• Title/Summary/Keyword: One-Time Signature

Search Result 98, Processing Time 0.03 seconds

Frequency-Code Domain Contention in Multi-antenna Multicarrier Wireless Networks

  • Lv, Shaohe;Zhang, Yiwei;Li, Wen;Lu, Yong;Dong, Xuan;Wang, Xiaodong;Zhou, Xingming
    • Journal of Communications and Networks
    • /
    • v.18 no.2
    • /
    • pp.218-226
    • /
    • 2016
  • Coordination among users is an inevitable but time-consuming operation in wireless networks. It severely limit the system performance when the data rate is high. We present FC-MAC, a novel MAC protocol that can complete a contention within one contention slot over a joint frequency-code domain. When a node takes part in the contention, it generates randomly a contention vector (CV), which is a binary sequence of length equal to the number of available orthogonal frequency division multiplexing (OFDM) subcarriers. In FC-MAC, different user is assigned with a distinct signature (i.e., PN sequence). A node sends the signature at specific subcarriers and uses the sequence of the ON/OFF states of all subcarriers to indicate the chosen CV. Meanwhile, every node uses the redundant antennas to detect the CVs of other nodes. The node with the minimum CV becomes the winner. The experimental results show that, the collision probability of FC-MAC is as low as 0.05% when the network has 100 nodes. In comparison with IEEE 802.11, contention time is reduced by 50-80% and the throughput gain is up to 200%.

Development of Oil Change Warning Algorithm and Display Device (오일교환경보 알고리즘 및 표시장치 개발)

  • Chun, Sang Myung
    • Tribology and Lubricants
    • /
    • v.30 no.3
    • /
    • pp.168-176
    • /
    • 2014
  • This paper presents an engine oil change warning algorithm based on the test results of a small dip-stick-gage-type engine-oil-deterioration-detection sensor, software to realize the algorithm and a display device to apply the software. The algorithm determines the engine oil deterioration condition from the rate of change in the dielectric constant based on the average measured capacitance at $80^{\circ}C$ after the engine stops. The rate of change in the dielectric constant at the time for oil change correlates with the time that one of recommended warning limits for engine oil physical properties such as TAN (Total Acid Number), TBN (Total Base Number) and viscosity is first reached. At this point, a warning signal for oil change appears on the display device like a smart-phone or individual display device. The frames of smartphone app have three stages. The user can directly input all of the thresholds into the frame of the smartphone app. The screen of the display device comprises one frame for each warning signature with the related message. The user can input the thresholds to the device through a USB cable connected to a personal computer.

Impact Damage Detection in a Composite Stiffened Panel Using Built-in Piezoelectric Active Sensor Arrays (배열 압전 능동 센서를 이용한 복합재 보강판의 충격 손상 탐지)

  • Park, Chan-Yik;Cho, Chang-Min
    • Composites Research
    • /
    • v.20 no.6
    • /
    • pp.21-27
    • /
    • 2007
  • Low-velocity impact damage in a composite stiffened panel was detected using built-in piezoelectric active sensor arrays. Using these piezoelectric active sensors, various diagnostic signals were generated to propagate Lamb waves through the structure and the responses were picked up to detect changes in the structure's vibration signature due to the damage. Three algorithms - ADI(Active Damage Interrogation), TD RMS (Time Domain Root Mean Square) and STFT (Short Time Fourier Transform) - were examined to express the features of the signal changes as one damage index. From damage detecting tests, two impact induced delaminations were detected and the location was estimated with the algorithms and diagnostic signals.

A Recovery Technique of PDF File in the Unit of Page (PDF 파일의 페이지단위 복구 기법)

  • Jang, Jeewon;Bang, Seung Gyu;Han, Jaehyeok;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.1
    • /
    • pp.25-30
    • /
    • 2017
  • The influence of the data deletion method which is one of anti-forensic techniques is substantial in terms of forensic analysis compared to its simplicity of the act. In academic world, recovery techniques on deleted files have been continuously studied in response to the data deletion method and representatively, the file system-based file recovery technique and file format based recovery technique exist. If there's metadata of deleted file in file system, the file can be easily recovered by using it, but if there's no metadata, the file is recovered by using the signature-based carving technique or the file format based recovery technique has to be applied. At this time, in the file format based recovery technique, the file structure analysis and possible recovery technique should be provided. This paper proposes the page recovery technique on deleted PDF file based on the structural characteristics of PDF file. This technique uses the tag value of page object which constitutes one page of PDF file. Object is extracted by utilizing each tag value as a kind of signature and by analyzing extracted object, the metadata of PDF file is recombined and then it's reconfigured page by page. Recovering by page means that even if deleted PDF file is damaged, even some pages consisting of PDF file can be recovered. Generally, if the file system based file is not recoverable, deleted file is recovered by applying the signature based carving technique. The technique which we proposed in this paper can recover PDF files that are damaged. In the digital forensic perspective, it can be utilized to recover more data than previously.

ISAR IMAGING FROM TARGET CAD MODELS

  • Yoo, Ji-Hee;Kwon, Kyung-Il
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.550-553
    • /
    • 2005
  • To acquire radar target signature, various kinds of target are necessary. Measurement is one of the data acquiring method, but much time and high cost is required to get the target data from the real targets. Even if we can afford that, the targets we can access are very limited. To obtain target signatures avoiding these problems, we build the target CAD (Computer Aided Design) model for the calculation of target signatures. To speed up RCS calculation, we applied adaptive super-sampling and tested quite complex tank CAD model which is 1.4 hundred of thousands facet. We use calculated RCS data for ID range profile and 2D ISAR (Inverse Synthetic Aperture Radar) image formation. We adopted IFFT (Inverse Fast Fourier Transform) algorithm combined with polar formatting algorithm for the ISAR imaging. We could confirm the possibility of the construction of database from the images of CAD models for target classification applications.

  • PDF

A Study on the Characteristics of Injection-rate at Different Injection Conditions in a Common-rail Diesel Injector (분사조건에 따른 커먼레일 디젤 인젝터의 분사율 특성에 관한 연구)

  • Kim, H.M.;Chung, J.W.;Lee, K.H.
    • Journal of ILASS-Korea
    • /
    • v.12 no.3
    • /
    • pp.166-171
    • /
    • 2007
  • Recently, many studies on HSDI diesel engines have been performed to reduce the fuel consumption and $CO_2$ emission. One of the prominent technique to reduce emission is a high pressure multiple injection. For this technique, the injection rate is a critical parameter in order to determine precise injection duration and timing for combustion control. Thus the purpose of this study was to investigate relationship between the injection rate and the time-signature of chamber pressure at different injection pressure conditions in a common rail direct injection type injector using the Zeuch method. Using the measured correlation constants, estimated fuel injection rates are presented at many different injection conditions.

  • PDF

Efficient Digital Signature Scheme for Flows and Multicasts (효율적인 플로우 및 멀티캐스팅 인증 기법 방안)

  • 백재종;강명호;송주석
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10c
    • /
    • pp.287-289
    • /
    • 2000
  • 처리시간 지연에 민감한 패킷 플로우, 비디오, 오디오 스트림과 같은 어플리케이션을 보안성이 없는 인터넷상에서 멀티캐스팅할 때에 데이터의 기밀성, 메시지 또는 발신자 인증, 무결성 그리고 부인 방지 등의 보안 서비스를 제공하기 위해서는 여러 가지 암호 및 인증 기법이 필요하다. 본 논문에서는 이러한 멀티캐스트 스트림과 플로우에 대한 서명/인증 기법의 특성과 요구사항을 분석해 보고 기존에 제시된 each-sign 기법, one-time 서명 기법, star-chaining 기법, 그리고 Tree-chaining 기법에 대한 상호 비교 및 분석을 통해 이들의 서명/검증 계산시간과 통신 트래픽 오버헤드에 대한 단점을 효율적으로 개선하여 Enhanced Tree-chaining 기법을 제안한다. 서명 및 검증 시간은 약 50% 단축되며 통신 오버헤드는 log2n배 축소되는 향상을 기대할 수 있다. 또한 인증 소요 시간에 주요 요인이 되는 것은 서명/검증의 계산시간이 아니라 chaining 오버헤드의 크기임을 유추해 낸다.

  • PDF

Preventing ELF(Executable and Linking Format)-File-Infecting Malware using Signature Verification for Embedded Linux (임베디드 리눅스에서 서명 검증 방식을 이용한 악성 프로그램 차단 시스템)

  • Lee, Jong-Seok;Jung, Ki-Young;Jung, Daniel;Kim, Tae-Hyung;Kim, Yu-Na;Kim, Jong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.6
    • /
    • pp.589-593
    • /
    • 2008
  • These days, as a side effect of the growth of the mobile devices, malwares for the mobile devices also tend to increase and become more dangerous. Because embedded Linux is one of the advanced OSes on mobile devices, a solution to preventing malwares from infecting and destroying embedded Linux will be needed. We present a scheme using signature verification for embedded Linux that prevents executallle-Infecting malwares. The proposed scheme works under collaboration between mobile devices and a server. Malware detection is delegated to the server. In a mobile device, only integrity of all executables and dynamic libraries is checked at kernel level every time by kernel modules using LSM hooks just prior to loading of executables and dynamic libraries. All procedures in the mobile devices are performed only at kernel level. In experiments with a mobile embedded device, we confirmed that the scheme is able to prevent all executable-Infecting malwares while minimizing damage caused by execution of malwares or infected files, power consumption and performance overheads caused by malware check routines.

Extraction of bridge aeroelastic parameters by one reference-based stochastic subspace technique

  • Xu, F.Y.;Chen, A.R.;Wang, D.L.;Ma, R.J.
    • Wind and Structures
    • /
    • v.14 no.5
    • /
    • pp.413-434
    • /
    • 2011
  • Without output covariance estimation, one reference-based Stochastic Subspace Technique (SST) for extracting modal parameters and flutter derivatives of bridge deck is developed and programmed. Compared with the covariance-driven SST and the oscillation signals incurred by oncoming or signature turbulence that adopted by previous investigators, the newly-presented identification scheme is less time-consuming in computation and a more desired accuracy should be contributed to high-quality free oscillated signals excited by specific initial displacement. The reliability and identification precision of this technique are confirmed by a numerical example. For the 3-DOF sectional models of Sutong Bridge deck (streamlined) and Suramadu Bridge deck (bluff) in wind tunnel tests, with different wind velocities, the lateral bending, vertical bending, torsional frequencies and damping ratios as well as 18 flutter derivatives are extracted by using SST. The flutter derivatives of two kinds of typical decks are compared with the pseudo-steady theoretical values, and the performance of $H_1{^*}$, $H_3{^*}$, $A_1{^*}$, $A_3{^*}$ is very stable and well-matched with each other, respectively. The lateral direct flutter derivatives $P_5{^*}$, $P_6{^*}$ are comparatively more accurate than other relevant lateral components. Experimental procedure seems to be more critical than identification technique for refining the estimation precision.

A Delegation Model based on Agent in Distributed Systems

  • Kim, Kyu-Il;Lee, Joo-Chang;Choi, Won-Gil;Lee, Eun-Ju;Kim, Ung-Mo
    • Journal of Information Processing Systems
    • /
    • v.3 no.2
    • /
    • pp.82-88
    • /
    • 2007
  • Web services are the new building block of today's Internet, and provides interoperability among heterogeneous distributed systems. Recently in web services environment, security has become one of the most critical issues. The hackers attack one of fragile point and can misuse legitimate user privilege because all of the connected devices provide services for the user control and monitoring in real time. Also, the users of web services must temporarily delegate some or all of their rights to agents in order to perform actions on their behalf. This fact risks the exposure of user privacy information. In this paper, we propose secure delegation model based on SAML that provides confidentiality and integrity about the user information in distributed systems. In order to support privacy protection, service confidentiality, and assertion integrity, encryption and a digital signature mechanism is deployed. We build web service management server based on XACML, in order to manage services and policies of web service providers.