• Title/Summary/Keyword: 관리 프로토콜

Search Result 1,785, Processing Time 0.038 seconds

Secure Index Searching Schemes for Groups (그룹 환경을 위한 안전한 인덱스 검색 스킴)

  • Park Hyun-A;Byun Jin-Uk;Lee Hyun-Suk;Lee Dong-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.1
    • /
    • pp.87-97
    • /
    • 2005
  • A secure index search protocol let us search the index of encrypted documents using the trapdoor for a keyword. It enables an untrusted server to learn nothing more than the search result about the documents without revealing the keyword. A lot of secure search protocols have been suggested but they only considered the search between a single-user and a server. In real organizations such as government offices or enterprises where exist many hierarchical departments, the search system for groups is arisen more often. In this paper, we construct secure index search protocols for hierarchical group settings without re-encryption of the old encrypted documents when group keys are re-keyed newly.

A Proposal for the Practical and Secure Electronic Voting Protocol (실용적이고 안전한 전자투표 프로토콜에 관한 연구)

  • 김순석;이재신;김성권
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.4
    • /
    • pp.21-32
    • /
    • 2000
  • We have seen a lot of developments on computer application areas with the wide spread use of computers and the rapid growth of communication network. It is necessary to use a cryptographic technique for electronic voting, but, at present, despite of its importance electronic voting protocols so far have many shortcomings. In this paper, with the assumption of a trustable voting centers we propose a large-scale and practical electronic voting protocol satisfying protocol requirements, such as secureness, fairness, privacy of voter and correctness. Voters are able to get a vote without revealing their voted information by using the blinding technique. We can find the injustice between a voter and the tallier by using undeniable challenge and responsible protocol. Also, we proposes a secure protocol that compensates a integrity of electronic voting and protects a privacy of voter from outer attacks as using a anonymity of voter.

Design and Function Analysis of Dust Measurement Platform based on IoT protocol (사물인터넷 프로토콜 기반의 미세먼지 측정 플랫폼 설계와 기능해석)

  • Cho, Youngchan;Kim, Jeongho
    • Journal of Platform Technology
    • /
    • v.9 no.4
    • /
    • pp.79-89
    • /
    • 2021
  • In this paper, the fine dust (PM10) and ultrafine dust (PM2.5) measurement platforms are designed to be mobile and fixed using oneM2M, the international standard for IoT. The fine dust measurement platform is composed and designed with a fine dust measurement device, agent, oneM2M platform, oneM2M IPE, and monitoring system. The main difference between mobile and fixed is that the mobile uses the MQTT protocol for interconnection between devices and services without blind spots based on LTE connection, and the fixed uses the LoRaWAN protocol with low power and wide communication range. Not only fine dust, but also temperature, humidity, atmospheric pressure, volatile organic compounds (VOC), carbon monoxide (CO), sulfur dioxide (SO2), nitrogen dioxide (NO2), and noise data related to daily life were collected. The collected sensor values were managed using the common API provided by oneM2M through the agent and oneM2M IPE, and it was designed into four resource types: AE and container. Six functions of operability, flexibility, convenience, safety, reusability, and scalability were analyzed through the fine dust measurement platform design.

Implementation of the Environment for Mobile HMI Communication Settings Based on QR Code

  • Kim, Jong-Joo;Kim, Jae-Woong;Park, Seong-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.11
    • /
    • pp.139-145
    • /
    • 2022
  • As products that consumers want become more diverse, the types of automation equipment are becoming more diverse and advanced to produce competitive products. In general, equipment is manufactured with built-in interface devices (HMI) for users so that operators can efficiently monitor and operate equipment quickly. Because HMI devices are connected to various industrial controllers, elements such as communication protocols of various controllers must be understood and set up in the design stage. Non-experts not only have difficulty choosing compatible items among various protocols, but also have limitations in integrating and operating on one device because screens and settings are statically assigned. This paper proposes a model that can scan information such as equipment ID and communication protocol with QR code using a mobile device, access industrial controller, and remotely operate the displayed equipment screen. The proposed model is expected to increase efficiency in inspection and management of automated equipment as it can easily set, monitor, and operate the communication environment of various automated equipment using one mobile device.

N-WPA2: Practical WPA2 Without Key Exchange of 4-way Handshake Using NFT Authentication (NFT를 이용한 4-방향 핸드셰이크의 키 교환이 없는 실용적인 WPA2)

  • Tae-Young Eun;Alshihri Saad;Soo-Yong Park
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.6
    • /
    • pp.197-208
    • /
    • 2023
  • In the coming future, anyone using the Internet will have more than one NFT. Unlike FT, NFT can specify the owner, and tracking management is easier than FT. Even in the 2022 survey, WPA2 is the most widely used wireless protocol worldwide to date. As it is a protocol that came out in 2006, it is a protocol with various vulnerabilities at this time. In order to use WPA2-EAP or WPA3 (2018), which were released to compensate for the vulnerabilities of WPA2, additional equipment upgrades are required for STA (station) and AP (access point, router), which are connected devices. The use of expensive router equipment solves the security part, but it is economically inefficient to be introduced in Small Office Home Office (SOHO). This paper uses NFT as a means of authentication and uses the existing WPA2 as it is without equipment upgrade, defend crack tools of WPA2 that have been widely used so far and compared to the existing WPA2, it was shown that it was not difficult to actually use them in SOHO.

A Life time improvement Method of SVM application LEACH protocol in Wireless Sensor Networks (SVM을 적용한 LEACH 프로토콜 기반 무선센서네트워크의 수명 개선 방법)

  • Pyo, Se Jun;Jo, Yong-Ok;Ok, Tae-Seong;Bang, Jong-Dae;Keshav, Tushar;Lee, Seong-Ho;Ryu, Hui-Eun;Lee, Yeonwoo;Bae, Jinsoo;Lee, Seong-Ro
    • Annual Conference of KIPS
    • /
    • 2011.11a
    • /
    • pp.606-608
    • /
    • 2011
  • 무선 센서 네트워크는 특정지역에 센서 노드를 설치하여 주변 정보 또는 특정 목적의 데이터를 수집하고, 그 정보를 수집하는 싱크(Sink)로 구성되어 있다. 무선 센서 네트워크의 수명은 망을 구성하는 센서 노드의 베터리 소비에 따라 수명이 결정 되고 하나의 노드가 죽기 시작하면서부터 급격하게 센서 노드의 베터리 소비가 커져 빠르게 죽는다. 무선 센서 네트워크를 구성하는 센서노드는 라우팅, 센싱을 수행하기 때문에 베터리 소비에 많은 부담을 가지고 있다. 본 논문은 무선 센서 네트워크의 대표적 클러스터링 기반 라우팅 기법인 LEACH(Low - Energy Adaptive Clustering Hierarchy)프로토콜에 SVM(Support Vector Machine)을 적용하여 센서노드의 균형적인 베터리 소비로 망을 효율적으로 관리하고 망의 수명을 개선 할 수 있는 방법을 제안 한다. 이러한 센서 노드의 균형적인 베터리 소비로 무선센서 네트워크의 수명을 개선 한다. 실험결과 기존의 LEACH 프로토콜보다 우수한 성능을 보인다.

Energy Efficient Routing Protocol in Wireless Sensor Networks with Hole (홀이 있는 WSN 환경에서 에너지 효율적인 라우팅 프로토콜 )

  • Eung-Bum Kim;Tae-Wook Kwon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.5
    • /
    • pp.747-754
    • /
    • 2023
  • Energy-efficient routing protocol is an important task in a wireless sensor network that is used for monitoring and control by wirelessly collecting information obtained from sensor nodes deployed in various environments. Various routing techniques have been studied for this, but it is also necessary to consider WSN environments with specific situations and conditions. In particular, due to topographical characteristics or specific obstacles, a hole where sensor nodes are not deployed may exist in most WSN environments, which may result in inefficient routing or routing failures. In this case, the geographical routing-based hall bypass routing method using GPS functions will form the most efficient path, but sensors with GPS functions have the disadvantage of being expensive and consuming energy. Therefore, we would like to find the boundary node of the hole in a WSN environment with holes through minimal sensor function and propose hole bypass routing through boundary line formation.

An Energy-based PEGASIS Protocol for Efficient Routing in Wireless Sensor Networks (WSN에서의 효율적 라우팅을 위한 에너지 기반 PEGASIS 프로토콜)

  • Hyun-Woo Do;Tae-Wook Kwon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.5
    • /
    • pp.809-816
    • /
    • 2024
  • In a Wireless Sensor Network (WSN) environment, where numerous small sensors are arranged in a certain space to form a wireless network, each sensor has limited battery power. Therefore, the lifetime of each sensor node is directly related to the network's lifetime, necessitating efficient routing to maximize the network's lifespan. This study proposes a routing protocol based on PEGASIS, a representative energy-efficient routing protocol in WSN environments. The proposed protocol categorizes nodes into groups based on their distance from the sink node, forms multiple chains within each group, and selects the leader node for each group by comparing the remaining energy levels. The proposed method ensures that each group's leader node is the one with the highest energy within that group, which has been shown to increase the network's lifespan compared to the traditional PEGASIS method.

An Energy-Efficient Multi-Path Multi-Hop Routing Techniques based on LEACH in WSN Environment (WSN LEACH 기반 에너지 효율적인 다중 패스 멀티 홉 라우팅 기법 연구)

  • Park Tae Bin;Tae-Wook Kwon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.5
    • /
    • pp.827-834
    • /
    • 2024
  • LEACH, a layer-based routing protocol used in wireless sensor networks, sends fused data from the cluster head to the sink node in a single hop, so as the network size increases, the distance to the sink node increases significantly, which increases energy consumption. In addition, existing multi-hop transmission studies to solve this problem have problems with reverse transmission in the process of finding the next node to be transmitted and passing through this node. In this paper, we propose a multi-hop routing technique that selects a relay node based on the distance to the sink node and transmits it to a relay node via general nodes located in a straight line between the relay node and each cluster head. By reducing the transmission distance between nodes and minimizing reverse transmission occurring in the process through adjacent nodes, it was confirmed that the network life was extended compared to the previously proposed LEACH and EEACP protocols.

Trusted Execution Environment (TEE)-Based Blockchain Offline Payment Protocol (신뢰실행환경(TEE) 기반의 블록체인 오프라인 결제 프로토콜)

  • Donghyun Jeong;Beomjoong Kim;Junghee Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.5
    • /
    • pp.1021-1035
    • /
    • 2024
  • This paper proposes the TEE-BOP (Trusted Execution Environment-Based Blockchain Offline Payment) protocol for blockchain-based offline payments. TEE-BOP securely manages offline balances within a Trusted Execution Environment (TEE) and efficiently verifies initial deposit proofs recorded on the blockchain using Merkle trees. Additionally, it ensures secure and tamper-proof transactions in offline environments by guaranteeing the reliability of keys and the system through TEE Attestation. Unlike previous studies, TEE-BOP enhances real-world applicability by eliminating dependence on central authorities and avoiding assumptions of ideal models. The protocol solves the double-spending problem through multi-layered defense mechanisms and addresses forgery prevention by allowing recipients to directly verify data consistency between the TEE and the blockchain. This enables reliable blockchain-based offline payments in areas with unstable network infrastructure. It demonstrates that this research can expand the application of blockchain technology and contribute to improving access to financial services in developing countries or disaster situations.