• Title/Summary/Keyword: keys

Search Result 1,089, Processing Time 0.022 seconds

Secure and Fine-grained Electricity Consumption Aggregation Scheme for Smart Grid

  • Shen, Gang;Su, Yixin;Zhang, Danhong;Zhang, Huajun;Xiong, Binyu;Zhang, Mingwu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1553-1571
    • /
    • 2018
  • Currently, many of schemes for smart grid data aggregation are based on a one-level gateway (GW) topology. Since the data aggregation granularity in this topology is too single, the control center (CC) is unable to obtain more fine-grained data aggregation results for better monitoring smart grid. To improve this issue, Shen et al. propose an efficient privacy-preserving cube-data aggregation scheme in which the system model consists of two-level GW. However, a risk exists in their scheme that attacker could forge the signature by using leaked signing keys. In this paper, we propose a secure and fine-grained electricity consumption aggregation scheme for smart grid, which employs the homomorphic encryption to implement privacy-preserving aggregation of users' electricity consumption in the two-level GW smart grid. In our scheme, CC can achieve a flexible electricity regulation by obtaining data aggregation results of various granularities. In addition, our scheme uses the forward-secure signature with backward-secure detection (FSBD) technique to ensure the forward-backward secrecy of the signing keys. Security analysis and experimental results demonstrate that the proposed scheme can achieve forward-backward security of user's electricity consumption signature. Compared with related schemes, our scheme is more secure and efficient.

Korean Text Input System for Elderly using Grip Type Game Controller (그립형 게임 컨트롤러를 이용한 노인용 한글 입력 시스템)

  • Park, Sung-Jun;Lee, Ji-Won;Chang, Hee-Dong
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.12
    • /
    • pp.94-102
    • /
    • 2009
  • As an advance in medical technology development is being made, and people are increasingly aware of the importance of health, related investments and people's average life expectancy rise, which in turn leads to an increase in elderly people. Also, with a growing number of elderly people enjoying their leisure activities, the utilization of multimedia contents using computers is on the increase, leading to an activated research into the establishment of digital culture for the elderly people. This paper proposes a Korean text input system to enable the elderly to utilize digital contents. Text input interface has conventionally depended on keyboards. However, the keyboard wherein many keys are dispersed creates problems for the elderly, such as a protracted recognition of keys and a lowered concentration when they use the keyboard. To address these problems, in this paper, the grip type controller interface for console games was used and a corresponding alphabet location algorithm was developed. To verify these efforts, a simulator was developed to test 20 elderly people; as a result, their satisfaction over and convenience of using the grip type interface increased.

An Implementation of Stable Optical Security System using Interferometer and Cascaded Phase Keys (간섭계와 직렬 위상 키를 이용한 안정한 광 보안 시스템의 구현)

  • Kim, Cheol-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.12 no.1
    • /
    • pp.101-107
    • /
    • 2007
  • In this paper, we proposed an stable optical security system using interferometer and cascaded phase keys. For the encryption process, a BPCGH(binary phase computer generated hologram) that reconstructs the origial image is designed, using an iterative algorithm and the resulting hologram is regarded as the image to be encrypted. The BPCGH is encrypted through the exclusive-OR operation with the random generated phase key image. For the decryption process, we cascade the encrypted image and phase key image and interfere with reference wave. Then decrypted hologram image is transformed into phase information. Finally, the origianl image is recovered by an inverse Fourier transformation of the phase information. During this process, interference intensity is very sensitive to external vibrations. a stable interference pattern is obtained using self-pumped phase-conjugate minor made of the photorefractive material. In the proposed security system, without a random generated key image, the original image can not be recovered. And we recover another hologram pattern according to the key images, so can be used an authorized system.

  • PDF

A New Key Management Mechanism and Performance Improvement for Conditional Access System (제한수신시스템을 위한 키 관리 메카니즘과 성능향상 방안)

  • 조현숙;이상호
    • The KIPS Transactions:PartC
    • /
    • v.8C no.1
    • /
    • pp.75-87
    • /
    • 2001
  • The Conditional Access System is the complete system for ensuring that broadcasting services are only accessible to those who are entitled to receive them. Four major parts to this system are scrambling, descrambling, authentication and encryption. For the proper operation, which means hard-to- break and uninterrupted service, secure key management and efficient delivery mechanism are very important design factors to this system. Performance analysis is another important factor to this system that is used in massive subscriber environment. In this thesis, one of the secure and efficient key management mechanisms is proposed. For the secrecy of this mechanism, hierarchical stacking of keys and key generation matrix are proposed. For the proof of efficient delivery of those keys, simulation results and performance analysis. which is based on queuing analysis, are presented. Lastly, optimal key generation and delivery period, maximal and minimal key deliver time, and communication capacity for data collection are presented for various subscriber volume.

  • PDF

One-Time Key Generation System for Agent Data Protection in Mobile Agent Systems (이동 에이전트의 데이타 보호를 위한 일회용 에이전트 키 생성 시스템)

  • Park, Jong-Youl;Lee, Dong-Ik;Lee, Hyung-Hyo;Park, Joong-Gil
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.3
    • /
    • pp.309-320
    • /
    • 2001
  • This paper deals with security issues in a mobile agent system, especially protecting agent data from malicious agent servers. For this purpose, one-time key generation system, OKGS in short, is proposed. In OKGS, we integrate notions of a one-way hash function and a coupler. One-way function plays a major role in ensuring confidentiality and integrity of agent data. And the notion of a coupler is used to establish inter-relationship among consecutive encryption keys for agent data, i.e. all agent keys form a unidirectional chain. With these two features of OKGS, therefore, only the agent owner, who creates the agent bearing data, can decrypt and protect all the agent data which are gathered in the itinerary.

  • PDF

Secure Key Management Framework in USN Environment using Certificateless Public Keys (USN 환경에서 비인증서 공개키를 사용하는 보안키 관리 프레임워크)

  • Heo, Joon;Hong, Choong-Seon
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.6
    • /
    • pp.545-551
    • /
    • 2009
  • In this paper, we propose the secure key management framework to connect USN with different network. Although connected USN with different network has no CA (Certificate Authority), it is important to use public key based cryptography system because this network consists of numerous devices. The proposed mechanisms focus on device authentication and public/private key management without existing PKI system of IP network. To solve no CA and certificate problems, the IDC (Identity Based Cryptography) concept is adopted in our proposed mechanism. To verify the possibility of realization, we make an effort to implement the proposed mechanisms to real system. In the test bed, both USN and PLC network are connected to IP network; and proposed mechanisms are implemented to PLC and sensor devices. Through this test using the proposed mechanism, we met the similar performance with symmetric algorithms on key generation and update process. Also, we confirmed possibility of connection between different network and device authentication.

Information Right Management System using Secret Splitting of Hardware Dependent Encryption Keys (하드웨어에 종속된 암호키 비밀 분할을 이용한 정보권한관리 시스템)

  • Doo, So-Young;Kong, Eun-Bae
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.27 no.3
    • /
    • pp.345-351
    • /
    • 2000
  • This paper presents a right management scheme using secret splitting protocol. Right management schemes combat piracy of proprietary data (such as digital music). In these schemes, encryption has been used and it is essential to protect the keys used in encryption. We introduce a new key protection method in which a secret encryption key is generated using both user's hardware-dependent unique information (such as MAC address) and cryptographically secure random bit strings provided by data owner. This scheme prevents piracy by checking hardware-dependent information during rendering and improves the secrecy of the data by individualizing the encryption key for each data.

  • PDF

A Korean Text Input System for Elderly using Grip Type Game Controller (그립형 게임 컨트롤러를 이용한 노인용 한글 입력 시스템)

  • Lee, Ji-Won;An, Duk-Yong;Jang, Yu-Na;Jang, Hee-Dong;Park, Sung-Jun
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.208-214
    • /
    • 2009
  • As an advance in medical technology development is being made, and people are increasingly aware of the importance of health, related investments and people's average life expectancy rise, which in turn leads to an increase in elderly people. Also, with a growing number of elderly people enjoying their leisure activities, the utilization of multimedia contents using computers is on the increase, leading to an activated research into the establishment of digital culture for the elderly people. This paper proposes a Korean text input system to enable the elderly to utilize digital contents. Text input interface has conventionally depended on keyboards. However, the keyboard wherein many keys are dispersed creates problems for the elderly, such as a protracted recognition of keys and a lowered concentration when they use the keyboard. To address these problems, in this paper, the grip type controller interface for console games was used and a corresponding alphabet location algorithm was developed. To verify these efforts, a simulator was developed to test 20 elderly people; as a result, their satisfaction over and convenience of using the grip type interface invreased.

  • PDF

Communication-Efficient Representations for Certificate Revocation in Wireless Sensor Network (WSN에서의 효율적 통신을 위한 인증서 폐지 목록 표현 기법)

  • Maeng, Young-Jae;Mohaisen, Abedelaziz;Lee, Kyung-Hee;Nyang, Dae-Hun
    • The KIPS Transactions:PartC
    • /
    • v.14C no.7
    • /
    • pp.553-558
    • /
    • 2007
  • In this paper, we introduce a set of structures and algorithms for communication efficient public key revocation in wireless sensor networks. Unlike the traditional networks, wireless sensor network is subjected to resources constraints. Thus, traditional public key revocation mechanisms such like the ordinary certificate revocation list is unsuitable to be used. This unsuitability is due to the huge size of required representation space for the different keys' identifiers and the revocation communication as the set of revoked keys grow. In this work, we introduce two communication-efficient schemes for the certificate revocation. In the first scheme, we utilize the complete subtree mechanism for the identifiers representation which is widely used in the broadcast encryption/user revocation. In the second scheme, we introduce a novel bit vector representation BVS which uses vector of relative identifiers occurrence representation. We introduce different revocation policies and present corresponding modifications of our scheme. Finally, we show how the encoding could reduce the communication overhead as well. Simulation results and comparisons are provided to show the value of our work.

Evaluation of Axial Bearing Capacity of Waveform Micropile by Centrifuge Test (원심모형실험을 통한 파형 마이크로파일의 연직 지지력 평가)

  • Jang, Young-Eun;Han, Jin-Tae;Kim, Jae-Hyun;Park, Heon-Joon;Kim, Sang-Hwan
    • Journal of the Korean Geotechnical Society
    • /
    • v.31 no.8
    • /
    • pp.39-49
    • /
    • 2015
  • In this study, a series of centrifuge tests were performed in order to observe the bearing capacity of waveform micropile, a new concept of micropile that uses a modified jet grouting process. A total of six models were considered, conventional micropile, jet grouted pile, and four different shapes of waveform micropiles. The test results indicated that the waveform micropile effectively contributes to the increase of the bearing capacity compared to the micropile without the shear keys. Among the waveform micropiles, the model that has a relatively small space between the shear keys showed the most significant improvement of load capacity. Additionally, the ultimate load capacities of all piles were compared using well-known estimation method. As a result, P-S curve method and total settlement method with 25.4 mm were considered suitable to account ultimate load for the waveform micropile.