• Title/Summary/Keyword: Key distribution protocol

Search Result 174, Processing Time 0.017 seconds

Design of short-term forecasting model of distributed generation power for wind power (풍력 발전을 위한 분산형 전원전력의 단기예측 모델 설계)

  • Song, Jae-Ju;Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of Digital Convergence
    • /
    • v.12 no.3
    • /
    • pp.211-218
    • /
    • 2014
  • Recently, wind energy is expanding to combination of computing to forecast of wind power generation as well as intelligent of wind powerturbine. Wind power is rise and fall depending on weather conditions and difficult to predict the output for efficient power production. Wind power is need to reliably linked technology in order to efficient power generation. In this paper, distributed power generation forecasts to enhance the predicted and actual power generation in order to minimize the difference between the power of distributed power short-term prediction model is designed. The proposed model for prediction of short-term combining the physical models and statistical models were produced in a physical model of the predicted value predicted by the lattice points within the branch prediction to extract the value of a physical model by applying the estimated value of a statistical model for estimating power generation final gas phase produces a predicted value. Also, the proposed model in real-time National Weather Service forecast for medium-term and real-time observations used as input data to perform the short-term prediction models.

DoS attack prevention using methods for reduction of memory usage in 802.11i 4-Way Handshake (메모리 사용 감소를 통한 802.11i 4-Way Handshake에서의 DoS 공격 차단 기법)

  • Kim, Jung-Yoon;Kim, In-Hwan;Choi, Hyoung-Kee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.5
    • /
    • pp.89-98
    • /
    • 2010
  • Wireless LAN (WLAN) is type of wireless service that has higher data transmission than current cellular networks. The usage is continually increasing. There are a lot of vulnerabilities in wireless network, due to the properties of the wireless environment, regardless of its popularity. IEEE announced the 802.11i security standard to solve these problems. The vulnerable point of messages used in the process of key distribution for 802.11i makes the target node attacked lose memory through continuous messages and blocks the legitimate WLAN service. In this paper, we proposed new schemes to solve this problem and compared our proposals with the current process. The proposed protocol eliminates the memory exhaustion problem on the client side by using methods for reduction of memory usage.

Entity Authentication Scheme for Secure WEB of Things Applications (안전한 WEB of Things 응용을 위한 개체 인증 기술)

  • Park, Jiye;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.5
    • /
    • pp.394-400
    • /
    • 2013
  • WoT (Web of Things) was proposed to realize intelligent thing to thing communications using WEB standard technology. It is difficult to adapt security protocols suited for existing Internet communications into WoT directly because WoT includes LLN(Low-power, Lossy Network) and resource constrained sensor devices. Recently, IETF standard group propose to use DTLS protocol for supporting security services in WoT environments. However, DTLS protocol is not an efficient solution for supporting end to end security in WoT since it introduces complex handshaking procedures and high communication overheads. We, therefore, divide WoT environment into two areas- one is DTLS enabled area and the other is an area using lightweight security scheme in order to improve them. Then we propose a mutual authentication scheme and a session key distribution scheme for the second area. The proposed system utilizes a smart device as a mobile gateway and WoT proxy. In the proposed authentication scheme, we modify the ISO 9798 standard to reduce both communication overhead and computing time of cryptographic primitives. In addition, our scheme is able to defend against replay attacks, spoofing attacks, select plaintext/ciphertext attacks, and DoS attacks, etc.

A Preliminary Quantification of $^{99m}Tc$-HMPAO Brain SPECT Images for Assessment of Volumetric Regional Cerebral Blood Flow ($^{99m}Tc$-HMPAO 뇌혈류 SPECT 영상의 부위별 체적 혈류 평가에 관한 기초 연구)

  • Kwark, Cheol-Eun;Park, Seok-Gun;Yang, Hyung-In;Choi, Chang-Woon;Lee, Kyung-Han;Lee, Dong-Soo;Chung, June-Key;Lee, Myung-Chul;Koh, Chang-Soon
    • The Korean Journal of Nuclear Medicine
    • /
    • v.27 no.2
    • /
    • pp.170-174
    • /
    • 1993
  • The quantitative methods for the assessment of the cerebral blood flow using $^{99m}Tc$-HMPAO brain SPECT utilize the measured count distribution in some specific reconstructed tomographic slice or in algebraic summation of a few neighboring slices, rather than the true volumetric distribution, to estimate the relative regional cerebral blood flow, and consequently produce the biased estimates of the true regional cerebral blood flow. This kind of biases are thought to originate mainly from the arbitrarily irregular shape of the cerebral region of interest(ROI) which are analyzed. In this study, a semi-automated method for the direct quantification of the volumetric regional cerebral blood flow estimate is proposed, and the results are compared to those calculated by the previous planar approaches. Bias factors due to the partial volume effect and the uncertainty in ROI determination are not considered presently for the methodological comparison of planar/volumetric assessment protocol.

  • PDF