• Title/Summary/Keyword: strength of security

Search Result 286, Processing Time 0.028 seconds

An Efficient and Secure Group Key Distribution Protocol for IP-based Pay-TV Systems (IP기반의 Pay-TV 시스템을 위한 안전하고 효율적인 그룹 키 분배 프로토콜)

  • Kim, Jung-Yoon;Choi, Hyoung-Kee
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.199-208
    • /
    • 2009
  • Recently,IP-based broadcasting systems,such as Mobile-TV and IP-TV, have been widely deployed. These systems require a security system to allow only authorized subscribers access to broadcasting services. We analyzed the Conditional Access System, which is a security system used in the IP-based Pay-TV systems. A weakness of the system is that it does not scale well when the system experiences frequent membership changes. In this paper, we propose a group key distribution protocol which overcomes the scalability problem by reducing communication and computation overheads without loss of security strength. Our experimental results show that computation delay of the proposed protocol is smaller than one of the Conditional Access System. This is attributed to the fact that the proposed protocol replaces expensive encryption and decryption with relatively inexpensive arithmetic operations. In addition, the proposed protocol can help to set up a secure channel between a server and a client with the minimum additional overhead.

Ex situ combined in situ target strength of Japanese horse mackerel using a broadband echosounder (중심 주파수 200 kHz의 과학어군탐지기를 활용한 전갱이의 광대역 주파수 특성)

  • Myounghee KANG;Hansoo KIM;Dongha KANG;Jihoon JUNG;Fredrich SIMANUNGKALIT;Donhyug KANG
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.60 no.2
    • /
    • pp.142-151
    • /
    • 2024
  • Recently, domestic fishing production of Japanese horse mackerel has been continuously decreasing. To achieve sustainable fishing of this species, it is essential to acquire its target strength (TS) for accurate biomass estimation and to study its ecological characteristics. To date, there has been no TS research using a broadband echosounder targeting Japanese horse mackerel. In this study, for the first time, we synchronized an underwater camera with a broadband frequency (nominal center frequency of 200 kHz, range: 160-260 kHz) to measure the TS according to the body size (16.8-35.5 cm) and swimming angle of the species. The relationship between Japanese horse mackerel length and body weight showed a general tendency for body weight to increase as length increased. The pattern of the frequency spectra (average values) by body length exhibited a similar trend regardless of body length, with no significant fluctuations in frequency observed. The lowest TS value was observed at 243 kHz while the highest TS values were recorded at 180 and 257.5 kHz. The frequency spectra for the swimming angles appeared to be flat at angles of -5, 0, 30, 60, 75, and 80° while detecting more general trends of frequency spectra for swimming angle proved challenging. The results of this study can serve as fundamental data for Japanese horse mackerel biomass estimation and ecological research.

Flexural performances of deep-deck plate slabs: Experimental and numerical approaches

  • Inwook Heo;Sun-Jin Han;Khaliunaa Darkhanbat;Seung-Ho Choi;Sung Bae Kim;Kang Su Kim
    • Steel and Composite Structures
    • /
    • v.52 no.3
    • /
    • pp.313-325
    • /
    • 2024
  • This work presents experimental and numerical investigations on the flexural performances of composite deep-deck plate slabs. Seven deep-deck plate slab specimens with topping concrete were fabricated; the height of the topping slab as well as presence and type of shear connector were set as the main variables to perform bending experiments. The flexural behaviors of the specimens and composite behaviors of the deck plate and concrete were analyzed in detail. The contributions of the deck plate to the flexural stiffness and strength of the slab were identified through finite element (FE) analysis. FE analysis was carried out using the validated FE model by considering the varying bond strengths of the deck plates and concrete, thickness of the deck plate, and types and spacings of the shear connectors. Based on the results, the degree of composite of the deep-deck plate was examined, and a flexural strength equation for the composite deck plate slabs was proposed.

A Study on the Strength Properties of FRP Member for Making Personal Disaster Shelters in Rural Area (농산촌 재난대피시설 제작을 위한 FRP 부재의 강도특성에 관한 연구)

  • Kim, Jung Meyon;Hwang, Dea Won;Lim, Hyun Taek;Park, Sung Yong;Yeon, Kyu Seok;Kim, Yong Seong
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.58 no.2
    • /
    • pp.73-82
    • /
    • 2016
  • This study is about development of personal disaster shelters for minimization of the casualties caused by the landslide and steep slope collapse. The objectives of present research is the selection of disaster evacuation facilities utilizing FRP (Fiber Reinforced Plastic) material. For the proper assessment of FRP member, several layers by strength test and the three-dimensional numerical analysis of these FRR member was carried out. As a result, the personal disaster evacuation facility utilizing FRP materials, was found to be of a material that is able to protect the weak person at the time of the collapse of the landslides and steep slopes.

Efficient and Secure Sound-Based Hybrid Authentication Factor with High Usability

  • Mohinder Singh B;Jaisankar N.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.10
    • /
    • pp.2844-2861
    • /
    • 2023
  • Internet is the most prevailing word being used nowadays. Over the years, people are becoming more dependent on the internet as it makes their job easier. This became a part of everyone's life as a means of communication in almost every area like financial transactions, education, and personal-health operations. A lot of data is being converted to digital and made online. Many researchers have proposed different authentication factors - biometric and/or non-biometric authentication factors - as the first line of defense to secure online data. Among all those factors, passwords and passphrases are being used by many users around the world. However, the usability of these factors is low. Also, the passwords are easily susceptible to brute force and dictionary attacks. This paper proposes the generation of a novel passcode from the hybrid authentication factor - sound. The proposed passcode is evaluated for its strength to resist brute-force and dictionary attacks using the Shannon entropy and Passcode (or password) entropy formulae. Also, the passcode is evaluated for its usability. The entropy value of the proposed is 658.2. This is higher than that of other authentication factors. Like, for a 6-digit pin - the entropy value was 13.2, 101.4 for Password with Passphrase combined with Keystroke dynamics and 193 for fingerprint, and 30 for voice biometrics. The proposed novel passcode is far much better than other authentication factors when compared with their corresponding strength and usability values.

Enhanced Mutual Authentication Scheme based on Chaotic Map for PCM in NFC Service Environment

  • Park, Sung-Wook;Lee, Im-Yeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.1180-1200
    • /
    • 2017
  • Currently, automated payment services provide intuitive user interfaces by adapting various wireless communication devices with mobile services. For example, companies like Samsung, Google, and Apple have selected the NFC payment method to service payments of existing credit cards. An electronic payment standard has been released for NFC activation within Korea and will strengthen the safety of payment service communications. However, there are various security risks regarding the NFC-based electronic payment method. In particular, the NFC payment service using the recently released lightweight devices cannot provide the cryptographic strength that is supported by many financial transaction services. This is largely due to its computational complexity and large storage resource requirements. The chaotic map introduced in this study can generate a highly complicated code as it is sensitive to the initial conditions. As the lightweight study using the chaotic map has been actively carried out in recent years, associated authentication techniques of the lightweight environment have been released. If applied with a chaotic map, a high level of cryptographic strength can be achieved that can provide more functions than simple XOR operations or HASH functions. Further, this technique can be used by financial transaction services. This study proposes a mutual authentication technique for NFC-PCM to support an NFC payment service environment based on the chaotic map.

The Analysis of Organizational Factors Affecting the Outcome of Federal FOIA Implementation for National Security (국가 안보를 위한 미국 정보 자유법 시행의 결과에 미치는 조직적 요인의 분석)

  • Kwon, Hyck-Bin
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.1-31
    • /
    • 2010
  • This article aims to identify organizational factors that influence the performance of implementation of the U.S. Freedom of Information Act (FOIA) and to investigate the strength and direction of their effects. Explanatory variables include administrative resources, organizational culture, litigation cost, and the complexity of FOIA requests. The study will analyze quantitative secondary data from official statistics of federal agencies and the 2006 Federal Human Capital Survey as well as qualitative data from semi-structured interviews of FOIA officers. The results of statistical analyses are as follows : FOIA funding significantly affects median processing time and number of requests pending. There is a significant relationship between bureaucratic culture and number of requests pending, but not between bureaucratic culture and number of requests pending. There exists a significant relationship between the cost of FOIA litigation to federal agencies and the performance of FOIA implementation. There exists a significant relationship between the complexity of FOIA requests and the performance of FOIA implementation. This study also has important implication in South Korea, which has been under a sharp confrontation with North Korea for more than 50 years. As illustrated by the conflict between people's right to know and national security during the investigation of recent Sinking of the ROKS Cheonan, efforts should be made to prepare legal and institutional mechanism for freedom of information policy which can maintain a balance between conflicting values as well as efficient information disclosure in Korea.

  • PDF

RFID Tag Search Protocol Preserving Privacy of Reader Holders (이동형 리더 소지자의 프라이버시를 보호하는 RFID 태그 검색 프로토콜)

  • Chun, Ji-Young;Hwang, Jung-Yeon;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.59-69
    • /
    • 2009
  • RFID tag search system which is used to find a specific tag has an application such as asset management, supply chain, and this search scheme has been given much attention so far. In RFID tag search system, especially, mobility of the reader is important in order to search tags. Therefore, even though the handheld reader cannot connect with the central database because of unreliable wireless connection or remote location, handheld reader should search the specific tag without help of the central database. In addition, in RFID tag search system, users hold not the tag but the reader, the privacy of users should be considered. Since the signal strength of the reader is stronger than that of the tag, the privacy of the reader holder is very important. Recently, in order to solve these problems, a number of RFID tag search schemes have been proposed. However, since these schemes did not consider the privacy of reader holders, there are serious privacy breaches of reader holders. In this paper, we propose efficient RFID tag search protocol for passive tags. Our proposed scheme preserves the privacy of reader holders.

Developing and Assessing Geopolymers from Seochun Pond Ash with a Range of Compositional Ratios (서천화력발전소 매립 석탄재로부터 제조한 다양한 조성비의 지오폴리머와 그 특성의 평가)

  • Lee, Sujeong;Jou, Hyeong-Tae;Chon, Chul-Min;Kang, Nam-Hee;Cho, Sung-Baek
    • Journal of the Korean Ceramic Society
    • /
    • v.50 no.2
    • /
    • pp.134-141
    • /
    • 2013
  • Pond ash produced from Seochun Power Station was quantitatively characterized to manufacture geopolymers with a range of Si/Al compositional ratios. Mix consistency was kept nearly constant for comparing the compressive strengths of geopolymers. The amorphous composition of coal ash was determined using XRF and quantitative X-ray diffraction. Different mix compositions were used in order to achieve Si/Al ratios of 2.0, 2.5 and 3.0 in the geopolymer binder. Geopolymers synthesized from coal ash with a Si/Al ratio of 3.0 exhibited the highest compressive strength in this study. It was found that geopolymers activated with aluminate produced different microstructure from that of geopolymers activated with silicate. High silica in alkali activators produced the fine-grained microstructure of geopolymer gel. It was also found that high compressive strength was related to low porosity and a dense, connected microstructure. The outcome of the reported experiment indicates that quantitative formulation method made it possible to choose suitable activators for achieving targeted compositions of geopolymers and to avoid efflorescence.

Study on the Positioning Method using BLE for Location based AIoT Service (위치 기반 지능형 사물인터넷 서비스를 위한 BLE 측위 방법에 관한 연구)

  • Ho-Deok Jang
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.17 no.1
    • /
    • pp.25-30
    • /
    • 2024
  • Smart City, a key application area of the AIoT (Artificial Intelligence of Things), provides various services in safety, security, and healthcare sectors through location tracking and location-based services. an IPS (Indoor Positioning System) is required to implement location-based services, and wireless communication technologies such as WiFi, UWB (Ultra-wideband), and BLE (Bluetooth Low Energy) are being applied. BLE, which enables data transmission and reception with low power consumption, can be applied to various IoT devices such as sensors and beacons at a low cost, making it one of the most suitable wireless communication technologies for indoor positioning. BLE utilizes the RSSI (Received Signal Strength Indicator) to estimate the distance, but due to the influence of multipath fading, which causes variations in signal strength, it results in an error of several meters. In this paper, we conducted research on a path loss model that can be applied to BLE IPS for proximity services, and confirmed that optimizing the free space propagation loss coefficient can reduce the distance error between the Tx and Rx devices.