• Title/Summary/Keyword: group key management

Search Result 510, Processing Time 0.026 seconds

Improving a Forward & Backward Secure Key Management Scheme for Wireless Sensor Networks

  • Park, Dong-Gook
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.4
    • /
    • pp.521-524
    • /
    • 2009
  • Park proposed a forward & backward Secure key management scheme in wireless sensor networks for Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems [7]. The scheme, however, is still vulnerable to an attack called "sandwich attack": two nodes captured at times $t_1$ and $t_2$, respectively, surrenders all the group keys used between times $t_1$ and $t_2$. In this paper, we propose a fix to the scheme, which can limit the vulnerable time duration to an arbitrarily chosen time span while keeping the forward and backward secrecy of the scheme untouched.

A study on the analysis of production-related key performance indicator affecting business positioning of machinery manufacturers (중소기계제조업의 사업포지셔닝에 영향을 미치는 생산관련 핵심성과지표에 관한 연구)

  • Cheong, Hae-Sock;Yoo, Woo-Sik
    • Journal of the Korea Safety Management & Science
    • /
    • v.14 no.2
    • /
    • pp.221-228
    • /
    • 2012
  • This paper analyzed twenty-six production-related KPI(Key Performance indicator) factors of business diagnosis, such as personnel, equipment, materials, operations and quality affecting company business competition to 186 small machinery manufacturers in 2010. Also, we explained the concept of Business Positioning and divided research subjects into four Business Positioning Groups formed break-even point ratio & fixed cost ratio to sales and then we compared between the 4 groups using Logistic Regression analysis by SAS statistical software package. The objective of this study is two-fold. The first is to find out production-related KPI factor of superior Business Positioning Group. The second is to suggest improvement ways for small manufacturers in order to get better profitable Business Positioning.

Expression of $HpaG_{Xooc}$ Protein in Bacillus subtilis and its Biological Functions

  • Wu, Huijun;Wang, Shuai;Qiao, Junqing;Liu, Jun;Zhan, Jiang;Gao, Xuewen
    • Journal of Microbiology and Biotechnology
    • /
    • v.19 no.2
    • /
    • pp.194-203
    • /
    • 2009
  • $HpaG_{Xooc}$, from rice pathogenic bacterium Xanthomonas oryzae pv. oryzicola, is a member of the harpin group of proteins, eliciting hypersensitive cell death in non-host plants, inducing disease and insect resistance in plants, and enhancing plant growth. To express and secret the $HpaG_{Xooc}$ protein in Bacillus subtilis, we constructed a recombinant expression vector pM43HF with stronger promoter P43 and signal peptide element nprB. The SDS-PAGE and Western blot analysis demonstrated the expression of the protein $HpaG_{Xooc}$ in B. subtilis. The ELISA analysis determined the optimum condition for $HpaG_{Xooc}$ expression in B. subtilis WBHF. The biological function analysis indicated that the protein $HpaG_{Xooc}$ from B. subtilis WBHF elicits hypersensitive response(HR) and enhances the growth of tobacco. The results of RT-PCR analysis revealed that $HpaG_{Xooc}$ induces expression of the pathogenesis-related genes PR-1a and PR-1b in plant defense response.

Enhanced Secure Sensor Association and Key Management in Wireless Body Area Networks

  • Shen, Jian;Tan, Haowen;Moh, Sangman;Chung, Ilyong;Liu, Qi;Sun, Xingming
    • Journal of Communications and Networks
    • /
    • v.17 no.5
    • /
    • pp.453-462
    • /
    • 2015
  • Body area networks (BANs) have emerged as an enabling technique for e-healthcare systems, which can be used to continuously and remotely monitor patients' health. In BANs, the data of a patient's vital body functions and movements can be collected by small wearable or implantable sensors and sent using shortrange wireless communication techniques. Due to the shared wireless medium between the sensors in BANs, it may be possible to have malicious attacks on e-healthcare systems. The security and privacy issues of BANs are becoming more and more important. To provide secure and correct association of a group of sensors with a patient and satisfy the requirements of data confidentiality and integrity in BANs, we propose a novel enhanced secure sensor association and key management protocol based on elliptic curve cryptography and hash chains. The authentication procedure and group key generation are very simple and efficient. Therefore, our protocol can be easily implemented in the power and resource constrained sensor nodes in BANs. From a comparison of results, furthermore, we can conclude that the proposed protocol dramatically reduces the computation and communication cost for the authentication and key derivation compared with previous protocols. We believe that our protocol is attractive in the application of BANs.

A Proposal of Key Management Structure for Providing a Integrated Multicast Service ` (통합 멀티캐스트 서비스 지원을 위한 키 관리 구조 제안)

  • 박희운;이임영
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.6
    • /
    • pp.89-103
    • /
    • 2001
  • Through the increment of requirement for group oriented communication services, the multicast infrastructure based on a wire and wireless network has become a widely discussed researching topic. However the research of the security properties safety, efficiency and scaleability in a multicast structure, has not been enough. In this study, we propose a scalable secure multicast key management structure based on PKI(Public Key Infrastructure), IPSec, domain subgroup and structural two mode scheme to provide a integrated multicast service. Also we discuss and propose the digital nominative group signature a refreshing method for satisfying the security and trusty on the network. At the base of this work we certify to the usability of new proposed scheme from comparing it with conventional schemes in the part of safety, efficiency and scaleability.

Secure group communication protocol using a cellular automata (셀룰러 오토마타를 이용한 안전한 그룹 통신 프로토콜)

  • 이준석;박영호;이경현
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.05b
    • /
    • pp.27-31
    • /
    • 2003
  • 본 논문은 그름 멤버들간의 안전한 통신을 위한 그룹키 관리(Group key management)에 대한 새로운 방법을 제안한다. 제안된 방식은 선형 셀룰러 오토마타를 이용해서 생성된 involution 특성을 갖는 기본 암호 프리미티브를 이용하여 비밀 공유키를 생성한다. 제안된 방식은 공모에 대한 위협을 근본적으로 방지할 수 있는 특징을 가지고 있다.

  • PDF

A Key Management Scheme for Radio Frequency Communication Environment (저속 무전 통신 환경에 적용 가능한 키 관리 방식)

  • Kim, Song-Yi;Lee, Kwang-Woo;Jeong, Han-Jae;Cho, Young-Jun;Cha, Wook-Jae;Kim, Seung-Joo;Won, Dong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.16C no.4
    • /
    • pp.439-448
    • /
    • 2009
  • The development of wireless communications provides mobility and accessibility to the wire communication users. Wireless sensor network is one of the leading wireless communication techniques. The security mechanism for wired network communication cannot be applied to wireless sensor network because of the limited resource and computing capability of nodes. Furthermore, communication errors frequently occur and the speed is low. Thus, efficient key management scheme is required in low-speed environment. In this paper, we proposed an efficient and secured master key-based scheme compared to the existing scheme. The advantage of our scheme is that establishing and renewing the pair-wise key is possible. In addition, it provides functions such as establishing group keys and renewing it. Furthermore, adding nodes is enabled through our scheme. The master key-based scheme can be applied to military operations and to radio communications for confidential communications.

A Study on the Core Competency of Dance Festival Using VRIO Model (VRIO모델 분석을 활용한 춤 축제 핵심역량 도출)

  • Kwak, Ji-Hye
    • Journal of Korea Entertainment Industry Association
    • /
    • v.13 no.8
    • /
    • pp.77-91
    • /
    • 2019
  • As of 2019, a report by the Ministry of Culture, Sports and Tourism showed that 884 diverse regional festivals are being held in the country. While there are successful festivals with large audience numbers and local economic effects, there are many festivals that only waste local budgets. Against this backdrop, the question of this study is "What are the key competences of a successful dance festival utilizing the VRIO model?" The development process and success factors of the success dance festival at home and abroad were analyzed in order to explore the key competences and specialization measures of the festival that our dance festival can take off as a successful dance festival. The purpose of the study is to examine what is the source of competitiveness of the regional festival through VRIO model, which can identify the key competencies of the festival to grow into a successful dance festival, and to derive the key competencies of the festival through the interview of the expert group(Focus Group Interview) to apply the development measures of our country's dance festival. According to the analysis, festival experts view the success factors of local festivals from various perspectives based on their empirical knowledge. The key competencies priority was 1. Theme, 2. the festival organization and professional personnel management, 3. The results came in the order of residents' participation. And the successful domestic and foreign dance festivals had their own core competencies. Growing up as a successful festival through festival management, which is worth no other festival, difficult to emulate, rare and difficult to replace, is seen as the biggest key to leading the regional festival to the world festival.

Firms' Characteristics between Highly Successful and Less Successful Venture Business (우량.비우량 벤처비즈니스의 기업특성)

  • Choi Sang-Ryul;Roh Hyun-Sub
    • Management & Information Systems Review
    • /
    • v.6
    • /
    • pp.163-186
    • /
    • 2001
  • A venture business plays important roles in the economy of a developing nation. It makes highly value-added product, increases employment and improves the industry structure. The objective of this study is to derive the financial and non-financial characteristics from venture businesses, which determine a highly successful business group or a less successful business group. The firm characteristics are composed of 21 financial(liquidity, leverage, cash flow, activity, productivity, and etc) and 34 non-financial characteristics(manager, technology, marketability and credibility variables), which have been considered as the key characteristics for venture business by the existing literature. All financial ratios and non-financial characters play a role of making discriminations between a highly successful and a less successful group. Because there are not generally accepted definitions, classifying a highly successful and a less successful venture business is a very difficult problem. Operational definitions have many problems but we have no choice in current stage.

  • PDF

Authenticated IGMP for Controlling Access to Multicast Distribution Tree (멀티캐스트 분배트리 접근제어를 위한 Authenticated IGMP)

  • Park, Chang-Seop;Kang, Hyun-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.3-17
    • /
    • 2007
  • Receiver access control scheme is proposed to protect multicast distribution tree from DoS(Denial-of Service) attack induced by unauthorized use of IGMP(Internet group management protocol), by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP(Content Provider), NSP(Network Service Provider), and group members.