• Title/Summary/Keyword: hierarchical key

Search Result 304, Processing Time 0.022 seconds

FI-Based Local Group Key Generation/Distribution for Mobile Multicast in a Hierarchical Mobile IPv6Network

  • Baek, Jin-Suk;Fisher, Paul S.;Kwak, Ming-Yung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.2 no.1
    • /
    • pp.5-21
    • /
    • 2008
  • In order to securely transmit multicast data packets in a mobile environment where frequent join/leave events are a characteristic of the environment, there is a need for a new secure and efficient group key management solution. We propose a secure group key generation/distribution solution providing scalability and reliability. Using this solution, when a mobile node, which is in a multicast session, enters a new domain, the agent of the domain joins the multicast session and coordinates its data packets with the mobile node. The agent encrypts and transmits subsequent data packets to the mobile node, using a local one-time pad key. This key is generated with FI sequences, enabling the mobile node to regenerate the same data packet, based on the information sent by the agent. Our performance analysis demonstrates that the proposed solution can significantly reduce the number of key generations and distributions, when it is applied to the hierarchical mobile IPv6 network.

HIERARCHICAL SWITCHING CONTROL OF LONGITUDINAL ACCELERATION WITH LARGE UNCERTAINTIES

  • Gao, F.;Li, K.Q.
    • International Journal of Automotive Technology
    • /
    • v.8 no.3
    • /
    • pp.351-359
    • /
    • 2007
  • In this study, a hierarchical switching control scheme based on robust control theory is proposed for tracking control of vehicle longitudinal acceleration in the presence of large uncertainties. A model set consisting of four multiplicative-uncertainty models is set up, and its corresponding controller set is designed by the LMI approach, which can ensures the robust performance of the closed loop system under arbitray switching. Based on the model set and the controller set, a switching index function by estimating the system gain of the uncertainties between the plant and the nominal model is designed to determine when and which controller should be switched into the closed loop. After theoretical analyses, experiments have also been carried out to validate the proposed control algorithm. The results show that the control system has good performance of robust stability and tracking ability in the presence of large uncertainties. The response time is smaller than 1.5s and the max tracking error is about $0.05\;m/S^2$ with the step input.

A Multi-Chain Based Hierarchical Topology Control Algorithm for Wireless Sensor Networks

  • Tang, Hong;Wang, Hui-Zhu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.9
    • /
    • pp.3468-3495
    • /
    • 2015
  • In this paper, we present a multi-chain based hierarchical topology control algorithm (MCHTC) for wireless sensor networks. In this algorithm, the topology control process using static clustering is divided into sensing layer that is composed by sensor nodes and multi-hop data forwarding layer that is composed by leader nodes. The communication cost and residual energy of nodes are considered to organize nodes into a chain in each cluster, and leader nodes form a tree topology. Leader nodes are elected based on the residual energy and distance between themselves and the base station. Analysis and simulation results show that MCHTC outperforms LEACH, PEGASIS and IEEPB in terms of network lifetime, energy consumption and network energy balance.

Strongly-Connected Hierarchical Grid-Based Pairwise Key Predistribution Scheme for Static Wireless Sensor Networks (정적 무선 센서 네트워크를 위한 강한 연결성을 가진 계층적 그리드 기반의 키 선분배 기법)

  • Nyang Dae-Hun;Abedelaziz Mohaisen
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.14-23
    • /
    • 2006
  • Wireless Sensor Network(WSN) consists of huge number of sensor nodes which are small and inexpensive with very limited resources. The public key cryptography is undesirable to be used in WSN because of the limitations of the resources. A key management and predistribution techniques are required to apply the symmetric key cryptography in such a big network. Many key predistribution techniques and approaches have been proposed, but most of-them didn't consider the real WSN assumptions, In this paper, we propose a security framework that is based on a hierarchical grid for WSN considering the proper assumptions of the communication traffic and required connectivity. We apply simple keying material distribution scheme to measure the value of our framework. Finally, we provide security analysis for possible security threats in WSN.

A Developement of Group-Level Distance Education System Using the Generator of Hierarchical WBI Documents on the WWW (WWW에서 계층적 WBI 문서 생성기를 이용한 수준별 원격교육시스템 개발)

  • Kim, Chang-Geun;Choi, Jun-Young;Kim, Byung-Ki
    • The Journal of Korean Association of Computer Education
    • /
    • v.3 no.1
    • /
    • pp.135-142
    • /
    • 2000
  • Recently the user of distance education system using Intemet-Web are increasing rapidly. This paper shows that Hierarchical WBI documents generator by using CGI is devised and applied to development of distance education system for group-level spoken english. This overcomes the problems of the ready-made programs, which took a lot of time and cost. To generate WBI documents, The key is established to each document saved in server by types of the hierarchical structure and is transmitted to client. By client transmitting this key to server when next documentary is required. Sever can know what documents the client needs. The WBI documentary generator tells the keys transmitted from the client, automatically generates a new documentary to send, and delivery it.

  • PDF

A Fast Authentication based on Hierarchical Key Structure for Roaming Mobile Nodes Between Domains (모바일 네트워크에서 로밍을 위한 계층적 인증 방법)

  • Hong, Ki-Hun;Jung, Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.12C
    • /
    • pp.1288-1296
    • /
    • 2006
  • This paper proposes a fast authentication scheme based on hierarchical key structure (HiFA) for roaming mobile nodes in both intra-domain and inter-domain. The full authentication procedure standardized in IEEE 802.11 and 802.16 is difficult to be applied to a handover since it needs a heavy operation and long delay time during a handover. Though a number of schemes were proposed to solve the problem, the existing schemes might degrade the security of authentication or impose heavy administrative burden on the Pome authentication server. The main contribution of this paper is to reduce the communication and computation overhead of the home authentication sewer without degrading the security strength of the fast roaming authentication using hierarchical authentication key structure. The proposed scheme iii this paper decentralizes the administrative burden of the home authentication server to other network entities such as a local authentication server or access point and supports the security separation of the authentication key among local authentication servers using hash key chain.

Access Control of XML Object Using Role Hierarchy and Cryptographic Key Assignment Scheme (역할 계층과 암호학적인 키 할당 기법을 이용한 XML 객체의 접근제어)

  • Bae Kyoung-Man;Kim Jong-Hoon;Ban Yong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.93-103
    • /
    • 2005
  • As the usage of XML documents increases the requirement of security for XML documents is growing. Especially it is very important to solve the problem of access control to XML object which shares in the environment where various users connect to each others. In this paper, we propose the access control model and mechanism which is combined with role hierarchy in the RBAC and hierarchical key derivation/assign method for the access to XML object. So we implement the access control mechanism by including hierarchical key derivation method. The technique, we proposed, gives not only the benefit in management which RBAC provides in access control to XML objects, but also it ran help derive a lower layer key from the higher layer user's. This feature decrease the number of keys managed in each role hierarchy in comparison with previous methods.

A Multilevel Key Distribution using Pseudo - random Permutations (의사 랜덤치환을 이용한 다중레벨 키분배)

  • Kim, Ju-Seog;Shin, Weon;Lee, Kyung-Hyune
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.10
    • /
    • pp.2493-2500
    • /
    • 1997
  • We propose a new key management scheme for multiuser group which is classified as hierarchical structure (sometimes it is called a multilevel security hierarchy) in the symmetric key cryptosystem. The proposed scheme is based on the trapdoor one-way permutations which are generated by the pseudo-random permutation algorithm, and it is avaliable for multilevel hierarchical structure composed of a totally ordered set and a partially ordered set, since it has advantage for time and storage from an implemental point of view. Moreover, we obtain a performance analysis by comparing with the other scheme, and show that the proposed scheme is very efficient for computing time of key generation and memory size of key storage.

  • PDF

Enhancing Retrieval Performance for Hierarchical Compact Binary Tree (계층형 집약 이진 트리의 검색 성능 개선)

  • Kim, Sung Wan
    • Journal of Creative Information Culture
    • /
    • v.5 no.3
    • /
    • pp.345-353
    • /
    • 2019
  • Several studies have been proposed to improve storage space efficiency by expressing binary trie data structure as a linear binary bit string. Compact binary tree approach generated using one binary trie increases the key search time significantly as the binary bit string becomes very long as the size of the input key set increases. In order to reduce the key search range, a hierarchical compact binary tree technique that hierarchically expresses several small binary compact trees has been proposed. The search time increases proportionally with the number and length of binary bit streams. In this paper, we generate several binary compact trees represented by full binary tries hierarchically. The search performance is improved by allowing a path for the binary bit string corresponding to the search range to be determined through simple numeric conversion. Through the performance evaluation using the worst time and space complexity calculation, the proposed method showed the highest performance for retrieval and key insertion or deletion. In terms of space usage, the proposed method requires about 67% ~ 68% of space compared to the existing methods, showing the best space efficiency.

Numerical modelling of effective thermal conductivity of hardened cement paste

  • Cheng Liu;Qiang Liu;Jianming Gao;Yunsheng Zhang
    • Computers and Concrete
    • /
    • v.32 no.6
    • /
    • pp.567-576
    • /
    • 2023
  • In this study, a 3D microstructure-based model is established to simulate the effective thermal conductivity of cement paste, covering varying influencing factors associated with microstructure and thermal transfer mechanisms. The virtual cement paste divided into colloidal C-S-H and heterogeneous paste are reconstructed based on its structural attributes. Using the two-level hierarchical cement pastes as inputs, a lattice Boltzmann model for heat conduction is presented to predict the thermal conductivity. The results suggest that due to the Knudsen effect induced by the nanoscale pore, the thermal conductivity of air in C-S-H gel pore is significantly decreased, maximumly accounting for 3.3% thermal conductivity of air at the macroscale. In the cement paste, the thermal conductivities of dried and saturated cement pastes are stable at the curing age larger than 100 h. The high water-to-cement ratio can decrease the thermal conductivity of cement paste.