• Title/Summary/Keyword: Verification overhead

Search Result 71, Processing Time 0.028 seconds

Surveillant: a supervision mechanism between blockchains for efficient cross-chain verification

  • Liang, Xinyu;Chen, Jing;Du, Ruiying;Zhao, Tianrui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.8
    • /
    • pp.2507-2528
    • /
    • 2022
  • Blockchain interoperability, which refers in particular to the ability to access information across blockchain systems, plays the key role for different blockchains to communicate with each other, and further supports the superstructure built on top of the cross-chain mechanism. Nowadays, blockchain interoperability technology is still in its infancy. The existing cross-chain scheme such as BTCRelay requires that the smart contract in a blockchain to download and maintain block headers of the other blockchain, which is costly in maintenance and inefficient to use. In this paper, we propose a supervision mechanism between blockchains, called Surveillant. Specially, the new entities called dual-functional nodes are introduced to commit the real-time information from the blockchain under supervision to the supervising blockchain, which enables users to have efficient cross-chain verification. Furthermore, we introduce Merkle mountain range for blocks aggregation to deal with the large-scale committing data. We propose the design of long orphan branch counter to trace the bifurcations in the blockchain under supervision. The existing incentive mechanism is improved to encourage the behaviors of dual-functional nodes. In Surveillant, the analysis and experimental results demonstrate that users are able to have efficient cross-chain verification with low maintenance overhead.

A Study on the Blockchain-Based Access Control Using Random-List in Industrial Control System (산업제어시스템에서 랜덤리스트를 이용한 블록체인 기반 접근제어 방식에 관한 연구)

  • Kang, Myung Joe;Kim, Mi Hui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.5
    • /
    • pp.147-156
    • /
    • 2022
  • Industrial control systems that manage and maintain various industries were mainly operated in closed environment without external connection, but with the recent development of the Internet and the introduction of ICT technology, the access to the industrial control system of external or attackers has become easier. Such incorrect approaches or attacks can undermine the availability, a major attribute of the industrial control system, and violation of availability can cause great damage. In this paper, when issuing commands in an industrial control system, a verification group is formed using a random list to verify and execute commands, and a trust score technique is introduced that applies feedback to the verification group that conducted verification using the command execution result. This technique can reduce overhead generated by random generation in the process of requesting command verification, give flexibility to the verification process, and ensure system availability. For the performance analysis of the system, we measured the time and gas usage when deploying a smart contract, gas usage when verifying a command. As a result, we confirmed that although the proposed system generates a random list compared to the legacy system, there was little difference in the time when it took to deploy smart contract and that the gas used to deploy smart contract increased by about 1.4 times in the process of generating a random list. However, the proposed system does not perform random operations even though the operation of command verification and confidence score technique is performed together during the command verification process, thus it uses about 9% less gas per verification, which ensures availability in the verification process.

Study on Elliptic Curve Diffie-Hellman based Verification Token Authentication Implementation (타원곡선 디피헬만 기반 검증 토큰인증방식 구현 연구)

  • Choi, Cheong H.
    • Journal of Internet Computing and Services
    • /
    • v.19 no.5
    • /
    • pp.55-66
    • /
    • 2018
  • Since existing server-based authentications use vulnerable password-based authentication, illegal leak of personal data occurs frequently. Since this can cause illegal ID compromise, alternative authentications have been studied. Recently token-based authentications like OAuth 2.0 or JWT have been used in web sites, however, they have a weakness that if a hacker steals JWT token in the middle, they can obtain plain authentication data from the token, So we suggest a new authentication method using the verification token of authentic code to encrypt authentication data with effective time. The verification is to compare an authentication code from decryption of the verification-token with its own code. Its crypto-method is based on do XOR with ECDH session key, which is so fast and efficient without overhead of key agreement. Our method is outstanding in preventing the personal data leakage.

Implementation of 3GPP RLC Testbed for Protocol Verification and Evaluation (3GPP RLC 프로토콜의 검증 및 평가 테스트베드의 구축)

  • Sung, Junghwan;Suh, Hyo-Joong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.111-118
    • /
    • 2013
  • The connection based TCP protocol provides reliable packet delivery, but it takes certain overhead compare to the connection-less UDP protocol. Thus, 3GPP devise the upper-layer RLC protocol which provides reliability based upon the UDP protocol. Consequently, each implement of a base station and/or mobile terminal require the development of the RLC protocol, and it must qualify various interoperable tests. In this paper, we implement a testbed which verifies the RLC protocol under various packet losses/inversion circumstances of networks. Finally, we propose our testbed as the RLC protocol tester for the developments.

An Efficient Stream Authentication Scheme using Tree Authentication (인증 트리 기법을 이용한 효율적인 스트림 인증 기법)

  • Park, Yong-Su;Cho, Yoo-Kun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.8
    • /
    • pp.484-492
    • /
    • 2002
  • We propose an efficient stream authentication scheme using tree authentication. To reduce the computation cost of the sender, we design the authentication tree whose height is very short. We appropriately distribute authentication information over packets so the receiver can verify data with high probability. Moreover, we provide mathematical analysis on the verification probability. For the proposed scheme and previous schemes, we measured the elapsed time for generating authentication information and the proposed scheme has equal to or slightly larger than that of GM's scheme, which has the lowest computation overhead. We performed simulations, which show that the verification probability of the proposed scheme is much higher than that of any other scheme.

LAPG-2: A Cost-Efficient Design Verification Platform with Virtual Logic Analyzer and Pattern Generator (LAPG-2: 가상 논리 분석기 및 패턴 생성기를 갖는 저비용 설계 검증 플랫폼)

  • Hwang, Soo-Yun;Kang, Dong-Soo;Jhang, Kyoung-Son;Yi, Kang
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.35 no.5
    • /
    • pp.231-236
    • /
    • 2008
  • This paper proposes a cost-efficient and flexible FPGA-based logic circuit emulation platform. By improving the performance and adding more features, this new platform is an enhanced version of our LAPG. It consists of an FPGA-based hardware engine and software element to drive the emulation and monitor the results. It also provides an interactive verification environment which uses an efficient communication protocol through a bi-directional serial link between the host and the FPGA board. The experimental results show that this new approach saves $55%{\sim}99%$ of communication overhead compared with other methods. According to the test results, the new LAPG is more area efficient in complex circuits with many I/O ports.

Analysis of Financial Structure of Hospitals Before and After The Separation of Prescription and Drug Dispensing Policy (의약분업 전.후 병원재무구조 평가)

  • Park, Ho-Soon;Yoo, Kyu-Soo;Lee, Chang-Eun
    • Korea Journal of Hospital Management
    • /
    • v.8 no.3
    • /
    • pp.118-142
    • /
    • 2003
  • This study is aimed at evaluating the financial structure of hospitals before and after the separation of prescription and drug dispensing policy started to be implemented in July 2000 and at making a suitable hospital managerial strategy through the verification of the factors which have effect on their profitability. This study investigated the hospitals which have passed the accredition review to be designated as a accredited training hospital each year for three years from 1999 to 2001. Those hospitals were selected from members of the Korea Hospital Association. 106 hospitals were targeted for analysis except for the hospitals whose financial statements and managerial performance were not reported faithfully. The financial indicators used in this study were stability indicators(liability to total assets, ratio of debt to fund balance, fixed ratio), liquidity indicators(current ratio, quick ratio), activity indicators(total assets turnover, fixed assets turnover), profitability indicators(net profit to total assets, net profit to net worth, operating margin), and operating expenses to patient revenues indicators(drug and supplies costs/payroll/overhead expenses). The result of this study are as follows: First, the analysis of the increase of loss-making hospitals before and after. The separation of prescription and drug dispensing policy shows that the number of loss-making hospitals increase after the separation(22.6% before the separation; 31.1% after the separation). However, there was no significant statistical difference. Second, the analysis of operating expenses to patient revenues indicators showed that the ratio of drug and supplies cost became lower in all hospitals but the ratio of payroll/overhead expenses became higher. Additionally, the factor which have the greatest effect on profitability was operating expenses to patient revenues indicators (drug and supplies costs/payroll/overhead expenses). Third, the analysis of managerial performance by four types of loss-loss, loss-profit, profit-loss and profit-profit compared the results before the separation with those after the separation revealed as follows : Reliance on liability to total assets became higher in the profit-loss type($56.2%{\rightarrow}66.4%$), lower in the loss-profit type($82.7%{\rightarrow}74.5%$). Total assets turnover became higher in the profit-profit type($1.3{\rightarrow}1.5$), but lower in the loss-profit type($0.8{\rightarrow}0.7$). Operating margin decreased to minus 5.9% from 4.3% in the profit-loss type, but increased to 7.2% from minus 7.8% in the loss-profit type. Forth, operating expenses to revenues indicators showed that the increase of payroll was the biggest in the profit-loss type($39.2%{\rightarrow}49.9%$) and that overhead cost decreased in the loss-profit type but that rather increased in other types.

  • PDF

Secure Fragmentation Technique for Content-Centric Networking (콘텐츠 중심 네트워크를 위한 안전한 패킷 단편화 기술)

  • Hyun, Sangwon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.831-841
    • /
    • 2017
  • This paper presents a secure and DoS-resistant fragment authentication technique for Content-Centric Networking (CCN). Our approach not only guarantees the authenticity of each fragment, but also provides a high resistance to DoS attacks through the immediate verification of fragment authenticity at interim nodes on the routing path. Our experimental results demonstrate that the proposed approach provides much stronger security than the existing approach, without imposing a significant overhead.

A Study on Automatic Indexing System Using natural language Processing, Statistical Technique, Relevance Verification (자연어 처리, 통계적 기법, 적합성 검증을 이용한 자동색인 시스템에 관한 연구)

  • Yu, Chun-Sik;U, Seon-Mi;Yu, Cheol-Jung;Lee, Jong-Deuk;Gwon, O-Bong;Kim, Yong-Seong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.6
    • /
    • pp.1552-1562
    • /
    • 1998
  • 형태소 분석(Morphological Analysis)과 같은 언어학적 처리에 의존하는 기존의 한국어 문헌에 대한 자동색인 기법들은 품사의 애매모호함이나 복합명사의 처리 등으로 부담(overhead)이 크다. 또한 불용어 처리에 사용되는 불용어 리스트가 대상 문헌의 주제 분야별로 따로 구축되어야 하며 그 크기가 방대하다는 문제점이 있다. 이러한 문제점들을 해결하기 위해, 본 논문에서는 각 문헌의 텍스트에 대해 복합명사 처리나 애매모호함에 대한 엄격한 분석을 수행하지 않는 간단한 형태의 형태소 분석을 수행하여 단순명사들을 추출한다. 그런 후 이들 단순명사들을 이용하여 유한 오토마타(Finite Automata)를 구성하고, 구성된 유한 오토마타와 각 명사의 단어빈도(Term Frequency)에 의해 각 색인어 후보들의 중요도를 계산하는 자동색인 기법을 제안한다. 그 결과 품사의 애매모호함에 대한 처리나 복합명사의 처리에따른 부담을 줄일 수 있었으며, 선정된 색인어들과 수작업으로 선정한 색인어들의 비교 실험에 의해 제안한 자동색인 기법의 성능을 검증하였다.

  • PDF

Implementation of Integrated CPU-GPU for Efficient Uniform Memory Access Method and Verification System (CPU-GPU간 긴밀성을 위한 효율적인 공유메모리 접근 방법과 검증 시스템 구현)

  • Park, Hyun-moon;Kwon, Jinsan;Hwang, Tae-ho;Kim, Dong-Sun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.11 no.2
    • /
    • pp.57-65
    • /
    • 2016
  • In this paper, we propose a system for efficient use of shared memory between CPU and GPU. The system, called Fusion Architecture, assures consistency of the shared memory and minimizes cache misses that frequently occurs on Heterogeneous System Architecture or Unified Virtual Memory based systems. It also maximizes the performance for memory intensive jobs by efficient allocation of GPU cores. To test between architectures on various scenarios, we introduce the Fusion Architecture Analyzer, which compares OpenMP, OpenCL, CUDA, and the proposed architecture in terms of memory overhead and process time. As a result, Proposed fusion architectures show that the Fusion Architecture runs benchmarks 55% faster and reduces memory overheads by 220% in average.