• 제목/요약/키워드: key generation

검색결과 1,490건 처리시간 0.026초

클라우드 컴퓨팅에서 안전한 사물인터넷 데이터를 위한 키 관리 (Key Management for Secure Internet of Things(IoT) Data in Cloud Computing)

  • 성순화
    • 정보보호학회논문지
    • /
    • 제27권2호
    • /
    • pp.353-360
    • /
    • 2017
  • IoT 보안은 공유 목적을 위한 결함 없는 시스템과 일련의 규정을 필요로 하기 때문에 기술적 문제보다 더 필요하다. 따라서 본 연구는 IoT 데이터 보안을 위한 클라우드 컴퓨팅에서 IoT 데이터가 신뢰받을 수 있는 효율적인 키 관리를 제안한다. 기존 센서 네트워크의 키 분배센터와는 달리, 제안한 클라우드 프락시 키 서버의 연합키 관리는 중앙집중적 관리가 아니며, 능동적인 키 복구와 업데이트가 가능하다. 제안한 키 관리는 사전 설정된 비밀키 방식이 아닌 자율적인 클라우드의 클라우드 프락시 키 서버의 키 정보 공유로써, 키 생성과 공간 복잡도를 줄일 수 있다. 또한, 이전의 IoT 키 연구와는 달리, 클라우드 프락시 키 서버의 연합키는 데이터가 이동하는 동안에 유의미한 정보를 추출해 낼 수 있는 능력을 제공한다.

New Path-Setup Method for Optical Network-on-Chip

  • Gu, Huaxi;Gao, Kai;Wang, Zhengyu;Yang, Yintang;Yu, Xiaoshan
    • ETRI Journal
    • /
    • 제36권3호
    • /
    • pp.367-373
    • /
    • 2014
  • With high bandwidth, low interference, and low power consumption, optical network-on-chip (ONoC) has emerged as a highly efficient interconnection for the future generation of multicore system on chips. In this paper, we propose a new path-setup method for ONoC to mitigate contentions, such as packets, by recycling the setup packet halfway to the destination. A new, strictly non-blocking $6{\times}6$ optical router is designed to support the new method. The simulation results show the new path-setup method increases the throughput by 52.03%, 41.94%, and 36.47% under uniform, hotspot-I, and hotspot-II traffic patterns, respectively. The end-to-end delay performance is also improved.

Error Correction Codes for Biometric Cryptosystem: An Overview

  • Teoh, Andrew Beng Jin;Kim, Jaihie
    • 정보와 통신
    • /
    • 제32권6호
    • /
    • pp.39-49
    • /
    • 2015
  • In cryptographic applications, the key protection is either knowledge-based (passwords) or possession-based (tamper-proof device). Unfortunately, both approaches are easily forgotten or stolen, thus introducing various key management issues. By incorporating biometrics technologies which utilize the uniqueness of personal characteristics, the security of cryptosystems could be strengthened as authentication now requires the presence of the user. Biometric Cryptosystem (BC) encompasses the design of cryptographic keys protection methods by incorporating biometrics. BC involves either key-biometrics binding or direct key generation from biometrics. However, the wide acceptance and deployment of BC solutions are constrained by the fuzziness related with biometric data. Hence, error correction codes (ECCs) should be adopted to ensure that fuzziness of biometric data can be alleviated. In this overview paper, we present such ECC solutions used in various BCs. We also delineate on the important facts to be considered when choosing appropriate ECCs for a particular biometric based solution from accuracy performance and security perspectives.

Securing Mobile Ad Hoc Networks Using Enhanced Identity-Based Cryptography

  • Mehr, Kamal Adli;Niya, Javad Musevi
    • ETRI Journal
    • /
    • 제37권3호
    • /
    • pp.512-522
    • /
    • 2015
  • Recent developments in identity-based cryptography (IBC) have provided new solutions to problems related to the security of mobile ad hoc networks (MANETs). Although many proposals to solve problems related to the security of MANETs are suggested by the research community, there is no one solution that fits all. The interdependency cycle between secure routing and security services makes the use of IBC in MANETs very challenging. In this paper, two novel methods are proposed to eliminate the need for this cycle. One of these methods utilizes a key pool to secure routes for the distribution of cryptographic materials, while the other adopts a pairing-based key agreement method. Furthermore, our proposed methods utilize threshold cryptography for shared secret and private key generation to eliminate the "single point of failure" and distribute cryptographic services among network nodes. These characteristics guarantee high levels of availability and scalability for the proposed methods. To illustrate the effectiveness and capabilities of the proposed methods, they are simulated and compared against the performance of existing methods.

Efficient and Secure Group Key Generation Protocol for Small and Medium Business

  • 정현수
    • 중소기업융합학회논문지
    • /
    • 제4권4호
    • /
    • pp.19-23
    • /
    • 2014
  • Group communication is becoming increasingly popular in Internet applications such as videoconferences, online chatting programs, games, and gambling. For secure communications, the integrity of messages, member authentication, and confidentiality must be provided among group members. To maintain message integrity, all group members use the Group Key (GK) for encrypting and decrypting messages while providing enough security to protect against passive attacks. Tree-based Group Diffie-Hellman (TGDH) is an efficient group key agreement protocol to generate the GK. TGDH assumes all members have an equal computing power. One of the characteristics of distributed computing and grid environments is heterogeneity; the member can be at a workstation, a laptop or even a mobile computer. Member reordering in the TDGH protocol could potentially lead to an improved protocol; such reordering should capture the heterogeneity of the network as well as latency. This research investigates dynamic reordering mechanisms to consider not only the overhead involved but also the scalability of the proposed protocol.

  • PDF

Wind Power Interval Prediction Based on Improved PSO and BP Neural Network

  • Wang, Jidong;Fang, Kaijie;Pang, Wenjie;Sun, Jiawen
    • Journal of Electrical Engineering and Technology
    • /
    • 제12권3호
    • /
    • pp.989-995
    • /
    • 2017
  • As is known to all that the output of wind power generation has a character of randomness and volatility because of the influence of natural environment conditions. At present, the research of wind power prediction mainly focuses on point forecasting, which can hardly describe its uncertainty, leading to the fact that its application in practice is low. In this paper, a wind power range prediction model based on the multiple output property of BP neural network is built, and the optimization criterion considering the information of predicted intervals is proposed. Then, improved Particle Swarm Optimization (PSO) algorithm is used to optimize the model. The simulation results of a practical example show that the proposed wind power range prediction model can effectively forecast the output power interval, and provide power grid dispatcher with decision.

무선 센서 네트워크에서의 효율적 Broadcast Authentication 방안 (An efficient Broadcast Authentication Scheme for Wireless Sensor Networks)

  • 문형석;이성창
    • 대한전자공학회논문지TC
    • /
    • 제43권6호
    • /
    • pp.23-29
    • /
    • 2006
  • 자원 제한적인 노드들로 구성되는 무선 센서 네트워크의 보안 알고리즘은 짧은 패킷 길이와 메모리, 컴퓨팅 능력, 전력 등의 자원 문제 때문에 기존의 보안 알고리즘을 적용하기가 힘들다. 주로 센서의 자원 사용이 상대적으로 덜하고, 키 길이가 짧은 공유키 기반의 알고리즘이 많이 사용되고 있지만 베이스스테이션의 브로드캐스트 패킷에 대한 인증을 위해서 단순히 전체 노드가 동일한 공유키를 가지는 방식은 적합하지 못하다. 최근 센서 네트워크에 적합한 형태의 브로드캐스트 인증 알고리즘으로, one-way 해쉬 함수를 이용한 키 체인생성과 키 체인의 각 키를 이용한 Message Authentication Code 생성, 지연된 키 공개를 이용한 알고리즘이 제안 되었다. 이러한 방식은 무선 센서 네트워크 환경에 적합한 인증 방식을 제공하지만 브로드캐스트 율, 키 체인 레벨 등, 네트워크의 각 조건에 따라 비효율적인 결과를 초래하기도 한다. 본 논문에서는 키 체인 링크 및 주기적 키 공개 방식을 이용하여 낮은 인증 딜레이를 보장하며, 패킷 송수신량과 수신 노드의 메모리 및 컴퓨팅 리소스를 효율적으로 사용할 수 있도록 개선된 브로드캐스트 인증 알고리즘을 제안하고, TinyOS의 TOSSIM으로 그 성능을 검증한다.

2002 한.일 국민교류년 기념' 한국과 일본의 신세대의 복식업화에 대한 연구 - Street Fashion을 중심으로 - (A Study on the Clothing Culture for New Generation of Korea and Japan)

  • 백샘이;간호섭
    • 복식
    • /
    • 제53권3호
    • /
    • pp.31-49
    • /
    • 2003
  • The Purpose of this research is to examine and contrast the cultural characteristics of the street fashion in new generations of Korea and Japan. We also intended to help clothing companies understand the current trend in this new generation. As the method for street fashion analysis. various literature, internet information and new media materials were utilized. Key observations obtained are as following First, they pursue a complex image. New generations seem to admix images from different areas to create a synthetic image, rather than adopting a single image; Second, practicality is an important factor. They Pursue a sense of their own unique trend: Third, distinction. The difference in society values between Koreans and Japanese is incorporated. The Korean new generation considers the traditional moral principles as important social values. In contrast the Japanese new generation is greatly influenced by the open sexuality culture ; Fourth. public ownership and sharing of the culture. There is a gradual deviation from a dominating unidirectional influence from one country on another. Now the two countries are influencing each other ; Fifth, sense. There are numerous fashion items and generalized total coordination. New generations express more active and creative fashion sense in those fashion items.

Registration-free 3D Point Cloud Data Acquisition Technique for as-is BIM Generation Using Rotating Flat Mirrors

  • Li, Fangxin;Kim, Min-Koo;Li, Heng
    • 국제학술발표논문집
    • /
    • The 8th International Conference on Construction Engineering and Project Management
    • /
    • pp.3-12
    • /
    • 2020
  • Nowadays, as-is BIM generation has been popularly adopted in the architecture, engineering, construction and facility management (AEC/FM) industries. In order to generate a 3D as-is BIM of a structural component, current methods require a registration process that merges different sets of point cloud data obtained from multiple locations, which is time-consuming and registration error-prone. To tackle this limitation, this study proposes a registration-free 3D point cloud data acquisition technique for as-is BIM generation. In this study, small-size mirrors that rotate in both horizontal and vertical direction are used to enable the registration-free data acquisition technique. First, a geometric model that defines the relationship among the mirrors, the laser scanner and the target component is developed. Second, determinations of optimal laser scanner location and mirror location are performed based on the developed geometrical model. To validate the proposed registration-free as-is BIM generation technique, simulation tests are conducted on key construction components including a PC slab and a structural wall. The result demonstrates that the registration-free point cloud data acquisition technique can be applicable in various construction elements including PC elements and structural components for as-is BIM generation.

  • PDF

Knockout of Myostatin by Zinc-finger Nuclease in Sheep Fibroblasts and Embryos

  • Zhang, Xuemei;Wang, Liqin;Wu, Yangsheng;Li, Wenrong;An, Jing;Zhang, Fuchun;Liu, Mingjun
    • Asian-Australasian Journal of Animal Sciences
    • /
    • 제29권10호
    • /
    • pp.1500-1507
    • /
    • 2016
  • Myostatin (MSTN) can negatively regulate the growth and development of skeletal muscle, and natural mutations can cause "double-muscling" trait in animals. In order to block the inhibiting effect of MSTN on muscle growth, we transferred zinc-finger nucleases (ZFN) which targeted sheep MSTN gene into cultured fibroblasts. Gene targeted colonies were isolated from transfected fibroblasts by serial dilution culture and screened by sequencing. Two colonies were identified with mono-allele mutation and one colony with bi-allelic deletion. Further, we introduced the MSTN-ZFN mRNA into sheep embryos by microinjection. Thirteen of thirty-seven parthenogenetic embryos were targeted by ZFN, with the efficiency of 35%. Our work established the technical foundation for generation of MSTN gene editing sheep by somatic cloning and microinjection ZFN into embryos.