• Title/Summary/Keyword: construction protocol

Search Result 272, Processing Time 0.025 seconds

A Study on Key Information Service Protocol for Secure XML Web Service (안전한 XML 웹 서비스를 위한 키 정보 서비스 프로토콜에 관한 연구)

  • Park, Nam-Je;Moon, Ki-Young;Sohn, Sung-Won
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.769-778
    • /
    • 2003
  • XKMS(XML Key Management Specification), one of XML Security specification, defines the protocol for distributing and registering public keys for verifying digital signatures and enciphering XML documents of web service applications with various and complicate functions. In this paper, we propose XML Key Information protocol service model and implements reference model of protocol component based on standard specification. Also describes the analysis and security method of Key Information Service(XKIS) for Secure XML Web Service,paying attention to the features of XML based security service. This protocol component supported includes public key location by given identifier information, the binding of such keys to edentifier information. This reference model offers the security construction guideline for future domestric e-Business Frameworks.

Securing Anonymous Authenticated Announcement Protocol for Group Signature in Internet of Vehicles

  • Amir, Nur Afiqah Suzelan;Malip, Amizah;Othman, Wan Ainun Mior
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.11
    • /
    • pp.4573-4594
    • /
    • 2020
  • Announcement protocol in Internet of Vehicles (IoV) is an intelligent application to enhance public safety, alleviate traffic jams and improve transportation quality. It requires communication between vehicles, roadside units and pedestrian to disseminate safety-related messages. However, as vehicles connected to internet, it makes them accessible globally to a potential adversary. Safety-related application requires a message to be reliable, however it may intrude the privacy of a vehicle. Contrarily, if some misbehaviour emerges, the malicious vehicles must be able to traceable and revoke from the network. This is a contradiction between privacy and accountability since the privacy of a user should be preserved. For a secure communication among intelligent entities, we propose a novel announcement protocol in IoV using group signature. To the best of our knowledge, our work is the first comprehensive construction of an announcement protocol in IoV that deploys group signature. We show that our protocol efficiently solves these conflicting security requirements of message reliability, privacy and accountability using 5G communication channel. The performance analysis and simulation results signify our work achieves performance efficiency in IoV communication.

Photogrammetric Crack Detection Method in Building using Unmanned Aerial Vehicle (사진측량법을 활용한 무인비행체의 건축물 균열도 작성 기법)

  • Jeong, Dong-Min;Lee, Jong-Hoon;Ju, Young-Kyu
    • Journal of the Architectural Institute of Korea Structure & Construction
    • /
    • v.35 no.1
    • /
    • pp.11-19
    • /
    • 2019
  • Recently, with the development of the fourth industrial revolution that has been achieved through the fusion of information and communication technology (ICT), the technologies of AI, IOT, BIG-DATA, it is increasing utilization rate by industry and research and development of application technologies are being actively carried out. Especially, in the case of unmanned aerial vehicles, the construction market is expected to be one of the most commercialized areas in the world for the next decade. However, research on utilization of unmanned aerial vehicles in the construction field in Korea is insufficient. In this study, We have developed a quantitative building inspection method using the unmanned aerial vehicle and presented the protocol for it. The proposed protocol was verified by applying it to existing old buildings, and defect information could be quantified by calculating length, width, and area for each defect. Through this technical research, the final goal is to contribute to the development of safety diagnosis technology using unmanned aerial vehicle and risk assessment technology of buildings in case of disaster such as earthquake.

AN ASSESSMENT SYSTEM OF ECO-FRIENDLINESS OF CONSTRUCTED FACILITY IN THE DESIGN PHASE USING VALUE ENGINEERING

  • Byung-Soo, Kim;Dong-Eun, Lee;Suk-Hyun, Kwon;Min-Kwon, Choe
    • International conference on construction engineering and project management
    • /
    • 2009.05a
    • /
    • pp.1625-1629
    • /
    • 2009
  • The new paradigm called 'Low Carbon Green Growth' involved in reducing greenhouse gas is on the rise as a critical issue worldwide. The essential of Kyoto protocol issued in 1997 is to achieve the sustainable economic growth environments by converting existing production system to eco-friendly one. The protocol imposes the liability to reduce greenhouse gas to the countries joined to it. The paradigm is directly involved in the energy consumption and environmental pollution caused by construction activities. Value Engineering which are mainly applied in the design phase in practice is a measure to improve the value of a constructed facility by analyzing and/or appraising the functions and costs of it. However, an appropriate method which assesses eco-friendliness of constructed facility has not been propose by researchers. This paper proposes a method which assesses the performance involved in eco-friendliness of constructed facility using Value Engineering (VE) in the design phase. The method estimates the environmental cost relative to the amounts of energy consumption and environmental pollution occurred over the entire project life cycle. The database called "Life Cycle Inventory DB", which stores information about the amounts of environmental pollution, is used. The algorithm which retrieves the amounts of environmental pollutions from the DB and converts them into environmental costs is developed. The algorithm is implemented into a system which quantifies the eco-friendliness of constructed facility in the design phase using VE.

  • PDF

An Entropy-based Dynamic Routing Protocol for Supporting Effective Route Stability in Mobile Ad-hoc Wireless Sensor Networks (모바일 Ad-hoc 무선 센서 네트워크에서 효과적인 경로 안정성을 지원하기 위한 엔트로피 기반 동적 라우팅 프로토콜)

  • An, Beongku
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.6
    • /
    • pp.29-34
    • /
    • 2008
  • In this paper, we propose an entropy-based dynamic routing protocol for supporting effective route stability in mobile ad-hoc wireless sensor networks(MAWSN). The basic ideas and features are as follows. First, construction of entropy-based stable routing route using mobility of nodes between a source node and a destination node. Second, usage of location and direction information for route construction to support resource saving. Third, We consider a realistic approach, in the points of view of the MAWSN, based on mobile sensor nodes as well as fixed sensor nodes in sensor fields while the conventional research for sensor networks focus on mainly fixed sensor nodes. The performance evaluation of the proposed routing protocol is performed via simulation using OPNET. The simulation results show the proposed routing protocol can effectively support route stability and packet delivery ratio.

  • PDF

Multi-Hop Vehicular Cloud Construction and Resource Allocation in VANETs (VANET 망에서 다중 홉 클라우드 형성 및 리소스 할당)

  • Choi, Hyunseok;Nam, Youngju;Lee, Euisin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.11
    • /
    • pp.263-270
    • /
    • 2019
  • Vehicular cloud computing is a new emerging technology that can provide drivers with cloud services to enable various vehicular applications. A vehicular cloud is defined as a set of vehicles that share their own resources. Vehicles should collaborate with each other to construct vehicular clouds through vehicle-to-vehicle communications. Since collaborating vehicles to construct the vehicular cloud have different speeds, directions and locations respectively, the vehicular cloud is constructed in multi-hop communication range. Due to intermittent wireless connectivity and low density of vehicles with the limited resources, the construction of vehicular cloud with multi-hop communications has become challenging in vehicular environments in terms of the service success ratio, the service delay, and the transmitted packet number. Thus, we propose a multi-hop vehicular cloud construction protocol that increases the service success ratio and decreases the service delay and the transmitted packet number. The proposed protocol uses a connection time-based intermediate vehicle selection scheme to reduce the cloud failure probability of multi-hop vehicular cloud. Simulation results conducted in various environments verify that the proposed protocol achieves better performance than the existing protocol.

Revocation Protocol for Group Signatures in VANETs: A Secure Construction

  • Shari, Nur Fadhilah Mohd;Malip, Amizah;Othman, Wan Ainun Mior
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.299-322
    • /
    • 2020
  • Vehicular ad hoc networks (VANETs) enable wireless communication between vehicles and roadside infrastructure to provide a safer and more efficient driving environment. However, due to VANETs wireless nature, vehicles are exposed to several security attacks when they join the network. In order to protect VANETs against misbehaviours, one of the vital security requirements is to revoke the misbehaved vehicles from the network. Some existing revocation protocols have been proposed to enhance security in VANETs. However, most of the protocols do not efficiently address revocation issues associated with group signature-based schemes. In this paper, we address the problem by constructing a revocation protocol particularly for group signatures in VANETs. We show that this protocol can be securely and efficiently solve the issue of revocation in group signature schemes. The theoretical analysis and simulation results demonstrate our work is secure against adversaries and achieves performance efficiency and scalability.

Analysis of regulatory action for environmental protection in International Commerce (국제교역에 있어 환경보호를 위한 규제조치의 내용 분석)

  • Lee, Jae-Young
    • International Commerce and Information Review
    • /
    • v.11 no.1
    • /
    • pp.379-403
    • /
    • 2009
  • The Purpose of this study is to research the problems of trade restriction for an environment protection. Environmental regulation relate to trade are Convention on International Trade in Endangered Species of Wild Fauna & Flora, Montreal Protocol on Substances that Deplete the Ozone Layer, Kyoto Protocol to the UN Framework Convention on Climate Change, Basel Convention on the Control of Transboundary Movements of Hazardous Wastes & Their Disposal, Cartagena Protocol on Biosafty and WTO Agreement. Regulatory action for environmental protection has economics instrument, command & control, liablity, damage compensation, voluntary agreement. In the case of our country, impact of regulatory action for environmental protection is low. Because is recognized position of developing country yet. For in the balance rules of trade and enviroment, First must satisfy WTO's basic principles and principle of quantitative restrictions prohibition, Second, operation of protection action must reasonable and objective standards Third, must satisfy GATT article 20 (b) clause and (g) protestation each essential factor To grow for environment advanced country, we should do i) using of FTA ii) international cooperation strengthening for developing country position iii) construction of environment information network

  • PDF

The Construction of AHU Control Network by Power Line Communication (전력선 통신에 의한 공기조화설비 제어네트워크 구축)

  • Kim, Myungho;Ahn, Kyochol
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.1 no.2
    • /
    • pp.7-11
    • /
    • 2008
  • In order to enhance standardization and interoperability of local level systems, AHU control network was designed with basement(8 point) and basis story(15 point) and then the network was constructed by power line communication. Each devices of AHU system were programed with neuron C of $L_{ON}W_{ORKS}$ as an open protocol. As a result of a study, each devices of the network were controlled with self dispersion process by $L_{ON}W_{ORKS}$ protocol and wiring could be reduced by power line communication.

  • PDF

Group Key Agreement From Signcryption

  • Lv, Xixiang;Li, Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.12
    • /
    • pp.3338-3351
    • /
    • 2012
  • There is an intuitive connection between signcryption and key agreement. Such a connector may lead to a novel way to construct authenticated and efficient group key agreement protocols. In this paper, we present a primary approach for constructing an authenticated group key agreement protocol from signcryption. This approach introduces desired properties to group key agreement. What this means is that the signcryption gives assurance to a sender that the key is available only to the recipient, and assurance to the recipient that the key indeed comes from the sender. Following the generic construction, we instantiate a distributed two-round group key agreement protocol based on signcryption scheme given by Dent [8]. We also show that this concrete protocol is secure in the outsider unforgeability notion and the outsider confidentiality notion assuming hardness of the Gap Diffie-Hellman problem.