• Title/Summary/Keyword: Key share

Search Result 443, Processing Time 0.029 seconds

Price-based Resource Allocation for Virtualized Cognitive Radio Networks

  • Li, Qun;Xu, Ding
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.10
    • /
    • pp.4748-4765
    • /
    • 2016
  • We consider a virtualized cognitive radio (CR) network, where multiple virtual network operators (VNOs) who own different virtual cognitive base stations (VCBSs) share the same physical CBS (PCBS) which is owned by an infrastructure provider (InP), sharing the spectrum with the primary user (PU). The uplink scenario is considered where the secondary users (SUs) transmit to the VCBSs. The PU is protected by constraining the interference power from the SUs. Such constraint is applied by the InP through pricing the interference. A Stackelberg game is formulated to jointly maximize the revenue of the InP and the individual utilities of the VNOs, and then the Stackelberg equilibrium is investigated. Specifically, the optimal interference price and channel allocation for the VNOs to maximize the revenue of the InP and the optimal power allocation for the SUs to maximize the individual utilities of the VNOs are derived. In addition, a low‐complexity ±‐optimal solution is also proposed for obtaining the interference price and channel allocation for the VNOs. Simulations are provided to verify the proposed strategies. It is shown that the proposed strategies are effective in resource allocation and the ±‐optimal strategy achieves practically the same performance as the optimal strategy can achieve. It is also shown that the InP will not benefit from a large interference power limit, and selecting VNOs with higher unit rate utility gain to share the resources of the InP is beneficial to both the InP and the VNOs.

An Effects of the Distribution Information Technology Application on the Communication strategies and CRM performance (유통정보기술 활용이 커뮤니케이션 전략과 CRM 성과에 미치는 영향)

  • Moon, Jang-sil
    • Journal of Distribution Science
    • /
    • v.8 no.2
    • /
    • pp.13-22
    • /
    • 2010
  • Customer Relationship Management(CRM) paradigm has emerged that suggests organizations will be more successfully if they concentrate on obtaining and maintaining a share of each customer rather than a share of the entire market, with information technology(IT) being the enabling factor. This paper presents five key elements that provide the necessary steps that allow and organization to position its people, business process, and information system to establish and take advantage of this paradigm. The key elements are : (1) IT investment, (2) Website application, (3) IT System application, (4) Communication strategies, (5) CRM Performance. The results show that IT investment, IT system application, and Website application play a vital role in enhancing an Organizational Communication. Also, the results show that IT investment, IT system application, Website application, and Organizational Communication play a vital role in enhancing an organization's performance of customer relationship management. Further, this paper discusses the importance of integrating these four elements for achieving effective customer interaction. The author provides academical and managerial implication for business strategies.

  • PDF

The Impact of SSM Market Entry on Changes in Market Shares among Retailing Types (기업형 슈퍼마켓(SSM)의 시장진입이 소매업태간 시장점유율 변화에 미친 영향)

  • Choi, Ji-Ho;Yonn, Min-Suk;Moon, Youn-Hee;Choi, Sung-Ho
    • Journal of Distribution Research
    • /
    • v.17 no.3
    • /
    • pp.115-132
    • /
    • 2012
  • This study empirically examines the impact of SSM market entry on changes in market shares among retailing types. The data is monthly time-series data spanning over the period from January 2000 to December 2010, and the effect of SSM market entry on market shares of retailing types is analyzed by utilizing several key factors such as the number of new SSM monthly entrants, total number of SSMs, the proportion of new SSM entrant that is smaller than $165m^2$ to total new SSM entrants. According to the Korean Standard Industrial Classification codes, the retailing type is classified into 5 groups: department stores, retail sale in other non-specialized large stores(big marts), supermarkets, convenience stores, and retail sale in other non-specialized stores with food or beverages predominating (others). The market shares of retailing types are calculated by the ratio of each retailing type monthly sales to total monthly retailing sales in which total retailing sales is the sum of each retailing type sales. The empirical model controls for the size effects with the number of monthly employees for each retailing type and the macroeconomic effects with M2. The empirical model employed in this study is as follows; $$MS_i=f(NewSSM,\;CumSSM,\;employ_i,\;under165,\;M2)$$ where $MS_i$ is the market share of each retailing type (department stores, big marts), supermarkets, convenience stores, and others), NewSSM is the number of new SSM monthly entrants, CumSSM is total number of SSMs, $employ_i$ is the number of monthly employees for each retailing type, and under165 is the proportion of new SSM entrant that is smaller than $165m^2$ to total new SSM entrants. The correlation among these variables are reported in

    .
    shows the descriptive statistics of the sample. Sales is the total monthly revenue of each retailing type, employees is total number of monthly employees for each retailing type, area is total floor space of each retail type($m^2$), number of store is total number of monthly stores for each retailing type, market share is the ratio of each retailing type monthly sales to total monthly retailing sales in which total retailing sales is the sum of each retailing type sales, new monthly SSMs is total number of new monthly SSM entrants, and M2 is a money supply. The empirical results of the effect of new SSM market entry on changes in market shares among retailing types (department stores, retail sale in other non-specialized large stores, supermarkets, convenience stores, and retail sale in other non-specialized stores with food or beverages predominating) are reported in
    . The dependant variables are the market share of department stores, the market share of big marts, the market share of supermarkets, the market share of convenience stores, and the market share of others. The result shows that the impact of new SSM market entry on changes in market share of retail sale in other non-specialized large stores (big marts) is statistically significant. Total number of monthly SSM stores has a significant effect on market share, but the magnitude and sign of effect is different among retailing types. The increase in the number of SSM stores has a negative effect on the market share of retail sale in other non-specialized large stores(big marts) and convenience stores, but has a positive impact on the market share of department stores, supermarkets, and retail sale in other non-specialized stores with food or beverages predominating (others). This study offers the theoretical and practical implication to these findings and also suggests the direction for the further analysis.

  • PDF
  • Operational Implication of R-WeSET Program through Women Students and Companies' Perception and Assessment on the Basis of NCS Key Competency (이공계 여대생과 기업의 NCS 기반 직업기초능력 중요도 인식 및 평가에 의한 R-WeSET 프로그램 운영의 시사점)

    • Kim, Hyun Ju;Pak, Sung Sine
      • Journal of Engineering Education Research
      • /
      • v.21 no.1
      • /
      • pp.27-36
      • /
      • 2018
    • This study aims to deduce operational implication of R-WeSET program through women students in science & engineering and companies's perception and assessment on the basis of NCS key competency. The significant results are as follows. Firstly, companies and women students in science & engineering share a similar perception on importance of NCS key competencies. The programs should be reviewed and improved for women students who are truly aware of companies' needs. Secondly, the main areas of NCS key competency that are poor in companies' perception are 'positive thinking & drive', 'creativity & challenge spirit', 'communication skills' and 'problem-solving skills'. To enhance these weak skills, activating the actual programs such as "Convergence Design Camp", "Field Adaptability Improvement" and developing the new communication program are required. Lastly, most of women students have attained the satisfying result from "Field Competency Reinforcement Program". Especially, "Industry Field Training" shared the great progresses on all skills of key competency, hence why the progressive model should be developed in the future. This study figures out who's the right person for the 4th Industrial Revolution era, producing a meaningful result in order to change in the higher education system of women students and to grow human resources who will contribute to the community and company.

    Light Weight Authentication and Key Establishment Protocol for Underwater Acoustic Sensor Networks (수중 음파 센서 네트워크 환경에 적합한 경량화된 인증 및 키 발급 프로토콜)

    • Park, Minha;Kim, Yeog;Yi, Okyoen
      • The Journal of Korean Institute of Communications and Information Sciences
      • /
      • v.39B no.6
      • /
      • pp.360-369
      • /
      • 2014
    • Underwater Acoustic Sensor Networks(UASN) enables varied study from collected data of underwater environments such as pollution monitoring, disaster prevention. The collected data is transmitted from underwater to terrestrial communication entity by acoustic communication. Because of the constraints of underwater environments include low data rate and propagation delay, it is difficult to apply cryptographic techniques of terrestrial wireless communication to UASN. For this reason, if the cryptographic techniques are excluded, then collected data will be exposed to security threats, such as extortion and forgery, during transmission of data. So, the cryptographic techniques, such as the authentication and key establishment protocol which can confirm reliability of communication entities and help them share secret key for encryption of data, must need for protecting transmitted data against security threats. Thus, in this paper, we propose the light weight authentication and key establishment protocol.

    Efficient ID-Based Authentication and Key Exchange Protocol (효율적인 ID 기반 인증 및 키 교환 프로토콜)

    • Eom, Jieun;Seo, Minhye;Park, Jong Hwan;Lee, Dong Hoon
      • Journal of the Korea Institute of Information Security & Cryptology
      • /
      • v.26 no.6
      • /
      • pp.1387-1399
      • /
      • 2016
    • In a hyper-connected society realized through IoT-enabled technology, a large amount of data is collected by various devices and is processed to provide new services to users. While communicating through a network, it is essential for devices to execute mutual authentication since users' privacy can be infringed by malicious attackers. ID-based signature enables authentication and key exchange with a unique ID of a device. However, most of the previous ID-based signature schemes based on RSA require an additional step to share parameters for key exchange so that they are not suitable for resource-constrained devices in terms of efficiency. In this paper, we design an efficient ID-based signature and thereby propose an efficient ID-based authentication and key exchange protocol in which sessions for both an authentication and a key exchange are executed simultaneously. In addition, we prove the security of our scheme under the RSA onewayness problem and analyze the efficiency by comparing with the previous schemes.

    Design of Quantum Key Distribution System without Fixed Role of Cryptographic Applications (암호장치의 송·수신자 역할 설정이 없는 양자키분배 시스템 설계)

    • Ko, Haeng-Seok;Ji, Se-Wan;Jang, Jingak
      • Journal of the Korea Institute of Information Security & Cryptology
      • /
      • v.30 no.5
      • /
      • pp.771-780
      • /
      • 2020
    • QKD(Quantum Key Distribution) is one of the protocols that can make two distant parties safely share secure keys against the threat of quantum computer. Generally, cryptographic applications which are connected to the QKD device have fixed roles as a transmitter and a receiver due to the race condition and complexity of implementation. Because the conventional QKD system is mainly applied to the link encryptor, there are no problems even if the roles of the cryptographic devices are fixed. We propose a new scheme of QKD system and protocol that is easy to extend to the QKD network by eliminating quantum key dependency between cryptographic device and QKD node. The secure keys which are generated by the TRNG(True Random Number Generator) are provided to the cryptographic applications instead of quantum keys. We design an architecture to transmit safely the secure keys using the inbound and outbound quantum keys which are shared between two nodes. In this scheme, since the dependency of shared quantum keys between two QKD nodes is eliminated, all cryptographic applicatons can be a master or a slave depending on who initiates the cryptographic communications.

    Secure Subgroup and Group Communication Service for TETRA System (TETRA 시스템을 위한 안전한 소그룹과 그룹통신 서비스)

    • 이수연;정진욱
      • Convergence Security Journal
      • /
      • v.3 no.1
      • /
      • pp.31-37
      • /
      • 2003
    • This paper proposed a model supporting secure mechanism both group communication service and subgroup communication service of TETRA system that the standard developed by the technical committee Radio Equipment and Systems(RES) of the European Telecommunications Standards Institute(ETSI) provides a pure digital information technology for the transmission of speech and data. In each scheme, members in a subgroup maintains its subgroup key, which is not distributed, but computed by each member in the subgroup only with his own secret information and public values and secure subgroup members in a same subgroup can communication securely each other by using their subgroup key. Also, all members in group can share securely a group key. In communication services of TETRA system, this model supports mechanism for both group and subgroup communication are simultaneously needed.

    • PDF

    Power Allocation Schemes For Downlink Cognitive Radio Networks With Opportunistic Sub-channel Access

    • Xu, Ding;Feng, Zhiyong;Zhang, Ping
      • KSII Transactions on Internet and Information Systems (TIIS)
      • /
      • v.6 no.7
      • /
      • pp.1777-1791
      • /
      • 2012
    • This paper considers a downlink cognitive radio (CR) network where one secondary user (SU) and one primary user (PU) share the same base station (BS). The spectrum of interest is divided into a set of independent, orthogonal subchannels. The communication of the PU is of high priority and the quality of service (QoS) is guaranteed by the minimum rate constraint. On the other hand, the communication of the SU is of low priority and the SU opportunistically accesses the subchannels that were previously discarded by the PU during power allocation. The BS assigns fractions ?? and 1 ?? of the total available transmit power to the PU and the SU respectively. Two power allocation schemes with opportunistic subchannel access are proposed, in which the optimal values of ??'s are also obtained. The objective of one scheme is to maximize the rate of the SU, and the objective of the other scheme is to maximize the sum rate of the SU and the PU, both under the PU minimum rate constraint and the total transmit power constraint. Extensive simulation results are obtained to verify the effectiveness of the proposed schemes.

    A study of Cryptographic Algorithms of IKE version 2 Protocol (IKE 버전 2 프로토콜의 암호 알고리즘에 관한 연구)

    • 김윤희;이유태;이계상
      • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
      • /
      • 2003.10a
      • /
      • pp.199-202
      • /
      • 2003
    • IPsec is a standardization way for protection of IP packets in network layer and it is composed of three protocols that is AH(Authentication Header), ESP(Encapsulation Security Protocol) and IKE(Internet Key Exchange). Before doing encryption and decryption using AH or ESP protocols, both of communicating entities have to share same key safely. IKE protocol works automatically. But it has less interoperability because IKE protocol is not simple. A work which standardize IKEv2 has been done up to now. In this article, we will examine the Cryptographic Algorithms of IKEv2, and describe the AES usage with IPsec, based on the IETF Draft document.

    • PDF

    (34141) Korea Institute of Science and Technology Information, 245, Daehak-ro, Yuseong-gu, Daejeon
    Copyright (C) KISTI. All Rights Reserved.