• Title/Summary/Keyword: Key-Chain

Search Result 795, Processing Time 0.032 seconds

Key Management Framework based on Double Hash Chain for Secure Smart Grid Environments (안전한 스마트 그리드 환경을 위한 이중 해쉬 체인 기반 키 관리 프레임워크)

  • Lee, Young-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.9
    • /
    • pp.2063-2072
    • /
    • 2013
  • Smart Grid is the next-generation intelligent power grid that maximizes energy efficiency with the convergence of IT technologies and the existing power grid. It enables consumers to check power rates in real time for active power consumption. It also enables suppliers to measure their expected power generation load, which stabilizes the operation of the power system. However, there are high possibility that various kinds of security threats such as data exposure, data theft, and privacy invasion may occur in interactive communication with intelligent devices. Therefore, to establish a secure environment for responding to such security threat with the smart grid, the key management technique, which is the core of the development of a security mechanism, is required. Using a hash chain, this paper suggests a group key management mechanism that is efficiently applicable to the smart grid environment with its hierarchical structure, and analyzes the security and efficiency of the suggested group key management framework.

Design of E-Document Management System Using Dynamic Group Key based on OOXML (OOXML기반의 동적 그룹키를 이용한 전자문서 관리 시스템의 설계)

  • Lee, Young-Gu;Kim, Hyun-Chul;Jung, Taik-Yeong;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.12B
    • /
    • pp.1407-1417
    • /
    • 2009
  • We propose a e-document management system that can provide segmented page information on a document according to different levels of authority from access control environment. The proposed system creates hierarchy identifier using a one-way hash chain and therefore does not need to own key information for all users as in existing system. Also by creating group keys by compounding hash chain hierarchy identifier with randomly formed group identifier, the system can flexibly respond to dynamic changes from group member movements while at the same time resolving the problems of key formation and management in document encoding technique using symmetric key for each page. Lastly as a result of comparative analysis through an experiment with existing e-document management systems, the proposed system showed superiority in the efficiency of encoding and decoding document and the speed of encoding and decoding by the pages.

Mutual Authentication Method for Hash Chain Based Sensors in IoT Environment (IoT 환경에서 해시 체인 기반 센서 상호 인증 기법)

  • Lee, Kwang-Hyoung;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.11
    • /
    • pp.303-309
    • /
    • 2018
  • Internet of Things technology is an intelligent service that connects all objects to the Internet and interacts with them. It is a technology that can be used in various fields, such as device management, process management, monitoring of restricted areas for industrial systems, as well as for navigation in military theaters of operation. However, because all devices are connected to the Internet, various attacks using security vulnerabilities can cause a variety of damage, such as economic loss, personal information leaks, and risks to life from vulnerability attacks against medical services or for military purposes. Therefore, in this paper, a mutual authentication method and a key-generation and update system are applied by applying S/Key technology based on a hash chain in the communications process. A mutual authentication method is studied, which can cope with various security threats. The proposed protocol can be applied to inter-peer security communications, and we confirm it is robust against replay attacks and man-in-the-middle attacks, providing data integrity against well-known attacks in the IoT environment.

Hash chain based Group Key Management Mechanism for Smart Grid Environments (스마트그리드 환경에 적용 가능한 해쉬체인 기반의 그룹키 관리 메커니즘)

  • Eun, Sun-Ki;Oh, Soo-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.149-160
    • /
    • 2011
  • Smart Grid is the next-generation intelligent power grid that maximizes energy efficiency with the convergence of IT technologies and the existing power grid. It enables consumers to check power rates in real time for active power consumption. It also enables suppliers to measure their expected power generation load, which stabilizes the operation of the power system. However, there are high possibility that various kinds of security threats such as data exposure, data theft, and privacy invasion may occur in interactive communication with intelligent devices. Therefore, to establish a secure environment for responding to such security threat with the smart grid, the key management technique, which is the core of the development of a security mechanism, is required. Using a hash chain, this paper suggests a group key management mechanism that is efficiently applicable to the smart grid environment with its hierarchical structure, and analyzes the security and efficiency of the suggested group key management mechanism.

Key Pose-based Proposal Distribution for Upper Body Pose Tracking (상반신 포즈 추적을 위한 키포즈 기반 예측분포)

  • Oh, Chi-Min;Lee, Chil-Woo
    • The KIPS Transactions:PartB
    • /
    • v.18B no.1
    • /
    • pp.11-20
    • /
    • 2011
  • Pictorial Structures is known as an effective method that recognizes and tracks human poses. In this paper, the upper body pose is also tracked by PS and a particle filter(PF). PF is one of dynamic programming methods. But Markov chain-based dynamic motion model which is used in dynamic programming methods such as PF, couldn't predict effectively the highly articulated upper body motions. Therefore PF often fails to track upper body pose. In this paper we propose the key pose-based proposal distribution for proper particle prediction based on the similarities between key poses and an upper body silhouette. In the experimental results we confirmed our 70.51% improved performance comparing with a conventional method.

TG-SPSR: A Systematic Targeted Password Attacking Model

  • Zhang, Mengli;Zhang, Qihui;Liu, Wenfen;Hu, Xuexian;Wei, Jianghong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2674-2697
    • /
    • 2019
  • Identity authentication is a crucial line of defense for network security, and passwords are still the mainstream of identity authentication. So far trawling password attacking has been extensively studied, but the research related with personal information is always sporadic. Probabilistic context-free grammar (PCFG) and Markov chain-based models perform greatly well in trawling guessing. In this paper we propose a systematic targeted attacking model based on structure partition and string reorganization by migrating the above two models to targeted attacking, denoted as TG-SPSR. In structure partition phase, besides dividing passwords to basic structure similar to PCFG, we additionally define a trajectory-based keyboard pattern in the basic grammar and introduce index bits to accurately characterize the position of special characters. Moreover, we also construct a BiLSTM recurrent neural network classifier to characterize the behavior of password reuse and modification after defining nine kinds of modification rules. Extensive experimental results indicate that in online attacking, TG-SPSR outperforms traditional trawling attacking algorithms by average about 275%, and respectively outperforms its foremost counterparts, Personal-PCFG, TarGuess-I, by about 70% and 19%; In offline attacking, TG-SPSR outperforms traditional trawling attacking algorithms by average about 90%, outperforms Personal-PCFG and TarGuess-I by 85% and 30%, respectively.

The Construction of Service Chain Management for Optimizing Service Quality in After-Sales Service (사후서비스부문의 서비스품질 최적화를 위한 서비스사슬관리 구축)

  • Lee, Cheol-Gyu;Kim, Min-Jung;Yoo, Wang-Jin
    • Journal of Korean Society for Quality Management
    • /
    • v.33 no.4
    • /
    • pp.12-20
    • /
    • 2005
  • Supply chain management is a total systems approach to delivering manufactured products to the end customer. Using information technology to coordinate all elements of the supply chain from parts suppliers to retailers achieves a level of integration that is a competitive advantage not available in traditional logistics systems. On the other hand, service chain management is an analogous systems approach that is especially suitable for delivering mobile services such as parcel delivery, cable installation, and home health care. The key elements that distinguish service supply chain management from supply chain management are bidirectional optimization, management of productive capacity, and management of perishability. The purpose of this study is to maintain the construction of service chain management by proving that service quality in after-sales service can be improved through service chain management. First of all, supply chain management, service quality, and service chain management were introduced in theoretical research. In empirical research, it was selected the domestic enterprise that produce electronic appliances with after-sales service, and some customers using the enterprise's after-sales service in the metropolitan area were selected as a sample by convenience sampling method and examined.

The Significant Decisions in Cold Chain Logistics

  • Sung-Ho, RYU
    • East Asian Journal of Business Economics (EAJBE)
    • /
    • v.11 no.1
    • /
    • pp.41-51
    • /
    • 2023
  • Purpose - The prior literature has shown that there is a lack of a complete assessment of the key decisions in cold chain logistics. Such a study is required to offer recommendations for research in this expanding but under-researched topic with potentially significant management ramifications. Research design, Data, and methodology - The current researcher accumulated peer-reviewed sources from databases to augment each chosen study's validity. Selection varied between seminal works and much of the existing literature. The selection process was consistent with using a content checklist that established the inclusion and exclusion criteria. Result - The research findings indicate total five solutions regarding better decision in Cold Chain Logistics (CCL), such as (1) Pricing Decision in Cold Chain Logistics, (2) Decision on Temperature Control Decision in Cold Chain Logistics, (3) Supply Chain Network Design in Cold Chain Logistics, (4) Decision on Minimizing Inventory in Cold Chain Logistics, (5) Decision on Logistics Distribution. Conclusion - Stability of a cold chain should be maintained from manufacture or via logistical components and cold logistics products are susceptible to several variables, such as temperature, and degradation can easily harm food supply, product prices, and human health. Product safety infractions substantially impact human health, among other losses linked with a functioning CCL.

Synthesis of Novel Carboacyclic Nucleosides with Vinyl Bromide Moiety as Open-chain Analogues of Neplanocin A

  • Choi, Myung-Hee;Kim, Hee-Doo
    • Archives of Pharmacal Research
    • /
    • v.26 no.12
    • /
    • pp.990-996
    • /
    • 2003
  • A novel carboacyclic nucleoside analogue, 9-[2-bromo-4-hydroxy-3-hydroxymethyl-2-butenyl] adenine, and its derivatives were designed and synthesized as open-chain analogues of neplanocin A. The syntheses were accomplished via the coupling of adenine or pyrimidine bases to the key intermediate allylic bromide 7. The bromide 7 was prepared from epichlorohydrin in a seven step process in a 54% overall yield. The synthesized compounds were evaluated for their antiviral activity against the polio virus, HSV and HIV.

An Empirical Analysis of the Effect of Operations Performance on Financial Performance (오퍼레이션스 성과와 재무성과 간의 인과관계에 대한 실증분석)

  • Kim, Younghoon;Pyun, Jebum;Kim, DaeSoo
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.40 no.1
    • /
    • pp.57-73
    • /
    • 2015
  • While many previous studies investigated the effect of operations performance on financial performance, most studies considered only a few performance indicators and ignored the characteristics of industries. Therefore, this study intends to analyze the effect of operations performance on financial performance, by selecting a rather comprehensive operations performance indicators from firms' financial data. In doing so, we used operating efficiency and supply chain performance indicators for operations performance and a firm's profitability and future value indicators for financial performance. For the analysis, we collected 544 firms' operations and financial performance data belonging to eight key industries from the 'Forbes Global 2000'. We first analysed the differences in operations and financial performance among high, medium and low supply chain performance groups based on the quantitative criteria of Gartner's 'Supply Chain Top 25' ranking procedure. Then we analysed the effect of operations performance indicators on financial performance for both entire industry and individual industries, using multiple regression. Based on the results, we provided practical insights into key operations performance indicators to focus on and manage in order to improve financial performance.