• Title/Summary/Keyword: 클러스터 암호화

Search Result 26, Processing Time 0.022 seconds

A Secure Energy-Efficient Routing Scheme Using Distributed Clustering in Wireless Sensor Networks (무선 센서 네트워크에서 분산 클러스터링을 이용한 안전한 에너지 효율적인 라우팅 기술)

  • Cheon, EunHong;Lee, YonSik
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.3-9
    • /
    • 2016
  • The wireless sensor networks have become an economically viable monitoring solution for a wide variety of civilian and military applications. The main challenge in wireless sensor networks is the secure transmission of information through the network, which ensures that the network is secure, energy-efficient and able to identify and prevent intrusions in a hostile or unattended environment. In that correspondence, this paper proposes a distributed clustering process that integrates the necessary measures for secure wireless sensors to ensure integrity, authenticity and confidentiality of the aggregated data. We use the notion of pre-distribution of symmetric and asymmetric keys for a secured key management scheme, and then describe the detailed scheme which each sensor node within its cluster makes use of the pre-distribution of cryptographic parameters before deployment. Finally, we present simulation results for the proposed scheme in wireless sensor network.

A Study on Light Weight Authentication Method of Distributed Cluster-based IoT Devices (분산 클러스터 기반 IoT 디바이스 경량 인증 방법에 대한 연구)

  • Kim, Sung-hwan;Kim, Young-gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.2
    • /
    • pp.103-109
    • /
    • 2019
  • Due to the development of ICT technology, the IoT environment for connecting objects in the vicinity to networks and utilizing information about objects in various fields is getting attention, and security threats are also increasing. In order to solve the increasing security problem in IoT environment, we are studying methods that use certificate, encryption, hash calculation and block chain in the private sector. However, the security authentication method which overcomes the performance gap between devices and has compatibility with various devices It has not been proposed yet. In this paper, we propose an authentication method that can achieve wide compatibility by minimizing the influence of IoT device environment.

A step-by-step service encryption model based on routing pattern in case of IP spoofing attacks on clustering environment (클러스터링 환경에 대한 IP 스푸핑 공격 발생시 라우팅 패턴에 기반한 단계별 서비스 암호화 모델)

  • Baek, Yong-Jin;Jeong, Won-Chang;Hong, Suk-Won;Park, Jae-Hung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.6
    • /
    • pp.580-586
    • /
    • 2017
  • The establishment of big data service environment requires both cloud-based network technology and clustering technology to improve the efficiency of information access. These cloud-based networks and clustering environments can provide variety of valuable information in real-time, which can be an intensive target of attackers attempting illegal access. In particular, attackers attempting IP spoofing can analyze information of mutual trust hosts constituting clustering, and attempt to attack directly to system existing in the cluster. Therefore, it is necessary to detect and respond to illegal attacks quickly, and it is demanded that the security policy is stronger than the security system that is constructed and operated in the existing single system. In this paper, we investigate routing pattern changes and use them as detection information to enable active correspondence and efficient information service in illegal attacks at this network environment. In addition, through the step-by -step encryption based on the routing information generated during the detection process, it is possible to manage the stable service information without frequent disconnection of the information service for resetting.

Desing of Secure Adaptive Clustering Algorithm Using Symmetric Key and LEAP in Sensor Network (센서네트워크 통신에서 대칭키 방식과 LEAP을 적용한 안전한 동적 클러스터링 알고리즘 설계)

  • Jang Kun-Won;Shin Dong-Gyu;Jun Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.3
    • /
    • pp.29-38
    • /
    • 2006
  • Recent advances in wireless communication technology promotes many researches related to sensor network and brings several proposals to fit into various types of sensor network communication. The research direction for sensor network is divided into the method to maximize an energy efficiency and security researches that has not been remarkable so far. To maximize an energy efficiency, the methods to support data aggregation and cluster-head selection algorithm are proposed. To strengthen the security, the methods to support encryption techniques and manage a secret key that is applicable to sensor network are proposed, In. However, the combined method to satisfy both energy efficiency and security is in the shell. This paper is devoted to design the protocol that combines an efficient clustering protocol with key management algorithm that is fit into various types of sensor network communication. This protocol may be applied to sensor network systems that deal with sensitive data.

A Study on the Genomic Patterns of SARS coronavirus using Bioinformtaics Techniques (바이오인포매틱스 기법을 활용한 SARS 코로나바이러스의 유전정보 연구)

  • Ahn, Insung;Jeong, Byeong-Jin;Son, Hyeon S.
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.522-526
    • /
    • 2007
  • Since newly emerged disease, the Severe Acute Respiratory Syndrome (SARS), spread from Asia to North America and Europe rapidly in 2003, many researchers have tried to determine where the virus came from. In the phylogenetic point of view, SARS virus has been known to be one of the genus Coronavirus, but, the overall conservation of SARS virus sequence was not highly similar to that of known coronaviruses. The natural reservoirs of SARS-CoV are not clearly determined, yet. In the present study, the genomic sequences of SARS-CoV were analyzed by bioinformatics techniques such as multiple sequence alignment and phylogenetic analysis methods as well multivariate statistical analysis. All the calculating processes, including calculations of the relative synonymous codon usage (RSCU) and other genomic parameters using 30,305 coding sequences from the two genera, Coronavirus, and Lentivirus, and one family, Orthomyxoviridae, were performed on SMP cluster in KISTI, Supercomputing Center. As a result, SARS_CoV showed very similar RSCU patterns with feline coronavirus on the both axes of the correspondence analysis, and this result showed more agreeable results with serological results for SARS_CoV than that of phylogenetic result itself. In addition, SARS_CoV, human immunodeficiency virus, and influenza A virus commonly showed the very low RSCU differences among each synonymous codon group, and this low RSCU bias might provide some advantages for them to be transmitted from other species into human beings more successfully. Large-scale genomic analysis using bioinformatics techniques may be useful in genetic epidemiology field effectively.

  • PDF

Characterization of Exolytic GH50A β-Agarase and GH117A α-NABH Involved in Agarose Saccharification of Cellvibrio sp. KY-GH-1 and Possible Application to Mass Production of NA2 and L-AHG (Cellvibrio sp. KY-GH-1의 아가로오스 당화 관련 엑소형 GH50A β-아가레이즈와 GH117A α-NABH의 특성 및 NA2와 L-AHG 양산에의 적용 가능성)

  • Jang, Won Young;Lee, Hee Kyoung;Kim, Young Ho
    • Journal of Life Science
    • /
    • v.31 no.3
    • /
    • pp.356-365
    • /
    • 2021
  • Recently, we sequenced the entire genome of a freshwater agar-degrading bacterium Cellvibrio sp. KY-GH-1 (KCTC13629BP) to explore genetic information encoding agarases that hydrolyze agarose into monomers 3,6-anhydro-L-galactose (L-AHG) and D-galactose. The KY-GH-1 strain appeared to possess nine β-agarase genes and two α-neoagarobiose hydrolase (α-NABH) genes in a 77-kb agarase gene cluster. Based on these genetic information, the KY-GH-1 strain-caused agarose degradation into L-AHG and D-galactose was predicted to be initiated by both endolytic GH16 and GH86 β-agarases to generate NAOS (NA4/NA6/NA8), and further processed by exolytic GH50 β-agarases to generate NA2, and then terminated by GH117 α-NABHs which degrade NA2 into L-AHG and D-galactose. More recently, by employing E. coli expression system with pET-30a vector we obtained three recombinant His-tagged GH50 family β-agarases (GH50A, GH50B, and GH50C) derived from Cellvibrio sp. KY-GH-1 to compare their enzymatic properties. GH50A β-agarase turned out to have the highest exolytic β-agarase activity among the three GH50 isozymes, catalyzing efficient NA2 production from the substrate (agarose, NAOS or AOS). Additionally, we determined that GH117A α-NABH, but not GH117B α-NABH, could potently degrade NA2 into L-AHG and D-galactose. Sequentially, we examined the enzymatic characteristics of GH50A β-agarase and GH117A α-NABH, and assessed their efficiency for NA2 production from agarose and for production of L-AHG and D-galactose from NA2, respectively. In this review, we describe the benefits of recombinant GH50A β-agarase and GH117A α-NABH originated from Cellvibrio sp. KY-GH-1, which may be useful for the enzymatic hydrolysis of agarose for mass production of L-AHG and D-galactose.