• 제목/요약/키워드: secure transmission

검색결과 429건 처리시간 0.027초

Low area field-programmable gate array implementation of PRESENT image encryption with key rotation and substitution

  • Parikibandla, Srikanth;Alluri, Sreenivas
    • ETRI Journal
    • /
    • 제43권6호
    • /
    • pp.1113-1129
    • /
    • 2021
  • Lightweight ciphers are increasingly employed in cryptography because of the high demand for secure data transmission in wireless sensor network, embedded devices, and Internet of Things. The PRESENT algorithm as an ultralightweight block cipher provides better solution for secure hardware cryptography with low power consumption and minimum resource. This study generates the key using key rotation and substitution method, which contains key rotation, key switching, and binary-coded decimal-based key generation used in image encryption. The key rotation and substitution-based PRESENT architecture is proposed to increase security level for data stream and randomness in cipher through providing high resistance to attacks. Lookup table is used to design the key scheduling module, thus reducing the area of architecture. Field-programmable gate array (FPGA) performances are evaluated for the proposed and conventional methods. In Virtex 6 device, the proposed key rotation and substitution PRESENT architecture occupied 72 lookup tables, 65 flip flops, and 35 slices which are comparably less to the existing architecture.

Secure Performance Analysis Based on Maximum Capacity

  • Zheng, Xiuping;Li, Meiling;Yang, Xiaoxia
    • Journal of Information Processing Systems
    • /
    • 제16권6호
    • /
    • pp.1261-1270
    • /
    • 2020
  • The physical security layer of industrial wireless sensor networks in the event of an eavesdropping attack has been investigated in this paper. An optimal sensor selection scheme based on the maximum channel capacity is proposed for transmission environments that experience Nakagami fading. Comparing the intercept probabilities of the traditional round robin (TRR) and optimal sensor selection schemes, the system secure performance is analyzed. Simulation results show that the change in the number of sensors and the eavesdropping ratio affect the convergence rate of the intercept probability. Additionally, the proposed optimal selection scheme has a faster convergence rate compared to the TRR scheduling scheme for the same eavesdropping ratio and number of sensors. This observation is also valid when the Nakagami channel is simplified to a Rayleigh channel.

Privacy-Preserving NFC-Based Authentication Protocol for Mobile Payment System

  • Ali M. Allam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권5호
    • /
    • pp.1471-1483
    • /
    • 2023
  • One of the fastest-growing mobile services accessible today is mobile payments. For the safety of this service, the Near Field Communication (NFC) technology is used. However, NFC standard protocol has prioritized transmission rate over authentication feature due to the proximity of communicated devices. Unfortunately, an adversary can exploit this vulnerability with an antenna that can eavesdrop or alter the exchanged messages between NFC-enabled devices. Many researchers have proposed authentication methods for NFC connections to mitigate this challenge. However, the security and privacy of payment transactions remain insufficient. We offer a privacy-preserving, anonymity-based, safe, and efficient authentication protocol to protect users from tracking and replay attacks to guarantee secure transactions. To improve transaction security and, more importantly, to make our protocol lightweight while ensuring privacy, the proposed protocol employs a secure offline session key generation mechanism. Formal security verification is performed to assess the proposed protocol's security strength. When comparing the performance of current protocols, the suggested protocol outperforms the others.

무선 센서네트워크에서 경량화 개인별 암호화를 사용한 멀티캐스트 전송기법 (Lightweight Individual Encryption for Secure Multicast Dissemination over WSNs)

  • 박태현;김승영;권구인
    • 한국컴퓨터정보학회논문지
    • /
    • 제18권11호
    • /
    • pp.115-124
    • /
    • 2013
  • 본 논문에서는 무선 센서네트워크상에서 Lightweight Individual Encryption Multicast 방식으로 그룹키의 사용대신에 Forward Error Correction을 이용한 개인별 인크립션을 사용하여 안전한 데이터 전송을 제안한다. 무선 센서네트워크에서 센서노드 프로그램을 위한 업데이트 방법으로 싱크 노드는 데이터를 다수의 센서노드에게 멀티캐스트 방식으로 전송이 가능하며, 그룹키 인크립션 방식이 가장 보편적인 안전한 데이터 전송을 위한 방식이라 할 수 있다. 이러한 그룹키 방식은 더 강력하고 안전한 데이터 전송을 위하여 멤버의 가입 및 탈퇴시 키를 재 생성하는 re-key 방식이 필요하다. 그러나 이러한 그룹키 방식을 센서네트워크에서 구현하기에는 제한된 컴퓨팅 자원, 저장 공간, 통신 등으로 인한 많은 제약이 존재한다. 또한 개인별 인크립션을 사용하면 각 노드에 대한 개별적 컨트롤은 가능하지만, 데이터 전송을 위한 개인별 인크립션 비용이 많이 발생하는 문제점이 있다. 멀티캐스트 전송시 개인별 인크립션 방식이 많이 고려되지 않았지만, 보내고자 하는 전체 데이터의 0.16 %만 개인키를 사용하여 각 노드에게 유니캐스트로 안전하게 전송하고, 나머지 99.84%의 데이터는 멀티캐스트를 이용하여 전송함으로써 무선 센서네트워크 성능을 향상시킨다.

High-Availability Virtual Communication for Cloud Access

  • Sirisutthidecha, Suthee;Maichalernnukul, Kiattisak
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권8호
    • /
    • pp.3455-3473
    • /
    • 2016
  • Cloud computing is a paradigm in which information is permanently stored in servers on the Internet and cached temporarily on clients. Virtual private network (VPN) is the most widely used technology for secure cloud access. Unfortunately, VPN-based cloud services become unavailable when a VPN failure occurs. In this paper, we propose a new scheme to improve the availability of VPN connections against such failures, called high-availability virtual communication (HAVC). Unlike most of the multipath transmission schemes in the literature, the proposed scheme is implemented by using a virtualization technique, and its protocol functions are independent of existing networks - potential clients are not required to modify their applications or operating systems. Simulation results show that the HAVC can not only tolerate VPN failures but also achieve high transmission performance.

애착의 세대간 전이 - 어머니의 내적 실행모델과 영아의 애착유형 - (Intergenerational Transmission of Attachment: Mother's Internal Working Model of Relationships and Infant Attachment Patterns)

  • 장미자;조복희
    • 아동학회지
    • /
    • 제20권1호
    • /
    • pp.147-164
    • /
    • 1999
  • The purpose of this study was to investigate (1) intergenerational transmission from mother's internal working model of relationships formed in her childhood and infant's attachment patterns and (2) the associations among maternal working models, maternal sensitivity, and infant attachment patterns. The subjects were twenty 12- to 20-month-old infants and their mothers. The Adult Attachment Interview (1996) was used to assess mother's internal work model of relationships. Interviews were audio-recorded and transcribed verbatim. Each dyad was videotaped in the modified Ainsworth Strange Situation(1978) and filmed for 3 minutes in the Questionaire Situation of Smith and Pederson (1988). Mothers were classified as autonomous(F), dismissing(Ds), preoccupied(E), or unresolved/disorganized(Ud). Infants were classified as secure(B), insecure-avoidant(A), or insecure-resistant(C). Exact A/B/C/D and Ds/F/E/Ud agreement was observed in 55% of the dyads. Maternal sensitivity was related to infant attachment patterns but not to maternal working models.

  • PDF

특허분석을 통한 무선충전 기술방향 분석 (Research on the Development Direction of Wireless Charging Technology Using Patent Analysis)

  • 양동원;이행병
    • 한국IT서비스학회지
    • /
    • 제19권3호
    • /
    • pp.89-100
    • /
    • 2020
  • The wireless power transmission market is growing at an average annual rate of 51.5% from $ 16.4 billion in 2015 to $ 131.1 billion in 2020. However, there are limitations to commercialization due to the development of standards and technologies. Thus, this study identified trends in standards and regulations by market and by country. The research collected and filtered a total of 69,488 worldwide wireless power transfer patents by June 2019 and extracted a total of 28,555 patents. Based on this, technology development status was analyzed and predicted. In this study, long-distance and short-range technology development with high technology development difficulty and low technology development ratio could lead to growth of the entire wireless charging market. It is analyzed that investment and policy preparation are necessary to secure source technology for long-distance / near technology development than China, Japan and Europe.

수정모드를 고려한 예방모드에서의 유연송전기기 최적투입계획 관한 연구 (Optimal Allocation of FACTS Devices Considering both Corrective and Prevenvite Mode)

  • 임남규;송화창;이병준
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2000년도 추계학술대회 논문집 학회본부 A
    • /
    • pp.23-25
    • /
    • 2000
  • In recent deregulation and competitive power market environment, electric utilities plan and operate their systems for economic benefit with secure system condition. Flexible AC transmission system(FACTS) technology opens up new opportunities of controlling power and enhancing the usable capacity of present transmission system. This paper presents a method for security constrained optimal allocation of FAETS considering contingencies for the purpose of enhanced system operation. The proposed scheme uses Benders decomposition to account of both corrective and preventive mode.

  • PDF

Chua 회로를 이용한 카오스 동기화 (Chaos Synchronization Using Chua's Circuit)

  • 배영철;고재호;이광원;서삼문;임화영
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1996년도 하계학술대회 논문집 B
    • /
    • pp.1086-1088
    • /
    • 1996
  • A number of recent paper have investigated the feasibility of synchronizing chaotic system. In this paper we proposed the chaotic synchronization of the canonical. Chua's circuit with RLCG transmission line by drive-response system. We expect that proposed method is available to secure communication with RLCG transmission line.

  • PDF

Physical Layer Technique to Assist Authentication Based on PKI for Vehicular Communication Networks

  • Wen, Hong;Ho, Pin-Han
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권2호
    • /
    • pp.440-456
    • /
    • 2011
  • In this paper, we introduce a novel Public Key Infrastructure (PKI) based message authentication scheme that takes advantage of temporal and spatial uniqueness in physical layer channel responses for each transmission pair in vehicular communication networks. The proposed scheme aims at achieving fast authentication and minimizing the packet transmission overhead without compromising the security requirements, in which most messages can be authenticated through an extreme fast physical-layer authentication mechanism. We will demonstrate that the proposed secure authentication scheme can achieve very short message delay and reduced communication overhead through extensive analysis and simulation.