• 제목/요약/키워드: Forward security

Search Result 311, Processing Time 0.03 seconds

KMMR: An Efficient and scalable Key Management Protocol to Secure Multi-Hop Communications in large scale Wireless Sensor Networks

  • Guermazi, Abderrahmen;Belghith, Abdelfettah;Abid, Mohamed;Gannouni, Sofien
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.901-923
    • /
    • 2017
  • Efficient key distribution and management mechanisms as well as lightweight ciphers are the main pillar for establishing secure wireless sensor networks (WSN). Several symmetric based key distribution protocols are already proposed, but most of them are not scalable, yet vulnerable to a small number of compromised nodes. In this paper, we propose an efficient and scalable key management and distribution framework, named KMMR, for large scale WSNs. The KMMR contributions are three fold. First, it performs lightweight local processes orchestrated into upward and downward tiers. Second, it limits the impact of compromised nodes to only local links. Third, KMMR performs efficient secure node addition and revocation. The security analysis shows that KMMR withstands several known attacks. We implemented KMMR using the NesC language and experimented on Telosb motes. Performance evaluation using the TOSSIM simulator shows that KMMR is scalable, provides an excellent key connectivity and allows a good resilience, yet it ensures both forward and backward secrecy. For a WSN comprising 961 sensor nodes monitoring a 60 hectares agriculture field, KMMR requires around 2.5 seconds to distribute all necessary keys, and attains a key connectivity above 96% and a resilience approaching 100%. Quantitative comparisons to earlier work show that KMMR is more efficient in terms of computational complexity, required storage space and communication overhead.

Secure Electronic Ticketing System based on Consortium Blockchain

  • Li, Xuelian;Niu, Jie;Gao, Juntao;Han, Yue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.10
    • /
    • pp.5219-5243
    • /
    • 2019
  • In electronic ticketing system, the malicious behavior of scalpers damages the customer's interest and disturbs the normal order of market. In order to solve the problem of scalpers, we took two steps. Firstly, we established the electronic ticketing system based on the consortium blockchain (CB-ETS). By establishing CB-ETS, we can make the ticketing market develop better in a controlled environment and be managed by the members in the consortium blockchain. Secondly, we put forward a kind of taxation mechanism for suppressing scalpers based on CB-ETS. Together with the regulatory mechanism, our scheme can effectively reduce the scalpers' profits and further inhibit scalpers. Through the above two steps, the scheme can effectively resist the malicious behavior of scalpers. Among them, in the process of transferring tickets, we optimized the transfer mechanism to achieve a win-win situation. Finally, we analyzed the security and efficiency of our scheme. Our scheme realizes the anonymity through the mixed currency protocol based on ring signature and guarantees the unforgeability of tickets by multi-signature in the process of modifying the invalidity of tickets. It also could resist to Dos attacks and Double-Spending attacks. The efficiency analysis shows that our scheme is significantly superior to relevant works.

A Design of RFID Mutual Authentication System based on Open Channel (공개 채널 기반의 RFID 상호인증 시스템 설계)

  • Yoon, Eun-Jun;Yoo, Kee-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.10C
    • /
    • pp.946-954
    • /
    • 2009
  • General RFID system has assumed that the communication channel between reader and back-end database is secure channel. However, the reader can be communicated with the database through insecure channel like the communication channel between the reader and the tag according to application environment. In this paper, we propose a new secure RFID mutual authentication protocol based on open network channel which assumed that all communication channels between the database, the reader and the tag are insecure communication channels. The proposed protocol uses a secure one-way hash function to provide authentication and integrity against all communication messages which exchanged on the open channels. In addition, we designed that the proposed protocol can provide forward secrecy by performing the database and the tag update their old secret key with a new secret key after finished mutual authentication.

A Study on Analysis and DMAIC Preventive Operations for Cargo Handling Accidents In Inchon Port (6시그마 기법을 적용한 인천항 항만하역 재해예방 대책에 관한 연구)

  • Nam Young Woo;Lee Chang Ho
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2005.05a
    • /
    • pp.199-212
    • /
    • 2005
  • Many countries of the world is driving forward development of large-scale hub port. They are now pushing ahead with setting up of effective marketing strategies to survive in keen competitions of the 21st century port industry. The port is of ever increasing importance for the bridge connecting sea and road transportation in handling international cargoes. The port, differently from general working places, is a closed area required for security, customs, and quarantine procedures. The loading and unloading is being done differently by ports, cargoes, and ships. To do loading and unloading, a lot of equipment and different types of labor are required, which flow is complicated and safe management is essential. As above mentioned the port is very unique and very deteriorated working place in its working environment. The purpose of this study is to propose ways to reduce and prevent from port accidents. As first step to do this, we have collected 923 accidents happened at Incheon Port during the period of 1994 to 2003. We have thoroughly analyzed characteristics, harmfulness, and risk of the loading/unloading they have done, as well as the accident frequency and relationship between the accidents. As second step to further analyze, We have employed DMAIC technology, an advanced process of 6 sigma presently in spotlight as the best program for management innovation. This analysis results in recognition of important accident characteristics, causes and effects analysis, critical causes of accident, and suggestions to decrease accidents.

  • PDF

Source Identification in 2-Dimensional Scattering Field Based on Inverse Problem (역문제를 이용한 2차원 산란장에서의 소스 추정)

  • Kim, Tae Yong;Lee, Hoon-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.6
    • /
    • pp.1262-1268
    • /
    • 2014
  • Inverse problem is very interest in the sciences and engineering, in particular for modeling and monitoring applications. By applying inverse problem, it can be widely used to exploration of mineral resources, identification of underground cables and buried pipelines, and diagnostic imaging in medical area. In this paper, we firstly consider 2-dimensional EM scattering problem and present the FDTD method to estimate unknown source. In this case, non-linear CGM technique is used to investigate unknown sources corresponding to measured data obtained from forward problem in near field. The proposed technique for solving the inverse source problem presents a reasonable agreement and can be applied to investigate an internal source signal of embedded security module.

Optical and Thermal Influence Analysis of High-power LED by MCPCB temperature (MCPCB의 온도에 따른 고출력 LED의 광학적, 열적 영향력 분석)

  • Lee, Seung-Min;Yang, Jong-Kyung;Jo, Ju-Ung;Lee, Jong-Chan;Park, Dae-Hee
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.57 no.12
    • /
    • pp.2276-2280
    • /
    • 2008
  • In this paper, we present thermal dependancy of LED package element by changing temperature of MCPCB for design high efficiency LED lamp, and confirmed influence of LED chip against temperature with analysis of thermal resistance and thermal capacitance. As increasing temperature, WPOs were decreased from 25 to 22.5 [%] and optical power were also decreased. that is decreased reason of optical power that forward voltage was declined by decrease of energy bandgap. Therefore optical power by temperature of MCPCB should consider to design lamp for street light and security light. Moreover, compensation from declined optical efficiency is demanded when LED package is composed. Also, thermal resistances from chip to metal PCB were decreased from 12.18 to 10.8[$^{\circ}C/W$] by changing temperature. Among the thermal resistances, the thermal resistance form chip to die attachment was decreased from 2.87 to 2.5[$^{\circ}C/W$] and was decreased 0.72[$^{\circ}C/W$] in Heat Slug by chaning temperature. Therefore, because of thermal resistance gap in chip and heat slug, reliability and endurance of high power LED affect by increasing non-radiative recombination in chip from heat.

A Study on Analysis and DMAIC Preventive Operations for Cargo Handling Accidents In Inchon Port (6시그마 기법을 적용한 인천항 항만하역 재해예방 대책에 관한 연구)

  • Nam Young Woo;Lee Chang Ho
    • Journal of the Korea Safety Management & Science
    • /
    • v.7 no.2
    • /
    • pp.13-27
    • /
    • 2005
  • Many countries of the world is driving forward development of large-scale hub port. They are now pushing ahead with setting up of effective marketing strategies to survive in keen competitions of the 21st century port industry. The port is of ever increasing importance for the bridge connecting sea and road transportation in handling international cargoes. The port, differently from general working places, is a closed area required for security, customs, and quarantine procedures. The loading and unloading is being done differently by ports, cargoes, and ships. To do loading and unloading, a lot of equipment and different types of labor are required, which flow is complicated and safe management is essential. As above mentioned the port is very unique and very deteriorated working place in its working environment. The purpose of this study is to propose ways to reduce and prevent from port accidents. As first step to do this, we have collected 923 accidents happened at Incheon Port during the period of 1994 to 2003. We have thoroughly analyzed characteristics, harmfulness, and risk of the loading/unloading they have done, as well as the accident frequency and relationship between the accidents. As second step to further analyze, We have employed DMAIC technology, an advanced process of 6 sigma presently in spotlight as the best program for management innovation. This analysis results in recognition of important accident characteristics, causes and effects analysis, critical causes of accident, and suggestions to decrease accidents.

The Building for Standard Specification DB of Urban Transit System Infrastructure used by Computer Design Tool (전산지원도구를 이용한 도시철도시설 표준사양 DB 구축 연구)

  • Lee, Woo-Dong;Park, Kee-Jun;Chung, Jong-Duk
    • Proceedings of the KSR Conference
    • /
    • 2006.11b
    • /
    • pp.791-795
    • /
    • 2006
  • Urban transit is one of the most effective ways for efficient operation and construction of an urban transit by composition system which is liked originally such as rolling-stock, power, signal and infrastructure. Urban rail transit system is running in domestic, imports major equipments from advanced countries and setup for maintenance. But it takes long time because it does each organizations and lines. Also, signal, power and track system apply different standard by each construction organizations it causes an increasing construction of cost accordingly it desperately needs a systematic countermeasure. Therefore standard specification of urban transit have been establishing and operatingfor efficient operation of urban transit and base technology security that is populace ride to become a base of state economy. After track, power and signal system will be announced. Standard specification become more, the importance of administrationof standards is emphasized more. Specification administrator’s the importance which use a computing support tool recently in railroad part in embossed and is predicted to be more such forward. Therefore we propose the effective method of management with track, power signal system by constructed data-base system.

  • PDF

An Internet Time Synchronization Model using Dynamic Linear Model (동적선형모델을 적용한 인터넷 시각동기 모델)

  • Yu, Dong-Hui;Hwang, So-Young;Kim, Yong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.711-716
    • /
    • 2003
  • We propose a new Interet time synchronization model using danamic linear model and introduce the characteristics of internet transmission delays. SNTP(Simple Network Time Protocol) has been widely used as a time synchronization method on the Internet. While SNTP provides a very simple usage, SNTP may not provide the stable services, since SNTP does not consider the several essential error factors. In order to overcome the instabitily of SNTP, we analyze the process of time estimation of SNTP and find the difference between forward transmission delay and backward transmission delay operates the main error on the estimation of an time offset.

Enhanced Protocol for RFID Privacy Protection Based on AES (AES를 기반으로 하는 개선된 RFID 프라이버시 보호 프로토콜)

  • Cho Jung-Hwan;Yeo Sang-Soo;Kim Sung kwon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.100-102
    • /
    • 2005
  • 유비쿼터스는 현재의 제한된 컴퓨팅 환경을 떠나서 시간과 장소에 구애받지 않는 자유로운 컴퓨팅 환경을 제공함으로서 각광받고 있다. 그 중 언제어디서나 정보를 주고받을 수 있으며 가격과 성능 면에서 단연 뛰어난 RFID(Radio Frequency Identification)의 중요성은 점점 증가되고 있는 추세이다. 그러나, 이와 같은 우수성에도 불구하고, 정보 유출의 위험성을 내포하고 있으며, 개인의 위치 추적이나, 비 접근 권한자의 위장행세 등의 사용자 프라이버시 보호에 대한 많은 문제점들을 수반한다. 현재까지 이와 관련된 연구들이 활발히 진행되고 있다. 특히 그 중, Ohkubo의 해시함수를 이용한 프로토콜은 프라이버시 보호 측면에서 위치추적 공격(location tracking), 전방위보안성(forward security)과 같은 문제들에 대한 해결책을 제시하고 있으나, 해시함수를 태그에 직접 구현하는 것은 현재까지는 불가능한 상태이다. 또한, Martin Feldhofer는 대칭키 암호 알고리즘인 AES(Advanced Encryption Standard)를 태그에 구현을 함으로서 암호학적인 강도를 높였으나, 위치추적 공격에 대한 문제정과 물리적 공격에 대한 가정을 하지 않은 단점을 가지고 있다. 본 논문에서는 기존연구에서의 문제점들을 보완하고자 현실적으로 구현 가능한 AES를 사용하고, 위치추적 공격, 비권한자 접근(unauthorized access) 공격과 물리적 공격으로부터 안전하며 전방위보안성을 제공하는 기법을 제안한다.

  • PDF