• Title/Summary/Keyword: remove and management

Search Result 475, Processing Time 0.031 seconds

A study on Management Mechanism of Malicious Node in Ad-hoc Networks (Ad-hoc 네트워크에서 악의적 노드 관리기법에 관한 연구)

  • Kim, Il-Do;Kim, Dong-Cheon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.605-608
    • /
    • 2010
  • An Ad-hoc network will operate properly and provide smooth communication when nodes cooperate mutually with each of them having equal authority. Although it is possible to form a network conisting only of authenticated nodes in order to ensure reliability, authentication by itself is not sufficient to remove malicious nodes and their activities jeopardizing the whole network. Detection and prevention of such activities are vital for maintaining a safe and reliable network, but research on this matter is relatively lacking. Hence a suggestion is made on how to detect and prevent malicious or uncooperative ones among the nodes forming a network by a relationship of mutual trust, thereby maintaining safety and stability of the network and improving its processing abilities

  • PDF

A study on Management Mechanism of Malicious Node in Ad-hoc Networks (Ad-hoc 네트워크에서 악의적 노드 관리기법에 관한 연구)

  • Kim, Il-Do;Kim, Dong-Cheon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.12
    • /
    • pp.2716-2723
    • /
    • 2010
  • An Ad-hoc network will operate properly and provide smooth communication when nodes cooperate mutually with each of them having equal authority. Although it is possible to form a network consisting only of authenticated nodes in order to ensure reliability, authentication by itself is not sufficient to remove malicious nodes and their activities jeopardizing the whole network. Detection and prevention of such activities are vital for maintaining a safe and reliable network, but research on this matter is relatively lacking. Hence a suggestion is made on how to detect and prevent malicious or uncooperative ones among the nodes forming a network by a relationship of mutual trust, thereby maintaining safety and stability of the network and improving its processing abilities

An Efficient Anonymous Authentication Scheme with Secure Communication in Intelligent Vehicular Ad-hoc Networks

  • Zhang, Xiaojun;Mu, Liming;Zhao, Jie;Xu, Chunxiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3280-3298
    • /
    • 2019
  • Vehicular ad-hoc networks (VANETs) have become increasingly significant in intelligent transportation systems, they play a great role in improving traffic safety and efficiency. In the deployment of intelligent VANETs, intelligent vehicles can efficiently exchange important or urgent traffic information and make driving decisions. Meanwhile, secure data communication and vehicle's identity privacy have been highlighted. To cope with these security issues, in this paper, we construct an efficient anonymous authentication scheme with secure communication in intelligent VANETs. Combing the ElGamal encryption technique with a modified Schnorr signature technique, the proposed scheme provides secure anonymous authentication process for encrypted message in the vehicle-to-infrastructure communication model, and achieves identity privacy, forward security, and reply attack resistance simultaneously. Moreover, except the trusted authority (TA), any outside entity cannot trace the real identity of an intelligent vehicle. The proposed scheme is designed on an identity-based system, which can remove the costs of establishing public key infrastructure (PKI) and certificates management. Compared with existing authentication schemes, the proposed scheme is much more practical in intelligent VANETs.

An Efficient and Provable Secure Certificateless Identification Scheme in the Standard Model

  • Chin, Ji-Jian;Heng, Swee-Huay;Phan, Raphael C.W.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.7
    • /
    • pp.2532-2553
    • /
    • 2014
  • In Asiacrypt 2003, Al-Riyami and Paterson proposed the notion of certificateless cryptography, a technique to remove key escrow from traditional identity-based cryptography as well as circumvent the certificate management problem of traditional public key cryptography. Subsequently much research has been done in the realm of certificateless encryption and signature schemes, but little to no work has been done for the identification primitive until 2013 when Chin et al. rigorously defined certificateless identification and proposed a concrete scheme. However Chin et al.'s scheme was proven in the random oracle model and Canetti et al. has shown that certain schemes provable secure in the random oracle model can be insecure when random oracles are replaced with actual hash functions. Therefore while having a proof in the random oracle model is better than having no proof at all, a scheme to be proven in the standard model would provide stronger security guarantees. In this paper, we propose the first certificateless identification scheme that is both efficient and show our proof of security in the standard model, that is without having to assume random oracles exist.

Study in the integrated watershade management for conservation of water resources (II) - Water quality modeling and simulation of Oship stream - (수자원 보전을 위한 유역통합관리 방안에 관한 연구(II) - 오십천 수계의 수질모델링 및 수질 예측 -)

  • 허인량;정의호;권재혁
    • Journal of Environmental Health Sciences
    • /
    • v.28 no.2
    • /
    • pp.61-69
    • /
    • 2002
  • Oship stream is located nearby south eastern coasts. This study was performed to find out waters quality modeling and then to predict water quality of Oship stream. Based on survey data, BOD, T-N, T-P calibration and verification result were in good agreement with measured value within mean coefficient variance(MSE) value, which were 13.9%, 9.0%, 26.5% and 19.5%, 12.0%, 16.5%, respectively. Sectional water quality predictions of the main stream of Oship stream are executed on the basis of the following cases 1) with sewage treatment of Dogye-eup 2) reduction of mine wastewater treatment of 80% in th basin. As a result, BOD, T-P improvement rates at down stream of Oship stream, case 1) were appeared 12.2%, 22.2%, case 2) maximum sulfate ion and conductivity reduction removal rate of Oship stream were 58%, 68%. The main pollution sources of Oship-stream were almost domestic wastewater and mine wastewater discharged from Dogye-eup which located in uppers stream. The large effects will appear after the construction of Dogye sewage water treatment plant which remove the organic matter and nutrients in these sewage water. The waste water from mine can not easily to treat for characteristics of effluence and economic problems. However, to achieve the goal of water quality in Oship-stream water system, treatments of those are necessary.

A Study on The Acknowledgement of A Criterion and Subjective Symptom of Musculoskeletal Diseases by Dental Hygienists works (치과위생사 업무 중 근·골격계 질환의 자각 증상과 업무상 재해 인정기준에 관한 연구)

  • Lee, Sook-Jeong
    • Journal of Korean society of Dental Hygiene
    • /
    • v.5 no.2
    • /
    • pp.235-245
    • /
    • 2005
  • The changes in korean economic environment, from quantitative to qualitative growth of economy, go with making desperate efforts, that is, companies have put through many technical improvements, quality control, improvement of service, and so forth. Enterprises cut the number of employees through labor-management adjustment, so that a shortage of labor caused. An increase in intension of labor brought about growing the proportion of occupational diseases which is musculoskeletal diseases. Because of a rapid change in society and a change in our circumstances, we have many difficulties in examine a business disease closely. In support corroboration of relevance on admission of business, a criterion for dudging afford a basis for a causal relationship of medical science, take the state of working conditions into consideration, and at the same time, give a adaptable decision based on the purpose and point of "The Labor Standard Law" as well as "The Law about Industrial Accident Compensation insurance". In conclusion, it is necessary for the dental hygienists 10 reduce the on-duty hours a day, to make good postures in working, and to remove the stressful conditions in order to reduce the incidence of the lumbago. Good working postures, appropriate rest time, and early detection, care and education of the lumbago could be recommended for the dental hygienists.

  • PDF

Development of a Process Technique for Heavy Metal Removal in the Production of Recycled Synthetic Resin Materials (재생 합성수지 원료생산을 위한 중금속 이물질 제거 공정기술 개발)

  • Kim, Jung-Ho;Cha, Cheon-Seok;Kim, Jae-Yeol;Kim, Ji-Hoon
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.17 no.4
    • /
    • pp.137-142
    • /
    • 2018
  • Recycled synthetic resin materials produced from waste vinyl and waste plastic contain many foreign substances. Plastic products made from this recycled resin materials containing foreign substances are of poor quality, with reduced the strength and rigidity. Foreign substances include heavy metals, cement, foil, dyed paper and dust. In this study, the scratch-Dies process; which remove foreign sbustances, with precision and automation, through a three-stage mesh filter, is designed. The process is evaluated with finite element analysis according to vibration loading and make. After installing the manufactured equipment, recycled resin was producde, and its heavy metal content was evaluated. Recycled synthetic resin materials were also used plastic products and evaluate their strength. In addition, the change in production was assessed.

A Lightweight Authentication and Key Agreement Protocol in Wireless Sensor Networks (무선센서 네트워크에서 경량화된 인증과 키 동의 프로토콜)

  • Yoon, Sin-Sook;Ha, Jae-Cheol
    • Journal of Internet Computing and Services
    • /
    • v.10 no.2
    • /
    • pp.41-51
    • /
    • 2009
  • Recently, there are many researches on security to remove vulnerability which is caused by wireless communication in wireless sensor networks. To guarantee secure communication, we should basically provide key management for each node, mutual authentication and key agreement protocol between two nodes. Although many protocols are presented to supply these security services, some of them require plentiful storage memory, powerful computation and communication capacity. In this paper, we propose a lightweight and efficient authentication and key agreement protocol between two sensor nodes, which is an enhanced version of Juang's scheme. In Juang's protocol, sensor node's information used to share a secret key should be transmitted to registration center via a base station. On the contrary, since node's information in our protocol is transmitted up to only base station, the proposed scheme can decrease computation and communication cost for establishing the shared key between two nodes.

  • PDF

Design and Implementation of Invisible Depth Analysis (불가시심도분석의 설계 및 구현)

  • Lee, Sang-Bok;Lee, Seung-Yeob;Ha, Jae-Myung
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.12 no.3
    • /
    • pp.66-75
    • /
    • 2009
  • The purpose of this paper is design and implement the invisible depth analysis tools. The developed algorithm was basically used reference plan method and to remove first step errors we mix-used point-to-point method. and we consider error due to curvature and refraction for large scale analysis. The final algorithm was developed as ArcToolBox tools, which can be considered convenient and public use as well; as result it reduced experimental errors as compared with conventional method and makes possible high resolution analysis for large scale site.

  • PDF

Estimation of VOCs Emissions from Small-Scale Surface Coating Facilities in Seoul

  • Jin-Ho, SHIN;Woo-Taeg, KWON
    • Journal of Wellbeing Management and Applied Psychology
    • /
    • v.6 no.1
    • /
    • pp.17-22
    • /
    • 2023
  • Purpose: VOCs (volatile organic compounds) are all the organic compounds that react with solar rays and increase the concentration of ozone in the troposphere and are partially also known as carcinogens. The adsorption using activated carbon is usually applied to remove VOCs. Research design, data and methodology: The 20 places of surface coating facilities were selected to evaluate the emission amount of VOCs in Seoul. In addition, the removal efficiency of VOCs in 25 places of automobile coating facilities was evaluated. Results: The average emission amount of VOCs was 10.903 kg/hr from automobile coating facilities, while 3.520 kg/hr from other surface coating facilities. The removal efficiency in adsorption with the combustion catalytic process has the mean value of 87.9% and the regeneration efficiency of activated carbon has the mean value of 95.0%. Conclusions: The removal efficiency in adsorption with the biofiltration process has the mean value of 89.8% and the regeneration efficiency of activated carbon has the mean value of 94.8%. The removal efficiency in the plasma catalyst process has the mean value of 79.3%.