• Title/Summary/Keyword: formal proof

Search Result 72, Processing Time 0.784 seconds

Energy-Aware Self-Stabilizing Distributed Clustering Protocol for Ad Hoc Networks: the case of WSNs

  • Ba, Mandicou;Flauzac, Olivier;Haggar, Bachar Salim;Makhloufi, Rafik;Nolot, Florent;Niang, Ibrahima
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.11
    • /
    • pp.2577-2596
    • /
    • 2013
  • In this paper, we present an Energy-Aware Self-Stabilizing Distributed Clustering protocol based on message-passing model for Ad Hoc networks. The latter does not require any initialization. Starting from an arbitrary configuration, the network converges to a stable state in a finite time. Our contribution is twofold. We firstly give the formal proof that the stabilization is reached after at most n+2 transitions and requires at most $n{\times}log(2n+{\kappa}+3)$ memory space, where n is the number of network nodes and ${\kappa}$ represents the maximum hops number in the clusters. Furthermore, using the OMNeT++ simulator, we perform an evaluation of our approach. Secondly, we propose an adaptation of our solution in the context of Wireless Sensor Networks (WSNs) with energy constraint. We notably show that our protocol can be easily used for constructing clusters according to multiple criteria in the election of cluster-heads, such as nodes' identity, residual energy or degree. We give a comparison under the different election metrics by evaluating their communication cost and energy consumption. Simulation results show that in terms of number of exchanged messages and energy consumption, it is better to use the Highest-ID metric for electing CHs.

The Design of Self Testing Comparator (자체시험(Self-Testing) 특성을 갖는 비교기(Comparator) 설계)

  • 양성현;이상훈
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.2
    • /
    • pp.219-228
    • /
    • 2001
  • This paper presents the implementation of comparator which are Fail-Safe with respect to faults caused by any single physical defect likely to occur in NMOS and CMOS integrated circuit. The goal is to use it at the Fail-Safe system. First, a new fault model for PLA(Programmable Logic Array) is presented. This model reflects several physical defects in VLSI circuits. It focuses on designs based on PLA because VLSI chips are far too complex to allow detailed analysis of all the possible physical defects that can occur and of the effects on the operation of the circuit. Second, this paper show that these design, which was implemented with 2 level AND_ORor NOR-NOR circuit, are optimal in term of size. And it also present a formal proof that a comparator implemented as NOR-NOR PLA, based on these design, is self-testing with respect to most single faults in the presented fault model. Finally, it discuss the application of the self-testing comparator as a building block for implementing Fail-Safe Adder.

  • PDF

The Actual Wearing Condition and Preference of the Working Uniform Design in the Industrial Complex (공단근로자의 작업복 디자인 실태 및 선호도 연구)

  • Park, Hye-Won;Park, Gin-Ah
    • Journal of Fashion Business
    • /
    • v.12 no.2
    • /
    • pp.134-152
    • /
    • 2008
  • Functional, aesthetic and symbolic working uniforms in the industrial complex are demanded by employees and employers. The purpose of this research was to find out the actual wearing condition and preference of the working uniform design in the industrial complex. The research selected 7 enterprise subjects located in the Changwon National Industrial Complex and adopted a questionnaire method. 912 workers categorized into 4 work groups according to their work posts replied in total. The data and the degrees of satisfaction/preference of the working uniforms were analysed into descriptive statistics and F-tests by using the SPSS S/W package. The results were as follows: First, the style of the working uniform was the standard two-piece style. Second, the degree of the satisfaction with the entrepreneurial image implied to the working uniform was 2.83 throughout the 5-scale evaluation. In addition, the degree of the satisfaction with the working uniform colors was in between 2.94 and 2.96. Third, unsatisfied parts of the upper and lower uniform garments were: sleeve > pocket > collar; and waist belt loop > hip pocket > hem line respectively. Fourth, beige was the most preferred color for the working uniform top and bottom both. The most preferred color images were the calm and safety and the bright and light in order. Especially, the demand on the safety factors and soil proof colors of the outside field workers was much higher than the clerical workers. Fifth, the blouson type jacket with shirts collar or soutien roll collar was more preferred to than the casual style; and the straight formal pants were more preferred to than the casual/sweat sports pants styles. Sixth, inner pockets to keep the mobile phone and pens were required for upper garment details specially by manufacture workers. Increase of the waist belt loop numbers was required by all work groups.

A Security Analysis of Zhao and Gu's Key Exchange Protocol (Zhao와 Gu가 제안한 키 교환 프로토콜의 안전성 분석)

  • Nam, Jung-Hyun;Paik, Ju-Ryon;Lee, Young-Sook;Won, Dong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.9
    • /
    • pp.91-101
    • /
    • 2012
  • Key exchange protocols are essential for building a secure communication channel over an insecure open network. In particular, password-based key exchange protocols are designed to work when user authentication is done via the use of passwords. But, passwords are easy for human beings to remember, but are low entropy and thus are subject to dictionary attacks. Recently, Zhao and Gu proposed a new server-aided protocol for password-based key exchange. Zhao and Gu's protocol was claimed to be provably secure in a formal adversarial model which captures the notion of leakage of ephemeral secret keys. In this paper, we mount a replay attack on Zhao and Gu's protocol and thereby show that unlike the claim of provable security, the protocol is not secure against leakage of ephemeral secret keys. Our result implies that Zhao and Gu's proof of security for the protocol is invalid.

Development of a Web-based Adaptive System for Learning Pumping Lemma (펌핑 정리 학습을 위한 웹기반 적응형 시스템 개발)

  • Jung, Hyosook;Min, Kyungsil;Park, Seongbin
    • The Journal of Korean Association of Computer Education
    • /
    • v.12 no.5
    • /
    • pp.87-94
    • /
    • 2009
  • This paper presents a Web-based interactive and adaptive learning system that helps students learn the pumping lemma for the family of regular languages. Our system allows the students to proceed with their learning according to their individual differences through Web-Based Instruction and gives them opportunities for the interaction so that they can practice exercise related to the learning and gain feedbacks on the results of the exercises immediately. Especially, the system provides adaptive scaffolding that helps learners understand each step for the proof of the pumping lemma. Unlike existing systems that support learning the pumping lemma, the proposed system defines possible errors in advance and provides appropriate messages for corresponding errors. In addition, the system allows the learners to decompose a string into three parts so that they can understand the pumping lemma precisely.

  • PDF

Privacy Vulnerability Analysis on Shuai et al.'s Anonymous Authentication Scheme for Smart Home Environment (Shuai등의 스마트 홈 환경을 위한 익명성 인증 기법에 대한 프라이버시 취약점 분석)

  • Choi, Hae-Won;Kim, Sangjin;Jung, Young-Seok;Ryoo, Myungchun
    • Journal of Digital Convergence
    • /
    • v.18 no.9
    • /
    • pp.57-62
    • /
    • 2020
  • Smart home based on Internet of things (IoT) is rapidly emerging as an exciting research and industry field. However, security and privacy have been critical issues due to the open feature of wireless communication channel. As a step towards this direction, Shuai et al. proposed an anonymous authentication scheme for smart home environment using Elliptic curve cryptosystem. They provided formal proof and heuristic analysis and argued that their scheme is secure against various attacks including de-synchronization attack, mobile device loss attack and so on, and provides user anonymity and untraceability. However, this paper shows that Shuai et al.'s scheme does not provide user anonymity nor untraceability, which are very important features for the contemporary IoT network environment.

A Study on the Origin Verification of China and the Cases disapproved under Korea-China FTA (한·중 FTA체제에서 중국의 원산지검증제도와 원산지불인정사례 연구)

  • Bae, Myong-Ryeol;Shim, Sang-Ryul
    • Korea Trade Review
    • /
    • v.42 no.2
    • /
    • pp.297-318
    • /
    • 2017
  • This study reviews the origin verification system of China via literature research and analyzes cases of Korean exports origin disapproved of Chinese customs clearance, to provide origin verification strategy recommendations for Korean companies exporting to China under Korea-China FTA. We reviewed the provisions of Chinese rules of origin and analyzed origin disapproved cases gathered from various presentations. The main results of the study have the following implications; First, the customs authority needs to establish a consultation channel with the customs authority of China, and origin certification issuing agencies should provide exporters with consulting services in the certificate issuing stage to reduce verification risk. Second, exporters need to pay attention to the formal requirements of the proof of origin, utilize the advance rulings program of differences in classification of items between Korea and China, and monitor regulatory change in China.

  • PDF

On bi(必, necessity) and xianzhi(先知, a priori knowledge) of Mojing (『묵경』에 있어서 '선지(先知)'와 '필(必)' 개념의 문제)

  • Chong, Chaehyun
    • (The)Study of the Eastern Classic
    • /
    • no.35
    • /
    • pp.275-295
    • /
    • 2009
  • The aim of this paper is to reject Graham's interpretation of bi (必) and xianzhi (先知) of Later Mohists' Mojing ("墨經") as logical necessity and a priori knowledge respectively. Graham's interpretations of them are based on his beliefs that Mojing distinguishes lun (論), the art of description from bian (辯), the art of inference in the Mohist disciplines and that the latter art should be seen as such a rigorous proof as Euclidean geometry even though it is not a Western formal logic. His beliefs also start from his distinguishing 'knowledge of names' from 'knowledge of conjunction of names and objects' according to the objects of knowledge. In my reading, the art of description and the art of inference, however, can't be sharply distinguished each other in Mojing and bi and xianzhi should be taken as suggesting both a normative necessity and an empirical necessity. A normative necessity is derived from 'normative theory of definition' which comes form the theory of rectification of names in China. The normative theory of definition, unlike the descriptive theory of definition, defines terms normatively rather than descriptively. For example, although such a definition of father, 'father is beneficient', has the form of being descriptive, but it actually is prescriptive and therefore means 'father should be beneficient'. Through this normative theory of definition, empirical knowledge, as long as it is a knowledge, is seen as necessary and so can't be wrong. To conclude, for Mohists an empirical knowledge is always a basis of an inferential knowledge or a priori knowledge, so Mohists' a priori knowledge is not really a fundamental knowledge and its necessity therefore is nothing but both a normative necessity and an empirical necessity.

Construction of UOWHF based on Block Cipher (유니버설 일방향 해쉬 함수에 대한 블록 암호 기반 구성 방법)

  • 이원일
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.1
    • /
    • pp.101-111
    • /
    • 2004
  • Preneel, Govaerts, and Vandewalle considered the 64 basic ways to construct a collision resistant hash function from a block cipher. They regarded 12 of these 64 schemes as secure, though no proofs or formal claims were given. Black, Rogaway, and Shrimpton presented a more proof-centric look at the schemes from PGV. They proved that, in the black box model of block cipher, 12 of 64 compression functions are CRHFs and 20 of 64 extended hash functions are CRHFs. In this paper, we present 64 schemes of block-cipher-based universal one way hash functions using the main idea of PGV and analyze these schemes in the black box model. We will show that 30 of 64 compression function families UOWHF and 42 of 64 extended hash function families are UOWHF. One of the important results is that, in this black box model, we don't need the mask keys for the security of UOWHF in contrast with the results in general security model of UOWHF. Our results also support the assertion that building an efficient and secure UOWHF is easier than building an efficient and secure CRHF.

Compressed Demographic Transition and Economic Growth in the Latecomer

  • Inyong Shin;Hyunho Kim
    • Analyses & Alternatives
    • /
    • v.7 no.2
    • /
    • pp.35-77
    • /
    • 2023
  • This study aims to solve the entangled loop between demographic transition (DT) and economic growth by analyzing cross-country data. We undertake a national-level group analysis to verify the compressed transition of demographic variables over time. Assuming that the LA (latecomer advantage) on DT over time exists, we verify that the DT of the latecomer is compressed by providing a formal proof of LA on DT over income. As a DT has the double-kinked functions of income, we check them in multiple aspects: early maturation, leftward threshold, and steeper descent under a contour map and econometric methods. We find that the developing countries (the latecomer) have speedy DT (CDT, compressed DT) as well as speedy income such that DT of the latecomers starts at lower levels of income, lasts for a shorter period, and finishes at the earlier stage of economic development compared to that of developed countries (the early mover). To check the balance of DT, we classify countries into four groups of DT---balanced, slow, unilateral, and rapid transition countries. We identify that the main causes of rapid transition are due to the strong family planning programs of the government. Finally, we check the effect of latecomer's CDT on economic growth inversely: we undertake the simulation of the CDT effect on economic growth and the aging process for the latecomer. A worrying result is that the CDT of the latecomer shows a sharp upturn of the working-age population, followed by a sharp downturn in a short period. Compared to early-mover countries, the latecomer countries cannot buy more time to accommodate the workable population for the period of demographic bonus and prepare their aging societies for demographic onus. Thus, we conclude that CDT is not necessarily advantageous to developing countries. These outcomes of the latecomer's CDT can be re-interpreted as follows. Developing countries need power sources to pump up economic development, such as the following production factors: labor, physical and financial capital, and economic systems. As for labor, the properties of early maturation and leftward thresholds on DTs of the latecomer mean that demographic movement occurs at an unusually early stage of economic development; this is similar to a plane that leaks fuel before or just before take-off, with the result that it no longer flies higher or farther. What is worse, the property of steeper descent represents the falling speed of a plane so that it cannot be sustained at higher levels, and then plummets to all-time lows.