• Title/Summary/Keyword: group key management

Search Result 515, Processing Time 0.022 seconds

An Enhanced System of Group Key Management Based on MIPUF in IoT (IoT 환경의 MIPUF 기반 그룹키 관리 시스템 개선)

  • Tak, Geum Ji;Jeong, Ik Rae;Byun, Jin Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1243-1257
    • /
    • 2019
  • With the emergence of the IoT environment, various smart devices provide consumers with the convenience and various services. However, as security threats such as invasion of privacy have been reported, the importance of security issues in the IoT environment has emerged, and in particular, the security problem of key management has been discussed, and the PUF has been discussed as a countermeasure. In relation to the key management problem, a protocol using MIPUF has been proposed for the security problem of the group key management system. The system can be applied to lightweight IoT environments and the safety of the PUF ensures the safety of the entire system. However, in some processes, it shows vulnerabilities in terms of safety and efficiency of operation. This paper improves the existing protocol by adding authentication for members, ensuring data independence, reducing unnecessary operations, and increasing the efficiency of database searches. Safety analysis is performed for a specific attack and efficiency analysis results are presented by comparing the computational quantities. Through this, this paper shows that the reliability of data can be improved and our proposed method is lighter than existing protocol.

Group Idea Generation and Simulation (그룹 아이디어 제너레이션을 위한 시뮬레이션 알고리즘의 개발)

  • Jung, J.H.
    • Korean Management Science Review
    • /
    • v.26 no.2
    • /
    • pp.37-59
    • /
    • 2009
  • Electronic brainstorming (EBS) to improve the process and outcomes of group decision making is an artifact of Information Systems legacy. Despite three decades of research with EBS in an effort to become a key resource of organizational performance, its performance when compared to that of nominal is inconclusive because of the recent debate over its usefulness in terms of productivity. Subsequent researchers have directed our attention to the re-examination of cognitive stimulation, which is considered the major benefit in computer-based idea generation, to explain the performance singularity in computer-based groups. While both cognitive and motivational factors that moderate and mediate the group-interaction process remain unexplored, individual differences that are tightly linked to creative behavior have been largely ignored to account for the discrepancy in performance. Since simulations have been widely used in situations where an outcome does not meet the assumptions, the notion of a group simulator and detailed simulation mechanisms are introduced to examine the potential effects of individual differences on the performance of computer-based idea generation groups. In addition, two prior studies that empirically explored cognitive mechanisms with the group simulator are showcased along with six propositions to initiate future research.

Positive integration of the franchise system: A new perspective on leadership, followership, trust and group efficacy

  • Yang, Hoe-Chang;Ju, Young-Hwang
    • Asian Journal of Business Environment
    • /
    • v.1 no.1
    • /
    • pp.5-8
    • /
    • 2011
  • This study has been conducted by focusing franchisor's leadership style, franchisee's followership, group-efficacy and their trust in order to achieve positive integration of the franchise system. The key results of empirical examination on the moderating effect of group-efficacy and trust between leadership style proposed by Path-Goal Theory and followership has been found as follows. First, franchisors should be showed their leadership style to fit their mutual business situation. Second, Franchisors and franchisees will be found many ways to increase level of franchisee's group-efficacy. Third, Franchisors will be obtained trust from their own franchisees. These efforts will be given high level of franchisees' trust and group-efficacy. As a result, positive integration of the franchise system will both enhance their competitiveness.

  • PDF

Case Study of Cooperative Learning Simulating Turn-Key System in Design Class for Environmental Engineering (턴키 제도를 모사한 환경공학 설계과목의 협동학습 적용사례)

  • Kim, Geon-Ha;Oh, Ju-Won;Lee, Hack-Soo
    • Journal of Engineering Education Research
    • /
    • v.9 no.4
    • /
    • pp.5-9
    • /
    • 2006
  • In this research, a case study for cooperative learning practiced in a design class for environmental engineering was presented. Designing a treatment facility for urban diffuse pollution was a main problem given to the participants. Turn-key system for civil works were simulated throughout class works. Twenty five students were grouped into four virtual companies and assigned own position from chairperson to workers. Each group competed throughout establishing design concept regarding order, expense calculation, process distribution, actual calculation. Best design with lowest bidding won the first place. For evaluating class effectiveness, one student from each group were monitored thorough semester. Participants were improved for their understanding about company establishment, turn-key system management, awareness about personal management, and presentation skills. Tension of the class was effectively elevated as well.

A Study on the Multicast Security System in Multiple Core Environment (다중코어 환경에서의 멀티캐스트 보안에 관한 연구)

  • Lee, Jun-Seok
    • Journal of Industrial Convergence
    • /
    • v.7 no.1
    • /
    • pp.21-31
    • /
    • 2009
  • Multicast is a network technology for the delivery of information to a group of destinations simultaneously using the most efficient strategy to deliver the messages over each link of the network only once, creating copies only when the links to the multiple destinations split. This thesis designed a group certificate that can authenticate group information safety between cores based on CBT, proposed a multicast security system that can control some security key.

  • PDF

Examination of the Impact of Blood Groups on Group Participation

  • Asgari, Omid
    • The Journal of Economics, Marketing and Management
    • /
    • v.3 no.2
    • /
    • pp.9-20
    • /
    • 2015
  • Could blood type provide a key to wellness and even affect our personality? The theory that blood type is linked to personality (and other mental and physical qualities) is popular mainly in Japan, though it has carried over to Taiwan and South Korea. The present study is the result of a scientific research in which the relationship between two important variables, namely blood group a nd group participation, are determined in the research framework. Based on some collected data from manufacturing firms which are accepted firms in Tehran Stock Exchange, and through cluster sampling a sample was selected. 380 questionnaires were distributed to the personnel of production line, of the firms then the reliability and validity of the questionnaires through independence test and average ratio comparison of the two population were examined, and through Pearson's chi-square formula, the relationship between blood group (independent variable) and group participation (dependent variable) were tested, then through Schuprow coefficient, the prioritization of blood groups over group participation was identified and the following results were obtained: people group participation is affected by their personality features which is derived from their temperament, mood, and characteristics. The study also showed that people blood groups has an effect on their group cooperation, and among blood groups, blood group A has the greatest tendency to group participation and then blood group O, AB, B are prioritized respectively.

Lightweight Individual Encryption for Secure Multicast Dissemination over WSNs (무선 센서네트워크에서 경량화 개인별 암호화를 사용한 멀티캐스트 전송기법)

  • Park, Taehyun;Kim, Seung Young;Kwon, Gu-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.115-124
    • /
    • 2013
  • In this paper, we suggest a secure data dissemination by Lightweight Individual Encryption Multicast scheme over wireless sensor networks using the individual encryption method with Forward Error Correction instead of the group key encryption method. In wireless sensor networks, a sink node disseminates multicast data to the number of sensor nodes to update the up to date software such as network re-programming and here the group key encryption method is the general approach to provide a secure transmission. This group key encryption approach involves re-key management to provide a strong secure content distribution, however it is complicated to provide group key management services in wireless sensor networks due to limited resources of computing, storage, and communication. Although it is possible to control an individual node, the cost problem about individual encryption comes up and the individual encryption method is difficult to apply in multicast data transmission on wireless sensor networks. Therefore we only use 0.16% of individually encrypted packets to securely transmit data with the unicast to every node and the rest 99.84% non-encrypted encoded packets is transmitted with the multicast for network performance.

Fast Group Rekeying Scheme for Secure Multicast in Wireless Sensor Networks (무선센서네트워크 환경에서 안전한 멀티캐스트를 지원하는 신속한 그룹키 갱신 기법)

  • NamGoong, Wan;Cho, Kwan-Tae;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.75-88
    • /
    • 2011
  • Messages need to transmit to the neighbors securely in wireless sensor network, because a sensor node is deployed in hostile area. Thus it is necessary to support secure communication. One of the most important communication part is secure multicast. Especially, group rekeying is a big problem for multicast key management. So, group rekeying must be proceed securely when secrete information is exposed by attacker. Many group rekeying schemes have been studied for ad hoc networks. However, these schemes are Ill1desirable in WSNs. In this paper, we proposed a novel group rekeying scheme in WSNs that it has very powerful security.

A comparative analysis for the original references of prescriptions including Rhei Rhizoma in Dongeuibogam (동의보감(東醫寶鑑) 중 대황(大黃) 처방의 원저(原著) 비교 분석 연구)

  • Kim, An-Na;Lee, Chia-Wei;Oh, Yong-Taek;Jang, Hyun-Chul;Kim, Hong-Jin
    • Journal of Haehwa Medicine
    • /
    • v.23 no.1
    • /
    • pp.21-55
    • /
    • 2014
  • Objectives : This report describes the original references of 154 formulas related to the use of Rhei Rhizoma main blended from Dongeuibogam. Methods : This study analyzes the original references of 154 formulas including Rhei Rhizoma as a key component in Dongeuibogam. Results : There were five types as follows: 1.There is no exact match between 154 formulas in Dongeuibogam and the original formulas in references. 2. Case that could not found the original formula in reference: 22%. 3. Case that the citation is the similar to the original reference: 4%. 4. Case that the citation is not same to expression but contents basically: 73%. 5. Case of addition of content: 1% Conclusions : Most formulas related to the use of Rhei Rhizoma main blended from Dongeuibogam are similar to the contents in the original references. But we can find that Heo Jun, who writes Dongeuibogam, modifies the contents for his intention of editing, idea and situation in Korea.

The Impacts of Childhood Trauma on Psychosocial Features in a Chinese Sample of Young Adults

  • Wang, Dandan;Lu, Shaojia;Gao, Weijia;Wei, Zhaoguo;Duan, Jinfeng;Hu, Shaohua;Huang, Manli;Xu, Yi;Li, Lingjiang
    • Psychiatry investigation
    • /
    • v.15 no.11
    • /
    • pp.1046-1052
    • /
    • 2018
  • Objective The aims of the present study were to explore the occurrence of childhood trauma and importantly to determine the impacts of childhood trauma on psychosocial features in a Chinese sample of young adults. Methods A survey was carried out in a group of 555 university students by using Childhood Trauma Questionnaire (CTQ), Self-rating Depression Scale (SDS), Self-rating Anxiety Scale (SAS), Dysfunctional Attitudes Questionnaire (DAS), Eysenck Personality Questionnaire (EPQ), and Social Support Rating Scale (SSRS). The moderate-severe cut-off scores for CTQ were used to calculate the prevalence of childhood trauma, and then psychosocial features were compared between individuals with and without childhood trauma. Results A proportion of 18.6% of university students had self-reported childhood trauma exposures. Subjects with childhood trauma reported higher scores of SDS, SAS, DAS, and psychoticism and neuroticism dimensions of EPQ (t=4.311-5.551, p<0.001); while lower scores of SSRS and extraversion dimension of EPQ (t=-4.061- -3.039, p<0.01). Regression analyses further revealed that scores of SAS and DAS were positively (Adjusted B=0.211-0.230, p<0.05), while scores of SSRS were negatively (Adjusted B=-0.273- -0.240, p<0.05) associated with specific CTQ scores. Conclusion Childhood trauma is still a common social and psychological problem. Individuals with childhood trauma show much more depression, anxiety, distorted cognition, personality deficits, and lower levels of social support, which may represent the social and psychological vulnerability for developing psychiatric disorders after childhood trauma experiences.