• Title/Summary/Keyword: cluster key management

Search Result 87, Processing Time 0.029 seconds

A Session Key Establishment Scheme in Mobile Ad-Hoc Networks (이동 애드혹 네트워크에서 세션 키 설정 방안)

  • 왕기철;정병호;조기환
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.4
    • /
    • pp.353-362
    • /
    • 2004
  • Mobile Ad-Hoc network tends to expose scarce computing resources and various security threats because all traffics are carried in air along with no central management authority. To provide secure communication and save communication overhead, a scheme is inevitable to serurely establish session keys. However, most of key establishment methods for Ad-Hoc network focus on the distribution of a group key to all hosts and/or the efficient public key management. In this paper, a secure and efficient scheme is proposed to establish a session key between two Ad-Hoc nodes. The proposed scheme makes use of the secret sharing mechanism and the Diffie-Hellman key exchange method. For secure intra-cluster communication, each member node establishes session keys with its clusterhead, after mutual authentication using the secret shares. For inter-cluster communication, each node establishes session keys with its correspondent node using the public key and Diffie-Hellman key exchange method. The simulation results prove that the proposed scheme is more secure and efficient than that of the Clusterhead Authentication Based Method(1).

Secure Key Management Protocol in the Wireless Sensor Network

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of Information Processing Systems
    • /
    • v.2 no.1
    • /
    • pp.48-51
    • /
    • 2006
  • To achieve security in wireless sensor networks (WSN), it is important to be able to encrypt messages sent among sensor nodes. We propose a new cryptographic key management protocol, which is based on the clustering scheme but does not depend on the probabilistic key. The protocol can increase the efficiency to manage keys since, before distributing the keys by bootstrap, the use of public keys shared among nodes can eliminate the processes to send or to receive keys among the sensors. Also, to find any compromised nodes safely on the network, it solves safety problems by applying the functions of a lightweight attack-detection mechanism.

A Resilient Key Renewal Scheme in Wireless Sensor Networks (센서 네트워크에서 복원력을 지닌 키갱신 방안)

  • Wang, Gi-Cheol;Cho, Gi-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.2
    • /
    • pp.103-112
    • /
    • 2010
  • In sensor networks, because sensors are deployed in an unprotected environment, they are prone to be targets of compromise attack, If the number of compromised nodes increases considerably, the key management in the network is paralyzed. In particular, compromise of Cluster Heads (CHs) in clustered sensor networks is much more threatening than that of normalsensors. Recently, rekeying schemes which update the exposed keys using the keys unknown to the compromised nodes are emerging. However, they cause some security and efficiency problems such as single group key employment in a cluster, passive eviction of compromised nodes, and excessive communication and computation overhead. In this paper, we present a proactive rekeying scheme using renewals of duster organization for clustered sensor networks. In the proposed scheme, each sensor establishes individual keys with neighbors at network boot-up time, and these keys are employed for later transmissions between sensors and their CH. By the periodic cluster reorganization, the compromised nodes are expelled from network and the individual keys employed in a cluster are changed continuously. Besides, newly elected CHs securely agree a key with sink by informing their members to sink, without exchangingany keying materials. The simulation results shows that the proposed scheme remarkably improves the confidentiality and integrity of data in spite of the increase of compromised nodes. Also, they show that the proposed scheme exploits the precious energy resource more efficiently than SHELL.

Efficient Transmission Structure and Key Management Mechanism Using Key Provisioning on Medical Sensor Networks (의료 센서 네트워크에서의 효율적인 전송 구조 및 Key Provisioning을 사용한 키 관리 기법 연구)

  • Seo, Jae-Won;Kim, Mi-Hui;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.285-298
    • /
    • 2009
  • According to the development of ubiquitous technologies, sensor networks is used in various area. In particular, medical field is one of the significant application areas using sensor networks, and recently it has come to be more important according to standardization of the body sensor networks technology. There are special characteristics of their own for medical sensor networks, which are different from the one of sensor networks for general application or environment. In this paper, we propose a hierarchical medical sensor networks structure considering own properties of medical applications, and also introduce transmission mechanism based on hierarchical structure. Our mechanism uses the priority and threshold value for medical sensor nodes considering patient's needs and health condition. Through this way Cluster head can transmit emergency data to the Base station rapidly. We also present the new key establishment mechanism based on key management mechanism which is proposed by L. Eschenauer and V. Gligor for our proposed structure and transmission mechanism. We use key provisioning for emergency nodes that have high priority based on patients' health condition. This mechanism guarantees the emergency nodes to establish the key and transmit the urgent message to the new cluster head more rapidly through preparing key establishment with key provisioning. We analyze the efficiency of our mechanism through comparing the amount of traffic and energy consumption with analysis and simulation with QualNet simulator. We also implemented our key management mechanism on TmoteSKY sensor board using TinyOS 2.0 and through this experiments we proved that the new mechanism could be actually utilized in network design.

Cluster Tool Module Communication Based on a High-level Fieldbus (고수준 필드버스 기반의 클러스터 툴 모듈 통신)

  • Lee Jin Hwan;Lee Tae Eok;Park Jeong Hyeon
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2002.05a
    • /
    • pp.285-292
    • /
    • 2002
  • A cluster tool for semiconductor manufacturing is an integrated device that consists of several single wafer processing modules and a wafer transport module based on a robot. The distributed module controllers are integrated by an inter-module communication network and coordinated by a centralized controller, called a cluster tool controller (CTC). Since the CTC monitors and coordinates the distributed complex module controllers for advanced process control, complex commuication messaging and services between the CTC and the module controllers are required. A SEMI standard, CTMC(Cluster Tool Module Communication), specifies application-level communication service requirements for inter-module communication. We propose the use of high-level fieldbuses, for instance. PROFIBUS-FMS, for implementing CTMC since the high-level fieldbuses are well suited for complex real-time distributed manufacturing control applications. We present a way of implementing CTMC using PROFIBUS-FMS as the communication enabler. We first propose improvements of a key object of CTMC for material transfer and the part transfer protocol to meet the functional requirements of modem advanced cluster tools. We also discuss mapping objects and services of CTMC to PROFIBUS-FMS communication objects and services. Finally, we explain how to implement the mappings.

  • PDF

A Study on development of Innovational Cluster for Knowledge Management in Busan (부산지역 지식경영을 위한 혁신클러스터 모델 구축에 관한 연구)

  • Jeong, Hyung-Il;Bang, Kwuen-Soo;Kim, Jong-Duk
    • Management & Information Systems Review
    • /
    • v.29 no.4
    • /
    • pp.169-186
    • /
    • 2010
  • This study aims to reveal the ways to sharpen the edges of Korean companies through the relativity analysis between knowledge management and innovational cluster in environmental changes in resent Busan. That is, according to the knowledge management approach, the methods and directions of strengthening industrial competition were established, while the strategy of innovational clusters was suggested as a way of expanding and encouraging knowledge management. The key words of innovational cluster are in this research are the framework of Cluster theory, the importance of innovational cluster, and the change of managerial strategy paradigm. This study provide the several implication for the practice of knowledge management and the researchers. Based on these theories of knowledge management and industrial clusters, their close relationships were analyzed. As a result, industrial clusters were found to be effectively utilized to enlarge and deepen knowledge management. In addition, this suggests the efficient operation guideline of knowledge management. this study indicates both knowledge and innovational cluster should be operated and handled together in the managerial strategy. but this research has limitations in generaling the study result because it collects data from local firms only in Busan.

  • PDF

A Study of Key Pre-distribution Scheme in Hierarchical Sensor Networks (계층적 클러스터 센서 네트워크의 키 사전 분배 기법에 대한 연구)

  • Choi, Dong-Min;Shin, Jian;Chung, Il-Yong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.43-56
    • /
    • 2012
  • Wireless sensor networks consist of numerous small-sized nodes equipped with limited computing power and storage as well as energy-limited disposable batteries. In this networks, nodes are deployed in a large given area and communicate with each other in short distances via wireless links. For energy efficient networks, dynamic clustering protocol is an effective technique to achieve prolonged network lifetime, scalability, and load balancing which are known as important requirements. this technique has a characteristic that sensing data which gathered by many nodes are aggregated by cluster head node. In the case of cluster head node is exposed by attacker, there is no guarantee of safe and stable network. Therefore, for secure communications in such a sensor network, it is important to be able to encrypt the messages transmitted by sensor nodes. Especially, cluster based sensor networks that are designed for energy efficient, strongly recommended suitable key management and authentication methods to guarantee optimal stability. To achieve secured network, we propose a key management scheme which is appropriate for hierarchical sensor networks. Proposed scheme is based on polynomial key pool pre-distribution scheme, and sustain a stable network through key authentication process.

A Study on China's "the Belt and Road" Initiative and the Collaboration Scheme for the Main Ports in Tumen River Region (중국의 "일대일로" 창의와 두만강 지역 주요 항만의 협력방안에 관한 연구)

  • Li, Zhong-Shi;Li, Xue
    • Journal of the Korea Safety Management & Science
    • /
    • v.23 no.1
    • /
    • pp.31-38
    • /
    • 2021
  • port is the intersection of highway, railway, waterway and other transportation modes, and is the key to realizing integrated transportation. There are many excellent ports around the Tumen River Region. With the obvious location advantages, Tumen River Region is an important part of Tumen River regional cooperation and development, and is the key to realizing the "borrow port to sea", which is raised in "China Tumen River regional cooperation and development planning outline -- regard Changjitu area as the development and opening leading area" (referred to as "planning outline"). This paper focus on the main ports in the Tumen River region, taking them as the research object. Furthermore, the paper makes the strategic plan for the port cluster in the Tumen River region as well as puts a collaboration scheme is proposed by analyzing the research reviews of the Tumen River region and the present situations of the main ports.

Imabari Maritime Cluster: A Case Analysis of Japan Maritime Cluster (이마바리해사클러스터의 사례분석)

  • HAN, Jong-khil
    • The Journal of shipping and logistics
    • /
    • v.34 no.4
    • /
    • pp.695-710
    • /
    • 2018
  • Following the collapse of Hanjin Shipping, building a strong maritime cluster is one of the policy measures for the re-construction of the Korean shipping and shipbuilding industries. Thus, the purpose of this study is to develop a policy alternative for building a maritime cluster. Using Porter's diamond models, we analyzed the Imabari maritime cluster of Japan, which is characterized by cooperation between key industries, such as shipping, shipbuilding, shipbuilding equipment, and finance. The Imabari Maritime Cluster is equipped with complete domestic demand conditions and related supporting industry conditions. Although the strengths of the production conditions include excellent family-based management and strong support from regional administration and banks which develops independency among cluster members, the weak points include the absense of robust port services and difficulty in recruiting young talent in small and medium-sized cities. We can confirm that the company's strategy is focused on stable management, rather than a short-term view.

University Student Characteristics of Type of Job Values and Key Competency

  • Bok, Mi-Jung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.5
    • /
    • pp.47-53
    • /
    • 2018
  • This study is aimed to determine types of job values which is searched by 242 university student in Gwangju, to study characteristics of each type, and to analyze key competency of each type. The data were analyed with PASW 18.0 using frequency analysis, k-mean cluster analysis, crosstabs and one-way ANOVA. According to findings, first of all, university student types of job values are divided into 4 groups; a type of intrinsic job values(27.7%), a type of active job value(32.2%), a type of external job value(12.4%), a type of passive job value(27.7%). Secondly, the type of job values showed statistically significant difference only in the monthly allowance of socio-economic variables. Thirdly, the type of job values showed statistically significant difference 'communication', 'mathematics', 'problem solving', 'self development', 'resource management', 'interpersonal skills', 'technical ability', 'understanding organizations' and 'work ethics'.