• Title/Summary/Keyword: Key Exposure

Search Result 446, Processing Time 0.023 seconds

A Black Hole Detection Protocol Design based on a Mutual Authentication Scheme on VANET

  • Lee, ByungKwan;Jeong, EunHee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.1467-1480
    • /
    • 2016
  • This paper proposes "A Black Hole Detection Protocol Design based on a Mutual Authentication Scheme on VANET." It consists of the Mutual Authentication Scheme (MAS) that processes a Mutual Authentication by transferring messages among a Gateway Node, a Sensor Node, and a User Node and the Black Hole Detection Protocol (BHDP) which detects a Non-Authentication Node by using the Session Key computed in the MAS and a Black Hole by using the Broadcasting Table. Therefore, the MAS can reduce the operation count of hash functions more than the existing scheme and protect a privacy from an eavesdropping attack and an information exposure by hashing a nonce and user's ID and password. In addition, the MAS prevents a replay attack by using the randomly generated nonce and the time stamp. The BHDP improves Packet Delivery ratio and Throughput more than the AODV with Black hole by 4.79% and 38.28Kbps. Also, it improves Packet Delivery ratio and Throughput more than the IDSAODV by 1.53% and 10.45Kbps. Hence it makes VANET more safe and reliable.

A multiscale numerical simulation approach for chloride diffusion and rebar corrosion with compensation model

  • Tu, Xi;Li, Zhengliang;Chen, Airong;Pan, Zichao
    • Computers and Concrete
    • /
    • v.21 no.4
    • /
    • pp.471-484
    • /
    • 2018
  • Refined analysis depicting mass transportation and physicochemical reaction and reasonable computing load with acceptable DOFs are the two major challenges of numerical simulation for concrete durability. Mesoscopic numerical simulation for chloride diffusion considering binder, aggregate and interfacial transition zone is unable to be expended to the full structure due to huge number of DOFs. In this paper, a multiscale approach of combining both mesoscopic model including full-graded aggregate and equivalent macroscopic model was introduced. An equivalent conversion of chloride content at the Interfacial Transition Layer (ITL) connecting both models was considered. Feasibility and relative error were discussed by analytical deduction and numerical simulation. Case study clearly showed that larger analysis model in multiscale model expanded the diffusion space of chloride ion and decreased chloride content in front of rebar. Difference for single-scale simulation and multiscale approach was observed. Finally, this paper addressed some worth-noting conclusions about the chloride distribution and rebar corrosion regarding the configuration of rebar placement, rebar diameter, concrete cover and exposure period.

Safety Improvement Methods of Personal Identification Services using the i-Pin (아이핀 기반 본인확인서비스의 안전성 강화 방안)

  • Kim, Jongbae
    • Journal of Information Technology Services
    • /
    • v.16 no.2
    • /
    • pp.97-110
    • /
    • 2017
  • Due to development of IT, various Internet services via the non-face-to-face are increasing rapidly. In the past, the resident registration numbers (RRN) was used a mean of personal identification, but the use of RRN is prohibited by the relevant laws, and the personal identification services using alternative means are activated. According to the prohibition policy of RRN, i-PIN service appeared as an alternative means to identify a person. However, the user's knowledge-based i-PIN service continues to cause fraudulent issuance, account hijacking, and fraud attempts due to hacking accidents. Due to these problems, the usage rate of i-PIN service which performs a nationwide free personal identification service, is rapidly decreasing. Therefore, this paper proposes a technical safety enhancement method for security enhancement in the i-PIN-based personal identification service. In order to strengthen the security of i-PIN, this paper analyzes the encryption key exposure, key exchange and i-PIN authentication model problems of i-PIN and suggests countermeasures. Through the proposed paper, the i-PIN can be expected to be used more effectively as a substitution of RRN by suggesting measures to enhance the safety of personal identification information. Secured personal identification services will enable safer online non-face-to-face transactions. By securing the technical, institutional, and administrative safety of the i-PIN service, the usage rate will gradually increase.

Nanomedicine: Drug Delivery Systems and Nanoparticle Targeting (나노의학: 나노물질을 이용한 약물전달시스템과 나노입자의 표적화)

  • Youn, Hye-Won;Kang, Keon-Wook;Chung, June-Key;Lee, Dong-Soo
    • Nuclear Medicine and Molecular Imaging
    • /
    • v.42 no.5
    • /
    • pp.337-346
    • /
    • 2008
  • Applications of nanotechnology in the medical field have provided the fundamentals of tremendous improvement in precise diagnosis and customized therapy. Recent advances in nanomedicine have led to establish a new concept of theragnosis, which utilizes nanomedicines as a therapeutic and diagnostic tool at the same time. The development of high affinity nanoparticles with large surface area and functional groups multiplies diagnostic and therapeutic capacities. Considering the specific conditions related to the disease of individual patient, customized therapy requires the identification of disease target at the cellular and molecular level for reducing side effects and enhancing therapeutic efficiency. Well-designed nanoparticles can minimize unnecessary exposure of cytotoxic drugs and maximize targeted localization of administrated drugs. This review will focus on major pharmaceutical nanomaterials and nanoparticles as key components of designing and surface engineering for targeted theragnostic drug development.

Identification and functional analysis of COLD-signaling-related genes in Panax ginseng

  • Jeongeui Hong;Hojin Ryu
    • Journal of Plant Biotechnology
    • /
    • v.50
    • /
    • pp.225-231
    • /
    • 2023
  • Cold stress is one of the most vulnerable environmental stresses that affect plant growth and crop yields. With the recent advancements in genetic approaches using Arabidopsis and other model systems, genes involved in cold-stress response have been identified and the key cold signaling factors have been characterized. Exposure to low-temperature stress triggers the activation of a set of genes known as cold regulatory (COR) genes. This activation process plays a crucial role in enhancing the resistance of plants to cold and freezing stress. The inducer of the C-repeatbinding factor (CBF) expression 1-CBF module (ICE1-CBF module) is a key cold signaling pathway regulator that enhances the expression of downstream COR genes; however, this signaling module in Panax ginseng remains elusive. Here, we identified cold-signaling-related genes, PgCBF1, PgCBF3, and PgICE1 and conducted functional genomic analysis with a heterologous system. We confirmed that the overexpression of cold- PgCBF3 in the cbf1/2/3 triple Arabidopsis mutant compensated for the cold stress-induced deficiency of COR15A and salt-stress tolerance. In addition, nuclearlocalized PgICE1 has evolutionarily conserved phosphorylation sites that are modulated by brassinsteroid insensitive 2 (PgBIN2) and sucrose non-fermenting 1 (SNF1)-related protein kinase 3 (PgSnRK3), with which it physically interacted in a yeast two-hybrid assay. Overall, our data reveal that the regulators identified in our study, PgICE1 and PgCBFs, are evolutionarily conserved in the P. ginseng genome and are functionally involved in cold and abiotic stress responses.

DnaJ of Streptococcus suis Type 2 Contributes to Cell Adhesion and Thermotolerance

  • Zhang, Xiaoyan;Jiang, Xiaowu;Yang, Ling;Fang, Lihua;Shen, Hongxia;Lu, Xingmeng;Fang, Weihuan
    • Journal of Microbiology and Biotechnology
    • /
    • v.25 no.6
    • /
    • pp.771-781
    • /
    • 2015
  • To examine if the molecular chaperone DnaK operon proteins of Streptococcus suis type 2 (SS2) are involved in adhesion to host cells, the abundance values of these proteins from the surface of two SS2 strains of different adhesion capability were compared. Their roles in growth and adhesion to human laryngeal epithelial cell line HEp-2 cells were investigated on SS2 strain HA9801 and its mutants with DnaK operon genes partially knocked-out (PKO mutant) under heat stress. The major difference was that DnaJ was more abundant in strain HA9801 than in strain JX0811. Pretreatment of the bacteria with hyperimmune sera to DnaJ, but not with those to other proteins, could significantly reduce SS2 adhesion to HEp-2 cells. PKO of dnaJ g ene resulted in decreased SS2 growth at 37℃ and 42℃, and reduced its adhesion to HEp-2 cells. The wild-type strain stressed at 42℃ had increased expression of DnaJ on its surface and elevated adhesion to HEp-2 cells, which was also inhibitable by DnaJ specific antiserum. These results indicate that the DnaJ of S. suis type 2 is important not only for thermotolerance but also for adhesion to host cells. Because DnaJ expression is increased upon temperature upshift with increased exposure on the bacterial surface, the febrile conditions of the cases with systemic infections might help facilitate bacterial adhesion to host cells. DnaJ could be one of the potential candidates as a subunit vaccine because of its good immunogenicity.

Ebb-and-Flow of Macroautophagy and Chaperone-Mediated Autophagy in Raji Cells Induced by Starvation and Arsenic Trioxide

  • Li, Cai-Li;Wei, Hu-Lai;Chen, Jing;Wang, Bei;Xie, Bei;Fan, Lin-Lan;Li, Lin-Jing
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.14
    • /
    • pp.5715-5719
    • /
    • 2014
  • Autophagy is crucial in the maintenance of homeostasis and regenerated energy of mammalian cells. Macroautophagy and chaperone-mediated autophagy(CMA) are the two best-identified pathways. Recent research has found that in normal cells, decline of macroautophagy is appropriately parallel with activation of CMA. However, whether it is also true in cancer cells has been poorly studied. Here we focused on cross-talk and conversion between macroautophagy and CMA in cultured Burkitt lymphoma Raji cells when facing serum deprivation and exposure to a toxic compound, arsenic trioxide. The results showed that both macroautophagy and CMA were activated sequentially instead of simultaneously in starvation-induced Raji cells, and macroautophagy was quickly activated and peaked during the first hours of nutrition deprivation, and then gradually decreased to near baseline. With nutrient deprivation persisted, CMA progressively increased along with the decline of macroautophagy. On the other hand, in arsenic trioxide-treated Raji cells, macroautophagy activity was also significantly increased, but CMA activity was not rapidly enhanced until macroautophagy was inhibited by 3-methyladenine, an inhibitor. Together, we conclude that cancer cells exhibit differential responses to diverse stressor-induced damage by autophagy. The sequential switch of the first-aider macroautophagy to the homeostasis-stabilizer CMA, whether active or passive, might be conducive to the adaption of cancer cells to miscellaneous intracellular or extracellular stressors. These findings must be helpful to understand the characteristics, compensatory mechanisms and answer modes of different autophagic pathways in cancer cells, which might be very important and promising to the development of potential targeting interventions for cancer therapies via regulation of autophagic pathways.

Correlation analysis of muscle amino acid deposition and gut microbiota profile of broilers reared at different ambient temperatures

  • Yang, Yuting;Gao, Huan;Li, Xing;Cao, Zhenhui;Li, Meiquan;Liu, Jianping;Qiao, Yingying;Ma, Li;Zhao, Zhiyong;Pan, Hongbin
    • Animal Bioscience
    • /
    • v.34 no.1
    • /
    • pp.93-101
    • /
    • 2021
  • Objective: Temperature could influence protein and amino acid deposition as well as gut microbiota profile and composition. However, the specific effects of ambient temperature on amino acids deposition and gut microbiota composition remain insufficiently understood. Methods: A total of 300 one-day-old Avian broilers were randomly divided into three groups and reared at high, medium, and low temperature (HT, MT, and LT), respectively. Breast muscle and fecal samples were collected for amino acid composition analysis and 16S rRNA gene sequence analysis. Results: Our data showed that compared to the MT group, there was a decrease of muscle leucine and tyrosine (p<0.05), as well as an increase of methionine in the HT group (p<0.05) and a decrease of serine in the LT group. Examination of microbiota shift revealed that at genus level, the relative abundance of Turicibacter and Parabacteroides was increased in the HT group (p<0.05) and that the relative abundances of Pandoraea, Achromobacter, Prevotella, Brevundimonas, and Stenotrophomonas in the LT group were higher than those in the MT group (p<0.05). In addition, there were substantial correlations between microbes and amino acids. In the HT group. Turicibacter was negatively correlated with aspartic acid and tyrosine, whereas Parabacteroides was positively correlated with methionine (p<0.05). In the LT group, there were multiple positive correlations between Achromobacter and arginine, isoleucine or tyrosine; between Prevotella and cysteine or phenylalanine; between Brevundimonas and cysteine; and between Stenotrophomonas and cysteine as well as a negative correlation between Stenotrophomonas and serine. Conclusion: Our findings demonstrated that amino acid content of breast muscle and intestinal microbiota profile was affected by different ambient temperatures. Under heat exposure, augmented abundance of Parabacteroides was correlated with elevated methionine. Low temperature treatment may affect muscle tyrosine content through the regulation of Achromobacter.

A Design of Safe AKA Module for Adapted Mobile Payment System on Openness SMART Phone Environment (개방형 스마트 폰 환경에 적합한 모바일 결제 시스템을 위한 안전한 AKA(Authentication Key Agreement) 모듈 설계)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.11
    • /
    • pp.1687-1697
    • /
    • 2010
  • The USIM-based AKA authentication process is essential to a mobile payment system on smart phone environment. In this paper a payment protocol and an AKA module are designed for mobile payment system which is suitable for openness smart phone environment. The payment protocol designs the cross authentication among components of the mobile payment system to improve the reliability of the components. The AKA module of mobile payment system based on 3GPP-AKA protocol prevents the exposure of IMSI by creating the SSK(Shared Secure Key) through advance registration and solves the SQN(SeQuence Number) synchronization problem by using timestamp. Also, by using the SSK instead of authentication vector between SN and authentication center, the existing bandwidth $(688{\times}N){\times}R$ bit between them is reduced to $320{\times}R$ bit or $368{\times}R$ bit. It creates CK and IK which are message encryption key by using OT-SSK(One-Time SSK) between MS and SN. In addition, creating the new OT-SSK whenever MS is connected to SN, it prevents the data replay attack.

Group Key Generation and Exchange Scheme using a Trapdoor Collision Hash in M2M Communications Environment (M2M 통신 환경에서 트랩도어 충돌 해쉬를 이용한 그룹키 생성 및 교환 기법)

  • Kim, Sung-Soo;Jun, Moon-Seog;Choi, Do-Hyeon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.5
    • /
    • pp.9-17
    • /
    • 2015
  • The development of wireless communication technology and change in the ICT market has led to the development of the M2M service and technology. Under these circumstances, the M2M environment has been the focus of communication environment construction between machines without control or direct intervention of human being. With characteristics of wireless communication environment, the possibility of being exposed to numerous security threats and safe communication security technology have becoming an issue an important requirements for problems such as data exposure, forgery, modulation, deletion, and privacy. This research analyzes requirements of trapdoor collision hash, generates keys between groups under the M2M environment by using the specificity of trapdoor, and suggests technology to exchange keys with session keys. Further, it also suggests techniques to confirm authentication of device and gateway in accordance with group key generation. The techniques herein suggested are confirmed as safe methods in that they have attack resistance such as Masquerade Attack, Man-in-the-Middle Attack, and Replay Attack in the group communication block by using the speciality of collision message and collision hash.