• Title/Summary/Keyword: Mutual Channel

Search Result 123, Processing Time 0.021 seconds

Hash-based Authentication Protocol for RFID Applicable to Desynchronization between the Server and Tag with efficient searching method (서버와 태그 비동기시에도 효율적으로 검색이 가능한 해시기반 RFID 인증 프로토콜)

  • Kwon, Hye-Jin;Kim, Hae-Mun;Jeong, Seon-Yeong;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.71-82
    • /
    • 2011
  • The RFID system provides undeniable advantages so that it is used for various application. However recent RFID system is vulnerable to some attacks as eavesdropping, replay attack, message hijacking, and tag tampering, because the messages are transmitted through the wireless channel and the tags are cheap. Above attacks cause the tag and reader impersonation, denial of service by invalidating tag, and the location tracking concerning bearer of tags, A lot of RFID authentication protocol bas been proposed to solve the vulnerability. Since Weis, Sanna, Rivest, and Engel, proposed the bash-based RFID authentication protocol, many researchers have improved hash-based authentication protocol and recent bash-based authentication protocols provide security and desirable privacy. However, it remains open problem to reduce the tag identification time as long as privacy and security are still guaranteed. Here we propose a new protocol in which the tags generate the message depending on the state of previous communitions between tag and reader. In consequence, our protocol allows a server to identify a tag in a reasonable amount of time while ensuring security and privacy, To be specific, we reduced the time for the server to identify a tag when the last session finished abnormally by at least 50% compared with other bash-based schemes that ensure levels of security and privacy similar to ours.

The Impact of Conflict and Influence Strategies Between Local Korean-Products-Selling Retailers and Wholesalers on Performance in Chinese Electronics Distribution Channels: On Moderating Effects of Relational Quality (중국 가전유통경로에서 한국제품 현지 판매업체와 도매업체간 갈등 및 영향전략이 성과에 미치는 영향: 관계 질의 조절효과)

  • Chun, Dal-Young;Kwon, Joo-Hyung;Lee, Guo-Ming
    • Journal of Distribution Research
    • /
    • v.16 no.3
    • /
    • pp.1-32
    • /
    • 2011
  • I. Introduction: In Chinese electronics industry, the local wholesalers are still dominant but power is rapidly swifting from wholesalers to retailers because in recent foreign big retailers and local mass merchandisers are growing fast. During such transient period, conflicts among channel members emerge important issues. For example, when wholesalers who have more power exercise influence strategies to maintain status, conflicts among manufacturer, wholesaler, and retailer will be intensified. Korean electronics companies in China need differentiated channel strategies by dealing with wholesalers and retailers simultaneously to sell more Korean products in competition with foreign firms. For example, Korean electronics firms should utilize 'guanxi' or relational quality to form long-term relationships with whloesalers instead of power and conflict issues. The major purpose of this study is to investigate the impact of conflict, dependency, and influence strategies between local Korean-products-selling retailers and wholesalers on performance in Chinese electronics distribution channels. In particular, this paper proposes effective distribution strategies for Korean electronics companies in China by analyzing moderating effects of 'Guanxi'. II. Literature Review and Hypotheses: The specific purposes of this study are as follows. First, causes of conflicts between local Korean-products-selling retailers and wholesalers are examined from the perspectives of goal incongruence and role ambiguity and then effects of these causes are found out on perceived conflicts of local retailers. Second, the effects of dependency of local retailers upon wholesalers are investigated on local retailers' perceived conflicts. Third, the effects of non-coercive influence strategies such as information exchange and recommendation and coercive strategies such as threats and legalistic pleas exercised by wholesalers are explored on perceived conflicts by local retailers. Fourth, the effects of level of conflicts perceived by local retailers are verified on local retailers' financial performance and satisfaction. Fifth, moderating effects of relational qualities, say, 'quanxi' between wholesalers and retailers are analyzed on the impact of wholesalers' influence strategies on retailers' performances. Finally, moderating effects of relational qualities are examined on the relationship between conflicts and performance. To accomplish above-mentioned research objectives, Figure 1 and the following research hypotheses are proposed and verified. III. Measurement and Data Analysis: To verify the proposed research model and hypotheses, data were collected from 97 retailers who are selling Korean electronic products located around Central and Southern regions in China. Covariance analysis and moderated regression analysis were employed to validate hypotheses. IV. Conclusion: The following results were drawn using structural equation modeling and hierarchical moderated regression. First, goal incongruence perceived by local retailers significantly affected conflict but role ambiguity did not. Second, consistent with conflict spiral theory, the level of conflict decreased when retailers' dependency increased toward wholesalers. Third, noncoercive influence strategies such as information exchange and recommendation implemented by wholesalers had significant effects on retailers' performance such as sales and satisfaction without conflict. On the other hand, coercive influence strategies such as threat and legalistic plea had insignificant effects on performance in spite of increasing the level of conflict. Fourth, 'guanxi', namely, relational quality between local retailers and wholesalers showed unique effects on performance. In case of noncoercive influence strategies, 'guanxi' did not play a role of moderator. Rather, relational quality and noncoercive influence strategies can serve as independent variables to enhance performance. On the other hand, when 'guanxi' was well built due to mutual trust and commitment, relational quality as a moderator can positively function to improve performance even though hostile, coercive influence strategies were implemented. Fifth, 'guanxi' significantly moderated the effects of conflict on performance. Even if conflict arises, local retailers who form solid relational quality can increase performance by dealing with dysfunctional conflict synergistically compared with low 'quanxi' retailers. In conclusion, this study verified the importance of relational quality via 'quanxi' between local retailers and wholesalers in Chinese electronic industry because relational quality could cross out the adverse effects of coercive influence strategies and conflict on performance.

  • PDF

A Study on the Real Condition and the Improvement Directions for the Protection of Industrial Technology (산업기술 보호 관리실태 및 발전방안에 관한 연구)

  • Chung, Tae-Hwang;Chang, Hang-Bae
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.147-170
    • /
    • 2010
  • This study is to present a improvement directions for the protection of industrial key technology. For the purpose of the study, the survey was carried out on the administrative security activity of 68 enterprises including Large companies, small-midium companies and public corporations. survey result on the 10 items of security policy, 10 items of personal management and 7 items of the assets management are as follows; First, stable foundation for the efficient implement of security policy is needed. Carrying a security policy into practice and continuous upgrade should be fulfilled with drawing-up of the policy. Also for the vitalization of security activity, arrangement of security organization and security manager are needed with mutual assistance in the company. Periodic security inspection should be practiced for the improvement of security level and security understanding. Second, the increase of investment for security job is needed for security invigoration. Securing cooperation channel with professional security facility such as National Intelligence Service, Korea internet & security agency, Information security consulting company, security research institute is needed, also security outsourcing could be considered as the method of above investment. Especially small-midium company is very vulnerable compared with Large company and public corporation in security management, so increase of government's budget for security support system is necessary. Third, human resource management is important, because the main cause of leak of confidential information is person. Regular education rate for new employee and staff members is relatively high, but the vitalization of security oath for staff members and the third party who access to key technology is necessary. Also access right to key information should be changed whenever access right changes. Reinforcement of management of resigned person such as security oath, the elimination of access right to key information and the deletion of account. is needed. Forth, the control and management of important asset including patent and design should be tightened. Classification of importance of asset and periodic inspection are necessary with the effects evaluation of leak of asset.

  • PDF