• Title/Summary/Keyword: key pre-distribution

Search Result 83, Processing Time 0.027 seconds

Error Control Protocol and Data Encryption Mechanism in the One-Way Network (일방향 전송 네트워크에서의 오류 제어 프로토콜 및 데이터 암호화 메커니즘)

  • Ha, Jaecheol;Kim, Kihyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.613-621
    • /
    • 2016
  • Since the error control problem is a critical and sensitive issue in the one-way network, we can adopt a forward error correction code method or data retransmission method based on the response of reception result. In this paper, we propose error control method and continuous data transmission protocol in the one-way network which has unidirectional data transmission channel and special channel to receive only the response of reception result. Furthermore we present data encryption and key update mechanism which is based on the pre-shared key distribution scheme and suggest some ASDU(Application Service Data Unit) formats to implement it in the one-way network.

Non-linear stability analysis of a hybrid barrel vault roof

  • Cai, Jianguo;Zhou, Ya;Xu, Yixiang;Feng, Jian
    • Steel and Composite Structures
    • /
    • v.14 no.6
    • /
    • pp.571-586
    • /
    • 2013
  • This paper focuses on the buckling capacity of a hybrid grid shell. The eigenvalue buckling, geometrical non-linear elastic buckling and elasto-plastic buckling analyses of the hybrid structure were carried out. Then the influences of the shape and scale of imperfections on the elasto-plastic buckling loads were discussed. Also, the effects of different structural parameters, such as the rise-to-span ratio, beam section, area and pre-stress of cables and boundary conditions, on the failure load were investigated. Based on the comparison between elastic and elasto-plastic buckling loads, the effect of material non-linearity on the stability of the hybrid barrel vault is found significant. Furthermore, the stability of a hybrid barrel vault is sensitive to the anti-symmetrical distribution of loads. It is also shown that the structures are highly imperfection sensitive which can greatly reduce their failure loads. The results also show that the support conditions pose significant effect on the elasto-plastic buckling load of a perfect hybrid structure.

A Study on Implementation of Authentication System for Home Networking Service (홈 네트워크 서비스를 위한 인증시스템 구현에 관한 연구)

  • Lee, Ki-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.6
    • /
    • pp.1091-1098
    • /
    • 2009
  • In this paper, we designed the authentication system for home network service and applied it to actual sensor nodes. The pair-wise pre-distribution key skim is applied for prevention of authentication key from sniffing on the wireless sensor networks. The authentication key and data are encrypted by using the CBC mode RC5 algorithm based on the SPINS. The experimental environment consists of a base station (BS)and sensor nodes and each sensor node sends both sensing data and the encrypted authentication key to the BS. For simulations we set up some what-if scenarios of security menaces in home network service.Slightly modified the TOS_Msg data arrays of TinyOS is suggested to store 8-byte authentication key which can enable data encryption and authentication at the each sensor node. As a result, malfunction caused by communication between BS and nodes of other groups of added nodes having malicious purpose can be protected. Also, we confirmed that a critical data of home networking service like vital signal can be transmitted securely through this system by encryption technique.

The Design and Implementation of a Security Management Server for Pre-Distributed Key Exchange Method and Lightweight Key Distribution Protocol for Mobile Ad-hoc Node (이동 Ad-hoc 노드용 사전 키 분배 기법 및 경량 키 분배 프로토콜을 위한 보안관리 서버 시스템 설계 및 구현)

  • Yang, Jong-Won;Seo, Chang-Ho;Lee, Tae-Hoon
    • Journal of Internet Computing and Services
    • /
    • v.8 no.6
    • /
    • pp.1-8
    • /
    • 2007
  • The Mobile Ad-hoc network does environmental information which an individual collects in nodes which are many as the kernel of the USN technology based on the radio communication. And it is the latest network description delivering critical data to the destination location desiring through a multi-hop. Recently, the Ad-hoc network relative technique development and service are activated. But the security function implementation including an authentication and encoding about the transmitted packets, and etc, is wirelessly the insufficient situation on the Ad-hoc network. This paper provides the security service of key exchange, key management. entity authentication, data enciphering, and etc on the Mobile Ad-hoc network. It implements with the Ad-hoc network security management server system design which processes the security protocol specialized in the Ad-hoc network and which it manages.

  • PDF

Understanding N-nitrosodimethylamine (NDMA) formation during chloramination: Precursor characteristics, pathways and mitigation (상수 염소 처리 과정중에 형성되는 N-니트로소디메틸아민에 대한 이해: 전구체의 특징, 경로와 경감)

  • Seid., Mingizem Gashaw;Son, Aseom;Cho, Kangwoo;Hong, Seokwon
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.32 no.3
    • /
    • pp.279-289
    • /
    • 2018
  • N-nitrosodimethylamine (NDMA) is a class of disinfection byproducts and a frequently detected nitrosamine with carcinogenic potentials. This review summarizes NDMA precursors, their formation mechanisms in chloraminated water, and mitigation strategies. Understanding the formation mechanism and characteristics of precursors is essential for developing a mitigation strategy. Dimethylamine (DMA), the most widely studied NDMA precursor, has an NDMA molar yield up to 3%. In comparison, a subset of tertiary amines, e.g., pharmaceuticals, generate up to 90% upon chloramination. Potent NDMA precursors, are characterized by their negative partial charge, low planarity values and molecular weight, and high bond length and $pK_a$ values. A nucleophilic substitution of tertiary amine on chloramine is a key reason for the high NDMA yield from the most potent NDMA precursors. The distribution and fate of NDMA in surface water, aquifers, and its formation in the distribution system can be mitigated through two strategies: (1) degrading or/removing NDMA after its formation and (2) pre-treatment of its precursor's prior chloramination.

The Application of CFD for Ship Design (선박설계를 위한 계산유체역학의 활용)

  • Kim Wu-Joan;Van Suak-Ho
    • Journal of computational fluids engineering
    • /
    • v.8 no.2
    • /
    • pp.42-48
    • /
    • 2003
  • The issues associated with the application of CFD for ship design are addressed. Doubtlessly at the moment, CFD tools are very useful in evaluating hull forms prior to traditional towing tank tests. However, time-consuming pre-processing is an obstacle in the daily application of CFD tools to improve hull forms. The accuracy of computational modeling without sacrificing the usability of CFD system is also to be assessed. The wave generation is still predicted by using potential panel methods, while velocity profiles entering into propeller plane is solved using turbulent flow solvers. The choice of turbulence model is a key to predict nominal wake distribution within acceptable accuracy. The experimental data for CFD validation are invaluable to improve physical and numerical modeling. Other applications of CFD for ship design than hull form improvement are also given. It is certain that CFD can be a cost-effective tool for the design of new and better ships.

Toxicoinformatics: The Master Key for Toxicogenomics

  • Lee, Wan-Sun;Kim, Yang-Seok
    • Molecular & Cellular Toxicology
    • /
    • v.1 no.1
    • /
    • pp.13-16
    • /
    • 2005
  • The current vision of toxicogenomics is the development of methods or platforms to predict toxicity of un characterized chemicals by using '-omics' information in pre-clinical stage. Because each chemical has different ADME (absorption, distribution, mechanism, excretion) and experimental animals have lots of variation, precise prediction of chemical's toxicity based on '-omics' information and toxicity data of known chemicals is very difficult problem. So, the importance of bioinformatics is more emphasized on toxicogenomics than other functional genomics studies because these problems can not be solved only with experiments. Thus, toxicoinformatics covers all information-based analytical methods from gene expression (bioinformatics) to chemical structures (cheminformatics) and it also deals with the integration of wide range of experimental data for further extensive analyses. In this review, the overall strategy to toxicoinformatics is discussed.

Secure Key Pre-distribution Scheme for Wireless Sensor Network (무선 센서 네트워크 환경에서의 안전한 키 분배 기법)

  • Jang Ji-Yong;Kim Hyoung-Jin;Kwon Tae-Kyoung;Song Joo-Seok
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.447-450
    • /
    • 2006
  • 센서 네트워크는 앞으로 다방면에서 활용되어질 것으로 기대되고 있다. 그러나 센서 노드들은 악의적인 공격자에 의해 통신내용이 수집되고 공격을 받거나 조작될 수 있는 적대적이고 안전하지 못한 환경에 위치할 수 있다. 더욱이 센서 네트워크는 메모리, 전력, 계산능력에 있어서 상당히 제약적인 노드들로 구성되기 때문에 기존의 키 관리 기법을 적용하기 어려우며, 따라서 별도의 키 관리 기법이 요구되어진다. 본 논문에서는 센서 네트워크에서의 키 관리에 관련한 연구들을 소개하고 좀 더 안전한 키 분배 기법을 제안하고자 한다.

  • PDF

A hierarchical key pre-distribution scheme for wireless sensor network (무선 센서 네트워크를 위한 계층적인 사전 키 분배 방법)

  • 김복순;조기환;이행곤
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.361-363
    • /
    • 2004
  • 무선 센서 네트워크(WSN: Wireless Sensor Network) 환경에서 보안성을 확보하기 위하여, 센서 노드간에 전송된 메시지를 암호화하고 인증하는 것이 중요하다. 암호화와 인증을 위해 사용되는 키는 통신 노드 사이에 합의되어야 한다. 그러나 자원의 제약성 때문에, 일반적인 네트워크에서 많이 사용되는 Diffie-Hellman이나 공개키 기반 키 협의 방법은 WSN 환경에 적합하지 않다. 많은 노드에 비밀키를 사전에 정적으로 분배하는 것은 대용량의 메모리와 계산 능력을 요구하고, 네트워크 환경이 커짐에 따라 이들의 요구량이 급증하기 때문이다. 따라서 이러한 사전 키 분배 문제를 해결하기 위하여, 본 논문은 계층적인 사전 키 분배 방법을 제시한다. 제안된 방법은 기존 방법론과 비교하여 센서 노드간의 공유키가 존재 할 가능성을 증가시켜, 통신 채널을 쉽게 형성할 수 있도록 하였다. 또한 외부 공격자의 위협에 대비하여 q-composite 이론을 적용하여, 보안성을 강화시켰다.

  • PDF

The Application of CED for Ship Design (선박설계를 위한 계산유체역학의 활용에 대하여)

  • Kim Wu-Joan
    • Proceedings of the KSME Conference
    • /
    • 2002.08a
    • /
    • pp.5-8
    • /
    • 2002
  • The issues associated with the application of CFD for ship design are addressed. It is quite certain that the CFD tools are very useful in evaluating hull forms a prior to traditional towing tank tests. However, the time-consuming pre-processing is an obstacle in the daily application of CFD tools to improve hull forms. The accuracy of computational modeling without sacrificing the usability of CFD system is also to be assessed. The wave generation is still predicted by using potential panel methods, while velocity profiles entering into propeller plane is solved using turbulent flow solvers. The choice of turbulence model is a key to predict nominal wake distribution within acceptable accuracy. The experimental data for CFD validation are invaluable to improve physical and numerical modeling. Other applications of CFD for ship design than hull form improvement are also given. It is certain that CFD can be a cost-effective tool for the design of new and better ships.

  • PDF