• Title/Summary/Keyword: ID-Based System

Search Result 488, Processing Time 0.028 seconds

IEEE 802.15.4 MAC-based Location-ID Exchange Protocol for Realizing Micro-Cell Connectionless Location- Awareness Services

  • Kim, Baek-Gyu;Kang, Soon-Ju
    • Journal of Computing Science and Engineering
    • /
    • v.2 no.4
    • /
    • pp.412-427
    • /
    • 2008
  • We propose ID-exchange protocol for Connectionless Location-Awareness Service (CLAS) to locate mobile nodes in indoor sensor network. When adapting location-awareness service to sensor network, the target system must be designed in accordance with various metrics which reflect the system requirement. We especially consider sustainability of the existing service which has been provided for its original purpose, such as environmental monitoring. The detailed meaning of sustainability here is that, even if location-awareness service is newly added to the existing service, the system must be assured to retain a stable network condition, and to deal with newly caused traffic properly. The CLAS ID-exchange protocol is especially designed for fixture and mobile nodes communication to achieve these properties. The protocol operates on 802.15.4 MAC layer to make mobile node work independently of the procedure to build routing table of fixture node, so a stable routing condition can be achieved even if there are many mobile nodes. Moreover, the dedicated frequency channel is assigned only for this protocol, so that traffic caused by location-awareness service can be distributed to another channel. A real system adapting the protocol was implemented to monitor fire and authorities' positions. We verified the overhead and elapsed time for location-awareness. The result shows the proposed protocol has a high performance in detecting speed, traffic distribution, and stability of overall network.

Secret Group Key Distribution and Re-sharing Protocol Based on the Identity Security System. (ID보안 시스템에 기반한 그룹 비밀키 분배 및 갱신 프로토콜)

  • 오명옥;정일용;김성열
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.757-759
    • /
    • 2002
  • 본 논문에서는 ID 보안 기술에 기반을 둔 디지털서명, 키분배 기법을 이용하여 그룹 비밀키의 분배와 갱신을 위한 효율적인 프로토콜을 제안한다. 제안된 프로토콜의 안전성은 이산대수 문제에 근거하고 있으며 단말기의 저장능력과 처리의 능력이 적을 경우도 적절하게 운영될 수 있고, 그룹 내에서 제외하고자하는 통화자가 동시에 여러 명일 경우에도 적용한 수 있다. 또한 통화자의 변동 없이 그룹 비밀키를 변경하고자 하는 경우에도 용이하게 키를 갱신할 수 있도록 설계되었다.

  • PDF

Blockchain-based new identification system (블록체인 기반 새로운 신원확인 체계)

  • Jung, Yong-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.2
    • /
    • pp.452-458
    • /
    • 2021
  • The value and importance of personal information are increasing due to the increasing number of fields where the Internet environment and computing environment are used, and user authentication technology is also changing. Until now, accredited certificates, which are mainly used in the financial sector, are being replaced with biometric authentication technology due to the problem of revocation. However, another problem is that biometric information cannot be modified once it is leaked. Recently, with the advent of blockchain technology, research on user authentication methods has actively progressed. In this paper, both public certificate and blockchain-based user authentication can be used without system change, and a new DID issuance and reissuance method that can replace the resident registration number is presented. The proposed system can be used without restrictions in a blockchain. However, the currently used DID requires installation of an application at the Interworking Support Center for verification. Since a DID can be authenticated without registering as a member, indiscriminate information collection can be prevented. Security, convenience, and determinism are compared with the existing system, and excellence is proven based on various attack methods, its portability, and proxy use.

Development of Nucleic Acid Lateral Flow Immunoassay for Rapid and Accurate Detection of Chikungunya Virus in Indonesia

  • Ajie, Mandala;Pascapurnama, Dyshelly Nurkartika;Prodjosoewojo, Susantina;Kusumawardani, Shinta;Djauhari, Hofiya;Handali, Sukwan;Alisjahbana, Bachti;Chaidir, Lidya
    • Journal of Microbiology and Biotechnology
    • /
    • v.31 no.12
    • /
    • pp.1716-1721
    • /
    • 2021
  • Chikungunya fever is an arboviral disease caused by the Chikungunya virus (CHIKV). The disease has similar clinical manifestations with other acute febrile illnesses which complicates differential diagnosis in low-resource settings. We aimed to develop a rapid test for CHIKV detection based on the nucleic acid lateral flow immunoassay technology. The system consists of a primer set that recognizes the E1 region of the CHIKV genome and test strips in an enclosed cassette which are used to detect amplicons labeled with FITC/biotin. Amplification of the viral genome was done using open-source PCR, a low-cost open-source thermal cycler. Assay performance was evaluated using a panel of RNA isolated from patients' blood with confirmed CHIKV (n = 8) and dengue virus (n = 20) infection. The open-source PCR-NALFIA platform had a limit of detection of 10 RNA copies/ml. The assay had a sensitivity and specificity of 100% (95% CI: 67.56% - 100%) and 100% (95% CI: 83.89% - 100%), respectively, compared to reference standards of any positive virus culture on C6/36 cell lines and/or qRT-PCR. Further evaluation of its performance using a larger sample size may provide important data to extend its usefulness, especially its utilization in the peripheral healthcare facilities with scarce resources and outbreak situations.

A Wireless Identification System Using an Efficient Antenna Based on Passive Surface Acoustic Wave(SAW) Devices

  • Chang, Ki-Hun;Lee, Woo-Sung;Yoon, Young-Joong;Kim, Jae-Kwon;Park, Joo-Yong;Burm, Jin-Wook
    • Journal of electromagnetic engineering and science
    • /
    • v.7 no.1
    • /
    • pp.12-16
    • /
    • 2007
  • A UHF band wireless identification system based on passive surface acoustic wave(SAW) devices is presented in this paper. SAW ID tags were fabricated on Y-Z $LiNbO_3$ piezoelectric substrate with a good electro-mechanical coupling property. To reduce degradation of the antenna performance associated with the piezoelectric materials, an efficient design of the SAW RFID antenna is introduced. By measuring the parameters of the SAW ID tag, the performance of the antenna was tested by experimentation.

Neural Network-based Decision Class Analysis with Incomplete Information

  • 김재경;이재광;박경삼
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 1999.03a
    • /
    • pp.281-287
    • /
    • 1999
  • Decision class analysis (DCA) is viewed as a classification problem where a set of input data (situation-specific knowledge) and output data(a topological leveled influence diagram (ID)) is given. Situation-specific knowledge is usually given from a decision maker (DM) with the help of domain expert(s). But it is not easy for the DM to know the situation-specific knowledge of decision problem exactly. This paper presents a methodology for sensitivity analysis of DCA under incomplete information. The purpose of sensitivity analysis in DCA is to identify the effects of incomplete situation-specific frames whose uncertainty affects the importance of each variable in the resulting model. For such a purpose, our suggested methodology consists of two procedures: generative procedure and adaptive procedure. An interactive procedure is also suggested based the sensitivity analysis to build a well-formed ID. These procedures are formally explained and illustrated with a raw material purchasing problem.

  • PDF

Blind Signature based on Mobile Commerce (무선 인터넷에서의 은익기반 서명에 의한 전자상거래)

  • Kim, Jang-Hwan;Rhee, Chung-Sei
    • Convergence Security Journal
    • /
    • v.8 no.2
    • /
    • pp.1-6
    • /
    • 2008
  • Designing efficient and secure electronic payment is important for M-Commerce. In this paper, we propose an efficient Micro-payment protocol that allows multiple transactions using ID-based public key encryption-system. The proposed payword system requires to generate authenticated key generated by Weil-pairing which uses an elliptic curve cryptosystem over finite field Fq for transactions. Therefore, it is more secure in known key attacks as well as man-in-the middle attacks.

  • PDF

An Intrusion Detection System Based on Sensor (센서 개념을 적용한 침입 탐지 시스템)

  • 장철연;김근래;조성제;김준모
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10c
    • /
    • pp.454-456
    • /
    • 2002
  • 본 논문에서는 센서(센서 파일, 센서 데이터 등)를 이용한 침입 탐지 시스템인 SbIDS(Sensor based Intrusion Detection System)를 제안한다. 리눅스 시스템에 구현된 SbIDS는 호스트 기반 침입탐지 기법과 네트워크 기반 침입탐지 기법이 통합된 시스템으로, 일차적으로 커털 수준에서 침입을 감지하고 대응하는 KMOD 모듈과 이차적으로 네트워크 수준에서 침입을 감지하고 대응하는 NetMOD 모듈로 구성되어 있어 호스트 내에서의 침입과 네트워크를 통한 침입을 동시에 탐지할 수 있다. SbIDS를 이용한 침입 탐지를 위해 먼저 주요 디렉토리에는 센서 파일을, 주요 파일에는 센서 데이터를 설치한다. 그 다음, 침입자에 의해 센서가 접근될 때마다 위기 상황으로 보고 커널 수준과 네트워크 수줄에서 로그를 작성하며, 공격자를 식별하여 추적할 수 있고 침입으로 판단될 경우 해당 프로세스를 조기에 종료시킬 수 있도록 구현하였다.

  • PDF

Load-Sharing Algorithm using Digital Parallel Communication (디지털 병렬 통신을 이용한 부하분담 알고리즘)

  • Park, Seong-Mi;Kim, Chun-Sung;Lee, Sang-Hyeok;Lee, Sang-Hun;Park, Sung-Jun;Lee, Bae-Ho
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.16 no.1
    • /
    • pp.50-57
    • /
    • 2011
  • In this paper, we proposes a new load-sharing algorithm with a ATmega2560 based digital communication. Proposed algorithm is different from conventional analog method. The high speed communication digital control is performed. To apply the digital communication and real-time control for time-sharing token bus method, we implemented high efficient load-sharing and redundancy. Also this system make down the price by auto ID algorithm and system response is improved by controller's voltage and current integral value sharing. In parallel system prototype, each module have controller and performed load-sharing according to master module integral value. In this paper, we verify the validity of proposed algorithm using PSIM program and prototype.

Secure ID-Based Key Agreement Protocol with Anonymity for Mobile Ad Hoc Networks (이동 애드혹 네트워크에서의 익명성을 제공하는 아이디 기반의 안전한 키 교환 프로토콜)

  • Park, Yo-Han;Park, Young-Ho;Moon, Sang-Jae
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.1
    • /
    • pp.92-101
    • /
    • 2012
  • Security support is a significant factor in ad hoc networks. Especially in dynamic topologies, key agreement with private key updating is essential in providing a secure system. And it is also necessary to protect the identities of individual nodes in wireless environments to avoid personal privacy problems. However, many of the existing key agreement schemes for ad hoc networks do not consider these issues concurrently. This paper proposes an anonymous ID-based private key update scheme and a key agreement scheme for mobile ad hoc networks. We also suggest a method of rekeying between different domains using service-coordinators. These schemes are secure against various attacks and are suitable for service-oriented mobile ad hoc networks.