• Title/Summary/Keyword: Team identity

Search Result 81, Processing Time 0.032 seconds

A Highly Secure Identity-Based Authenticated Key-Exchange Protocol for Satellite Communication

  • Yantao, Zhong;Jianfeng, Ma
    • Journal of Communications and Networks
    • /
    • v.12 no.6
    • /
    • pp.592-599
    • /
    • 2010
  • In recent years, significant improvements have been made to the techniques used for analyzing satellite communication and attacking satellite systems. In 2003, a research team at Los Alamos National Laboratory, USA, demonstrated the ease with which civilian global positioning system (GPS) spoofing attacks can be implemented. They fed fake signals to the GPS receiver so that it operates as though it were located at a position different from its actual location. Moreover, Galileo in-orbit validation element A and Compass-M1 civilian codes in all available frequency bands were decoded in 2007 and 2009. These events indicate that cryptography should be used in addition to the coding technique for secure and authenticated satellite communication. In this study, we address this issue by using an authenticated key-exchange protocol to build a secure and authenticated communication channel for satellite communication. Our protocol uses identity-based cryptography. We also prove the security of our protocol in the extended Canetti-Krawczyk model, which is the strongest security model for authenticated key-exchange protocols, under the random oracle assumption and computational Diffie-Hellman assumption. In addition, our protocol helps achieve high efficiency in both communication and computation and thus improve security in satellite communication.

Regulations of Food Packaging in Korea, Europe and USA (우리나라, 유럽 및 미국의 식품용 용기포장재 기준규격 관리제도 연구)

  • Jeon, Dae-Hoon;Lee, Young-Ja
    • KOREAN JOURNAL OF PACKAGING SCIENCE & TECHNOLOGY
    • /
    • v.13 no.2
    • /
    • pp.75-78
    • /
    • 2007
  • Regulation of food packaging in Korea, Eurpoe and USA are surveyed. Food packaging manufacturer or converter has a responsibility to evaluate the safety of migration of harmful materials from typical finished packaging items. The 'overall migration limit' of all components from the packaging and 'specific migration limits(SML)' of monomers or additives are evaluated with food simulants, water, acetic acid, ethanol and n-heptane, based on the regulations of the countries. A substance not regulated has to be authorized with the technical data required, information on chemical identity, physical chemical and other properties, the intended use, migration studies and toxicological studies.

  • PDF

Radiation Pattern of Multibeam Array Antenna with Digital Beamforming for Stratospheric Communication System: Statistical Simulation

  • Ku, Bon-Jun;Ahn, Do-Seob;Lee, Seong-Pal;Shishlov, A.V.;Reutov, A.S.;Ganin, S.A.;Shubov, A.G.
    • ETRI Journal
    • /
    • v.24 no.3
    • /
    • pp.197-204
    • /
    • 2002
  • This paper presents the results of the numerical simulation of a multibeam active phased array antenna for a High Altitude Platform Station (HAPS). The simulation takes into account the random errors caused by the non-identity of the array elements and the inaccuracy of the antenna calibration. The results of our statistical simulation show that the strict requirements on the sidelobe envelope for HAPSs can be met when the amplitude and phase distribution errors are minor, a condition which may be achieved by using digital beamforming.

  • PDF

A Study of Signaling Network Architecture in UMTS Networks Using Signaling Gateway (UMTS 망에서의 SG 도입을 통한 신호망 구조 연구)

  • Cho, Jeong-Je;Park, Sang-Hoon
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.187-188
    • /
    • 2006
  • In CDMA based mobile communication network, signaling messages are routed through Signaling Transfer Point(STP) which is responsible for MTP layer 3 switching. As WCDMA based UMTS network is considered as next generation technology allowing global roaming services, all nodes in networks have their own identity number called Global Title(GT). Therefore, it is essential to introduce Signaling Gateway(SG) responsible for SCCP layer switching to solve the problem each node has all GT tables including even all overseas nodes. In this paper, we propose the signaling network architecture in UMTS networks using SG and we show that we can reduce CAPEX and OPEX in each node. To show the validity of the proposed method some simulations are given in which the results can be expected by intuitive observation.

  • PDF

A Protocol for Message Authentication in a Digital Identity Card System Using a Keyed Hash and a Hash Tree (Keyed Hash와 Hash Tree를 이용한 전자신분증 시스템에서의 메시지 인증 프로토콜)

  • Kim, Young-Sam;Kim, Seung-Hyun;Jin, Seung-Hun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.673-674
    • /
    • 2009
  • 전자신분증 시스템을 구현하기 위해서는 여러 가지 보안요소들이 고려되어야 한다. 본 논문에서는 Hash Tree와 Keyed Hash를 이용하여 전자신분증 시스템에 효율적으로 적용될 수 있는 메시지 인증(Message Authentication) 프토토콜을 제안한다.

Detection, isolation, and characterization of the cucumber mosaic virus in Pseudostellaria heterophylla from Korea

  • Lee, Da Hyun;Kim, Jinki;Han, Jun Soo;Lee, Jae-Hyeon;Lee, ByulHaNa;Park, Chung Youl
    • Journal of Plant Biotechnology
    • /
    • v.47 no.2
    • /
    • pp.150-156
    • /
    • 2020
  • Weeds play an important role in the survival of viruses and are potential inoculum sources of viral diseases for crop plants. In this study, specimens of Pseudostellaria heterophylla exhibiting symptoms of the cucumber mosaic virus (CMV) were collected in Bonghwa, Korea. The characteristics of the disease were described and leaf RNA was extracted and sequenced to identify the virus. Three CMV contigs were obtained and PCR was performed using specific primer pairs. RNA from positive samples exhibiting CMV leaf symptoms was amplified to determine the coat protein. A sequence comparison of the coat protein gene from the CMV BH isolate shared the highest nucleotide identity (99.2%) with the CMV ZM isolate. Phylogenetic analysis showed that CMV-BH belonged to subgroup IA and that the most closely-related isolate was CMV-ZM. All test plants used for the biological assay were successfully infected with CMV and exhibited CMV disease symptoms such as blistering, mosaic, and vein yellowing. To our knowledge, this is the first report of CMV infection in P. heterophylla from Korea.

Team Commitment and Job Productivity Influential from Organizational Trust, Trust in Superior and Trust to Colleague Perceived by Revenue Officers (세무공무원이 지각하는 조직신뢰, 상사신뢰, 동료신뢰가 팀몰입과 직무생산성에 미치는 영향)

  • Hong, Soon-Bok
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.4
    • /
    • pp.274-281
    • /
    • 2010
  • The objective of the present study lied in providing empirical analysis over subjects of revenue officers targeted for suggesting effective managerial way for enhanced job productivity by using team commitment as a mediator in the correlation between trust and job productivity. As a result, it was identified that organizational trust, trust in superiors and trust to colleagues perceived by revenue officers have positive effects on team commitment, while the higher team commitment leads to higher job productivity, accordingly leading to better efficiency in carrying out tax-related administration and improving the level of satisfaction as for tax payers. It demonstrated that managers in tax-related organizations must create the foundation affordable for revenue officers to be widely exposed to participate in organization-related key decision-making processes in such a way that encourages and initiates them to have stronger loyalty and self-confidence based on common identity. Furthermore, much effort shall be continuously paid in designing personnel and organizational management policies in order for them to have faithfulness and adherence to their belonged organization.

Pseudonym-based Anonymous PKI with Short Group Signature (Short Group Signature를 이용한 가명 기반 PKI)

  • Lee, Sok-Joon;Han, Seung-Wan;Lee, Yun-Kyung;Chung, Byung-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.703-707
    • /
    • 2008
  • Nowadays, Internet becomes an essential element in our life. We can make use of numerous on-line services through Internet such as information search, on-line shopping, e-mail service, etc. But, while getting the benefits of Internet service, invasion of our privacy frequently occurs because on-line service providers tend to request excessive or unnecessary personal information. So, there have been some researches on anonymous authentication, which means that user can authenticate herself, not revealing her identity or personal information. But, most of the researches are not somewhat applicable to current authentication infrastructure. In this paper, we propose a pseudonym-based anonymous PKI with short group signature. Using our proposed scheme, we can provide anonymity with conditional traceability to current PKI.

  • PDF

The Differential Effect of Task & Relationship Conflict: The Mediating Effect of Relationship Conflict based on the Conflict Transference, and the Moderating Effect of Team-Identification (과업 및 관계갈등의 차별적 효과: 갈등전이에 따른 관계갈등의 매개역할 및 팀 정체화의 조절역할)

  • Kim, Hack-Soo;Lee, Jun-Ho;Bae, Bum-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.5
    • /
    • pp.2758-2768
    • /
    • 2014
  • A research on differential effects of task and relationship conflicts claims positive effects of task conflict on innovation performance and negative effects of relation conflict on innovation performance. Yet, given the intimate interconnectedness of task conflict and relation conflict, task conflict, which has a beneficial impact on innovation performance, may have adverse effects on innovation performance as it goes through the process of being transferred to relation conflict. That necessitates the need for a way of management that can undermine the process of transference of task conflict to relation conflict, and team identification, which is a social identity of an individual and also a sort of positive, affective or cognitive bonds of such individual toward the team, can be an effective way of managing conflict. The research, which was conducted based on materials collected from 213 employees, confirms that such theory holds true for the real-life business environment. Based on the findings, this study suggested implications and directions for future research.

Efficient and Security Enhanced Evolved Packet System Authentication and Key Agreement Protocol

  • Shi, Shanyu;Choi, Seungwon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.87-101
    • /
    • 2017
  • As people increasingly rely on mobile networks in modern society, mobile communication security is becoming more and more important. In the Long Term Evolution/System Architecture Evolution (LTE/SAE) architecture, the 3rd Generation Partnership (3GPP) team has also developed the improved Evolved Packet System Authentication and Key Agreement (EPS AKA) protocol based on the 3rd Generation Authentication and Key Agreement (3G AKA) protocol in order to provide mutual authentication and secure communication between the user and the network. Unfortunately, the EPS AKA also has several vulnerabilities such as sending the International Mobile Subscriber Identity (IMSI) in plain text (which leads to disclosure of user identity and further causes location and tracing of the user, Mobility Management Entity (MME) attack), man-in-middle attack, etc. Hence, in this paper, we analyze the EPS AKA protocol and point out its deficiencies and then propose an Efficient and Security Enhanced Authentication and Key agreement (ESE-EPS AKA) protocol based on hybrid of Dynamic Pseudonym Mechanism (DPM) and Public Key Infrastructure (PKI) retaining the original framework and the infrastructure of the LTE network. Then, our evaluation proves that the proposed new ESE-EPS AKA protocol is relatively more efficient, secure and satisfies some of the security requirements such as confidentiality, integrity and authentication.