• Title/Summary/Keyword: Updated key

Search Result 137, Processing Time 0.03 seconds

An Efficient Group Key Distribution Mechanism for the Secure Multicast Communication in Mobile Ad Hoc Networks (이동 애드혹 네트워크에서 안전한 멀티캐스트 통신을 위한 효율적인 그룹 키 분배 방식)

  • Lim Yu-Jin;Ahn Sang-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.13C no.3 s.106
    • /
    • pp.339-344
    • /
    • 2006
  • Secure delivery of multicast data can be achieved with the use of a group key for data encryption in mobile ad hoc network (MANET) applications based on the group communication. However, for the support of dynamic group membership, the group key has to be updated for each member joining/leaving and, consequently, a mechanism distributing an updated group key to members is required. The two major categories of the group key distribution mechanisms proposed for wired networks are the naive and the tree-based approaches. The naive approach is based on unicast, so it is not appropriate for large group communication environment. On the other hand, the tree-based approach is scalable in terms of the group size, but requires the reliable multicast mechanism for the group key distribution. In the sense that the reliable multicast mechanism requires a large amount of computing resources from mobile nodes, the tree-based approach is not desirable for the small-sized MANET environment. Therefore, in this paper, we propose a new key distribution protocol, called the proxy-based key management protocol (PROMPT), which is based on the naive approach in the small-sized MANET environment. PROMPT reduces the message overhead of the naive through the first-hop grouping from a source node and the last-hop grouping from proxy nodes using the characteristics of a wireless channel.

A improved authentication protocol for the forward security (개선된 포워드 보안을 위한 인증 프로토콜)

  • Shi, Wenbo;Jang, In-Joo;Yoo, Hyeong-Seon
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.4
    • /
    • pp.17-27
    • /
    • 2007
  • This paper proposes a key distribution and authentication protocol between user, service provider and key distribution center (KDC). This protocol is based on symmetric cryptosystem, challenge-response, Diffie-Hellman component and hash function. In the proposed protocol, user and server update the session key under token-update operation, and user can process repeated efficient authentications by using updated session keys. And another merit is that KDC needs not to totally control the session key between user and server in proposed protocol. Even an attacker steals the parameters from the KDC, the attacker still can not calculate session key. According to the comparison and analysis with other protocols, our proposed protocol provides good efficiency and forward secure session key.

  • PDF

Structural modal identification and MCMC-based model updating by a Bayesian approach

  • Zhang, F.L.;Yang, Y.P.;Ye, X.W.;Yang, J.H.;Han, B.K.
    • Smart Structures and Systems
    • /
    • v.24 no.5
    • /
    • pp.631-639
    • /
    • 2019
  • Finite element analysis is one of the important methods to study the structural performance. Due to the simplification, discretization and error of structural parameters, numerical model errors always exist. Besides, structural characteristics may also change because of material aging, structural damage, etc., making the initial finite element model cannot simulate the operational response of the structure accurately. Based on Bayesian methods, the initial model can be updated to obtain a more accurate numerical model. This paper presents the work on the field test, modal identification and model updating of a Chinese reinforced concrete pagoda. Based on the ambient vibration test, the acceleration response of the structure under operational environment was collected. The first six translational modes of the structure were identified by the enhanced frequency domain decomposition method. The initial finite element model of the pagoda was established, and the elastic modulus of columns, beams and slabs were selected as model parameters to be updated. Assuming the error between the measured mode and the calculated one follows a Gaussian distribution, the posterior probability density function (PDF) of the parameter to be updated is obtained and the uncertainty is quantitatively evaluated based on the Bayesian statistical theory and the Metropolis-Hastings algorithm, and then the optimal values of model parameters can be obtained. The results show that the difference between the calculated frequency of the finite element model and the measured one is reduced, and the modal correlation of the mode shape is improved. The updated numerical model can be used to evaluate the safety of the structure as a benchmark model for structural health monitoring (SHM).

Highlights of the 2023 Bethesda System for Reporting Thyroid Cytopathology, 3rd Edition (갑상선 세침흡인세포검사 2023년 베데스다 시스템, 3판의 하이라이트)

  • Dong Eun Song
    • Korean Journal of Head & Neck Oncology
    • /
    • v.40 no.1
    • /
    • pp.1-5
    • /
    • 2024
  • The Bethesda System for Reporting Thyroid Cytopathology (TBSRCT) is crucial for cytopathologists to use a standardized, category-based reporting system for thyroid fine needle aspirations and is effective for clear communication with the referring physicians. The new Bethesda System for Reporting Thyroid Cytopathology, the third edition in 2023, provides several key updates. The most important update is the assignment of only single name for each of the six diagnostic categories: (I) nondiagnostic; (II) benign; (III) atypia of undetermined significance; (IV) follicular neoplasm; (V) suspicious for malignancy; and (VI) malignant. An implied risk of malignancy (ROM) for each of six categories has been updated based on extensively published data since the second edition of TBSRTC in 2017 and offers both an average ROM for each category and the expected range of cancer risk. Estimated final ROM after excluding "Noninvasive Follicular Thyroid Neoplasm with Papillary Like Nuclear Features (NIFTP)" for each of six categories has been updated based on the reported mean decreases in the ROM if excluding NIFTP. For atypia of undetermined significance (AUS) category, the subcategorization is simplified and more formalized into 2 subgroups, AUS-nuclear atypia or AUS-other, based on the implied ROM and molecular profiling. For the pediatric thyroid disease, pediatric ROMs and management algorithms are newly added for the same six reporting categories for this age group. New or revised disease nomenclatures including high-grade follicular-derived carcinoma has been updated according to the recently published 2022 World Health Organization Classification of Thyroid Neoplasms. Brand new two chapters are added including clinical perspectives and imaging studies (Chap. 13) and the use of molecular and other ancillary tests (Chap. 14). The atlas is updated with new images to illustrate more effectively for new disease entity and diagnostic criteria.

Centralized Group Key Management Scheme for Tactical Swarming Drone Networks (전술 군집 드론 네트워크를 위한 중앙집권식 그룹키 관리 기법)

  • Lee, Jong-Kwan;Shin, Kyuyong;Kim, Kyung-Min
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.6
    • /
    • pp.817-825
    • /
    • 2018
  • Recently, drones have been used in various field to overcome time and space limitations. However, single drone still has a lot of restriction on transportation wight and travel time. Therefore many studies have been conducted to increase the utilization by swarm of drones. Many things should be additionally considered in order to operate swarming drones securely. Especially the group key management is a challenging research topic in tactical domain due to existence of adversary that has anti-drone skill. In this paper, we proposed an efficient group key management scheme for tactical swarming drone networks where an adversary equipped with anti-drone skills exists. The group key can be updated with a small number of message exchange compared to other convenience schemes. The numerical and simulation results demonstrate that the proposed scheme manages the group key efficiently and securely.

An Effective Group Management Method for Secure Multicast Transmission (안전한 멀티캐스트 전송을 위한 효율적인 그룹 관리 방법)

  • Ko Hoon;Jang Uijin;Kim Sunho;Shin Yongtae
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.1
    • /
    • pp.9-15
    • /
    • 2006
  • While a lot of important information is being sent and received on the Internet, the information could be exposed to many threats, and the more the Multicast Service is various and generalized, the more the service range is widened. When a new member joins in or leaves from the Multicast Group, the Group Key, which the existing member use for, should be newly updated. The existing method had a problem that the performance was depreciated by the key exchanging. This paper proposes the effective group management mechanism for a secure transmission of the Multicast Data on the Multicast Group.

A Design of Secure Electronic Health Information Management Protocol in the Internet of Things Environment (사물 인터넷 환경에서 안전한 전자의료정보 관리 프로토콜 설계)

  • Park, Jeong Hyo;Kim, Nak Hyun;Jung, Yong Hoon;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.323-328
    • /
    • 2014
  • ZigBee based on the most vulnerable part of u-Healthcare system that uses the ZigBee communication is the wireless section. ZigBee communication sectors to identify vulnerabilities in this paper, we propose to compensate. ZigBee has been raised from the existing vulnerabilities organize and ZigBee also uses the 64bit address that uniquely identifies a vulnerability that was defined as exposure. And to prevent the exposure of a unique identifying address was used to address a temporary identification. ZigBee security services, the proposed system during the Network Key for encryption only use one mechanism of Residential Mode is used. Residential Mode on all nodes of the entire network because they use a common key, the key is stolen, your network's security system at a time are at risk of collapse. Therefore, in order to guard against these risks to the security policy Network Key updated periodically depending on the method used to. The proposed evaluation and comparative analysis of the system were exposed in the existing system can hide the address that uniquely identifies a public key Network Key also updated periodically, so that leaks can occur due to reduced risk.

A Key Recovery Mechanism for Reliable Group Key Management (신뢰성 있는 그룹키 관리를 위한 키 복구 메커니즘)

  • 조태남;김상희;이상호;채기준;박원주;나재훈
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.6
    • /
    • pp.705-713
    • /
    • 2003
  • For group security to protect group data or to charge, group keys should be updated via key update messages when the membership of group changes. If we lose these messages, it is not possible to decrypt the group data and so this is why the recovery of lost keys is very significant. Any message lost during a certain member is logged off can not be recovered in real-time. Saving all messages and resending them by KDC (Key Distribution Center) not only requests large saving spaces, but also causes to transmit and decrypt unnecessary keys. This paper analyzes the problem of the loss of key update messages along with other problems that may arise during member login procedure, and also gives an efficient method for recovering group keys and auxiliary keys. This method provides that group keys and auxiliary keys can be recovered and sent effectively using information stored in key-tree. The group key generation method presented in this paper is simple and enable us to recover any group key without storing. It also eliminates the transmissions and decryptions of useless auxiliary keys.

A two-stage Kalman filter for the identification of structural parameters with unknown loads

  • He, Jia;Zhang, Xiaoxiong;Feng, Zhouquan;Chen, Zhengqing;Cao, Zhang
    • Smart Structures and Systems
    • /
    • v.26 no.6
    • /
    • pp.693-701
    • /
    • 2020
  • The conventional Kalman Filter (KF) provides a promising way for structural state estimation. However, the physical parameters of structural systems or models should be available for the estimation. Moreover, it is not applicable when the loadings applied to the structures are unknown. To circumvent the aforementioned limitations, a two-stage KF with unknown input approach is proposed for the simultaneous identification of structural parameters and unknown loadings. In stage 1, a modified observation equation is employed. The structural state vector is estimated by KF on the basis of structural parameters identified at the previous time-step. Then, the unknown input is identified by Least Squares Estimation (LSE). In stage 2, based on the concept of sensitivity matrix, the structural parameters are updated at the current time-step by using the estimated structural states obtained from stage 1. The effectiveness of the proposed approach is numerically validated via a five-story shearing model under random and earthquake excitations. Shaking table tests on a five-story structure are also employed to demonstrate the performance of the proposed approach. It is demonstrated from numerical and experimental results that the proposed approach can be used for the identification of parameters of structure and the external force applied to it with acceptable accuracy.