• Title/Summary/Keyword: Random ID

Search Result 87, Processing Time 0.02 seconds

Secret Sharing based Node Authentication in FANET (FANET에서의 비밀분산 기반 노드 인증)

  • Yang Ji Hun;Lee Soo Jin
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.25-34
    • /
    • 2022
  • This paper proposes a secret sharing based fast node authentication technique applicable to Flying Ad-Hoc Network (FANET) that can be used to construct self-organized communication network in multi drones and drone squadrons operations. Before deployment, each node stores an exponential share, exponential secret and a portion of PUF CRP table. After being deployed in the field, in the early-stage of network formation, each node broadcasts its ID, exponential share and a hash value of PUF Response and pseudo-random number. Then each node performs a reconstruction of the exponential secret using the exponential shares transmitted from neighboring nodes. When the exponential secret is reconstructed, simultaneous authentication is completed for all nodes that have transmitted the exponential share used in the reconstruction. A node that transmits an incorrect exponential share to disturb the reconstruction of the exponential secret during the authentication process can be detected before performing the reconstruction through the verification of the hash value, and will be excluded from the reconstruction.

Study on Improvement of Weil Pairing IBE for Secret Document Distribution (기밀문서유통을 위한 Weil Pairing IBE 개선 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.13 no.2
    • /
    • pp.59-71
    • /
    • 2012
  • PKI-based public key scheme is outstanding in terms of authenticity and privacy. Nevertheless its application brings big burden due to the certificate/key management. It is difficult to apply it to limited computing devices in WSN because of its high encryption complexity. The Bilinear Pairing emerged from the original IBE to eliminate the certificate, is a future significant cryptosystem as based on the DDH(Decisional DH) algorithm which is significant in terms of computation and secure enough for authentication, as well as secure and faster. The practical EC Weil Pairing presents that its encryption algorithm is simple and it satisfies IND/NM security constraints against CCA. The Random Oracle Model based IBE PKG is appropriate to the structure of our target system with one secret file server in the operational perspective. Our work proposes modification of the Weil Pairing as proper to the closed network for secret file distribution[2]. First we proposed the improved one computing both encryption and message/user authentication as fast as O(DES) level, in which our scheme satisfies privacy, authenticity and integrity. Secondly as using the public key ID as effective as PKI, our improved IBE variant reduces the key exposure risk.

Distributed Translator Part 2: Laboratory Test Results (분산 중계기 Part 2: 실험실 테스트 결과)

  • Park, Sung-Ik;Eum, Ho-Min;Seo, Jae-Hyun;Kim, Heung-Mook;Lee, Soo-In
    • Journal of Broadcast Engineering
    • /
    • v.15 no.1
    • /
    • pp.29-39
    • /
    • 2010
  • This paper presents and analyzes laboratory test results of distributed translator (DTxR) for distributed frequency network (DFN) in the ATSC (Advanced Television Systems Committee) terrestrial digital TV broadcasting system. The DTxR laboratory test is classified to receiving part test and transmitting part test. The receiving part test includes dynamic range, random noise, single echo, and adjacent channel interference. The transmitting part test includes quality of output signal (out-of channel emission, quality of transmitting signal, and phase noise), frequency synchronization among output signals, and TxID (Transmitter Identification) signal's affect to the legacy receiver. By the laboratory test results, the receiving part of DTxR eliminates average -2.5 dB of single echo and has average 17.5 dB at TOV (Threshold of Visibility) under random noise environment. In addition, the transmitting part of DTxR satisfies the specification of US FCC (Federal Communications Commission), and frequency difference among DTxR output signals is less than 0.001 Hz.

Analysis of Al-Saggaf et al's Three-factor User Authentication Scheme for TMIS

  • Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.9
    • /
    • pp.89-96
    • /
    • 2021
  • In this paper, we analyzed that the user authentication scheme for TMIS(Telecare Medicine Information System) proposed by Al-Saggaf et al. In 2019, Al-Saggaf et al. proposed authentication scheme using biometric information, Al-Saggaf et al. claimed that their authentication scheme provides high security against various attacks along with very low computational cost. However in this paper after analyzing Al-Saggaf et al's authentication scheme, the Al-Saggaf et al's one are missing random number s from the DB to calculate the identity of the user from the server, and there is a design error in the authentication scheme due to the lack of delivery method. Al-Saggaf et al also claimed that their authentication scheme were safe against a variety of attacks, but were vulnerable to password guessing attack using login request messages and smart cards, session key exposure and insider attack. An attacker could also use a password to decrypt the stored user's biometric information by encrypting the DB with a password. Exposure of biometric information is a very serious breach of the user's privacy, which could allow an attacker to succeed in the user impersonation. Furthermore, Al-Saggaf et al's authentication schemes are vulnerable to identity guessing attack, which, unlike what they claimed, do not provide significant user anonymity in TMIS.

An Exploratory Study on Narrative Elements-Based Therapeutic Rap Protocol for Enhancing Discourse Skills in Adolescents With Mild Intellectual Disabilities (경도 지적장애 청소년의 담화기술 향상을 위한 이야기 구성요소 기반 치료적 랩 프로토콜의 탐색적 연구)

  • Kim, Sol E
    • Journal of Music and Human Behavior
    • /
    • v.21 no.2
    • /
    • pp.51-75
    • /
    • 2024
  • This case study aimed to develop a therapeutic rap protocol based on narrative components for improving discourse skills of adolescents with mild intellectual disability (ID) and to explore its applicability. The protocol matched narrative elements (background, initiating event, internal response, attempts, and reaction) with rap components (verse, hook, and interjections), guiding participants to narrate their experiences in a connected discourse form. The protocol was also structured to gradually increase in difficulty, considering the developmental levels of adolescents with ID and it included steps for understanding discourse structures, applying narrative elements to content creation, and expanding narratives. Post-intervention analysis of the stories and rap lyrics created by participants to express their real-life experiences showed that participants increased the length of their stories and rap compositions, with notable improvements in rhythmicity and the inclusion of narrative elements. These findings suggest that, instead of constructing rap from random utterances, providing a structured framework reflecting discourse structure enhanced participants' understanding of event context and logical connections. Furthermore, the various elements and rhythmic features of rap can strengthen motivation and organization in discourse. This study highlights the therapeutic potential of rap in addressing the unique developmental needs of adolescents with mild ID, thereby diversifying and systematizing music therapy interventions for this population.

A Two-Way Authentication Protocol Based on Hash Collision for Unmanned Systems in Tactical Wireless Networks (전술 무선 네트워크에서 무인체계를 위한 해시 충돌 기반의 양방향 인증 프로토콜)

  • Lee, Jong-kwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.729-738
    • /
    • 2019
  • In this paper, we propose two-way authentication protocol between unmanned systems in tactical wireless networks in which long distance communications are not guaranteed due to a poor channel conditions. It is assumed that every unmanned systems have same random data set before they put into combat. The proposed protocol generates authentication code(AC) using random data that causes hash collision. The requester for authentication encrypts the materials such as their identifier, time-stamp, authentication code with the secret key. After then the requester transmits the encrypted message to the receiver. The receiver authenticates the requester by verifying the authentication code included in the request message. The performance analysis of the proposed protocol shows that it guarantees the security for various attack scenarios and efficiency in terms of communication overhead and computational cost. Furthermore, we analyzed the effect of the parameter values of the proposed protocol on the performance and suggest appropriate parameter value selection guide according to the level of security requirement.

An Enhanced Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Privacy (강한 인증과 프라이버시를 보장하는 개선된 초경량 RFID 인증 프로토콜)

  • Jeon, Dong-Ho;Kim, Young-Jae;Kwon, Hye-Jin;Jeong, Seon-Yeong;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.81-91
    • /
    • 2009
  • Recently, Chein et al proposed the ultralightweight strong authentication and strong integrity (SASI)protocol, where the tag requrires only simple bitwise operations. Since the tag does not support random number generator to generate a challenge nonce, an attacker can replay old messages and impersonate reader. However, all of the previous ultralightweight authentication schemes are vlunerable to various attacks: de-synk, eavesdropping, impersonating, tracking, DoS, disclosure etc. we analyze the problems of previous proposed ultrlightweight protocols, to overcome these security problems by using PRNG on the tag. Therefore, in this paper we propose a new lightweight RFID mutual authentication protocol that provides random number generator and bitwise operations, a security and an efficiency of the proposed schme analyze.

Backbone 1H, 15N, and 13C Resonance Assignment and Secondary Structure Prediction of HP0495 from Helicobacter pylori

  • Seo, Min-Duk;Park, Sung-Jean;Kim, Hyun-Jung;Seok, Seung-Hyeon;Lee, Bong-Jin
    • BMB Reports
    • /
    • v.40 no.5
    • /
    • pp.839-843
    • /
    • 2007
  • HP0495 (Swiss-Prot ID; Y495_HELPY) is an 86-residue hypothetical protein from Helicobacter pylori strain 26695. The function of HP0495 cannot be identified based on sequence homology, and HP0495 is included in a fairly unique sequence family. Here, we report the sequencespecific backbone resonance assignments of HP0495. About 97% of all the $^1HN$, $^{15}N$, $^{13}C{\alpha}$, $^{13}C{\beta}$, and $^{13}CO$ resonances were assigned unambiguously. We could predict the secondary structure of HP0495, by analyzing the deviation of the $^{13}C{\alpha}$ and $^{13}C{\beta}$ shemical shifts from their respective random coil values. Secondary structure prediction shows that HP0495 consists of two $\alpha$-helices and four $\beta$-strands. This study is a prerequisite for determining the solution structure of HP0495 and investigating the protein-protein interaction between HP0495 and other Helicobacter pylori proteins.

TinyIBAK: Design and Prototype Implementation of An Identity-based Authenticated Key Agreement Scheme for Large Scale Sensor Networks

  • Yang, Lijun;Ding, Chao;Wu, Meng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.11
    • /
    • pp.2769-2792
    • /
    • 2013
  • In this paper, we propose an authenticated key agreement scheme, TinyIBAK, based on the identity-based cryptography and bilinear paring, for large scale sensor networks. We prove the security of our proposal in the random oracle model. According to the formal security validation using AVISPA, the proposed scheme is strongly secure against the passive and active attacks, such as replay, man-in-the middle and node compromise attacks, etc. We implemented our proposal for TinyOS-2.1, analyzed the memory occupation, and evaluated the time and energy performance on the MICAz motes using the Avrora toolkits. Moreover, we deployed our proposal within the TOSSIM simulation framework, and investigated the effect of node density on the performance of our scheme. Experimental results indicate that our proposal consumes an acceptable amount of resources, and is feasible for infrequent key distribution and rekeying in large scale sensor networks. Compared with other ID-based key agreement approaches, TinyIBAK is much more efficient or comparable in performance but provides rekeying. Compared with the traditional key pre-distribution schemes, TinyIBAK achieves significant improvements in terms of security strength, key connectivity, scalability, communication and storage overhead, and enables efficient secure rekeying.

Improvements of Strength and Retention of Cotton Handsheet by Additives(II) -The durability test of cotton handsheet with additives (면 수초지의 지력 및 보류 향상을 위한 첨가제의 적용(제2보) -첨가제에 따른 면 수초지의 내구성 시험)

  • Cho, Yu-Je;Kim, Kang-Jae;Eom, Tae-Jin
    • Journal of Korea Technical Association of The Pulp and Paper Industry
    • /
    • v.46 no.1
    • /
    • pp.29-38
    • /
    • 2014
  • Guar gum is added to the pulp suspension at the suction side of the fan pump just before the sheet is formed on either a fourdrinier or cylinder machine. Guar gum replaced and supplements these hemicelluloses in paper bonding with many advantages, which include improved sheet formation with a more random distribution of pulp fibers. But, guar gum has serious storage problem. This material has easily decayed after High-temperature conditions such as summer. In this study, various properties of cotton handsheet were measured to solve the problem of deformation while storing guar gum and to improve the durability. After aging, which is one of the durability tests, cotton handsheet with 0.2% and 0.3% of A-PAM showed improved mechanical properties and bursting index and folding endurance of cotton handsheet with 0.3% of A-PAM were similar to those with guar gum. The yellowness loss of cotton handsheet with synthetic polymers was lower than those with guar gum.