• Title/Summary/Keyword: Security efficiency

Search Result 1,644, Processing Time 0.023 seconds

A Study on Secure Remote User Authentication Scheme using Smart Card (스마트카드를 이용한 안전한 원격 사용자 인증기법에 관한 연구)

  • Go, Sung Jong;Lee, Im Yeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.11
    • /
    • pp.503-510
    • /
    • 2013
  • Recently, the rapid development of network technology has enabled people to use various services on the internet. However, the existing password-based user authentication system used in the internet environment requires a password table, which is a potential security threat as it could be leaked by an insider. To solve this issue, remote user authentication methods that do not require a user password table have been proposed. Regarding remote user authentication using a smart card in particular, various methods have been suggested to reduce expenses and to improve stability and efficiency, but the possibility of impersonation attacks and password-guessing attacks using information saved in a user's smart card still exist. Therefore, this study proposes a remote user authentication method that can safeguard against impersonation attacks and password guessing attacks, by analyzing weak points of conventional methods and creating a smart card's ID and password that are based on the user's ID and password.

A Secure Protocol for Location-Aware Services in VANETs (VANET에서 안전한 위치인지 서비스를 위한 보안 프로토콜)

  • Sur, Chul;Park, Youngho;Rhee, Kyung Hyune
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.11
    • /
    • pp.495-502
    • /
    • 2013
  • In this paper, we present an anonymous authentication and location assurance protocol for secure location-aware services over vehicular ad hoc networks (VANETs). In other to achieve our goal, we propose the notion of a location-aware signing key so as to strongly bind geographic location information to cryptographic function while providing conditional privacy preservation which is a desirable property for secure vehicular communications. Furthermore, the proposed protocol provides an efficient procedure based on hash chain technique for revocation checking to effectively alleviate communication and computational costs on vehicles in VANETs. Finally, we demonstrate comprehensive analysis to confirm the fulfillment of the security objectives, and the efficiency and effectiveness of the proposed protocol.

A Study on the Exchange and Evidential Method & Evidential weight of Electronc Document (전자문서의 대체성과 증거방법 및 증거능력에 관한 고찰)

  • 홍선의
    • The Journal of Information Technology
    • /
    • v.2 no.1
    • /
    • pp.53-64
    • /
    • 1999
  • Due to the trend that the wave of the information society is rapidly expanding on a global basis, the level of informatization is emerging as one of the important elements for national competitiveness. To take a competitive position for individuals, corporations, or states beyond their survival in the rapidly changing information environment, they should be able to manage and transmit various information with swiftness and security Today, the exchange of electronic documents or data, through PC which were unknown in the past is indispensable to the expansion of electronic commerce(EC) and eventually contributes to promoting the information society. The improvement of productivity and efficiency through the exchange of electronic documents or data has been recognized as a means to enhance the competitiveness of corporations and states. The United States, the European nations, Japan, and the newly industrialized countries such as Singapore and Taiwan, have been contriving the utilization of electronic documents and the expansion of EC on the strategical dimension of each nation. To activate the use of electronic documents, thus, the purpose of this study is to examine the current environment concerning the use of electronic documents, to investigate the related legal barriers, and to propose some suggestions for reforming the legal system.

  • PDF

An Analytical Evaluation on Buckling Resistance of Tapered H-Section Deep Beam (춤이 큰 웨브 변단면 H형 보의 휨내력에 대한 해석적 평가)

  • Lee, Seong Hui;Shim, Hyun Ju;Lee, Eun Taik;Hong, Soon Jo;Choi, Sung Mo
    • Journal of Korean Society of Steel Construction
    • /
    • v.19 no.5
    • /
    • pp.493-501
    • /
    • 2007
  • Recently, in the domestic amount of materials,curtailment and economic efficiency security by purpose, tapered beam application is achieved, but the architectural design technology of today based on the material non-linear method does not consider solutions to problems such as brittle fracture. So, geometric non-linear evaluation thatincludes initial deformation, width-thickness ratio, web stiffener and unbraced length is required. Therefore, in this study, we used ANSYS, a proven finite elementanalysis program,and material and geometric non-linear analysis to study existing and completed tapered H-section as deep beam's analysis model. Main parameters include the width-thickness ratio of web, stiffener, and flange brace, with the experimental result obtained by main variable buckling and limit strength evaluation. We made certain that a large width-thickness ratio of the web decreases the buckling strength and short unbraced web significantly improves ductility.

Potential of Using Ginger Essential Oils-Based Nanotechnology to Control Tropical Plant Diseases

  • Abdullahi, Adamu;Ahmad, Khairulmazmi;Ismail, Intan Safinar;Asib, Norhayu;Haruna, Osumanu;Abubakar, Abubakar Ismaila;Siddiqui, Yasmeen;Ismail, Mohd Razi
    • The Plant Pathology Journal
    • /
    • v.36 no.6
    • /
    • pp.515-535
    • /
    • 2020
  • Essential oils (EOs) have gained a renewed interest in many disciplines such as plant disease control and medicine. This review discusses the components of ginger EOs, their mode of action, and their potential nanotechnology applications in controlling tropical plant diseases. Gas chromatography-mass spectroscopy (GC-MS), high-performance liquid chromatography, and headspace procedures are commonly used to detect and profile their chemical compositions EOs in ginger. The ginger EOs are composed of monoterpenes (transcaryophyllene, camphene, geranial, eucalyptol, and neral) and sesquiterpene hydrocarbons (α-zingiberene, ar-curcumene, β-bisabolene, and β-sesquiphellandrene). GC-MS analysis of the EOs revealed many compounds but few compounds were revealed using the headspace approach. The EOs have a wide range of activities against many phytopathogens. EOs mode of action affects both the pathogen cell's external envelope and internal structures. The problems associated with solubility and stability of EOs had prompted the use nanotechnology such as nanoemulsions. The use of nanoemulsion to increase efficiency and supply of EOs to control plant diseases control was discussed in this present paper. The findings of this review paper may accelerate the effective use of ginger EOs in controlling tropical plant diseases.

Power Support Device (PSD) Based Authentication Protocol for Secure WiBro Services (안전한 WiBro 서비스를 위한 PSD(Power Support Device) 기반 인증 프로토콜)

  • Lee, Gi-Sung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.3
    • /
    • pp.727-733
    • /
    • 2008
  • An authentication between a user's terminal and a Access Control Router (ACR) is preceded so that a user receives secure WiBro services. Otherwise they can be exposed from many attack risks. So the Telecommunications Technology Association (TTA) constituted a mechanism of the mutual authentication for WiBro service. In mechanism a user executes the mutual authentication between a Portable Equipment (PE) and the ACR by using Portable Internet Subscriber Identity Module (PISIM). But this standard needs many message to authenticate the ACR and the users cann't use wireless Internet service. Therefore in this paper we propose the key agreement protocol between the PSS and the ACR to authenticate the PSS to ACR. At this time Power Support Device (PSD) fer supporting the calculated quantity of the PSS is participated in the key agreement protocol. The ACR sends a generated key to Key Authentication Server (KAS) via secure IPsec tunnel and then it preserves the identity of the PSS and the value of key after it enciphered them. In conclusion we analyze the security and efficiency of the proposed protocol.

Algorithm of Channel Selection for DMO Communication in TETRA System (TETRA 시스템에서 DMO 통신을 위한 채널 선택 알고리즘)

  • Lee, Soon-Hwa;Kim, Chang-Bock
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.5
    • /
    • pp.497-505
    • /
    • 2013
  • In TETRA(TErrestrial Trunked RAdio) standard, TMO(Trunked Mode Operation) communicates with the UE through the base station and it has a higher priority than DMO(Direct Mode Operation) which communicates with UE directly for channel allocation. As a result, the UE needs an algorithm which restricts the frequency allocation by TMO so that DMO can have a successful communication within the network. However, the TETRA DMO standard does not consider this issue. In this paper, we propose an active DMO channel selection algorithm which allocates a channel based on some additional information such as channel usage state of TMO and channel utilization of DMO. The experimental results show that the proposed algorithm outperforms existing DMO channel allocation scheme in terms of the transmission efficiency.

One time password key exchange Authentication technique based on MANET (MANET 기반 원타임 패스워드 키교환 인증기법)

  • Lee, Cheol-Seung;Lee, Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.7
    • /
    • pp.1367-1372
    • /
    • 2007
  • This paper suggests One-time Password key exchange authentication technique for a strong authentication based on MANET and through identify wireless environment security vulnerabilities, analyzes current authentication techniques. The suggested authentication technique consists of 3 steps: Routing, Registration, and Running. The Routing step sets a safe route using AODV protocol. The Registration and Running step apply the One-time password S/key and the DH-EKE based on the password, for source node authentication. In setting the Session key for safe packet transmission and data encryption, the suggested authentication technique encrypts message as H(pwd) verifiers, performs key exchange and utilizes One time password for the password possession verification and the efficiency enhancement. EKE sets end to end session key using the DH-EKE in which it expounds the identifier to hash function with the modula exponent. A safe session key exchange is possible through encryption of the H(pwd) verifier. The suggested authentication technique requires exponentiation and is applicable in the wireless network environment because it transmits data at a time for key sharing, which proves it is a strong and reliable authentication technique based on the complete MANET.

Future Directions and Perspectives on Soil Environmental Researches (토양환경분야 연구동향 및 전망)

  • Yang, Jae-E.;Ok, Yong-Sik;Chung, Doug-Young
    • Korean Journal of Soil Science and Fertilizer
    • /
    • v.44 no.6
    • /
    • pp.1286-1294
    • /
    • 2011
  • This paper reviews the future directions and perspectives on the soil environmental researches in the 21 century. Previously, the principal emphasis of soil environmental researches had put on the enhancement of food and fiber productions. Beside the basic function of soil, however, the societal needs on soil resources in the 21st century have demands for several environmental and social challenges, occurring regionally or globally. Typical global issues with which soil science should deal include food security with increasing agronomic production to meet the exploding world population growth, adaptation and mitigation of climate change, increase of the carbon sequestration, supply of the biomass and bioenergy, securing the water resource and quality, protection of environmental pollution, enhancing the biodiversity and ecosystem health, and developing the sustainable farming/cropping system that improve the use efficiency of water and agricultural resources. These challenges can be solved through the sustainable crop production intensification (SCPI) or plant welfare concept in which soil plays a key role in solving the abovementioned global issues. Through implementation of either concept, soil science can fulfill the goal of the modern agriculture which is the sustainable production of crops while maintaining or enhancing the ecosystem function, quality and health. Therefore, directions of the future soil environmental researches should lie on valuing soil as an ecosystem services, translating research across both temporal and spatial scales, sharing and using data already available for other purposes, incorporating existing and new technologies from other disciplines, collaborating across discipline, and translating soil research into information for stakeholders and end users. Through the outcomes of these approaches, soil can enhance the productivity from the same confined land, increase profitability, conserve natural resource, reduce the negative impact on environment, enhance human nutrition and health, and enhance natural capital and the flow of ecosystem services. Soil is the central dogma, final frontier and new engine for the era of sustainability development in the $21^{st}$ century and thus soil environmental researches should be carried according to this main theme.

Manned-Unmanned Teaming Air-to-Air Combat Tactic Development Using Longshot Unmanned Aerial Vehicle (롱샷 무인기를 활용한 유무인 협업 공대공 전술 개발)

  • Yoo, Seunghoon;Park, Myunghwan;Hwang, Seongin;Seol, Hyeonju
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.44 no.3
    • /
    • pp.64-72
    • /
    • 2021
  • Manned-unmanned teaming can be a very promising air-to-air combat tactic since it can maximize the advantage of combining human insight with the robustness of the machine. The rapid advances in artificial intelligence and autonomous control technology will speed up the development of manned-unmanned teaming air-to-air combat system. In this paper, we introduce a manned-unmanned teaming air-to-air combat tactic which is composed of a manned aircraft and an UAV. In this tactic, a manned aircraft equipped with radar is functioning both as a sensor to detect the hostile aircraft and as a controller to direct the UAV to engage the hostile aircraft. The UAV equipped with missiles is functioning as an actor to engage the hostile aircraft. We also developed a combat scenario of executing this tactic where the manned-unmanned teaming is engaging a hostile aircraft. The hostile aircraft is equipped with both missiles and radar. To demonstrate the efficiency of the tactic, we run the simulation of the scenario of the tactic. Using the simulation, we found the optimal formation and maneuver for the manned-unmanned teaming where the manned-unmanned teaming can survive while the hostile aircraft is shot-downed. The result of this study can provide an insight to how manned aircraft can collaborate with UAV to carry out air-to-air combat missions.