• Title/Summary/Keyword: agreement protocols

Search Result 115, Processing Time 0.024 seconds

A Study on Routing Performance Improvement through Cooperation Authentication Technique (협력기반 인증 기법을 통한 라우팅 성능 개선에 관한 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.1
    • /
    • pp.71-79
    • /
    • 2016
  • The main security threats in MANET are integrity and non-repudiation. In the meantime, a lot of secure routing protocols have been designed in order to block these security threats. In this paper, partnership-based authentication technique is proposed in order to provide participation exclusion of network and non-repudiation for the nodes. The proposed technique is a technique that participates in data communication for only the nodes receiving the authentication through the authentication process for the nodes. For this, the proposed technique is largely consists of two steps. The first step is the process that issued the certificate after the reliability for the nodes participating in the network is evaluated. And in the second step, the key exchange agreement with the neighbor nodes is performed and data communication is made after setting security path with responding nodes. The level of security in data transmission is improved because the process of path setting is performed through cooperation with a neighboring nodes having high reliability during the course of these two steps. The superiority of proposed technique in this paper was confirmed through the comparative experiment.

Security Issues on Machine to Machine Communications

  • Lai, Chengzhe;Li, Hui;Zhang, Yueyu;Cao, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.498-514
    • /
    • 2012
  • Machine to machine (M2M) communications is the hottest issue in the standardization and industry area, it is also defined as machine-type communication (MTC) in release 10 of the 3rd Generation Partnership Project (3GPP). Recently, most research have focused on congestion control, sensing, computing, and controlling technologies and resource management etc., but there are few studies on security aspects. In this paper, we first introduce the threats that exist in M2M system and corresponding solutions according to 3GPP. In addition, we present several new security issues including group access authentication, multiparty authentication and data authentication, and propose corresponding solutions through modifying existing authentication protocols and cryptographic algorithms, such as group authentication and key agreement protocol used to solve group access authentication of M2M, proxy signature for M2M system to tackle authentication issue among multiple entities and aggregate signature used to resolve security of small data transmission in M2M communications.

Study on WP-IBE compliant Mobile IPSec (WP-IBE 적용 Mobile IPSec 연구)

  • Choi, Cheong Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.14 no.5
    • /
    • pp.11-26
    • /
    • 2013
  • In the wireless Internet, it is so restrictive to use the IPSec. The MIPv4 IPSec's path cannot include wireless links. That is, the IPSec of the wireless Internet cannot protect an entire path of Host-to-Host connection. Also wireless circumstance keeps a path static during the shorter time, nevertheless, the IKE for IPSec SA agreement requires relatively long delay. The certificate management of IPSec PKI security needs too much burden. This means that IPSec of the wireless Internet is so disadvantageous. Our paper is to construct the Mobile IPSec proper to the wireless Internet which provides the host-to-host transport mode service to protect even wireless links as applying excellent WP-IBE scheme. For this, Mobile IPSec requires a dynamic routing over a path with wireless links. FA Forwarding is a routing method for FA to extend the path to a newly formed wireless link. The FA IPSec SA for FA Forwarding is updated to comply the dynamically extended path using Source Routing based Bind Update. To improve the performance of IPSec, we apply efficient and strong future Identity based Weil Pairing Bilinear Elliptic Curve Cryptography called as WP-IBE scheme. Our paper proposes the modified protocols to apply 6 security-related algorithms of WP-IBE into the Mobile IPSec. Particularly we focus on the protocols to be applied to construct ESP Datagram.

Analysis of Indicated Points and Main Factors Affecting the Quality of Clinical Research for the Development of Internal Audit Tools (자체점검 도구 개발을 위한 지적사항 및 임상연구의 품질에 작용하는 요인 분석)

  • Hye Yun Jang;Jung-Hee Jang;Yoon Jin Lee
    • The Journal of KAIRB
    • /
    • v.5 no.1
    • /
    • pp.14-20
    • /
    • 2023
  • Purpose: To obtain fundamental data on selection tools for an internal audit and develop a new guideline. We scored the indicated points from the internal audit, identified the research progress and problems that occurred, and confirmed the validity of the risk factors involved. Methods: Of the 63 internal audits conducted by Keimyung University Dongsan Hospital from 2014 to 2021, we analyzed 55 clinical trials with an inspection checklist. We excluded 8 that failed to transfer data and refused to comply with the internal audit. The statistical summary of the collected data was verified and interpreted by using frequency analysis and a chi-square test. Result: Of total 55 cases included in the internal audit, sponsor-initiated trial (SIT) was 63.6% (vs. investigator-initiated trial [IIT]), clinical trial for investigational drug was 71.0% (vs. nonclinical or clinical trial for investigational device), domestic multicenter trial was 60.0% (vs. single center or multinational multicenter trial), and trial requisition for MFDS approval was 69.1% (vs. exception for MFDS approval). The 10 areas of the clinical trial inspection checklist (reports, protection of subjects, compliance with protocols, records, management of investigational drug and/or device, delegation of duties, qualification of investigators, management of specimen, contract-agreement and approval of protocols, and preservation of recorded documents) were weighted between 2 to 5 points. The average of the total points was 16.09±13.2 and 20 clinical trials were above the average. As a result of comparing the average of the total points weighted by year, the highest score was in 2020. The 4 factors that play significant roles in determining the internal quality were (1) principal subjects that initiated the clinical trials (p=0.049), (2) type (p=0.003), (3) phase of clinical trials (p=0.024), and (4) number of registered subjects reported at the time of continuing deliberation (p=0.019). Of the 10 areas of the clinical trial inspection checklist, 'record' was the most inappropriate and insufficient. We found more indicated points; the quality of performance declined in IIT, nonclinical trials, and other clinical trials that were not in phase I1-IV4, and the study of more than 30 registered subjects at the time of continuing review. Conclusion: If an institution has an internal audit selection tool that reflects the aforementioned risk factors, it will be possible to effectively manage high-risk studies; thereby, contributing to an efficient internal audit and improving the quality of clinical trials.

  • PDF

An Investigation on Chemistry Problem-Solving Strategy of Middle School Student (중학생의 화학 문제해결 전략 조사)

  • Noh, Tae-Hee;Jeon, Kyung-Moon
    • Journal of The Korean Association For Science Education
    • /
    • v.17 no.1
    • /
    • pp.75-83
    • /
    • 1997
  • The purpose of this study was to determine the strategies that middle school students used in solving problems concerning density and solubility. These were compared in the aspects of problem contexts for 42 students of varying logical reasoning ability, spatial ability, and learning approach. A coding scheme used consists of five categories: reading & organization, production, errors, evaluation, and strategy. Students' protocols were analyzed after intercoder agreement had been established to be .95. The results were as follows: 1. Students had more difficulties in reading and organizing the problems in everyday contexts than in scientific contexts. Students at the concrete-operational stage and / or surface approach were more likely to have difficulties in reading and organizing the problems than those at the formal-operational stage and / or deep approach. 2. Students tended to split up the solubility problems into sub-problems and to solve the density problem in everyday contexts in random manner. These were significantly correlated with the test scores concerning logical reasoning ability, spatial ability, and learning approach at the .1 level of significance. 3. Major errors in solving the density problems were to disregard the given information or generated and to use inappropriate information. Many errors in solving the solubility problems were found to be executive errors. The strategy to use the information given appropriately was positively related to students' logical reasoning ability, spatial ability, and learning approach. 4. More evaluation strategies were found in everyday contexts. Their strategies to grasp the meaning of answers and to check the math were significantly related to students' logical reasoning ability. 5. Students used the random trial-and-error strategy more than the systematic strategy and the systematic trial-and-error strategy, especially in everyday contexts. The strategies used by the students were significantly related to students' logical reasoning ability, spatial ability, and learning approach.

  • PDF

Mutual Authentication between the mobile node in Ad-hoc Network (Ad-hoc 망에서 이동 노드 간 상호 인증)

  • Choi, Woo-Jin;Seok, Gyeong-Hyu
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.10
    • /
    • pp.1087-1092
    • /
    • 2015
  • It was diversified demand for a wireless network to the rapid growth of the Internet, the time and space that are not in the new level of Internet technology, limits the Ad-hoc networks are needed. Ad-hoc networks do not communicate with the central station, each of the mobile nodes included in the network communicate with each other by the relay role. In recent years, the Ad-hoc wireless networks in a variety of routing protocols and network security, research is actively underway for the authentication method, but the security of wireless Internet and Ad-hoc networks, certification is incomplete situation. This paper considers the authentication and key agreement technique applicability of the USIM card using the DSR routing protocol of the Java Card and Ad-hoc networks, we propose a secure authentication mechanism between the mobile node.

Convention on International Interests in Mobile Equipment

  • Suk, Kwang-Hyun
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.13
    • /
    • pp.69-81
    • /
    • 2000
  • Under the co-sponsorship of UNIDROIT and I.C.A.O., a preliminary draft Convention on International Interests in Mobile Equipment and a preliminary draft Protocol on Matters Specific to Aircraft Equipment has been prepared. The purpose of the Convention is to provide for the creation and effect of a new international interest in mobile equipment. The Convention's approach is quite novel in that it purports to create an international interest based upon the convention itself. The Convention is intended to be supplemented by Protocols, each of is intended to provide equipment-specific rules necessary to adapt the rules of the Convention to fit the special pattern of financing for different categories of equipment. To date, two sessions of governmental experts were held in Rome and Montreal. Korean delegations attended the two sessions. One of the members of the Korean delegation published a report on the first session. He expressed his objection to the so called self-help remedy contemplated by the current preliminary draft of the Convention which enables the holder of a security interest to repossess and dispose of the subject of the security interest by private sale rather than public auction on the occurrence of an event of default of the debtor. His view is based upon his understanding that under Korean law, the only remedy available to the holder of a security interest in mobile equipment, such as an airplane, is to apply to the competent court for a public auction. In my view, his understanding is not quite correct and is inconsistent with the current practice in Korea. Under Korean law, the parties' agreement for private sale is in principle valid unless there is an interested party who has acquired a security interest after the creation of the prior security interest or a creditor who has caused the subject of the security interest to be attached by a competent court. In this article, I discuss the current Korean law and practice relating to the enforcement of security interests by private sale in more detail.

  • PDF

Accuracy of Ventricular Volume and Ejection Fraction Measured by Gated Tl-201 Perfusion Single Photon Emission Tomography (심전도 게이트 심근관류 Tl-201 SPECT로 측정된 좌심실 기능 및 좌심실 용적의 정확성)

  • Pai, Moon-Sun;Moon, Dae-Hyuk
    • The Korean Journal of Nuclear Medicine
    • /
    • v.39 no.2
    • /
    • pp.94-99
    • /
    • 2005
  • Electrocardiogram-gated single photon omission computed tomography (SPECT) provides valuable information in the assessment of both myocardial perfusion and ventricular function. Tl-201 is a suboptimal isotope for gating. Tl-201 images are more blurred compared with Tc-99m tracers due to the increased amount of scattered photons and use of a smooth filter. The average myocardial count densities are approximately one-half those of conventional technetium tracers. However, Tl-201 is still widely used because of its well-established utility for assessing myocardial perfusion, viability and risk stratification. Gated SPECT with Tl-201 enables us to assess both post-stress and rest left ventricular volume and function. Previous studies with gated Tl-201 SPECT measurements of ejection fraction (EF), end-diastolic volume (EDV), end-systolic volume (ESV) have shown high correlation with first-pass radionuclide angiography, gated blood pool scan, Tc-99m-MIBI gated SPECT, contrast ventriculography, echocardiography, and 3-dimensional magnetic resonance imaging. However, problems related to these studies include few agreement data of EDV and ESV, use of a reference method that is likely to have the same systemic errors (gated Tc-99m-MIBI SPECT), and other technical factors related to the count density of gated SPECT. With optimization of gated imaging protocols and more validation studies, gated Tl-201 SPECT would be an accurate method to provide perfusion and function information in patients with coronary artery disease.

Differential Diagnosis of Hyperphenylalaninemias (고페닐알라닌혈증의 진단 및 평가)

  • Lee, Jeongho
    • Journal of The Korean Society of Inherited Metabolic disease
    • /
    • v.15 no.3
    • /
    • pp.110-117
    • /
    • 2015
  • All infants should be screened for phenylketonuria (PKU) within the three days of life, in order to allow timely dietary intervention to protect children with PKU from neurologic damage in Korea. A commonly used cut-off level for diagnosis of PKU is $240{\mu}mol/L$ (4 mg/dL). Up to 2% of cases of hyperphenylalaninemias (HPA) detected by the screening test will account for a disorder of $BH_4$ metabolism. Therefore, analysis of blood or urinary pterins is essential, backed up with measurement of DHPR activity, as this allows differentiation of $BH_4$ disorders. A $BH_4$ loading test and measurement of neurotransmitters in CSF provide further important information to the severity of $BH_4$ deficiency and $BH_4$ loading test can detect patients with $BH_4$ deficiency and $BH_4$ responsive PKU. Several protocols for $BH_4$ loading test have been described, involving treatment with $BH_4$ for periods ranging from 1 day to 1 month, and using doses of $BH_4$ of 10-20 mg/kg. There is general agreement that a reduction on blood phenylalanine of at least 30% in response to $BH_4$ loading indicates a clinically significant effect, although in some tests a lower cut-off value may be defined for individual patients, or no specific cut-off value is proposed. The frequency of $BH_4$ responsiveness is highest in patients with mild HPA and mild to moderate PKU resulting from PAH mutations with residual activity.

Authenticated Mobile IPv6 Binding Update Protocol for Micro/Pico Cell Environments (마이크로 및 피코 셀 환경에 적합한 인증된 모바일 IPv6 바인딩 갱신 프로토콜)

  • Lee, Gi-Sung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.6
    • /
    • pp.1519-1523
    • /
    • 2007
  • In this paper, we propose the fast and secure binding update protocol as handoff or handover in the micro and pico environment based on mobile IPv6. The nodes or routers on participating in this protocol generate their addresses from cryptographically generated addresses (CGAs) method unlike previous address generation method. The mobile node (MN) includes in home network or home link has limited power and computational abilities. So the home agent (HA) of the MN executes key agreement protocol with the correspondent node (CN) on behalf of the MN. The CN then creates a ticket on including session key, lifetime of ticket. and so on. It then transmits it to the MN via the HA of the MN. The ticket is used to communicate directly between the MN and its CN. In performance analysis, we analyze security of proposed binding update protocol under various attack scenarios and efficiency by comparing proposed protocol with prior binding update protocols. Finally we make a conclusion of this paper and present future works.

  • PDF