• Title/Summary/Keyword: public-shared network

Search Result 63, Processing Time 0.03 seconds

Analysis of the IPsec Internet Key Exchange (IKE) Protocol (IPsec의 키 교환 방식에 대한 안전성 분석)

  • 주한규
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.4
    • /
    • pp.33-46
    • /
    • 2000
  • IPsec is a protocol suite to protect the data communication between computers on internet and many VPNs(Virtual Private Networks) use IPsec protocol. IKE protocol is used to exchange keys in IPsec. Formal analysis method is used increasingly in computer science to increase the reliability of a system. In this paper, the IKE protocol is analyzed formally. This paper shows that IKE with Authentication with Signature and Authentication with Pre-Shared Key is safe, but Authentication with Public Key Encryption and A Revised Method of Authentication with Public Key Encryption are safe only with the assumption that a participant has the correct public key of the correspondent. To make sure that a participant has the correct public key of the correspondent, the usage of certificate is recommended.

Secure Key Management Protocol in the Wireless Sensor Network

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of Information Processing Systems
    • /
    • v.2 no.1
    • /
    • pp.48-51
    • /
    • 2006
  • To achieve security in wireless sensor networks (WSN), it is important to be able to encrypt messages sent among sensor nodes. We propose a new cryptographic key management protocol, which is based on the clustering scheme but does not depend on the probabilistic key. The protocol can increase the efficiency to manage keys since, before distributing the keys by bootstrap, the use of public keys shared among nodes can eliminate the processes to send or to receive keys among the sensors. Also, to find any compromised nodes safely on the network, it solves safety problems by applying the functions of a lightweight attack-detection mechanism.

A Study on Secure Routing Protocol using Multi-level Architecture in Mobile Ad Hoc Network (Multi-level 구조를 이용한 보안 라우팅 프로토콜에 관한 연구)

  • Yang, Hwan Seok
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.17-22
    • /
    • 2014
  • Wireless Ad hoc Network is threatened from many types of attacks because of its open structure, dynamic topology and the absence of infrastructure. Attacks by malicious nodes inside the network destroy communication path and discard packet. The damage is quite large and detecting attacks are difficult. In this paper, we proposed attack detection technique using secure authentication infrastructure for efficient detection and prevention of internal attack nodes. Cluster structure is used in the proposed method so that each nodes act as a certificate authority and the public key is issued in cluster head through trust evaluation of nodes. Symmetric Key is shared for integrity of data between the nodes and the structure which adds authentication message to the RREQ packet is used. ns-2 simulator is used to evaluate performance of proposed method and excellent performance can be performed through the experiment.

Constructing a Large Interlinked Ontology Network for the Web of Data (데이터의 웹을 위한 상호연결된 대규모 온톨로지 네트워크 구축)

  • Kang, Sin-Jae
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.1
    • /
    • pp.15-23
    • /
    • 2010
  • This paper presents a method of constructing a large interlinked ontology network for the Web of Data through the mapping among typical ontologies. When an ontology is open to the public, and more easily shared and used by people, its value is increased more and more. By linking CoreOnto, an IT core ontology constructed in Korea, to the worldwide ontology network, CoreOnto can be open to abroad and enhanced its usability. YAGO is an ontology constructed by combining category information of Wikipedia and taxonomy of WordNet, and used as the backbone of DBpedia, an ontology constructed by analyzing Wikipedia structure. So a mapping method is suggested by linking CoreOnto to YAGO and DBpedia through the synset of WordNet.

A Cluster-based Efficient Key Management Protocol for Wireless Sensor Networks (무선 센서 네트워크를 위한 클러스터 기반의 효율적 키 관리 프로토콜)

  • Jeong, Yoon-Su;Hwang, Yoon-Cheol;Lee, Keon-Myung;Lee, Sang-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.2
    • /
    • pp.131-138
    • /
    • 2006
  • To achieve security in wireless sensor networks(WSN), it is important to be able to encrypt and authenticate messages sent among sensor nodes. Due to resource constraints, many key agreement schemes used in general networks such as Diffie-Hellman and public-key based schemes are not suitable for wireless sensor networks. The current pre-distribution of secret keys uses q-composite random key and it randomly allocates keys. But there exists high probability not to be public-key among sensor nodes and it is not efficient to find public-key because of the problem for time and energy consumption. To remove problems in pre-distribution of secret keys, we propose a new cryptographic key management protocol, which is based on the clustering scheme but does not depend on probabilistic key. The protocol can increase efficiency to manage keys because, before distributing keys in bootstrap, using public-key shared among nodes can remove processes to send or to receive key among sensors. Also, to find outcompromised nodes safely on network, it selves safety problem by applying a function of lightweight attack-detection mechanism.

Performance Analysis of Global Shared Filesystem for the PLSI (국가 슈퍼컴퓨팅 공동활용체제 구축을 위한 글로벌공유파일시스템 성능 분석)

  • Woo, Joon;Park, SeokJung;Lee, SangDong;Kim, HyongShik
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.509-512
    • /
    • 2007
  • The purpose of the PLSI(Patnership & Leadership for the national Supercomputing Infarastructure) is to maximize a utilization of public supercomputing resources by linking with each other. When someone performs a simulation and visualization of an application using it's resources on each sites, it needs to construct the infrastructure, so that afford to access the data globally. So, in this research, I implemented the global shared filesystem mutually to share remote filesystem's data between KISTI and Pusan National University's supercomputing center based on GPFS of parallel file system, and analyzed a performance of network and filesystem on 1Gbps WAN.

  • PDF

Co-author.Keyword Network and its Two Culture Appearance in Health Policy Fields in Korea: Analysis of articles in the Korean Journal of Health Policy and Administration, 1991~2006 (국내 보건학 분야 학술활동의 군집화와 '두 문화' 현상 - 보건행정학회지(1991~2006) 게재논문의 공저자 네트워크 분석 -)

  • Jung, Min-Soo;Chung, Dong-Jun
    • Health Policy and Management
    • /
    • v.18 no.2
    • /
    • pp.86-106
    • /
    • 2008
  • This research analyzed. knowledge structure and its effect factor by analysis of co-author and keyword network in Korea's health policy and administration sector. The data was extracted from 339 articles listed in the Korean Journal of Health Policy and Administration, and was transformed into a co-author and keyword matrix. In this matrix the existence of a link was defined by impact factors which were calculated by the weight value of what the role was and the rate of how many authors contributed. We demonstrated that the research achievement was dependent on the author's status and network index. Analysis methods were neighborhood degree, correspondence analysis, multiple regression and the difference of weight distribution by research fields. Co-author networks were developed as closeness centrality as well as degree centrality by a few high productivity researchers. In particular, power law distribution was discovered in impact factor and research productivity. The effect of the author's role was significant in both the impact factor calculated by the participatory rate and the number of listed articles. Especially, this journal shared its major researchers who had a licensed physician with the Journal of Preventive Medicine and Public Health. Therefore, social scientists were likely to be small co-author network differently from natural scientists. It was so called 'two cultures' phenomenon. This study showed how can we verified academic research structure existed in the unit of journal like as citation networks. The co-author networks in the field of health policy and administration had more differentiated and clustered than preventive medicine and epidemiology fields.

A Study on Authentication ID using Identifier in Ad-hoc Network (Ad-hoc 네트워크에서 식별자를 이용한 인증 아이디에 관한 연구)

  • Moon, Jong-Sik;Byeon, Sang-Gu;Lee, Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.8
    • /
    • pp.1202-1211
    • /
    • 2010
  • The connection between devices in Ad-hoc network a network based on trust. Because a temporary device frequently join or leave, the authentication and security technology should be prepared for malicious device of a third-party attacks. The authentication scheme with the existing certification and ID, and the security technology using symmetric key and the public key is used. Therefore, in this paper we proposed two devices not having shared information use to generate each other's authentication ID. The use of authentication ID can establish the mutual trust and, provide security and efficiency for communication uses to generate a symmetric key.

Online Community Design: Review of Frameworks and Developing Online Community Construct

  • Oh Ki-Tae;Lee Kun-Pyo
    • Archives of design research
    • /
    • v.19 no.3 s.65
    • /
    • pp.131-142
    • /
    • 2006
  • The purpose of this study is to develop an online community construct, which proposes an inclusive illustration of the structure of online communities, for online community designers. This study reviewed researches from psychology, sociology, management engineering, and practical reports to understand the characteristics and dynamics of online communities. The proposed online community construct visualizes the cognitive, affective, and behavioral aspects of online community. As the notion of community originates from geographical groups, and with the assumption that geographical community shares identical characteristics with online community, this study reviewed researches about geographical communities as a starting-point. Then the study went through three main perspectives (1) online community attributes, (2) sense of online community and (3) challenges of online community. Then this study proposed an online community construct that encompasses the reviewed frameworks. The online community can be seen as a congregation of members from two sources. One is from the 'Shared Goal' that meets the personal needs. Given the shared goal, members gather into the community without personal relationship and have more chances to feel the sense of belonging to their needs fulfillment or benefit. This befitting tendency leads to strengthening of membership. Public online forums fall under this classification. The other source is from the emotional connections that are already initiated by personal and casual contacts in the real world. The network of emotional connection can evolve into an online congregation of people under faint boundaries. Although there is no (or weak) shared goal, members are strongly bound to other members. Personal homepage or web log (blog) can be classified as an example of relationship-oriented community.

  • PDF

Shared Governance for the Arts and Culture - US Public Arts Agencies and Cultural Foundations (문화예술활동 지원을 위한 지역과 중앙의 공유 거버넌스 - 미국의 지역예술위원회와 문화재단의 활동을 중심으로)

  • Chang, WoongJo;Lee, Dahyun
    • Review of Culture and Economy
    • /
    • v.21 no.1
    • /
    • pp.63-83
    • /
    • 2018
  • In the US, there are no governing bodies within the federal executive departments dedicated to the arts and cultural affairs. Direct government subsidies for the arts are relatively small compared to other countries with a comparable economy and standard of living. Nevertheless, the US produces artworks, artists, and arts groups, leading the world's arts and culture. Incorporating the concepts of network governance and shared governance, this paper examines the dynamic roles and interrelationships among various for-profit/nonprofit arts organizations, foundations, councils, service organizations, arts advocacy groups, and professional/amateur associations from the federal to local levels that compose the ecology of American arts and culture. Through our evaluation, we conclude that the local/state/federal arts agencies and arts organizations at various levels influence each other via the principle of subsidiarity and isomorphism, creating a unique cultural policy and arts-supporting system that correspond to the political and social structure and environment of the United States.