• Title/Summary/Keyword: Session Analysis

Search Result 646, Processing Time 0.02 seconds

Mutual Authentication and Secure Session Termination Scheme in iATA Protocol

  • Ong, Ivy;Lee, Shirly;Lee, Hoon-Jae;Lim, Hyo-Taek
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.4
    • /
    • pp.437-442
    • /
    • 2010
  • Ubiquitous mobile computing is becoming easier and more attractive in this ambient technological Internet world. However, some portable devices such as Personal Digital Assistant (PDAs) and smart phones are still encountering inherent constraints of limited storages and computing resources. To alleviate this problem, we develop a cost-effective protocol, iATA to transfer ATA commands and data over TCP/IP network between mobile appliances and stationary servers. It provides mobile users a virtual storage platform which is physically resided at remote home or office. As communications are made through insecure Internet connections, security risks of adopting this service become a concern. There are many reported cases in the history where attackers masquerade as legitimate users, illegally access to network-based applications or systems by breaking through the poor authentication gates. In this paper, we propose a mutual authentication and secure session termination scheme as the first and last defense steps to combat identity thief and fraud threat in particular for iATA services. Random validation factors, large prime numbers, current timestamps, one-way hash functions and one-time session key are deployed accordingly in the scheme. Moreover, we employ the concept of hard factorization problem (HFP) in the termination phase to against fraud termination requests. Theoretical security analysis discussed in later section indicates the scheme supports mutual authentication and is robust against several attacks such as verifiers' impersonation, replay attack, denial-of-services (DoS) attack and so on.

PMIPv6 Global Handover Mechanism using Multicast Source Based Forwarding (멀티캐스트 소스기반 포워딩을 이용한 PMIPv6 글로벌 핸드오버 메커니즘)

  • Choi, Hoan-Suk;Lee, Jang-Hyun;Rhee, Woo-Seop
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.7B
    • /
    • pp.745-759
    • /
    • 2011
  • In this paper, we propose the global handover mechanism that is able to provide the unlimited range of next-generation multimedia mobile services in an integrated environment. This mechanism consists of a multicast source based forwarding scheme and a global session management scheme. Global session management scheme provides LMA session information management, global mobility and route optimization. Multicast source based forwarding scheme delivers data between previously attached LMA and newly attached LMA without packet loss. In addition, this scheme removes the redundancy of buffered data. We present a performance evaluation and features analysis by the simulations using the ns-2. Global session management scheme has a less handover latency, propagation delay and signaling cost than the conventional methods. Multicast source based forwarding scheme can deliver buffer data without loss and it has less buffer size than conventional method.

A Study on Encryption Method using Hash Chain and Session Key Exchange in DRM System (DRM 시스템에서 해쉬체인과 세션키 교환을 이용한 암호화 기법에 관한 연구)

  • Park, Chan-Kil;Kim, Jung-Jae;Lee, Kyung-Seok;Jun, Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.13C no.7 s.110
    • /
    • pp.843-850
    • /
    • 2006
  • This is devoted to first, to propose a hash chain algorithm that generates more secure key than conventional encryption method. Secondly, we proposes encryption method that is more secure than conventional system using a encryption method that encrypts each block with each key generated by a hash chain algorithm. Thirdly, After identifying the user via wired and wireless network using a user authentication method. We propose a divided session key method so that Although a client key is disclosed, Attackers cannot catch a complete key and method to safely transfer the key using a divided key method. We make an experiment using various size of digital contents files for performance analysis after performing the design and implementation of system. Proposed system can distribute key securely than conventional system and encrypt data to prevent attacker from decrypting complete data although key may be disclosed. The encryption and decryption time that client system takes to replay video data fie is analogous to the conventional method.

Test-Retest Reliability of Level-Specific CE-Chirp Auditory Brainstem Response in Normal-Hearing Adults

  • Jamal, Fatin Nabilah;Dzulkarnain, Ahmad Aidil Arafat;Shahrudin, Fatin Amira;Marzuki, Muhammad Nasrullah
    • Journal of Audiology & Otology
    • /
    • v.25 no.1
    • /
    • pp.14-21
    • /
    • 2021
  • Background and Objectives: There is growing interest in the use of the Level-specific (LS) CE-Chirp® stimulus in auditory brainstem response (ABR) due to its ability to produce prominent ABR waves with robust amplitudes. There are no known studies that investigate the test-retest reliability of the ABR to the LS CE-Chirp® stimulus. The present study aims to investigate the test-retest reliability of the ABR to the LS CE-Chirp® stimulus and compare its reliability with the ABR to standard click stimulus at multiple intensity levels in normal-hearing adults. Subjects and Methods: Eleven normal-hearing adults participated. The ABR test was repeated twice in the same clinical session and conducted again in another session. The ABR was acquired using both the click and LS CE-Chirp® stimuli at 4 presentation levels (80, 60, 40, and 20 dBnHL). Only the right ear was tested using the ipsilateral electrode montage. The reliability of the ABR findings (amplitudes and latencies) to the click and LS CE-Chirp® stimuli within the same clinical session and between the two clinical sessions was calculated using an intra-class correlation coefficient analysis (ICC). Results: The results showed a significant correlation of the ABR findings (amplitude and latencies) to both stimuli within the same session and between the clinical sessions. The ICC values ranged from moderate to excellent. Conclusions: The ABR results from both the LS CE-Chirp® and click stimuli were consistent and reliable over the two clinical sessions suggesting that both stimuli can be used for neurological diagnoses with the same reliability.

Test-Retest Reliability of Level-Specific CE-Chirp Auditory Brainstem Response in Normal-Hearing Adults

  • Jamal, Fatin Nabilah;Dzulkarnain, Ahmad Aidil Arafat;Shahrudin, Fatin Amira;Marzuki, Muhammad Nasrullah
    • Korean Journal of Audiology
    • /
    • v.25 no.1
    • /
    • pp.14-21
    • /
    • 2021
  • Background and Objectives: There is growing interest in the use of the Level-specific (LS) CE-Chirp® stimulus in auditory brainstem response (ABR) due to its ability to produce prominent ABR waves with robust amplitudes. There are no known studies that investigate the test-retest reliability of the ABR to the LS CE-Chirp® stimulus. The present study aims to investigate the test-retest reliability of the ABR to the LS CE-Chirp® stimulus and compare its reliability with the ABR to standard click stimulus at multiple intensity levels in normal-hearing adults. Subjects and Methods: Eleven normal-hearing adults participated. The ABR test was repeated twice in the same clinical session and conducted again in another session. The ABR was acquired using both the click and LS CE-Chirp® stimuli at 4 presentation levels (80, 60, 40, and 20 dBnHL). Only the right ear was tested using the ipsilateral electrode montage. The reliability of the ABR findings (amplitudes and latencies) to the click and LS CE-Chirp® stimuli within the same clinical session and between the two clinical sessions was calculated using an intra-class correlation coefficient analysis (ICC). Results: The results showed a significant correlation of the ABR findings (amplitude and latencies) to both stimuli within the same session and between the clinical sessions. The ICC values ranged from moderate to excellent. Conclusions: The ABR results from both the LS CE-Chirp® and click stimuli were consistent and reliable over the two clinical sessions suggesting that both stimuli can be used for neurological diagnoses with the same reliability.

An Efficient and Secure Authentication Scheme with Session Key Negotiation for Timely Application of WSNs

  • Jiping Li;Yuanyuan Zhang;Lixiang Shen;Jing Cao;Wenwu Xie;Yi Zheng;Shouyin Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.3
    • /
    • pp.801-825
    • /
    • 2024
  • For Internet of Things, it is more preferred to have immediate access to environment information from sensor nodes (SNs) rather than from gateway nodes (GWNs). To fulfill the goal, mutual authentication scheme between user and SNs with session key (SK) negotiation is more suitable. However, this is a challenging task due to the constrained power, computation, communication and storage resources of SNs. Though lots of authentication schemes with SK negotiation have been designed to deal with it, they are still insufficiently secure and/or efficient, and some even have serious vulnerabilities. Therefore, we design an efficient secure authentication scheme with session key negotiation (eSAS2KN) for wireless sensor networks (WSNs) utilizing fuzzy extractor technique, hash function and bitwise exclusive-or lightweight operations. In the eSAS2KN, user and SNs are mutually authenticated with anonymity, and an SK is negotiated for their direct and instant communications subsequently. To prove the security of eSAS2KN, we give detailed informal security analysis, carry out logical verification by applying BAN logic, present formal security proof by employing Real-Or-Random (ROR) model, and implement formal security verification by using AVISPA tool. Finally, computation and communication costs comparison show the eSAS2kN is more efficient and secure for practical application.

Meta-analysis about the Effectiveness of Intervention Programs for Married Immigrant Women (결혼이주여성에게 적용한 중재 프로그램의 효과성에 대한 메타분석)

  • Lee, Mi Ok;Kim, Sinhyang
    • Women's Health Nursing
    • /
    • v.21 no.4
    • /
    • pp.342-354
    • /
    • 2015
  • Purpose: The purpose of this study was to test the effect size of intervention programs for married immigrant women as well as to suggest the basic data for health care practices for married migrant women. Methods: Meta-analysis was conducted with 27 articles from domestic Korea master's and doctorate degree dissertations and Korea academic journals from 2007 to 2014. Results: Overall average effect size was 1.17 and 'parental education' of Intervention Variables was the biggest effect size. Intervention Variables were also identified to be the most desirable in cases when total sessions were applied with 10-18 sessions, 1 session per week, 90-120 minutes per session activity time and with less than 10 subjects in group size. Regarding effect variables, psychological variable group was identified to show the biggest effect size and in sub-variables, self-efficacy was identified to show the biggest effect size. Conclusion: If intervention programs for married immigrant women is expanded and conducted based on the results of this study, the program would have significant affect psychological, social and physical health of the married migrant women who currently occupy the important status in our society.

Network Session Analysis For BotNet Detection (봇넷 탐지를 위한 네트워크 세션 분석)

  • Park, Jong-Min
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.12
    • /
    • pp.2689-2694
    • /
    • 2012
  • In recent years, cyber crimes were intended to get financial benefits through malicious attempts such as DDoS attacks, stealing financial information and spam. Botnets, a network composed of large pool of infected hosts, lead such malicious attacks. The botnets have adopted several evasion techniques and variations. Therefore, it is difficult to detect and eliminate them. Current botnet solutions use a signature based detection mechanism. Furthermore, the solutions cannot cover broad areas enough to detect world-wide botnets. In this paper, we propose IRC (Internet Relay Chat) that is used to control the botnet communication in a session channel of IRC servers connected through the analysis of the relationship of the channel and the connection with the server bot-infected hosts and how to detect.

Meta-analysis of the Effects of Group Art Therapy on Elementary School Students (초등학생을 대상으로 한 집단미술치료프로그램 효과에 대한 메타분석)

  • Lee, Kyeong Mi;Lee, Ju Lie
    • Korean Journal of Childcare and Education
    • /
    • v.15 no.2
    • /
    • pp.77-102
    • /
    • 2019
  • Objective: The purpose of this study was to investigate the effectiveness of group art therapy for elementary school students through meta-analysis of domestic journals from 2010 to 2017. Methods: The subjects of this study were 259 effect sizes calculated from the 41 research materials selected in "Korean Journal of Art Therapy" (Korea Art Therapy Association) and "The Korean Journal of Art Therapy" (The Institute of Korea Arts Therapy). Results: First, the overall mean effect size of children participating in art therapy for this study was 1.69, which indicates that the programs proved to be useful for children. Second, the session with the largest effect size consisting of 7~10 group members was conducted more than 20 times in total, with the time per session of 60~90 minutes. Conclusion/Implications: It is expected that elementary school art therapy can be an effective way of solving the psychological problems of children and will be useful for future program development and research.

Problem Analysis and Enhancement of 'An Improved of Enhancements of a User Authentication Scheme'

  • Mi-Og Park
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.6
    • /
    • pp.53-60
    • /
    • 2024
  • In this paper, we analyze the authentication scheme of Hwang et al. proposed in 2023 and propose a new authentication scheme that improves its problems. Hwang et al. claimed that their authentication scheme was practical and secure, but as a result of analysis in this paper, it is possible to attack the password/ID guessing attack and session key disclosure attack due to insider attack and stolen smart card attack. In addition, Hwang et al.'s authentication scheme, which provides user anonymity, does not provide user untraceability due to its unstable design. The proposed authentication scheme, which improves these problems, not only provides user untraceability, but also is secure for stolen smart card attack, insider attack, session key disclosure attack, and replay attack. In addition, except for one fuzzy extraction operation, it shows the same complexity or very similar one as related authentication schemes. Therefore, the proposed authentication scheme can be said to be an authentication scheme with safety and practicality.