT, this paper presents an integrated submodule level half-bridge stack structure along with an optimal current point tracking (OCPT) control algorithm. In this full power processing integrated solution, the number of power switches and passive components is greatly reduced. On the other hand, only one current sensor and its related AD unit are needed to perform the ideal maximum power generation for all of the PV submodules in any irradiance case. The proposal can totally eliminate different small-scaled mismatch effects in real-word condition and the true maximum power point of each PV submodule can be achieved. As a result, the ideal maximum power output of the whole PV system can be achieved. Compared with current solutions, the proposal further develops the integration level of submodule DMPPT solutions with a lower cost and a smaller size. Moreover, the individual MPPT tracking for all of the submodules are guaranteed.

Efficient security mechanism in 3GPP-WLAN interworking (3GPP-WLAN interworking에서의 효율적인 보안 메커니즘)

  • 신상욱
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.137-144
    • /
    • 2004
  • 3GPP(3rd Generation Project Partnership)-WLAN(Wireless Local Area Network) interworking refers to the utilization of resources and access to services within the 3GPP system by the WLAN UE(User Equipment) and user respectively. The intent of 3GPP-WLAN Interworking is to extend 3GPP services and functionality to the WALN access environment. We propose an efficient mechanism for the setup of UE-initiated tunnels in 3GPP-WLAN interworking. The proposed mechanism is based on a secret key which is pre-distributed in the process of authentication and key agreement between UE and 3GPP AAA(Authentication, Authorization Accounting) server. Therefore it can avoid modular exponentiation and public key signature which need a large amount of computation in UE. Also the proposed scheme provides mutual authentication and session key establishment between UE and PDGW(Packet Data Gateway).

Provision of Two-area Automatic Generation Control by Demand-side Electric Vehicle Battery Swapping Stations

  • Xie, Pingping;Shi, Dongyuan;Li, Yinhong
    • Journal of Electrical Engineering and Technology
    • /
    • v.11 no.2
    • /
    • pp.300-308
    • /
    • 2016
  • Application of demand-side resources to automatic generation control (AGC) has a great significance for improving the dynamic control performance of power system frequency regulation. This paper investigates the possibility of providing regulation services by demand-side energy storage in electric vehicle battery swapping stations (BSS). An interaction framework, namely station-to-grid (S2G), is presented to integrate BSS energy storage into power grid for giving benefits to frequency regulation. The BSS can be regarded as a lumped battery energy storage station through S2G framework. A supplementary AGC method using demand-side BSS energy storage is developed considering the vehicle user demand of battery swapping. The effects to the AGC performance are evaluated through simulations by using a two-area interconnected power grid model with step and random load disturbance. The results show that the demand-side BSS can significantly suppress the frequency deviation and tie-line power fluctuations.

The Characteristics of Planar EMI Filter with Bi-Ground Layers Considering Impedance Mismatching

  • Wang, Shishang;Song, Zheng;Lou, Qianceng
    • Journal of Power Electronics
    • /
    • v.16 no.3
    • /
    • pp.1200-1208
    • /
    • 2016
  • Planar electromagnetic interference (EMI) filter has significant engineering significance to power electronic system integration and miniaturization. However, the value of differential mode capacitance cannot meet the demand of noise suppression because of the size limit of ceramics. In this case, the EMI filter of novel multilayers is recommended to address this issue. A novel integrated structure of EMI filter based on multilayer ceramic is proposed in this study. The inductance and capacitance of the new structure can be designed separately, which is an advantage in manufacturing. Insertion loss is measured more closely to the actual situation in this study, which is different from the condition where source and load impedances are both 50 Ω. In the process of designing a novel EMI filter, noise impedance is considered. Moreover, the prototype is created and applied to a small switching power supply, which verifies the effectiveness of the developed EMI filter.