• Title/Summary/Keyword: hierarchical key

Search Result 307, Processing Time 0.024 seconds

Key Update Protocols in Hierarchical Sensor Networks (계층적 센서 네트워크에서 안전한 통신을 위한 키 갱신 프로토콜)

  • Lee, Joo-Young;Park, So-Young;Lee, Sang-Ho
    • The KIPS Transactions:PartC
    • /
    • v.13C no.5 s.108
    • /
    • pp.541-548
    • /
    • 2006
  • Sensor network is a network for realizing the ubiquitous computing circumstances, which aggregates data by means of observation or detection deployed at the inaccessible places with the capacities of sensing and communication. To realize this circumstance, data which sensor nodes gathered from sensor networks are delivered to users, in which it is required to encrypt the data for the guarantee of secure communications. Therefore, it is needed to design key management scheme for encoding appropriate to the sensor nodes which feature continual data transfer, limited capacity of computation and storage and battery usage. We propose a key management scheme which is appropriate to sensor networks organizing hierarchical architecture. Because sensor nodes send data to their parent node, we can reduce routing energy. We assume that sensor nodes have different security levels by their levels in hierarchy. Our key management scheme provides different key establishment protocols according to the security levels of the sensor nodes. We reduce the number of sensor nodes which share the same key for encryption so that we reduce the damage by key exposure. Also, we propose key update protocols which take different terms for each level to update established keys efficiently for secure data encoding.

Hierarchical Image Encryption System Using Orthogonal Method (직교성을 이용한 계층적 영상 암호화)

  • Kim, Nam-Jin;Seo, Dong-Hoan;Lee, Sung-Geun;Shin, Chang-Mok;Cho, Kyu-Bo;Kim, Soo-Joong
    • Korean Journal of Optics and Photonics
    • /
    • v.17 no.3
    • /
    • pp.231-239
    • /
    • 2006
  • In recent years, a hierarchical security architecture has been widely studied because it can efficiently protect information by allowing an authorized user access to the level of information. However, the conventional hierarchical decryption methods require several decryption keys for the high level information. In this paper, we propose a hierarchical image encryption using random phase masks and Walsh code having orthogonal characteristics. To decrypt the hierarchical level images by only one decryption key, we combine Walsh code into the hierarchical level system. For encryption process, we first perform a Fourier transform for the multiplication results of the original image and the random phase mask, and then expand the transformed pattern to be the same size and shape of Walsh code. The expanded pattern is finally encrypted by multiplying with the Walsh code image and the binary phase mask. We generate several encryption images as the same encryption process. The reconstruction image is detected on a CCD plane by a despread process and Fourier transform for the multiplication result of encryption image and hierarchical decryption keys which are generated by Walsh code and binary random phase image. Computer simulations demonstrate that the proposed technique can decrypt hierarchical information by using only one level decryption key image and it has a good robustness to the data loss such as random cropping.

Evaluations of Small Area Estimations with/without Spatial Terms (공간 통계 활용에 따른 소지역 추정법의 평가)

  • Shin, Key-Il;Choi, Bong-Ho;Lee, Sang-Eun
    • The Korean Journal of Applied Statistics
    • /
    • v.20 no.2
    • /
    • pp.229-244
    • /
    • 2007
  • Among the small area estimation methods, it has been known that hierarchical Bayesian(HB) approach is the most reasonable and effective method. However any model based approaches need good explanatory variables and finding them is the key role in the model based approach. As the lacking of explanatory variables, adopting the spatial terms in the model was introduced. Here in this paper, we evaluate the model based methods with/without spatial terms using the diagnostic methods which were introduced by Brown et al. (2001). And Economic Active Population Survey(2005) is used for data analysis.

An Improved key Frame Selection Algorithm Based on Histogram Difference Between Frames (프레임간 히스토그램 차이를 이용한 개선된 대표프레임 추출 알고리즘)

  • 정지현;전승철;박성한
    • Proceedings of the IEEK Conference
    • /
    • 2000.11c
    • /
    • pp.137-140
    • /
    • 2000
  • In this paper, we propose as new algorithm for the selection of key frames in a given video. For the selected key frames to be well defined, the selected key frames need to spread out on the whole temporal domain of the given video and guaranteed not to be duplicate. For this purpose, we take the first frame of each shot of the video as the candidate key frame to represent the video. To reduce the overall processing time, we eliminate some candidate key frames which are visually indistinct in the histogram difference. The key frames are then selected using a clustering processing based on the singly linked hierarchical tree. To make the selected key frames be distributed evenly on the whole video, the deviation and time difference between the selected key frames are used. The simulation results demonstrate that our method provides the better performance compared with previous methods.

  • PDF

A POSTERIORI ERROR ESTIMATOR FOR HIERARCHICAL MODELS FOR ELASTIC BODIES WITH THIN DOMAIN

  • Cho, Jin-Rae;J. Tinsley Oden
    • Journal of Theoretical and Applied Mechanics
    • /
    • v.3 no.1
    • /
    • pp.16-33
    • /
    • 2002
  • A concept of hierarchical modeling, the newest modeling technology. has been introduced early In 1990. This nu technology has a goat potential to advance the capabilities of current computational mechanics. A first step to Implement this concept is to construct hierarchical models, a family of mathematical models which are sequentially connected by a key parameter of the problem under consideration and have different levels in modeling accuracy, and to investigate characteristics In their numerical simulation aspects. Among representative model problems to explore this concept are elastic structures such as beam-, arch-. plate- and shell-like structures because the mechanical behavior through the thickness can be approximated with sequential accuracy by varying the order of thickness polynomials in the displacement or stress fields. But, in the numerical analysis of hierarchical models, two kinds of errors prevail: the modeling error and the numerical approximation errors. To ensure numerical simulation quality, an accurate estimation of these two errors Is definitely essential. Here, a local a posteriori error estimator for elastic structures with thin domain such as plate- and shell-like structures Is derived using element residuals and flux balancing technique. This method guarantees upper bounds for the global error, and also provides accurate local error Indicators for two types of errors, in the energy norm. Comparing to the classical error estimators using flux averaging technique, this shows considerably reliable and accurate effectivity indices. To illustrate the theoretical results and to verify the validity of the proposed error estimator, representative numerical examples are provided.

  • PDF

New Constructions of Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Computing

  • Zhang, Leyou;Hu, Yupu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.1343-1356
    • /
    • 2013
  • Cloud computing has emerged as perhaps the hottest development in information technology at present. This new computing technology requires that the users ensure that their infrastructure is safety and that their data and applications are protected. In addition, the customer must ensure that the provider has taken the proper security measures to protect their information. In order to achieve fine-grained and flexible access control for cloud computing, a new construction of hierarchical attribute-based encryption(HABE) with Ciphertext-Policy is proposed in this paper. The proposed scheme inherits flexibility and delegation of hierarchical identity-based cryptography, and achieves scalability due to the hierarchical structure. The new scheme has constant size ciphertexts since it consists of two group elements. In addition, the security of the new construction is achieved in the standard model which avoids the potential defects in the existing works. Under the decision bilinear Diffie-Hellman exponent assumption, the proposed scheme is provable security against Chosen-plaintext Attack(CPA). Furthermore, we also show the proposed scheme can be transferred to a CCA(Chosen-ciphertext Attack) secure scheme.

A posteriori error estimator for hierarchical models for elastic bodies with thin domain

  • Cho, Jin-Rae
    • Structural Engineering and Mechanics
    • /
    • v.8 no.5
    • /
    • pp.513-529
    • /
    • 1999
  • A concept of hierarchical modeling, the newest modeling technology, has been introduced in early 1990's. This new technology has a great potential to advance the capabilities of current computational mechanics. A first step to implement this concept is to construct hierarchical models, a family of mathematical models sequentially connected by a key parameter of the problem under consideration and have different levels in modeling accuracy, and to investigate characteristics in their numerical simulation aspects. Among representative model problems to explore this concept are elastic structures such as beam-, arch-, plate- and shell-like structures because the mechanical behavior through the thickness can be approximated with sequential accuracy by varying the order of thickness polynomials in the displacement or stress fields. But, in the numerical, analysis of hierarchical models, two kinds of errors prevail, the modeling error and the numerical approximation error. To ensure numerical simulation quality, an accurate estimation of these two errors is definitely essential. Here, a local a posteriori error estimator for elastic structures with thin domain such as plate- and shell-like structures is derived using the element residuals and the flux balancing technique. This method guarantees upper bounds for the global error, and also provides accurate local error indicators for two types of errors, in the energy norm. Compared to the classical error estimators using the flux averaging technique, this shows considerably reliable and accurate effectivity indices. To illustrate the theoretical results and to verify the validity of the proposed error estimator, representative numerical examples are provided.

Effect of Arachidonic Acid on Production of Laminin and Connexin of Granulosa Cells from Chicken Pre-hierarchical Follicles

  • Jin, Yanmei;Tan, Tu Quang;Zhang, Caiqiao
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.22 no.3
    • /
    • pp.350-355
    • /
    • 2009
  • Arachidonic acid (AA) is a polyunsaturated fatty acid that is a normal constituent of membrane lipids in animal cells. In addition to its role as a precursor of prostaglandins, AA itself may play an important role in the regulation of cell function. The effect of AA on functions of granulosa cells was investigated in pre-hierarchical small yellow follicles of laying hens. Immuno-cytochemical staining showed that AA ($10^{-7}-10^{-5}$ M) increased the expression of the extracellular matrix glycoprotein laminin, gap junction connexin 43 and protein kinase C (PKC). Therefore, mediated by the PKC signal pathway, AA may regulate the intercellular communication of granulosa cells and follicular development by increasing the expression of laminin and connexin.

Quality Assessment of Curcuma longa L. by Gas Chromatography-Mass Spectrometry Fingerprint, Principle Components Analysis and Hierarchical Clustering Analysis

  • Li, Ming;Zhou, Xin;Zhao, Yang;Wang, Dao-Ping;Hu, Xiao-Na
    • Bulletin of the Korean Chemical Society
    • /
    • v.30 no.10
    • /
    • pp.2287-2293
    • /
    • 2009
  • Gas Chromatography-Mass Spectrometry (GC-MS) fingerprint analysis, Principle Components Analysis (PCA), and Hierarchical Cluster Analysis (HCA) were introduced for quality assessment of Curcuma longa L. (C. longa). The GC-MS fingerprint method was developed and validated by analyzing 33 batches of samples of C. longa from different geographic locations. 18 chromatographic peaks were selected as characteristic peaks and their relative peak areas (RPA) were calculated for quantitative expression. Two principal components (PCs) were extracted by PCA. C. longa collected from Guizhou and Fujian were separated from other samples by PC1, capturing 71.83% of variance. While, PC2 contributed for their further separation, capturing 11.13% of variance. HCA confirmed the result of PCA analysis. Therefore, GC-MS fingerprint study with chemometric techniques provides a very flexible and reliable method for quality assessment of C. longa.

Hierarchial Encryption System Using Two-Step Phase-Shifting Digital Holography Technology Based on XOR and Scramble Operations (XOR 및 스크램블 연산 기반 2단계 위상 천이 디지털 홀로그래피 기술을 이용한 계층적 암호화 시스템)

  • Kim, Cheolsu
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.8
    • /
    • pp.983-990
    • /
    • 2022
  • In this paper, we implemented a hierarchical encryption system using two-step phase-shifting digital holography(PSDH) technology based on XOR and scramble operations. The proposed encryption system is a system that authenticates access through the issuance of an encryption key for access to individual laboratories, department offices, and universities. In the encryption process, we proposed a double encryption method using XOR and scramble operation with digital technology and two-step phase-shifting digital holography with optical technology. In the two-step PSDH process, an new method of determining the reference wave intensity without measuring it by using random common object image gererated from digital encryption process was also proposed. In the decryption process, the process is performed in the reverse order of encryption process. And only when the various key information used in the encryption process is correct, the encrypted information can be decrypted, so that the user can access the desired place. That is, there is a feature that can hierarchically control the space that can be accessed according to the type of key issued in the proposed encryption system. Through the computer simulation, the feasibility of the proposed hierarchical encryption system was confirmed.