• Title/Summary/Keyword: group key management

Search Result 510, Processing Time 0.029 seconds

The Effect of Project Method on the Key Competencies on the unit of "Making Model by Architecture" in the Vocational High Schools (특성화 고등학교 '건축모형제작' 단원에서 프로젝트법을 적용한 수업이 직업기초능력 향상에 미치는 효과)

  • Hwang, Dong-Un;Choi, Ji-Yeon
    • 대한공업교육학회지
    • /
    • v.37 no.1
    • /
    • pp.125-143
    • /
    • 2012
  • This study aimed to identify the effect of the instruction applied with a project method for the 'Making Model by Architecture' unit in vocational High schools on the improvement of the Key competences. With this aim, the study selected as an experimental group, control group third graders in two classroom in G vocational High Schools in Goyang, Gyeonggi-do. Aiming at the selected students in the experimental group and the control group, the study conducted a pre-test of their Key competences; thus, the study confirmed that there was no statistically significant difference. Then, the study offered a class applied with a project method to the experimental group, while offering a traditional instruction to the control group. After offering the class, the study undertook a post-test, and verified the effect. In order to prove the test result, the study carried out a Hest using the SPSSWIN 12.0 statistical program, while the significance level being ${\alpha}$<.05. The conclusions obtained from this study include the following. All the six selected areas including 'problem-solving skills', 'communication skills', 'resource utilization competence', 'mathematical competence', 'interpersonal management competence' and 'self-management competence', which were supposed to be appropriate for this study among the sub-areas of Key competences, were found to show significant differences between the experimental group applied with a project method and the control group as a result of the post-test of the two groups. In summarizing the above research results, the class using a project method for the 'Making Model by Architecture' unit was discovered to be effective for improving Key competences. In particular, it may be more effective learning method for enhancing six areas greatly relevant to the project method among various sub-areas of Key competences.

A Study on Efficient Key Management Model for Digital Pay-TV System (디지털 유료 방송시스템에 적합한 키 관리 모델에 관한 연구)

  • Yang Hyung-kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.2C
    • /
    • pp.200-207
    • /
    • 2006
  • Recently, with the development of information and communication technology, digital pay-TV technology is paid attention. So the Protection of the provided contents is becoming more important. However, in order to encourage an active based on digital TV, the contents and information sent and received respectively by the broadcaster and the subscriber must be protected. Therefore, in this paper, I analyze the requirements to protect the digital contents, the security and efficiency of the previous digital pay-TV system model. Then I proposed a key management model for digital pay-TV system.

On the Insecurity of Asymmetric Key-based Architecture in Wireless Sensor Networks

  • Mohaisen, Abedelaziz;Choi, Jeong-Woon;Hong, Do-Won
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.4
    • /
    • pp.376-384
    • /
    • 2009
  • In this article, we demonstrate that the asymmetric key-based architecture for securing wireless sensor networks recently introduced by Haque et al. is insecure under impersonation attack, since it does not provide authentication semantics. In addition, we show that, for the scheme to work correctly, the resulting key distribution construction should be symmetric and group-wise.

Actual Condition and Issues for Mobile Security System

  • Sakurai, Kouichi;Fukushima, Kazuhide
    • Journal of Information Processing Systems
    • /
    • v.3 no.2
    • /
    • pp.54-63
    • /
    • 2007
  • The high-speed mobile Internet has recently been expanded, many attractive services are provided. However, these services require some form of security-related technology. This paper outlines Japanese mobile services and exposits some mobile security topics including mobile spam, mobile malware, mobile DRM system, mobile WiMAX security, and mobile key management.

The Study on Design and Implementation of MSEC-based Group Key Management Protocol for Corporate Secret Distribution (기업비밀유통을 위한 MSEC 기반 그룹 키 관리 프로토콜 설계와 구현 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.11 no.6
    • /
    • pp.87-110
    • /
    • 2010
  • Recently competitive Korean companies are suffered from financial loss due to illegal exposure of their own proprietary know-how secrets, since it is difficult to watch hidden illegal channels to leak them due to their digitalization. Today the DRM-based system designed to protect such secrets is insufficient to prevent it, since DRM-based protection system cannot defend the intelligent robbery of secrets, in special, employee's robbery. The MSEC is much appropriate to secure secrets against employee's robbery. Our paper notes that IGMP, MSEC and SNMP can work easily together to realize secure system that satisfy strong security condition for prevention from leaking secrets. Since the previous research was on the architectural design for prevention of illegal exposure, this paper proposes the efficient protocol based on MSEC protocol. Our protocol satisfies the strong security conditions that the principles that the secret should be stored/distributed only in an encrypted shape, and should be separated physically from its encryption key, and should be carried in registered mobile storage separate from its processing device, and should be verified in terms of both user and device. Thus this paper proposes both the protocol for secret document distribution and its group key management.

Development of ASEAN Network Model on Information Literacy

  • Sacchanand, Chutima
    • Journal of Information Science Theory and Practice
    • /
    • v.10 no.1
    • /
    • pp.18-29
    • /
    • 2022
  • This study aimed at overviewing the situation of information literacy education and research in the Association of Southeast Asian Nations (ASEAN) region, and developing an ASEAN network model on information literacy. This research used documentary and qualitative research methods. Key resources consisted of twenty bibliometric studies and related documents and two groups of key persons. The first group consisted of twenty-seven purposive key persons from eight countries, and the second group consisted of seven key persons from five countries. The research instruments comprised a data collection form and focus group/ interviewing forms. Data was collected by focus group discussion and online interviews, and qualitative content analysis was used in data analysis and presented descriptively. Research findings showed that: 1) information literacy education and research in the ASEAN region varied across countries and placed importance on the educational context. Singapore was found to be the most leading and productive country in ASEAN in information literacy with the highest number of journal articles on the international scale, and was among the most contributing groups at the regional and global level; 2) the ASEAN Network on Information Literacy (ASEAN-NIL) has been developed as a model with its principles, objectives, management system, activities, and promotion strategies. Its strengths are an integrated scope, multidimensional orientation, and interdisciplinary and collaborative partnerships at the national, regional, and international level, suitable for the ASEAN context, the online environment, and the digital educational ecosystem.

Security Issues on Machine to Machine Communications

  • Lai, Chengzhe;Li, Hui;Zhang, Yueyu;Cao, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.498-514
    • /
    • 2012
  • Machine to machine (M2M) communications is the hottest issue in the standardization and industry area, it is also defined as machine-type communication (MTC) in release 10 of the 3rd Generation Partnership Project (3GPP). Recently, most research have focused on congestion control, sensing, computing, and controlling technologies and resource management etc., but there are few studies on security aspects. In this paper, we first introduce the threats that exist in M2M system and corresponding solutions according to 3GPP. In addition, we present several new security issues including group access authentication, multiparty authentication and data authentication, and propose corresponding solutions through modifying existing authentication protocols and cryptographic algorithms, such as group authentication and key agreement protocol used to solve group access authentication of M2M, proxy signature for M2M system to tackle authentication issue among multiple entities and aggregate signature used to resolve security of small data transmission in M2M communications.

A need-awaring multi-agent approach to nomadic community computing for ad hoc need identification and group formation

  • Choi, Keun-Ho;Kwon, Oh-Byung
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2005.11a
    • /
    • pp.183-192
    • /
    • 2005
  • Recently, community computing has been proposed for group formation and group decision-making. However, legacy community computing systems do not support group need identification for ad hoc group formation, which would be one of key features of ubiquitous decision support systems and services. Hence, this paper aims to provide a multi-agent based methodology to enable nomadic community computing which supports ad hoc need identification and group formation. Focusing on supporting group decision-making of relatively small sized multiple individual in a community, the methodology copes with the following three characteristics: (1) ad hoc group formation, (2) context-aware group need identification, and (3) using mobile devices working in- and out-doors. NAMA-US, an RFID-based prototype system, has been developed to show the feasibility of the idea proposed in this paper.

  • PDF

A Design of Permission Management System Based on Group Key in Hadoop Distributed File System (하둡 분산 파일 시스템에서 그룹키 기반 Permission Management 시스템 설계)

  • Kim, Hyungjoo;Kang, Jungho;You, Hanna;Jun, Moonseog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.4
    • /
    • pp.141-146
    • /
    • 2015
  • Data have been increased enormously due to the development of IT technology such as recent smart equipments, social network services and streaming services. To meet these environments the technologies that can treat mass data have received attention, and the typical one is Hadoop. Hadoop is on the basis of open source, and it has been designed to be used at general purpose computers on the basis of Linux. To initial Hadoop nearly no security was introduced, but as the number of users increased data that need security increased and there appeared new version that introduced Kerberos and Token system in 2009. But in this method there was a problem that only one secret key can be used and access permission to blocks cannot be authenticated to each user, and there were weak points that replay attack and spoofing attack were possible. Hence, to supplement these weak points and to maintain efficiency a protocol on the basis of group key, in which users are authenticated in logical group and then this is reflected to token, is proposed in this paper. The result shows that it has solved the weak points and there is no big overhead in terms of efficiency.

A Study on KSI-based Authentication Management and Communication for Secure Smart Home Environments

  • Ra, Gyeong-Jin;Lee, Im-Yeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.892-905
    • /
    • 2018
  • In smart home environment, certificate based signature technology is being studied by communication with Internet of Things(IoT) device. However, block - chain technology has attracted much attention because of the problems such as single - point error and management overhead of the trust server. Among them, Keyless Signature Infrastructure(KSI) provides integrity by configuring user authentication and global timestamp of distributed server into block chain by using hash-based one-time key. In this paper, we provide confidentiality by applying group key and key management based on multi - solution chain. In addition, we propose a smart home environment that can reduce the storage space by using Extended Merkle Tree and secure and efficient KSI-based authentication and communication with enhanced security strength.