• Title/Summary/Keyword: Secure Scheme

Search Result 1,014, Processing Time 0.024 seconds

Secure and Efficient Cooperative Spectrum Sensing Against Byzantine Attack for Interweave Cognitive Radio System

  • Wu, Jun;Chen, Ze;Bao, Jianrong;Gan, Jipeng;Chen, Zehao;Zhang, Jia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.11
    • /
    • pp.3738-3760
    • /
    • 2022
  • Due to increasing spectrum demand for new wireless devices applications, cooperative spectrum sensing (CSS) paradigm is the most promising solution to alleviate the spectrum shortage problem. However, in the interweave cognitive radio (CR) system, the inherent nature of CSS opens a hole to Byzantine attack, thereby resulting in a significant drop of the CSS security and efficiency. In view of this, a weighted differential sequential single symbol (WD3S) algorithm based on MATLAB platform is developed to accurately identify malicious users (MUs) and benefit useful sensing information from their malicious reports in this paper. In order to achieve this, a dynamic Byzantine attack model is proposed to describe malicious behaviors for MUs in an interweave CR system. On the basis of this, a method of data transmission consistency verification is formulated to evaluate the global decision's correctness and update the trust value (TrV) of secondary users (SUs), thereby accurately identifying MUs. Then, we innovatively reuse malicious sensing information from MUs by the weight allocation scheme. In addition, considering a high spectrum usage of primary network, a sequential and differential reporting way based on a single symbol is also proposed in the process of the sensing information submission. Finally, under various Byzantine attack types, we provide in-depth simulations to demonstrate the efficiency and security of the proposed WD3S.

A Study on White Space Search of Wireless Signal based Passive Tracking Technology using Enhanced Search Formula of Patent Analysis (개선된 검색식 기반 특허분석을 통한 무선신호 기반 Passive Tracking 공백기술 도출에 관한 연구)

  • Lee, Hangwon;Kim, Youngok
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.4
    • /
    • pp.802-816
    • /
    • 2021
  • Purpose: In this paper, we propose a direction of future research and development to be carried out in the passive tracking field by deriving a white space with enhanced search formula of patent analysis. Method: In this paper, we derive a white space by identifying the direction and the flow of technology change and by matrixing the object and solution through extensive patent search with enhanced search formula and analysis in the field of passive tracking technology. Result: By the proposed scheme, 'multi-target positioning and tracking' and '3D positioning technology' using artificial intelligence, adaptive/hybrid positioning technology, and radar/antenna were derived as white space technologies and confirmed with absence of any services or products. Conclusion: The derived white space technologies from this paper are the areas where patent applications are not active and there are not many prior patents, thus it is necessary to secure the rights through more active R&D and patent application activities.

Application Development and Type Test for Smart Inverter Based on IEEE 1547-2018 Utilizing Power HILS (Power HILS를 활용한 IEEE 1547-2018 기반 스마트 인버터의 기술개발 및 형식시험 연구)

  • Shin, Danbi;Kang, Moses;Lee, Hyuna;Hong, Seonri;Yoon, Gihwan;Baek, Jongbok
    • Journal of IKEEE
    • /
    • v.26 no.1
    • /
    • pp.1-9
    • /
    • 2022
  • In order to secure the reliability of the power system and to increase the penetration level of distributed energy resources (DERs), requirements such as IEEE 1547 have been revised to strengthen the grid connection standards for DER. This paper proposes a control scheme for smart inverter functions based on IEEE 1547-2018 that satisfy these standards, and introduces a power HILS-based test platform built for verification of smart inverter. Among the smart inverter functions, Volt-var and Frequency-watt allow the curve to be set from the upper level to comply with the interoperability and operation time of enable signals for each function are controlled by references from the upper level. According to the requirement, Volt-var and Frequency-watt are performed via power HILS platform and verified through the measurement results that all of the specified type tests were satisfied.

A Scheme for DID and EMR Integrated System based on Hyperledger Indy (Hyperledger Indy 기반의 DID와 EMR 통합 시스템 기법)

  • Jiyong Yang;Hyosang Eom;Keun-Ho Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.1
    • /
    • pp.47-52
    • /
    • 2024
  • The efficiency and quality of healthcare services rely heavily on the secure protection and transparent management of individuals' medical information, which is becoming increasingly important in the digital age. To address this issue, we propose a distributed identity management (DID) and electronic medical record (EMR) integration system based on Hyperledger Indy, which aims to ensure the ownership of medical information to individuals and increase the accessibility and utilization of medical information. The system will allow individuals to manage their own medical information and share it transparently when necessary, which will improve the efficiency of healthcare services. In addition, the system will securely protect and transparently manage medical information, increasing the transparency of medical services and strengthening individuals' control over their medical information. Thus, the system will contribute significantly to improving the quality of medical services, protecting individuals' medical information, and improving the efficiency of medical services.

A Comparative Study on the Recognition of Urban Agriculture between Urban Farmers and Public Officials (도시농업인과 공무원의 도시농업 인식 비교·평가)

  • Park, Won-Zei;Koo, Bon-Hak;Park, Mi-Ok;Kwon, Hyo-Jin
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.40 no.4
    • /
    • pp.90-103
    • /
    • 2012
  • The aim of this study is to be able to understand the problems within the urban agriculture policy promoted by the Government and local autonomous entity base on the comparison of the consciousness of the urban agriculture between urban farmers and public officials and to inquire into the further revitalization scheme in the end. For this purpose, this study drew implications through studying latest trend and the legislation of domestic and foreign urban agriculture and then conducted a questionnaire survey of urban farmers and public officials. Because of this research, the revitalization schemes of urban agriculture are as follows: First, it's necessary to secure the usable arable land, such as the green roof, community garden, as well as urban agriculture park, etc. Second, it is necessary to establish the urban agriculture relations act suited for the actual circumstances of our country and to back up the legislation at an institutional, technological level in terms of a nation in order to secure the durability of urban agriculture. Third, it is advisable to make a proposal about the problems in time of activities for cultivation by forming a network between urban farmers and public officials and to prepare the plan for the active exchange of farming technologies. Fourth, it's necessary to activate the community gardens by supplying the education through cultivation method & its management method, and a variety of urban-agriculture-participation programs. Fifth, it is necessary to set up the specialized and practical education through an institute for landscape architecture. Sixth, it is necessary to induce the spontaneous participation in urban agriculture from urban farmers accompanied by the activities for promotion that are worth arousing urban farmers' interest. Lastly, it is also necessary to establish a legal basis of urban agricultural parks and facilities as well as to promote a search for multilateral policies and their practice so that the further urban agriculture can be stably continued within city boundaries.

A RBAC-based Access Control Framework in OSGi Service Platform (OSGi 서비스 플랫폼에서 RBAC 기반의 사용자 접근제어 프레임워크)

  • Cho, Eun-Ae;Moon, Chang-Joo;Baik, Doo-Kwon
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.5
    • /
    • pp.405-422
    • /
    • 2007
  • Recently, according to the network environment, there are many researches for home network. Nowadays, in home network, the method that access control policy is managed for each home device by using ACL is popular, and EAM (Extranet access management) is applied as a solution. In addition, the research about secure OS is ongoing based on open operating system and the research of user authentication mechanisms for home network using home server is also in progress. However, these researches have some problems as follows; First, the transmission scope of expected access technology in home network is wide, so unauthenticated outside terminal can access the home network. Second, user is inconvenient because user need to set the necessary information for each device. Third, user privacy and convenience are not considered. OSGi provides a service platform for heterogeneous technologies in home network environment. Here, user access control is one of the core parts which should have no problems such as above items, but there are no concrete researches yet. Thus in this paper, we propose an access control policy management framework and access control operation based on RBAC for user access control in home network environment in which OSGi service platform is operated. First, we list the consideration which is not clearly mentioned in OSGi standard, and then we solve these above problems through new framework. In addition, we propose the effective and economical operation method which reduces the policy change frequency for user access control by using RBAC concept though limited resource of home gateway. Besides, in this paper, these proposed policies are defined separately as user-role assignment policy and permission-role assignment policy, and user decide their own policies. In conclusion, we provide the scheme to enhance the user convenience and to solve the privacy problem.

A Secure Route Optimization Mechanism for Mobile VPN users in Foreign Networks (모바일 VPN 사용자를 위한 보안 강화 경로 최적화 방안)

  • Kim, Kyoung-Min;Byun, Hae-Sun;Lee, Mee-Jeong
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.5
    • /
    • pp.348-359
    • /
    • 2007
  • The conventional mobile VPN services assumed the mobile communications occur between the MN in foreign networks and the CN in the home network. However, if a MN wants to communicate with another MN in a foreign network, it could degrade the performance of the mobile VPN service because of the triangular routing problem. In this paper, we propose a route optimization mechanism based on the mobile VPN using an x-HA allocated by diameter MIP in order to support the efficient communication between the mobile VPN users in foreign networks. The i-HA maintains the VPN-TIA as well as the x-HoA as the CoAs to solve the security problem and to provide an efficient route optimization simultaneously. Moreover, we proposed revised IPSec tunnel configuration to reduce the IPSec tunnel overheads at a MN when the MN communicates with several MNs in the foreign networks at the same time. The VPN server, a security management entity in the home network, notifies an additional IPSec tunnel establishment between the x-HAs where the communication peers are registered. The simulation result showed that the proposed scheme decreases the end-to-end packet delay time and improves the throughput after the handoff compared to the existing mechanism.

The 'One Belt One Road' Initiative and Development of Inland Port in China (중국 '일대일로' 이니셔티브와 내륙항의 발전)

  • Lee, Choong Bae;Lee, Jong Chul
    • Journal of Korea Port Economic Association
    • /
    • v.33 no.3
    • /
    • pp.1-16
    • /
    • 2017
  • China has achieved rapid economic growth in the late 1970s with economic reform and open-door policy. China's economic growth began initially in the eastern coastal areas and from the 2000s expanded to the western and northeastern regions where the economy was relatively underdeveloped. In particular, in 2013 'One-Belt One Road' initiative proposed by Xi Jinping, the current General Secretary of the Communist Party of China is not only a key strategy for China's advancement into the world and also provides important opportunities for the development of these backward regions. Inland Port is the inland logistics hub and plays a crucial role in enhancing access to maritime ports as well as access to adjacent inland countries. Therefore, a number of inland ports have been developed and operated in order to enter into overseas markets and secure resources in the northeastern and western regions of China. This study aims to examine the role and development of inland port in 'One-Belt One Road' scheme. In conclusion, 'One-Belt One Road' will further increase the role of inland port, and in response, the development of inland port will play a pivotal role in one belt one road initiative. In this respect, Korean companies need to consider plans to participate in the development and operation of inland ports in China, which would provide opportunities to spread Northern markets including China, Russia, Central Asia, Eastern Europe.

kNN Query Processing Algorithm based on the Encrypted Index for Hiding Data Access Patterns (데이터 접근 패턴 은닉을 지원하는 암호화 인덱스 기반 kNN 질의처리 알고리즘)

  • Kim, Hyeong-Il;Kim, Hyeong-Jin;Shin, Youngsung;Chang, Jae-woo
    • Journal of KIISE
    • /
    • v.43 no.12
    • /
    • pp.1437-1457
    • /
    • 2016
  • In outsourced databases, the cloud provides an authorized user with querying services on the outsourced database. However, sensitive data, such as financial or medical records, should be encrypted before being outsourced to the cloud. Meanwhile, k-Nearest Neighbor (kNN) query is the typical query type which is widely used in many fields and the result of the kNN query is closely related to the interest and preference of the user. Therefore, studies on secure kNN query processing algorithms that preserve both the data privacy and the query privacy have been proposed. However, existing algorithms either suffer from high computation cost or leak data access patterns because retrieved index nodes and query results are disclosed. To solve these problems, in this paper we propose a new kNN query processing algorithm on the encrypted database. Our algorithm preserves both data privacy and query privacy. It also hides data access patterns while supporting efficient query processing. To achieve this, we devise an encrypted index search scheme which can perform data filtering without revealing data access patterns. Through the performance analysis, we verify that our proposed algorithm shows better performance than the existing algorithms in terms of query processing times.

The Distributed Authentication and Key Exchange Protocols for Smartcard (스마트카드에 적용가능한 분산형 인증 및 키 교환 프로토콜)

  • Oh Heung-Ryongl;Yoon Ho-Sun;Youm Heung-Youl
    • Journal of Internet Computing and Services
    • /
    • v.6 no.3
    • /
    • pp.17-30
    • /
    • 2005
  • A PAK(Password-Authenticated Key Exchange) protocol is used as a protocol to provide both the mutual authentication and allow the communication entities to share the session key for the subsequent secure communication, using the human-memorable portable short-length password, In this paper, we propose distributed key exchange protocols applicable to a smartcard using the MTI(Matsumoto, Takashima, Imai) key distribution protocol and PAK protocol. If only one server keeps the password verification data which is used for password authentication protocol. then It could easily be compromised by an attacker, called the server-compromised attack, which results in impersonating either a user or a server, Therefore, these password verification data should be distributed among the many server using the secret sharing scheme, The Object of this paper Is to present a password-based key exchange protocol which is to allow user authentication and session key distribution, using the private key in a smartcard and a password typed by a user. Moreover, to avoid the server-compromised attack, we propose the distributee key exchange protocols using the MTI key distribution protocol, And we present the security analysis of the proposed key exchange protocol and compare the proposed protocols with the existing protocols.

  • PDF