• Title/Summary/Keyword: Key Distribution System

Search Result 668, Processing Time 0.025 seconds

A Design of Secure Mobile Agent Systems Employing ID based Digital Multi-Signature Scheme (ID기반 디지털 다중 서명 기술을 적용한 안전한 이동 에이전트 시스템의 설계)

  • Yoo, Seong-Jin;Kim, Seong-Yeol;Lee, Ok-Bin;Chung, Il-Yong
    • The KIPS Transactions:PartC
    • /
    • v.10C no.1
    • /
    • pp.17-26
    • /
    • 2003
  • Mobile agent system comes into the spotlight since it contributes largely to mobile computing on distributed network environment. However, this system has a number of significant security Problems. In this Paper, we analyze suity attacks to mobile agent system Presented by NIST[3]. In order to protect this system from them, we suggest a security protocol for mobile agent system by employing R based key distribution and digital multi-signature scheme. To solve these problems described in NIST, securities for mobile agent and agent platform shouid be accomplished. Comparing with other protocols, our protocol performs both of these securities, while other protocols mentioned only one of them. Proposed Protocol satisfies simplicity of key management, providing security service such as confidentiality, integrity, authentication and preventing reputation, liveness guarantee, protection of excution-result data and preventing replay attack. Furthermore, it is designed to detect message modification immediately by verifying each step of agent execution at a corresponding server.

Initial Authentication Protocol of Hadoop Distribution System based on Elliptic Curve (타원곡선기반 하둡 분산 시스템의 초기 인증 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of Digital Convergence
    • /
    • v.12 no.10
    • /
    • pp.253-258
    • /
    • 2014
  • Recently, the development of cloud computing technology is developed as soon as smartphones is increases, and increased that users want to receive big data service. Hadoop framework of the big data service is provided to hadoop file system and hadoop mapreduce supported by data-intensive distributed applications. But, smpartphone service using hadoop system is a very vulnerable state to data authentication. In this paper, we propose a initial authentication protocol of hadoop system assisted by smartphone service. Proposed protocol is combine symmetric key cryptography techniques with ECC algorithm in order to support the secure multiple data processing systems. In particular, the proposed protocol to access the system by the user Hadoop when processing data, the initial authentication key and the symmetric key instead of the elliptic curve by using the public key-based security is improved.

Distribution of Digital Contents based on Public Key Considering Execution Speed and Security (실행속도와 보안성을 고려한 공개키 기반의 디지털콘텐츠 분배)

  • Ko, Il-Suk;Cho, Dong-Uk;Na, Yun-Ji;Leem, Chun-Seong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11c
    • /
    • pp.2021-2024
    • /
    • 2003
  • Information security is becoming a more important factor in distribution of digital contents. Generally, illegal facsimile of high-quality multimedia products such as DVDs, MP3s and AACs is possible without damaging quality. Thus, the illegal distribution of duplicated contents on the Web is causing digital content providers great economic loss. Therefore, a study of security and efficient distribution of digital contents is required. The most important issues in the design of a digital content distribution system are user convenience, execution speed and security. In this study, we designed a digital contents distribution system that uses web caching technology and encryption/decryption techniques in hierarchical structures. We propose a digital content distribution system that improves user convenience, security and execution speed. The superior performance of the proposed system has been proven in the tests. The results of experiment show that the developed system has improved the security of DC without decreasing process speed.

  • PDF

A Novel IPT System Based on Dual Coupled Primary Tracks for High Power Applications

  • Li, Yong;Mai, Ruikun;Lu, Liwen;He, Zhengyou
    • Journal of Power Electronics
    • /
    • v.16 no.1
    • /
    • pp.111-120
    • /
    • 2016
  • Generally, a single phase H-bridge converter feeding a single primary track is employed in conventional inductive power transfer systems. However, these systems may not be suitable for some high power applications due to the constraints of the semiconductor switches and the cost. To resolve this problem, a novel dual coupled primary tracks IPT system consisting of two high frequency resonant inverters feeding the tracks is presented in this paper. The primary tracks are wound around an E-shape ferrite core in parallel which enhances the magnetic flux around the tracks. The mutual inductance of the coupled tracks is utilized to achieve adjustable power sharing between the inverters by configuring the additional resonant capacitors. The total transfer power can be continuously regulated by altering the pulse width of the inverters' output voltage with the phase shift control approach. In addition, the system's efficiency and the control strategy are provided to analyze the characteristic of the proposed IPT system. An experimental setup with total power of 1.4kW is employed to verify the proposed system under power ratios of 1:1 and 1:2 with a transfer efficiency up to 88.7%. The results verify the performance of the proposed system.

Impact of Outdated CSI on the Performance of Incremental Amplify-and-Forward Opportunistic Relaying

  • Zhou, Tsingsong;Gao, Qiang;Fei, Li
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.6
    • /
    • pp.2567-2582
    • /
    • 2016
  • This paper investigates the impact of outdated channel state information (CSI) on the performance of the incremental amplify-and-forward (AF) opportunistic relaying (OR) over dual-hop Rayleigh fading channels. According to the definition of distribution function, we obtain the cumulative distribution function (CDF) of the actual combined signal-to-noise ratio (SNR) received at the destination. Based on this CDF, the closed-form expressions of the average spectral efficiency and outage probability are derived for the incremental AF OR under outdated CSI. Numerical results show that in the low region of the average SNR of the direct link, outdated CSI deteriorates the system performance, whereas in the high region, outdated CSI has almost no impact on the system performance.

Lessons from British Port Privatisation

  • Kim, Jin-Hwan
    • Journal of Distribution Science
    • /
    • v.13 no.2
    • /
    • pp.5-13
    • /
    • 2015
  • Purpose - In recent years, concerns over privatization have been growing in some public sectors. Privatization in Britain offers lessons for those who have intended to privatize their industry, and in particular, the port industry. Therefore, it is useful for researchers to examine British port privatization in detail, particularly the implications of UK port privatization. Research design, data, and methodology - After reviewing the historical development of the UK port industry, the important factors determining the success of the British port privatization process were identified. The interpretations could be lessons for some other country to consider port privatization in near future. Results - The key factors in relation to port privatization are first, regulation; second, ownership; and third, utilities and operations, which includes autonomy, efficiency, and competitiveness. In addition, the UK port management system is a pure private port system, which has been successful. Conclusions - In Britain, after deciding to privatize the erstwhile public ports, they were fully privatized, focusing on the aforesaid key factors. This offers important lessons for the privatization of other ports in the world.

Application of Block Design for an Efficient Conference Key Distribution System (효율적인 회의용 키분배 시스템을 위한 Block Design의 응용)

  • Lee, Tae-Hun;Jeong, Il-Yong
    • The KIPS Transactions:PartC
    • /
    • v.8C no.3
    • /
    • pp.271-276
    • /
    • 2001
  • 회의용 키분배 시스템은 회의용 키를 생성하여 키를 회의에 참석하고 있는 사람에게만 전달하여 서로간에 안전하게 통신하도록 한다. 본 논문에서는 Block Design의 한 분류인 symmetric balanced incomplete block design(SBIBD)를 적용한 효율적인 회의용 키분배시스템을 제안한다. 회의용 키를 생성하고 개인식별 정보를 근거로 하여 인증을 수행하는 통신 프로토콜이 설계된다. 제안된 프로토콜은 회의용 키를 생성하는 메시지의 복잡도를 최소화시키는데, SBIBD의 특별한 분류에서는 참석자의 수 v에 따라 메시지 복잡도는 O(v√v)가 된다. 보안시스템의 구현에서 중요한 요소인 프로토콜의 안전성은 factoring과 discrete logarithm을 계산할 정도로 난해하여 충분히 보장됨을 증명할 수 있다.

  • PDF

Automation-considered SVO Logic for Verifying Authentication and Key Distribution Protocols (인증 및 키 분배 프로토콜의 논리성 검증을 위한 ASVO 로직)

  • 권태경;임선간;박해룡
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.5
    • /
    • pp.17-37
    • /
    • 2003
  • This paper presents the ASVO (Automation-considered SVO) Logic that can be used for verifying authentication and key distribution protocols. The ASVO logic was designed for automatic verification, in a way to modify the SVO logic, one of the most famous authentication logics. The ASVO logic is syntactically and semantically sound, and requires relatively simple verification steps. Also we implemented the Isabelle/ASVO system which supports semi-automated verification, by using the Isabelle/Isar system.

Localized reliability analysis on a large-span rigid frame bridge based on monitored strains from the long-term SHM system

  • Liu, Zejia;Li, Yinghua;Tang, Liqun;Liu, Yiping;Jiang, Zhenyu;Fang, Daining
    • Smart Structures and Systems
    • /
    • v.14 no.2
    • /
    • pp.209-224
    • /
    • 2014
  • With more and more built long-term structural health monitoring (SHM) systems, it has been considered to apply monitored data to learn the reliability of bridges. In this paper, based on a long-term SHM system, especially in which the sensors were embedded from the beginning of the construction of the bridge, a method to calculate the localized reliability around an embedded sensor is recommended and implemented. In the reliability analysis, the probability distribution of loading can be the statistics of stress transferred from the monitored strain which covered the effects of both the live and dead loads directly, and it means that the mean value and deviation of loads are fully derived from the monitored data. The probability distribution of resistance may be the statistics of strength of the material of the bridge accordingly. With five years' monitored strains, the localized reliabilities around the monitoring sensors of a bridge were computed by the method. Further, the monitored stresses are classified into two time segments in one year period to count the loading probability distribution according to the local climate conditions, which helps us to learn the reliability in different time segments and their evolvement trends. The results show that reliabilities and their evolvement trends in different parts of the bridge are different though they are all reliable yet. The method recommended in this paper is feasible to learn the localized reliabilities revealed from monitored data of a long-term SHM system of bridges, which would help bridge engineers and managers to decide a bridge inspection or maintenance strategy.

A Study on Advanced RF4CE Key Agreement for Device Convergence Security (디바이스 융합 보안을 위한 향상된 RF4CE 키 교환 기법에 관한 연구)

  • Shon, Tae-Shik;Koo, Bon-Hyun;Han, Kyu-Suk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6B
    • /
    • pp.970-976
    • /
    • 2010
  • Platform convergence originated from the convergence of broadcast and telecommunication is making rapid progress including IT and not-IT fields in order to provide a variety of converged services, S/W eco-system construction, and so on. With the advent of convergence environment, IEEE 802.15.4-based RF4CE technology is rising because of creating momentum for the market using converged connectivity between home and office devices as well as all around located devices. In this paper, we present enhanced RF4CE key seed distribution approach in order to provide efficient connection and control between devices. The proposed approach consists of device mutual authentication, initial vector assignment, and two-phase key seed distribution. Moreover, we make a development real RF4CE test board and its key agreement simulator to verify the proposed approach.