• Title/Summary/Keyword: Key issue

Search Result 1,218, Processing Time 0.022 seconds

A Secure Key Distribution Scheme on Wireless Sensor Networks Using Dynamic Clustering Algorithms (동적 클러스터 알고리즘을 이용한 무선 센서 네트워크에서 안전한 키 분배 방법)

  • Cho, Dong-Min;Lee, Yeo-Jin;Chung, Il-Yong
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.2
    • /
    • pp.236-245
    • /
    • 2007
  • Wireless sensor networks consist of numerous nodes equipped with small-sized and limited calculation capacities and storage space as well as low-capacity batteries. Therefore, the key issue is to reduce energy consumption of sensor nodes in sensor network environment. To reduce energy consumption of sensor nodes, consideration must be given to decreasing frequency of messages transmitted by nodes. Also, considering network application, security of sensor networks is also considered important. Therefore, this study proposes a key distribution scheme in dynamic clustering model. The dynamic clustering model used for this scheme is very effective in extending life span of wireless sensor networks. The proposed scheme provides improved security compared to the existing key distribution scheme by applying grid-based key distribution scheme and allocating polynomial s hare to the nodes forming a cluster. Also, comparison was made with the previously proposed grid-based, location-based and cluster-based key distribution schemes to illustrate the advantages of the proposed scheme.

  • PDF

A Semantic Investigation of Geometric Terminology in School Mathematics (학교 수학 기하 용어의 의미론적 탐색 - 기하 용어의 역사적 변천 및 국제 비교를 중심으로 -)

  • 박경미;임재훈
    • Journal of Educational Research in Mathematics
    • /
    • v.8 no.2
    • /
    • pp.565-586
    • /
    • 1998
  • Like many other school subjects, terminology is a starting point of mathematical thinking, and plays a key role in mathematics learning. Among several areas in mathematics, geometry is the area in which students usually have the difficulty of learning, and the new terms are frequently appeared. This is why we started to investigate geometric terms first. The purpose of this study is to investigate geometric terminology in school mathematics. To do this, we traced the historical transition of geometric terminology from the first revised mathematics curriculum to the 7th revised one, and compared the geometric terminology of korean, english, Japanese, and North Korean. Based on this investigation, we could find and structuralize the following four issues. The first issue is that there are two different perspectives regarding the definitions of geometric terminology: inclusion perspective and partition perspective. For example, a trapezoid is usually defined in terms of inclusion perspective in asian countries while the definition of trapezoid in western countries are mostly based on partition perspective. This is also the case of the relation of congruent figures and similar figures. The second issue is that sometimes there are discrepancies between the definitions of geometric figures and what the name of geometric figures itself implies. For instance, a isosceles trapezoid itself means the trapezoid with congruent legs, however the definition of isosceles trapezoid is the trapezoid with two congruent angles. Thus the definition of the geometric figure and what the term of the geometric figure itself implies are not consistent. We also found this kind of discrepancy in triangle. The third issue is that geometric terms which borrow the name of things are not desirable. For example, Ma-Rum-Mo(rhombus) in Korean borrows the name from plants, and Sa-Da-Ri-Gol(trapezoid) in Korean implies the figure which resembles ladder. These terms have the chance of causing students' misconception. The fourth issue is that whether we should Koreanize geometric terminology or use Chinese expression. In fact, many geometric terms are made of Chinese characters. It's very hard for students to perceive the ideas existing in terms which are made of chines characters. In this sense, it is necessary to Koreanize geometric terms. However, Koreanized terms always work. Therefore, we should find the optimal point between Chines expression and Korean expression. In conclusion, when we name geometric figures, we should consider the ideas behind geometric figures. The names of geometric figures which can reveal the key ideas related to those geometric figures are the most desirable terms.

  • PDF

Study on VoIP Service Quality Management (VoIP 서비스 품질관리에 관한 연구)

  • Chang, Byeong-Yun;Seo, Dong-Won;Park, Byung-Joo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.245-252
    • /
    • 2011
  • VoIP transmits voices over IP-based networks and it is the abbreviation of Voice over Internet Protocol. Recently, VoIP provides various services in addition to voices. Since VoIP services' provision is extending, VoIP service quality management is becoming an important issue. Therefore, in this paper, we study VoIP service quality management. We examine VoIP technology, service types, and network architecture. Then, we investigate key quality indicators(KQIs)/key performance indicators(KPIs) in terms of customers, not network service providers. Toward this, we also study the concept of general service quality management as well as the concept of telecommunication related service quality management. Moreover, we apply $\bar{x}$ and R charts to show how to use statistical quality control techniques in real telecommunication companies with one KQI.

A Secure Key Exchange Protocol Using Smart Devices for U-healthcare Services (U-헬스케어 서비스에서 스마트 기기들을 활용한 안전한 키 교환 프로토콜)

  • Park, Sullha;Seo, Seung-Hyun;Lee, Sang-Ho
    • Journal of KIISE
    • /
    • v.44 no.3
    • /
    • pp.323-331
    • /
    • 2017
  • Due to the recent developments of various smart devices, U-healthcare services using these appliances has increased. However, the security of U-healthcare services is a very important issue since healthcare services contain highly sensitive and private personal health information. In order to handle the security issues, the functionality of encrypting medical information must be provided, and an encryption key exchange method is necessary. In this paper, we propose a key exchange protocol by utilizing smart devices for secure U-healthcare services. The proposed protocol has been designed based on the elliptic curve based public key cryptography, providing high level security for smart devices by using short keys. Moreover, in order to strengthen user authentication and security, a smart watch is used as a complementary device, whenever the key exchange protocol is performed.

Encryption Algorithm Technique for Device's key Protect in M2M environment (M2M 환경의 디바이스 키 보호를 위한 암호 알고리즘 응용 기법)

  • Choi, Do-Hyeon;Park, Jung-Oh
    • Journal of Digital Convergence
    • /
    • v.13 no.10
    • /
    • pp.343-351
    • /
    • 2015
  • With the diverse services of the current M2M environment being expanded to the organizations, the corporations, and the daily lives, the possibility of the occurrence of the vulnerabilities of the security of the related technologies have become an issue. In order to solve such a problem of the vulnerability of the security, this thesis proposes the technique for applying the cryptography algorithm for the protection of the device key of the M2M environment. The proposed technique was based on the elliptic curve cryptography Through the key exchange and the signature exchange in the beginning, the security session was created. And the white box cipher was applied to the encryption that creates the white box table using the security session key. Application results cipher algorithm, Elliptic Curve Cryptography provides a lightweight mutual authentication, a session key for protecting the communication session and a conventional white-box cipher algorithm and was guaranteed the session key used to encrypt protected in different ways. The proposed protocol has secure advantages against Data modulation and exposure, MITM(Man-in-the-middle attack), Data forgery and Manipulation attack.

Field measurement and numerical simulation of excavation damaged zone in a 2000 m-deep cavern

  • Zhang, Yuting;Ding, Xiuli;Huang, Shuling;Qin, Yang;Li, Peng;Li, Yujie
    • Geomechanics and Engineering
    • /
    • v.16 no.4
    • /
    • pp.399-413
    • /
    • 2018
  • This paper addresses the issue of field measurement of excavation damage zone (EDZ) and its numerical simulation method considering both excavation unloading and blasting load effects. Firstly, a 2000 m-deep rock cavern in China is focused. A detailed analysis is conducted on the field measurement data regarding the mechanical response of rock masses subjected to excavation and blasting operation. The extent of EDZ is revealed 3.6 m-4.0 m, accounting for 28.6% of the cavern span, so it is significantly larger than rock caverns at conventional overburden depth. The rock mass mechanical response subjected to excavation and blasting is time-independent. Afterwards, based on findings of the field measurement data, a numerical evaluation method for EDZ determination considering both excavation unloading and blasting load effects is presented. The basic idea and general procedures are illustrated. It features a calibration operation of damage constant, which is defined in an elasto-plastic damage constitutive model, and a regression process of blasting load using field blasting vibration monitoring data. The numerical simulation results are basically consistent with the field measurement results. Further, some issues regarding the blasting loads, applicability of proposed numerical method, and some other factors are discussed. In conclusion, the field measurement data collected from the 2000 m-deep rock cavern and the corresponding findings will broaden the understanding of tunnel behavior subjected to excavation and blasting at great depth. Meanwhile, the presented numerical simulation method for EDZ determination considering both excavation unloading and blasting load effects can be used to evaluate rock caverns with similar characteristics.

Improvement of Retrieval Performance Using Adaptive Weighting of Key Frame Features (키 프레임 특징들에 적응적 가중치 부여를 이용한 검색 성능 개선)

  • Kim, Kang-Wook
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.1
    • /
    • pp.26-33
    • /
    • 2014
  • Video retrieval and indexing are performed by comparing feature similarities between key frames in shot after detecting a scene change and extracting key frames from the shot. Typical image features such as color, shape, and texture are used in content-based video and image retrieval. Many approaches for integrating these features have been studied. However, the issue of these approaches is how to appropriately assign weighting of key frame features at query time. Therefore, we propose a new video retrieval method using adaptively weighted image features. We performed computer simulations in test databases which consist of various kinds of key frames. The experimental results show that the proposed method has better performance than previous works in respect to several performance evaluations such as precision vs. recall, retrieval efficiency, and ranking measure.

Investigation on energy dissipation and its mechanism of coal under dynamic loads

  • Feng, Junjun;Wang, Enyuan;Shen, Rongxi;Chen, Liang;Li, Xuelong;Xu, Zhaoyong
    • Geomechanics and Engineering
    • /
    • v.11 no.5
    • /
    • pp.657-670
    • /
    • 2016
  • The energy dissipation of coal under dynamic loads is a major issue in geomechanics and arising extensive concerns recently. In this study, dynamic loading tests of coal were conducted using a split Hopkinson pressure bar (SHPB) system, the characteristics of dynamic behavior and energy dissipation of coal were analyzed, and the mechanism of energy dissipation was discussed based on the fracture processes of coal under dynamic loads. Experimental results indicate that the energy dissipation of coal under dynamic loads has a positive linear correlation with both incident energy and dynamic compressive strength, and the correlation coefficients between incident energy, dynamic compressive strength and the energy dissipation rate are 0.74 and 0.98, respectively. Theoretical analysis demonstrates that higher level of stress leads to greater energy released during unstable crack propagation, thus resulting in larger energy dissipation rate of coal under dynamic loads. At last, a semi-empirical energy dissipation model is proposed for describing the positive relationship between dissipated energy and stress.

A Forward-Secure Certificate-Based Signature Scheme with Enhanced Security in the Standard Model

  • Lu, Yang;Li, Jiguo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1502-1522
    • /
    • 2019
  • Leakage of secret keys may be the most devastating problem in public key cryptosystems because it means that all security guarantees are missing. The forward security mechanism allows users to update secret keys frequently without updating public keys. Meanwhile, it ensures that an attacker is unable to derive a user's secret keys for any past time, even if it compromises the user's current secret key. Therefore, it offers an effective cryptographic approach to address the private key leakage problem. As an extension of the forward security mechanism in certificate-based public key cryptography, forward-secure certificate-based signature (FS-CBS) has many appealing merits, such as no key escrow, no secure channel and implicit authentication. Until now, there is only one FS-CBS scheme that does not employ the random oracles. Unfortunately, our cryptanalysis indicates that the scheme is subject to the security vulnerability due to the existential forgery attack from the malicious CA. Our attack demonstrates that a CA can destroy its existential unforgeability by implanting trapdoors in system parameters without knowing the target user's secret key. Therefore, it is fair to say that to design a FS-CBS scheme secure against malicious CAs without lying random oracles is still an unsolved issue. To address this problem, we put forward an enhanced FS-CBS scheme without random oracles. Our FS-CBS scheme not only fixes the security weakness in the original scheme, but also significantly optimizes the scheme efficiency. In the standard model, we formally prove its security under the complexity assumption of the square computational Diffie-Hellman problem. In addition, the comparison with the original FS-CBS scheme shows that our scheme offers stronger security guarantee and enjoys better performance.

Public Key Encryption with Keyword Search in Multi-Receiver Setting (다중 수신자 환경에서 키워드 검색 가능한 공개키 암호시스템)

  • Rhee, Hyun-Sook;Park, Jong-Hwan;Rhee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.2
    • /
    • pp.31-38
    • /
    • 2009
  • To provide the privacy of a keyword, a public key encryption with keyword search(PEKS) firstly was propsed by Boneh et al. The PEKS scheme enables that an email sender sends an encrypted email with receiver's public key to an email server and a server can obtain the relation between the given encrypted email and an encrypted query generated by a receiver. In this email system, we easily consider the situation that a user sends the one identical encrypted email to multi-receiver like as group e-mail. Hwang and Lee proposed a searchable public key encryption considering multi-receivers. To reduce the size of transmission data and the server's computation is important issue in multi-receiver setting. In this paper, we propose an efficient searchable public key encryption for multi-receiver (mPEKS) which is more efficient and reduces the server's pairing computation.