• Title/Summary/Keyword: Key Generation

Search Result 1,476, Processing Time 0.025 seconds

Torque-Angle-Based Direct Torque Control for Interior Permanent-Magnet Synchronous Motor Drivers in Electric Vehicles

  • Qiu, Xin;Huang, Wenxin;Bu, Feifei
    • Journal of Power Electronics
    • /
    • v.13 no.6
    • /
    • pp.964-974
    • /
    • 2013
  • A modified direct torque control (DTC) method based on torque angle is proposed for interior permanent-magnet synchronous motor (IPMSM) drivers used in electric vehicles (EVs). Given the close relationship between torque and torque angle, proper voltage vectors are selected by the proposed DTC method to change the torque angle rapidly and regulate the torque quickly. The amplitude and angle of the voltage vectors are determined by the torque loop and stator flux-linkage loop, respectively, with the help of the position of the stator flux linkage. Furthermore, to satisfy the torque performance request of EVs, the nonlinear dead-time of the invertor caused by parasitic capacitances is considered and compensated to improve steady torque performance. The stable operation region of the IPMSM DTC driver for voltage and current limits is investigated for reliability. The experimental results prove that the proposed DTC has good torque performance with a brief control structure.

A Design of MILENAGE Algorithm-based Mutual Authentication Protocol for The Protection of Initial Identifier in LTE (LTE 환경에서 초기 식별자를 보호하기 위한 MILENAGE 알고리즘 기반의 상호인증)

  • Yoo, Jae-hoe;Kim, Hyung-uk;Jung, Yong-hoon
    • Journal of Venture Innovation
    • /
    • v.2 no.1
    • /
    • pp.13-21
    • /
    • 2019
  • In LTE environment, which is 4th generation mobile communication systems, there is concern about private information exposure by transmitting initial identifier in plain text. This paper suggest mutual authentication protocol, which uses one-time password utilizing challenge-response and AES-based Milenage key generation algorithm, as solution for safe initial identification communication, preventing unique identification information leaking. Milenage key generation algorithm has been used in LTE Security protocol for generating Cipher key, Integrity key, Message Authentication Code. Performance analysis evaluates the suitability of LTE Security protocol and LTE network by comparing LTE Security protocol with proposed protocol about algorithm operation count and Latency.Thus, this paper figures out initial identification communication's weak points of currently used LTE security protocol and complements in accordance with traditional protocol. So, it can be applied for traditional LTE communication on account of providing additional confidentiality to initial identifier.

Performance Evaluation of Group Key Management Scheme Blocking Collusion Attack (공모공격의 차단기능을 갖는 그룹 키 관리기법의 성능평가)

  • Chung, Jong-In
    • The Journal of Korean Association of Computer Education
    • /
    • v.9 no.2
    • /
    • pp.111-124
    • /
    • 2006
  • Multicast services are provided on the Internet in fast increasing. Therefore it is important to keep security for multicast communication. If a member of the group is removed, new group key has to be generated and distributed to all remaining members of group. Minimizing number of messages and operation cost for generation of the composite keys to be used to encrypting group key are important evaluating criteria of multicast key management scheme since generation and distribution of new keys for rekeying require expensive operation. Periodic batch rekeying can reduce these important parameters rather than rekeying sequentially in fashion one after another. In this paper, Hamming distance is calculated between every members to be removed. In batch rekeying the members with Hamming distance less than threshold are selected for rekeying procedure. With running the round assignment algorithm in the case of removing several members simultaneously, our scheme has advantages of reducing messages and operation cost for generation of the composite keys and eliminating possibility of collusion attack for rekeying. We evaluate performance of round assignment algorithm through simulation and show that our scheme is excellent after performance comparison of existent schemes and our scheme.

  • PDF

Male Generation Y Consumers: Online Apparel Shopping and E-satisfaction

  • Kim, Jung-Hwan;Kim, Jung-Ho
    • International Journal of Costume and Fashion
    • /
    • v.12 no.2
    • /
    • pp.1-14
    • /
    • 2012
  • To date most of the research concerning e-service quality in the context of online apparel settings has had a female or a generalized for gender and age focus. To expand the scope of understanding of online consumers, this study focuses on the key dimensions of e-service quality which affect male Generation Y consumers' e-satisfaction which in turn may affect their e-loyalty. A convenience sample of male college students was recruited from a Korean university. The findings of this study showed that privacy, personalization, efficiency, and website design were the key dimensions that have significant positive relationships with e-satisfaction. The positive relationship between e-satisfaction and e-loyalty was also confirmed. Managerial implications and suggestions for further research are further discussed.

A Development of Design Support System for Multistep Deep Drawing Process (다단 디프 드로잉 공정의 설계지원 시스템 개발)

  • 나경환;최석우;최태훈;정완진;김종호;배형수
    • Transactions of Materials Processing
    • /
    • v.9 no.6
    • /
    • pp.638-643
    • /
    • 2000
  • This study Is concerned with the development of design support program for deep drawing process. The present support program is designed to generate the layout drawings by utilizing the following key functions: analysis of product shape, generation of key stages by pattern database, determination of layout generation method, generation of layout. furthermore, from the results by process design program input data for simulation Is automatically generated with appropriate process parameters and connected seamlessly to carry out the finite element analysis so that the design can be checked for the possible problems in real manufacturing process. The designer can generate layout drawings and test the design by simulation quickly and conveniently In these system designer can verify and optimize the design. We tested this system for various type of product shape md found that the generated layout is in good agreement with the real cases.

  • PDF

Distributed Optimal Path Generation Based on Delayed Routing in Smart Camera Networks

  • Zhang, Yaying;Lu, Wangyan;Sun, Yuanhui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.3100-3116
    • /
    • 2016
  • With the rapid development of urban traffic system and fast increasing of vehicle numbers, the traditional centralized ways to generate the source-destination shortest path in terms of travel time(the optimal path) encounter several problems, such as high server pressure, low query efficiency, roads state without in-time updating. With the widespread use of smart cameras in the urban traffic and surveillance system, this paper maps the optimal path finding problem in the dynamic road network to the shortest routing problem in the smart camera networks. The proposed distributed optimal path generation algorithm employs the delay routing and caching mechanism. Real-time route update is also presented to adapt to the dynamic road network. The test result shows that this algorithm has advantages in both query time and query packet numbers.

Key Generation and Management Scheme for Partial Encryption Based on Hash Tree Chain (부분 암호화를 위한 해쉬 트리 체인 기반 키 생성 및 관리 알고리즘)

  • Kim, Kyoung Min;Sohn, Kyu-Seek;Nam, Seung Yeob
    • Journal of the Korea Society for Simulation
    • /
    • v.25 no.3
    • /
    • pp.77-83
    • /
    • 2016
  • A new key generation scheme is proposed to support partial encryption and partial decryption of data in cloud computing environment with a minimal key-related traffic overhead. Our proposed scheme employs a concept of hash tree chain to reduce the number of keys that need to be delivered to the decryption node. The performance of the proposed scheme is evaluated through simulation.

A new KVN key science program: the iMOGABA to the AiMOGABA

  • Lee, Sang-Sung
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.44 no.1
    • /
    • pp.73.3-73.3
    • /
    • 2019
  • A Korean VLBI Network $1^{st}$ generation key science program, the Interferometric Monitoring of Gamma-ray Bright AGNs (iMOGABA) program has revealed various natures of gamma-ray flares in active galactic nuclei (AGNs). Here in this presentation, we would like to introduce a new candidate of KVN $2^{nd}$ generation key science program, so called, the AiMOGABA (Astrometric iMOGABA), aiming at studying a wondering radio core effect of relativistic jets from AGNs with high resolution VLBI astrometric monitoring of high-energy bursting AGNs with KVN as well as a Australian millimeter radio telescope MOPRA. The introduction will include the current scientific highlights of the iMOGABA, and the overview of the AiMOGABA.

  • PDF

A Study on the Performance Evaluation of Elliptic Curve Cryptography based on a Real Number Field (실수체 기반 타원곡선 암호의 성능 평가에 관한 연구)

  • Woo, Chan-Il;Goo, Eun-Hee;Lee, Seung-Dae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.3
    • /
    • pp.1439-1444
    • /
    • 2013
  • Recently, as the use of the applications like online banking and stock trading is increasing by the rapid development of the network, security of data content is becoming more and more important. Accordingly, public key or symmetric key encryption algorithm is widely used in open networks such as the internet for the protection of data. Generally, public key cryptographic systems is based on two famous number theoretic problems namely factoring or discrete logarithm problem. So, public key cryptographic systems is relatively slow compared to symmetric key cryptography systems. Among public key cryptographic systems, the advantage of ECC compared to RSA is that it offers equal security for a far smaller key. For this reason, ECC is faster than RSA. In this paper, we propose a efficient key generation method for elliptic curve cryptography system based on the real number field.

Low area field-programmable gate array implementation of PRESENT image encryption with key rotation and substitution

  • Parikibandla, Srikanth;Alluri, Sreenivas
    • ETRI Journal
    • /
    • v.43 no.6
    • /
    • pp.1113-1129
    • /
    • 2021
  • Lightweight ciphers are increasingly employed in cryptography because of the high demand for secure data transmission in wireless sensor network, embedded devices, and Internet of Things. The PRESENT algorithm as an ultralightweight block cipher provides better solution for secure hardware cryptography with low power consumption and minimum resource. This study generates the key using key rotation and substitution method, which contains key rotation, key switching, and binary-coded decimal-based key generation used in image encryption. The key rotation and substitution-based PRESENT architecture is proposed to increase security level for data stream and randomness in cipher through providing high resistance to attacks. Lookup table is used to design the key scheduling module, thus reducing the area of architecture. Field-programmable gate array (FPGA) performances are evaluated for the proposed and conventional methods. In Virtex 6 device, the proposed key rotation and substitution PRESENT architecture occupied 72 lookup tables, 65 flip flops, and 35 slices which are comparably less to the existing architecture.