• Title/Summary/Keyword: ad hoc

Search Result 2,484, Processing Time 0.03 seconds

Practical Password-Authenticated Three-Party Key Exchange

  • Kwon, Jeong-Ok;Jeong, Ik-Rae;Lee, Dong-Hoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.2 no.6
    • /
    • pp.312-332
    • /
    • 2008
  • Password-based authentication key exchange (PAKE) protocols in the literature typically assume a password that is shared between a client and a server. PAKE has been applied in various environments, especially in the “client-server” applications of remotely accessed systems, such as e-banking. With the rapid developments in modern communication environments, such as ad-hoc networks and ubiquitous computing, it is customary to construct a secure peer-to-peer channel, which is quite a different paradigm from existing paradigms. In such a peer-to-peer channel, it would be much more common for users to not share a password with others. In this paper, we consider password-based authentication key exchange in the three-party setting, where two users do not share a password between themselves but only with one server. The users make a session-key by using their different passwords with the help of the server. We propose an efficient password-based authentication key exchange protocol with different passwords that achieves forward secrecy in the standard model. The protocol requires parties to only memorize human-memorable passwords; all other information that is necessary to run the protocol is made public. The protocol is also light-weighted, i.e., it requires only three rounds and four modular exponentiations per user. In fact, this amount of computation and the number of rounds are comparable to the most efficient password-based authentication key exchange protocol in the random-oracle model. The dispensation of random oracles in the protocol does not require the security of any expensive signature schemes or zero-knowlegde proofs.

Design and implementation of a connectivity analyzer for the hybrid vehicular network (하이브리드 차량 네트워크를 위한 연결성 분석기의 설계 및 구현)

  • Lee, Junh-Hoon;Kim, Cheol-Min;Kwon, Sang-Cheol
    • Journal of Korea Spatial Information System Society
    • /
    • v.10 no.3
    • /
    • pp.45-54
    • /
    • 2008
  • This paper designs and Implements a connectivity analyzer for the hybrid vehicular network based on the real-life movement history data achieved from the Taxi telematics system currently in operation, aiming at providing a useful guideline and information to build a telematics network. The simulator traces the location of each vehicle, sets the vehicle type, either gateway or normal, decides whether it can be connected to a mobile gateway, keeps track of status of the vehicle, and calculates the duration of disconnected state. With this analysis considering the transmission range and gateway ratio, we can decide the cost-effective number of mobile gateways having both cellular and ad-hoc network interfaces, and buffer space requirement based on the measured disconnection time and message generation ratio.

  • PDF

An Address Autoconfiguration Mechanism for Connected MANET with Multiple Gateways having a Same Network Prefix (동일한 네트워크 프리픽스를 갖는 다중 게이트웨이 기반의 connected MANET에서 주소 자동 설정 방법)

  • Lee, Jae-Hwoon;Lee, Beom-Jae;Jung, Woo-Young
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.5
    • /
    • pp.405-412
    • /
    • 2009
  • Mobile ad hoc networks (MANETs) allow mobile nodes to communicate among themselves via wireless multiple hops without the help of the wired infrastructure. In the MANET, it is required not only a route setup mechanism that makes nodes not within each other's transmission range communicate but also mechanism in order for a node to auto-configure a unique address. In this paper, we propose an address auto-configuration mechanism when MANET is connected to the Internet via several Internet Gateways and all gateways advertise the same network prefix. By using the proposed mechanism, once a node configures an Internet topologically correct and globally unique IP address, then the node can utilize the configured address even though the node moves within the MANET. Through the simulations, we analyze the performance of our proposed mechanism and, from the simulation results, we show that out proposed mechanism outperforms the existing mechanism.

A Security method and Performance evaluation of preventing DoS attack against DAD in MANET (MANET 환경에서 중복 주소 탐지에 대한 DoS 공격을 방지하는 보안 기법과 성능 평가)

  • Lim, Jeong-Mi;Park, Chang-Seop
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.8
    • /
    • pp.1099-1108
    • /
    • 2009
  • The study of IP address allocation in MANET can be categories into Stateful and Stateless. The one, special node monitors other nodes' IP address and allocates IF address. And the other, node generates IP address by itself. Nodes in MANET have mobility and restricted resource, so Stateless is more suitable than Stateful. But, in Stateless, node requires DAD process because of unique IP address allocation. And Dos attack can be happened in DAD precess. In this paper, we propose a security method on preventing DoS attack against DAD in MANET using one-way hash function. Since, Computation of one-way hash function is suitable for nodes' restricted resource character in MANET. And we evaluate performance using NS2 and compare with other security method which is CGA using signature.

  • PDF

IDMMAC: Interference Aware Distributed Multi-Channel MAC Protocol for WSAN

  • Kakarla, Jagadeesh;Majhi, Banshidhar;Battula, Ramesh Babu
    • Journal of Information Processing Systems
    • /
    • v.13 no.5
    • /
    • pp.1229-1242
    • /
    • 2017
  • In this paper, an interference aware distributed multi-channel MAC (IDMMAC) protocol is proposed for wireless sensor and actor networks (WSANs). The WSAN consists of a huge number of sensors and ample amount of actors. Hence, in the IDMMAC protocol a lightweight channel selection mechanism is proposed to enhance the sensor's lifetime. The IDMMAC protocol divides the beacon interval into two phases (i.e., the ad-hoc traffic indication message (ATIM) window phase and data transmission phase). When a sensor wants to transmit event information to the actor, it negotiates the maximum packet reception ratio (PRR) and the capacity channel in the ATIM window with its 1-hop sensors. The channel negotiation takes place via a control channel. To improve the packet delivery ratio of the IDMMAC protocol, each actor selects a backup cluster head (BCH) from its cluster members. The BCH is elected based on its residual energy and node degree. The BCH selection phase takes place whenever an actor wants to perform actions in the event area or it leaves the cluster to help a neighbor actor. Furthermore, an interference and throughput aware multi-channel MAC protocol is also proposed for actor-actor coordination. An actor selects a minimum interference and maximum throughput channel among the available channels to communicate with the destination actor. The performance of the proposed IDMMAC protocol is analyzed using standard network parameters, such as packet delivery ratio, end-to-end delay, and energy dissipation, in the network. The obtained simulation results indicate that the IDMMAC protocol performs well compared to the existing MAC protocols.

A Message Authentication Scheme for V2V message based on RSSI with anonymity (익명성을 제공하는 RSSI기반 V2V 메시지 인증기법)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • The KIPS Transactions:PartC
    • /
    • v.18C no.4
    • /
    • pp.207-212
    • /
    • 2011
  • Vehicular Ad Hoc Network(VANET) is a communication technology between vehicles and vehicles(V2V) or vehicles and infrastructures(V2I) for offering a number of practical applications. Considering the importance of communicated information through VANET, data authentication, confidentiality and integrity are fundamental security elements. Recently, to enhance a security of VANET in various circumstances, message authentication is widely researched by many laboratories. Among of them, Zhang. et. al. is an efficient method to authenticate the message with condition of anonymity in dense space. In the scheme, to obtain the vehicular ID with condition of anonymity, the k-anonymity is used. However it has a disadvantage, which conducts hash operations in case of determining the vehicular ID. In the paper, we present a location based algorithm using received signal strength for the location based authentication and encryption technique as well, and to enhance the accuracy of algorithm we apply a location determination technique over the 3-dimensional space.

Plans for Integrating Health Care Personnel between the Two Koreas (남북한 보건의료인력의 통합방안 연구)

  • Lee, Hyekyoung
    • Korean Medical Education Review
    • /
    • v.18 no.1
    • /
    • pp.1-15
    • /
    • 2016
  • In preparing for the unification of North and South Korea, rather than unilaterally over-writing the North's human resource training system with the South's health care human resource development system, it is important to understand the North's system and its ecology and to achieve a balance by seeking out aspects of each of the systems that could be consolidated with each other. The training period in both the North and South's health care human resource development systems is specified to be 6 years, but there is no system for internships or residencies in the North. South Korea introduced a 6-year system for pharmacist education in 2009, but North Korea has been using such a system since the 1970s (currently 5.5 years). In North Korea, training of health care personnel is conducted at various levels: at universities, at vocational schools, and at institutes for training health officials. Various types of training (daytime training, online, and ad hoc programs) are carried out. Also of interest is the North's licensure examination system. Rather than a state examination system as in South Korea, the North favors a graduation exam given by a national graduation examination committee composed of university professors, which awards both graduation certificates and 'permits,' that is, licenses for doctors and pharmacists. In working out a plan for the integration of the two Koreas' systems based on the study and analysis of the North's educational and testing system for doctors and pharmacists, this paper does not place exclusive focus on the distinctions between the systems or cling to negative views. Rather than claim that unification/integration is a practical impossibility, the paper focuses on the similarities between the two systems and maximizes them to uncover an approach for arriving at solutions. It is hoped that the practical data offered in this paper can contribute to the design of a forward-minded unification/integration model.

Real-time Water Supply Facilities Monitoring System based on the USN (USN 기반의 실시간 수도설비 모니터링 시스템)

  • Kim, Yong-Tae;Yoo, Neung-Hwan;Park, Gil-Cheol;Kim, Seok-Soo;Kim, Tai-Hoon;Lee, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.6
    • /
    • pp.1207-1213
    • /
    • 2007
  • This paper has researched water supply facilities management using real-time water utility monitoring system based on USN(Ubiquitous Sensor Network) which is consisted of wireless sensors transferring waterworks facilities md treatment information about a valve-room and flowmeter-room of water supply installation. In the manholes, it was installed with flowmeter, pressure sensors, vibration sensors, Co-sensors, and hydro-thermograph sensors. These measurement values which are received by PDA are used for facilities operation on the spot safely and conveniently. It has also provided safe installation management via CDMA(Code Division Multiple Access) network which transfers data to remote servers to monitoring at a distance place. With safety management system of water supply facilities on USN technology convenience and safety is increased in real situation, and it is expected that we can supply clean water to people as much safer and more effective water supply installation management.

Introduction of Clinical and Laboratory Standards Institute Antibiotic Susceptibility Testing Subcommittee Meeting (Clinical and Laboratory Standards Institute의 항생제 감수성 검사 소위원회 회의 소개)

  • Chang, Chulhun L.
    • Annals of Clinical Microbiology
    • /
    • v.21 no.4
    • /
    • pp.69-74
    • /
    • 2018
  • Laboratory medicine is a specialized division that supports physicians in the care of patients by providing rapid and accurate in vitro diagnostic tests. Standardization of every component of a specific test is essential for producing accurate results. The Clinical and Laboratory Standards Institute (CLSI) was founded to develop a formal consensus process for standardization in 1968, and has been publishing standards and guidelines covering all aspects of clinical, research, and other laboratory work. CLSI guidelines are widely used around the world for standardization. The CLSI antimicrobial susceptibility testing subcommittee (AST SC) consists of 6 standing and many ad hoc working groups. Members of the AST SC review submitted proposals and suggestions, decide on approving these submissions in face-to-face meetings held twice a year, and revise CLSI documents accordingly. As these face-to-face meetings are open to anyone who registers to attend, I strongly encourage the members of our Society to attend and actively participate in document development.

Passive 3D motion optical data in shaking table tests of a SRG-reinforced masonry wall

  • De Canio, Gerardo;de Felice, Gianmarco;De Santis, Stefano;Giocoli, Alessandro;Mongelli, Marialuisa;Paolacci, Fabrizio;Roselli, Ivan
    • Earthquakes and Structures
    • /
    • v.10 no.1
    • /
    • pp.53-71
    • /
    • 2016
  • Unconventional computer vision and image processing techniques offer significant advantages for experimental applications to shaking table testing, as they allow the overcoming of most typical problems of traditional sensors, such as encumbrance, limitations in the number of devices, range restrictions and risk of damage of the instruments in case of specimen failure. In this study, a 3D motion optical system was applied to analyze shake table tests carried out, up to failure, on a natural-scale masonry structure retrofitted with steel reinforced grout (SRG). The system makes use of wireless passive spherical retro-reflecting markers positioned on several points of the specimen, whose spatial displacements are recorded by near-infrared digital cameras. Analyses in the time domain allowed the monitoring of the deformations of the wall and of crack development through a displacement data processing (DDP) procedure implemented ad hoc. Fundamental frequencies and modal shapes were calculated in the frequency domain through an integrated methodology of experimental/operational modal analysis (EMA/OMA) techniques with 3D finite element analysis (FEA). Meaningful information on the structural response (e.g., displacements, damage development, and dynamic properties) were obtained, profitably integrating the results from conventional measurements. Furthermore, the comparison between 3D motion system and traditional instruments (i.e., displacement transducers and accelerometers) permitted a mutual validation of both experimental data and measurement methods.