• Title/Summary/Keyword: key-agreement

Search Result 649, Processing Time 0.022 seconds

Secure and Efficient Key Management Scheme for Wireless Mesh Network (무선 메쉬망에서의 안전하고 효율적인 키관리 스킴)

  • Salam, Md. Iftekhar;Singh, Madhusudan;Lee, Sang-Gon;Lee, Hoon-Jae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.844-847
    • /
    • 2011
  • Wireless mesh network (WMN) is a type of mobile ad-hoc network consists of wireless router, mobile clients and gateway which connects the network with the Internet. To provide security in the network it is required to encrypt the message sent among the communicating nodes in such way so that only legitimate user can retrieve the original data. Several security mechanisms have been proposed so far to enhance the security of WMN. However, there still exists a need for a comprehensive mechanism to prevent attacks in data communication. Considering the characteristic of mesh network, in this paper we proposed a public key cryptography based security architecture to establish a secure key agreement among communicating nodes in mesh network. The proposed security architecture consists of two major sections: client data protection and network data protection. Client data protection deals with the mutual authentication between the client and the access router and provide client to access router encryption for data confidentiality using standard IEEE 802.11i protocol. On the other hand, network data protection ensures encrypted routing and data transfer in the multi hop backbone network. For the network data protection, we used the pre-distributed public key to form a secure backbone infrastructure.

EXPLORING THE KEY FACTORS FOR BIM ACCEPTANCE IN CONSTRUCTION ORGANIZATIONS

  • Seul-Ki Lee;Jung-Ho Yu
    • International conference on construction engineering and project management
    • /
    • 2013.01a
    • /
    • pp.14-20
    • /
    • 2013
  • Substantial research has been performed on the data standards and exchanges in the AEC/FM industry over the past several years. The growing popularity of BIM technology is based heavily upon a perception that the technology can facilitate the sharing and reuse of information during a project life-cycle. Although many researchers and practitioners are in agreement about the potential applicability and benefit of BIM in construction, it is still unclear why BIM is adopted, and what factors enhance implementation of BIM. Thus, BIM acceptance and use remains a central concern of BIM research and practice. Therefore, we propose the key factors affecting the acceptance of BIM in construction organizations using factor analysis. The key factors for BIM acceptance are identified through a literature review in TAM (Davis 1989) and related theories, and consolidated by interviews and pilot studies with professionals in construction industry. Based on the factors, a questionnaire was designed and sent out to construction organizations such as contractors, architects, and engineers in Korea. Total 148 completed questionnaires were retrieved. Using factor analysis, key factors were grouped into six dimensions. These findings will clarify what the highly prioritized factors are, and can also be used in an assessment tool for the performance of BIM utilization.

  • PDF

A Study on the Recognition of University Students and Parents about Legacy Preferences (기여입학제의 찬반에 대한 대학생과 학부모의 인식 분석)

  • Kim, Dal-Hyo
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.25 no.3
    • /
    • pp.632-642
    • /
    • 2013
  • Legacy preferences has become the key issue of educational policy. The purpose of this study was to investigate the recognition of university students and parents about legacy preferences. The questionnaire which was made by researcher of this study was used as the method of this study. As a sampling, university students 360 and parents 312 were sampled. And SPSSWIN 20.0 was used as the method of data analysis. As a conclusion, this study indicates as follows. First, the ratio of disagreement of legacy preferences was higher than the ratio of agreement of legacy preferences. But higher-income class parents were tended to agree with legacy preferences. Second, many university students and parents regarded 'economic advantages for tuition payments and a scholarship', 'excellences for education by helping financial deficit of university' as agreement reasons of legacy preferences. And many university students and parents regarded 'reproduction of social class', 'promotion of one's sense of values of mammonism' as disagreement reasons of legacy preferences.

Causal Loop Diagramming of Location Conflict on LULU(Locally Unwanted Land Use) Facilities and Policy Alternatives (비선호시설 입지갈등에 대한 인과지도 작성과 정책 대안)

  • Lee, Joong-Hoon;Kwon, Hyuk-Il;Kim, Yeon-Sik;Lee, Man-Hyung
    • Korean System Dynamics Review
    • /
    • v.8 no.1
    • /
    • pp.151-171
    • /
    • 2007
  • Without exception, diverse LULU(Locally Unwanted Land Use) facilities have been under the location conflict, especially between the public government units and local residents. In spite of repeated trials-and-errors, literally, the location conflict has shown no sign of improvement over time in Korea. As practical means to tackle these issues, this study focuses on divulging explicit and implicit relationships among key factors derived from the location conflict on the LULU facilities. Here, major research variables cover residents' agreement, residents' perception, compensation expectation, and public opinion. As the location conflict on the LULU facilities could be strengthened or resolved by the dynamic feedback system, it applies basic tools geared toward causal loop diagramming. After repeated experiments, the study highlights the fact that the residents' perception, compensation expectation, and public opinion, individually and collectively, exert significant impact on the residents' agreement ratio.

  • PDF

Hybrid medium model for conjugate heat transfer modeling in the core of sodium-cooled fast reactor

  • Wang, X.A.;Zhang, Dalin;Wang, Mingjun;Song, Ping;Wang, Shibao;Liang, Yu;Zhang, Yapei;Tian, Wenxi;Qiu, Suizheng;Su, G.H.
    • Nuclear Engineering and Technology
    • /
    • v.52 no.4
    • /
    • pp.708-720
    • /
    • 2020
  • Core-wide temperature distribution in sodium-cooled fast reactor plays a key role in its decay heat removal process, however the prediction for temperature distribution is quite complex due to the conjugate heat transfer between the assembly flow and the inter-wrapper flow. Hybrid medium model has been proposed for conjugate heat transfer modeling in the core. The core is modeled with a Realistic modeled inter-wrapper flow and hybrid medium modeled assembly flow. To validate present model, simulations for a three-assembly model were performed with Realistic modeling, traditional porous medium model and hybrid medium model, respectively. The influences of Uniform/Non-Uniform power distribution among assemblies and the Peclet number within the assembly flow have been considered. Compared to traditional porous medium model, present model shows a better agreement with in Realistic modeling prediction of the temperature distribution and the radial heat transfer between the inter-wrapper flow and the assembly flow.

Robust ID based mutual authentication and key agreement scheme preserving user anonymity in mobile networks

  • Lu, Yanrong;Li, Lixiang;Peng, Haipeng;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.1273-1288
    • /
    • 2016
  • With the swift growth of wireless technologies, an increasing number of users rely on the mobile services which can exchange information in mobile networks. Security is of key issue when a user tries to access those services in this network environment. Many authentication schemes have been presented with the purpose of authenticating entities and wishing to communicate securely. Recently, Chou et al. and Farash-Attari presented two ID authentication schemes. They both claimed that their scheme could withstand various attacks. However, we find that the two authentication schemes are vulnerable to trace attack while having a problem of clock synchronization. Additionally, we show that Farash-Attari's scheme is still susceptible to key-compromise impersonation attack. Therefore, we present an enhanced scheme to remedy the security weaknesses which are troubled in these schemes. We also demonstrate the completeness of the enhanced scheme through the Burrow-Abadi-Needham (BAN) logic. Security analysis shows that our scheme prevents the drawbacks found in the two authentication schemes while supporting better secure attributes. In addition, our scheme owns low computation overheads compared with other related schemes. As a result, our enhanced scheme seems to be more practical and suitable for resource-constrained mobile devices in mobile networks.

Nonlinear Buckling Analysis of H-Type Honeycombed Composite Column with Rectangular Concrete-Filled Steel Tube Flanges

  • Ji, Jing;Xu, Zhichao;Jiang, Liangqin;Yuan, Chaoqing;Zhang, Yunfeng;Zhou, Lijian;Zhang, Shilong
    • International journal of steel structures
    • /
    • v.18 no.4
    • /
    • pp.1153-1166
    • /
    • 2018
  • This paper was concerned with the nonlinear analysis on the overall stability of H-type honeycombed composite column with rectangular concrete-filled steel tube flanges (STHCC). The nonlinear analysis was performed using ABAQUS, a commercially available finite element (FE) program. Nonlinear buckling analysis was carried out by inducing the first buckling mode shape of the hinged column to the model as the initial imperfection with imperfection amplitude value of L/1000 and importing the simplified constitutive model of steel and nonlinear constitutive model of concrete considering hoop effect. Close agreement was shown between the experimental results of 17 concrete-filled steel tube (CFST) specimens and 4 I-beams with top flanges of rectangular concrete-filled steel tube (CFSFB) specimens conducted by former researchers and the predicted results, verifying the correctness of the method of FE analysis. Then, the FE models of 30 STHCC columns were established to investigate the influences of the concrete strength grade, the nominal slenderness ratio, the hoop coefficient and the flange width on the nonlinear stability capacity of SHTCC column. It was found that the hoop coefficient and the nominal slenderness ratio affected the nonlinear stability capacity more significantly. Based on the results of parameter analysis, a formula was proposed to predict the nonlinear stability capacity of STHCC column which laid the foundation of the application of STHCC column in practical engineering.

Experimental study on vertically upward steam-water two-phase flow patterns in narrow rectangular channel

  • Zhou, Jiancheng;Ye, Tianzhou;Zhang, Dalin;Song, Gongle;Sun, Rulei;Deng, Jian;Tian, Wenxi;Su, G.H.;Qiu, Suizheng
    • Nuclear Engineering and Technology
    • /
    • v.53 no.1
    • /
    • pp.61-68
    • /
    • 2021
  • Experiments of vertically upward steam-water two-phase flow have been carried out in single-side heated narrow rectangular channel with a gap of 3 mm. Flow patterns were identified and classified through visualization directly. Slug flow was only observed at 0.2 MPa but replaced by block-bubble flow at 1.0 MPa. Flow pattern maps at the pressure of 0.2 MPa and 1.0 MPa were plotted and the difference was analyzed. The experimental data has been compared with other flow pattern maps and transition criteria. The results show reasonable agreement with Hosler's, while a wide discrepancy is observed when compared with air-water two-phase experimental data. Current criteria developed based on air-water experiments poorly predict bubble-slug flow transition due to the different formation and growth of bubbles. This work is significant for researches on heat transfer, bubble dynamics and flow instability.

Molecular Spinless Energies of the Modified Rosen-Morse Potential Energy Model

  • Jia, Chun-Sheng;Peng, Xiao-Long;He, Su
    • Bulletin of the Korean Chemical Society
    • /
    • v.35 no.9
    • /
    • pp.2699-2703
    • /
    • 2014
  • We solve the Klein-Gordon equation with the modified Rosen-Morse potential energy model. The bound state energy equation has been obtained by using the supersymmetric shape invariance approach. The relativistic vibrational transition frequencies for the $6^1{\Pi}_u$ state of the $^7Li_2$ molecule have been computed by using the modified Rosen-Morse potential model. The calculated relativistic vibrational transition frequencies are in good agreement with the experimental RKR values.

Analytical and numerical analysis for unbonded flexible risers under axisymmetric loads

  • Guo, Yousong;Chen, Xiqia;Wang, Deyu
    • Ocean Systems Engineering
    • /
    • v.6 no.2
    • /
    • pp.129-141
    • /
    • 2016
  • Due to the structural complexity, the response of a flexible riser under axisymmetric loads is quite difficult to determine. Based on equilibrium conditions, geometrical relations and constitutive equations, an analytical model that can accurately predict the axisymmetric behavior of flexible risers is deduced in this paper. Since the mutual exclusion between the contact pressure and interlayer gap is considered in this model, the influence of the load direction on the structural behavior can be analyzed. Meanwhile, a detailed finite element analysis for unbonded flexible risers is conducted. Based on the analytical and numerical models, the structural response of a typical flexible riser under tension, torsion, internal and outer pressure has been studied in detail. The results are compared with experimental data obtained from the literature, and good agreement is found. Studies have shown that the proposed analytical and numerical models can provide an insightful reference for analysis and design of flexible risers.