• Title/Summary/Keyword: on channel

Search Result 13,565, Processing Time 0.045 seconds

IP Camera Authentication and Key Exchange Protocol Using ID-Based Signature Scheme (ID 기반 서명 기법을 이용한 IP 카메라 인증 및 키 교환 프로토콜)

  • Park, Jin Young;Song, Chi-ho;Kim, Suk-young;Park, Ju-hyun;Park, Jong Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.789-801
    • /
    • 2018
  • Currently widely used IP cameras provide the ability to control IP cameras remotely via mobile devices. To do so, the IP camera software is installed on the website specified by the camera manufacturer, and authentication is performed through the password between the IP camera and the mobile device. However, many products currently used do not provide a secure channel between the IP camera and the mobile device, so that all IDs and passwords transmitted between the two parties are exposed. To solve these problems, we propose an authentication and key exchange protocol using ID-based signature scheme. The proposed protocol is characterized in that (1) mutual authentication is performed using ID and password built in IP camera together with ID-based signature, (2) ID and password capable of specifying IP camera are not exposed, (3) provide forward-secrecy using Diffie-Hellman key exchange, and (4) provide security against external attacks as well as an honest-but-curious manufacturer with the master secret key of the ID-based signature.

Password-Based Authentication Protocol for Remote Access using Public Key Cryptography (공개키 암호 기법을 이용한 패스워드 기반의 원거리 사용자 인증 프로토콜)

  • 최은정;김찬오;송주석
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.75-81
    • /
    • 2003
  • User authentication, including confidentiality, integrity over untrusted networks, is an important part of security for systems that allow remote access. Using human-memorable Password for remote user authentication is not easy due to the low entropy of the password, which constrained by the memory of the user. This paper presents a new password authentication and key agreement protocol suitable for authenticating users and exchanging keys over an insecure channel. The new protocol resists the dictionary attack and offers perfect forward secrecy, which means that revealing the password to an attacher does not help him obtain the session keys of past sessions against future compromises. Additionally user passwords are stored in a form that is not plaintext-equivalent to the password itself, so an attacker who captures the password database cannot use it directly to compromise security and gain immediate access to the server. It does not have to resort to a PKI or trusted third party such as a key server or arbitrator So no keys and certificates stored on the users computer. Further desirable properties are to minimize setup time by keeping the number of flows and the computation time. This is very useful in application which secure password authentication is required such as home banking through web, SSL, SET, IPSEC, telnet, ftp, and user mobile situation.

Performance Analysis of a Cell - Cluster - Based Call Control Procedure for Wireless ATM Networks (셀집단화 방식에 근거한 무선 ATM 호제어절차의 성능분석)

  • Cho, Young-Jong;Kim, Sung-Soo
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.7
    • /
    • pp.1804-1820
    • /
    • 1997
  • In this paper, an efficient call control procedure is presented for next generation wireless ATM networks and its performance is mathematically analyzed using the open queueing network. This procedure is based on a new scheme called as the cell clustering. When we use the cell clustering scheme, at the time that a mobile connection is admitted to the network, a virtual cell is constructed by choosing a group of neighboring base stations to which the call may probabilistically hand over and by assigning to the call a collection of virtual paths between the base stations. Within a microcell/picocell environment, it is seen that the cell clustering can support effectively a very high rate of handovers, provides very high system capacity, and guarantees a high degree of frequency reuse over the same geographical region without requiring the intervention of the network call control processor each time a handover occurs. But since mobiles, once admitted, are free to roam within the virtual cell, overload condition occurs in which the number of calls to be handled by one base station to exceed that cell site's capacity of radio channel. When an overload condition happens, the quality of service is abruptly degraded. We refer to this as the overload state and in order to quantify the degree of degradation we define two metrics, the probability of overload and the normalized average time spent in the overload state. By using the open network queueing model, we derive closed form expressions for the maximum number of calls that can be admitted into the virtual cell such that the two defined metrics are used as the acceptance criteria for call admission control.

  • PDF

Engineering Geological Characteristics of volcanic rocks of the Northwestern Cheju Island, Korea (제주도 북서부 지역 화산암체의 지질공학 특성)

  • 김영기;최옥곤
    • The Journal of Engineering Geology
    • /
    • v.1 no.1
    • /
    • pp.19-37
    • /
    • 1991
  • The geology of the northwestern Cheju Island consist of Pleistocene to Holocene volcanic rocks which could be devided into basalt layers, the Sungsan Formation composed mainly of volcaniclastic debris exposed along the shoreline, and more than 30 cinder cones. Columnar joints and vesicles are dominant in the basalts of the Pyeosunri and the Sihungri basalt Formations. Volcaniclast and clay layers are intercalated in basaltic layers. When volcaniclast of the interlayers would be swept away by ground water and some caves of channel shape would be formaed. Overlying lavas cracked by columnar joints could be easily destroyed, collapsed and/or sunk. Geomechananical nature of the rocks such as strength may be controlled by the vesicularity(size, shape, and orientation of the vesicles) of the rocks. On the basis of vesicularity as a factor of strength, the effective strength ratio(Ke) could be calculated as Ke=0.3-0.72, in which the smaller Ke value reflects the lower in internal stress. In the studied area, the strength of the rocks tends to decrease as increasing in altitude of provenance of the rocks. The rocks in the area show relatively low values in angle of failure strength($\phi$) ranging from 10$^{\circ}$ to 30$^{\circ}$. In conclnsion, the rocks in question, majority of which the critical value exceeds 0.33, belong to the unstable rocks in the aspect of engineering geology.

  • PDF

Classification of Ground Subsidence Factors for Prediction of Ground Subsidence Risk (GSR) (굴착공사 중 지반함몰 위험예측을 위한 지반함몰인자 분류)

  • Park, Jin Young;Jang, Eugene;Kim, Hak Joon;Ihm, Myeong Hyeok
    • The Journal of Engineering Geology
    • /
    • v.27 no.2
    • /
    • pp.153-164
    • /
    • 2017
  • The geological factors for causing ground subsidence are very diverse. It can be affected by any geological or extrinsic influences, and even within the same geological factor, the soil depression impact factor can be determined by different physical properties. As a result of reviewing a large number of papers and case histories, it can be seen that there are seven categories of ground subsidence factors. The depth and thickness of the overburden can affect the subsidence depending on the existence of the cavity, whereas the depth and orientation of the boundary between soil and rock are dominant factors in the ground composed of soil and rock. In case of soil layers, more various influencing factors exist such as type of soil, shear strength, relative density and degree of compaction, dry unit weight, water content, and liquid limit. The type of rock, distance from the main fracture and RQD can be influential factors in the bedrock. When approaching from the hydrogeological point of view, the rainfall intensity, the distance and the depth from the main channel, the coefficient of permeability and fluctuation of ground water level can influence to ground subsidence. It is also possible that the ground subsidence can be affected by external factors such as the depth of excavation and distance from the earth retaining wall, groundwater treatment methods at excavation work, and existence of artificial facilities such as sewer pipes. It is estimated that to evaluate the ground subsidence factor during the construction of underground structures in urban areas will be essential. It is expected that ground subsidence factors examined in this study will contribute for the reliable evaluation of the ground subsidence risk.

A Comparison of Geomorphological and Hydrological Methods for Delimitation of Flood Plain in the Mankyung River, Korea (지형학적 및 수문학적 방법에 의한 만경강 홍수터 획정 방법 비교)

  • Kim, Ji-Sung;Lee, Chan-Joo;Kim, Joo-Hun;Choi, Cheonkyu;Kim, Kyu-Ho
    • Ecology and Resilient Infrastructure
    • /
    • v.2 no.2
    • /
    • pp.128-136
    • /
    • 2015
  • River areas include channels, floodplains and all the areas affected by physical and ecological processes in river systems. It is noticeably different from present riparian zone which is bounded by dykes. In this study, two methods for delineation of a floodplain are proposed, which are used for evaluation of the function of a river. One of them is a geomorphology-based technique and the other is hydrology-based inundation analysis. For the Mankyung River, these two methods are applied to delineate the floodplain area. Areas delineated with both methods are mutually compared. The results show that the geomorphology-based method is suitable for the delineation of a valley bottom, including the floodplain in a broader sense, which is unlike an inundated area reflecting contemporary hydrologic conditions. Compared with other flood frequency areas, a 100-year flood inundation area was found reasonable to represent the spatial extent of a floodplain without regard to the longitudinal location along a river. However, it is necessary in certain rivers reach where the division of a channel exists to compare a geomorphological analysis on a valley bottom with an inundation area of different frequencies.

Experimental Investigation of Water Discharge Capability According to Shape of Sluice for Tidal Power Generation - I. Physical Experiment (조력발전용 수문 형상에 따른 통수성능에 관한 실험적 연구 - I. 수리모형실험)

  • Lee, Dal-Soo;Oh, Sang-Ho;Yi, Jin-Hak;Park, Woo-Sun;Cho, Hyu-Sang;Kim, Duk-Gu
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.20 no.1
    • /
    • pp.73-80
    • /
    • 2008
  • An hydraulic experiment was carried out in an open channel flume in order to improve the technique of designing shape of the sluice used for tidal power generation, which greatly affects the economical efficiency of the construction of a tidal power plant. To predict the influence of change in the major design parameters relating to the sluice shape on the water discharge capability of the sluice, it was necessary to perform a precise experiment that is discriminated to previous feasibility studies or design projects. For this purpose, by installing various flow straighteners and rectifying structures inside the water supply system and the rectifying tank, the flow in the flume was stabilized as tranquil as possible. In addition, the measuring instruments and the location of installing them were carefully determined so as to minimize the errors intervened during the measurement of water discharge and water level. The method of estimating head difference between upstream and downstream of the sluice was also developed by taking account of the head loss due to the friction at the bottom and side walls in the flume.

A Study on Methods for Utilizing Digital Room in Public Library (공공도서관 디지털자료실 활성화 방안 연구)

  • Moon, Sung-Been;Kim, Pan-Jun;Lee, Mi-Kyeung
    • Journal of the Korean Society for information Management
    • /
    • v.26 no.1
    • /
    • pp.321-350
    • /
    • 2009
  • The purpose of this study is to find methods for utilizing digital room in public library and its efficient operation by analyzing the status quo of the digital rooms in public libraries, which had been built nation-widely about 5 years ago. It is found that it is urgent to supplement and improve the infrastructure of them. It is also required to build multi-functional digital rooms and an integrated operational system for digital rooms. Implementation of an integrated operational system, first of all, for applicable sections of digital room may be the best alternative. The multi-functional digital rooms can be built, which, in addition to its traditional function, can include a variety of original information resources and function of information creation using application programs, as well as functions such as education, information services, online/offline community creation, and activating information sharing. In the future, the digital rooms in public libraries must play a significant role as online/offline spaces, which are not the places for use and access to internet information resource, but for information/knowledge sharing and collaborative activities. It also must provide a communication channel between librarians and users as well as among users themselves.

Forward-Secure Public Key Broadcast Encryption (전방향 안전성을 보장하는 공개키 브로드캐스트 암호 기법)

  • Park, Jong-Hwan;Yoon, Seok-Koo
    • Journal of Broadcast Engineering
    • /
    • v.13 no.1
    • /
    • pp.53-61
    • /
    • 2008
  • Public Key Broadcast Encryption (PKBE) allows a sender to distribute a message to a changing set of users over an insecure channel. PKBE schemes should be able to dynamically exclude (i.e., revoke) a certain subset of users from decrypting a ciphertext, so that only remaining users can decrypt the ciphertext. Another important requirement is for the scheme to be forward-secrecy. A forward-secure PKBE (fs-PKBE) enables each user to update his private key periodically. This updated private key prevents an adversary from obtain the private key for certain past period, which property is particularly needed for pay-TV systems. In this paper, we present a fs-PKBE scheme where both ciphertexts and private keys are of $O(\sqrt{n})$ size. Our PKBE construction is based on Boneh-Boyen-Goh's hierarchical identity-based encryption scheme. To provide the forward-secrecy with our PKBE scheme, we again use the delegation mechanism for lower level identities, introduced in the BBG scheme. We prove chosen ciphertext security of the proposed scheme under the Bilinear Diffie-Hellman Exponent assumption without random oracles.

Effects of Fluoxetine on ATP-induced Calcium Signaling in PC12 Cells

  • Lee, Yeo-Min;Kim, Hee-Jung;Hong, Sun-Hwa;Kim, Myung-Jun;Min, Do-Sik;Rhie, Duck-Joo;Kim, Myung-Suk;Jo, Yang-Hyeok;Hahn, Sang-June;Yoon, Shin-Hee
    • The Korean Journal of Physiology and Pharmacology
    • /
    • v.8 no.1
    • /
    • pp.57-63
    • /
    • 2004
  • Fluoxetine, a widely used anti-depressant compound, has several additional effects, including blockade of voltage-gated ion channels. We examined whether fluoxetine affects ATP-induced calcium signaling in PC12 cells by using fura-2-based digital calcium imaging and assay for $[^3H]-inositol$ phosphates (IPs). Treatment with ATP $(100\;{\mu}M)$ for 2 min induced $[Ca^{2+}]_i$ increases. The ATP-induced $[Ca^{2+}]_i$ increases were significantly decreased by removal of extracellular $Ca^{2+}$ and treatment with the inhibitor of endoplasmic reticulum $Ca^{2+}$ ATPase thapsigargin $(1\;{\mu}M)$. Treatment with fluoxetine for 5 min blocked the ATP-induced $[Ca^{2+}]_i$ increase concentration-dependently. Treatment with fluoxetine $(30\;{\mu}M)$ for 5 min blocked the ATP-induced $[Ca^{2+}]_i$ increase following removal of extracellular $Ca^{2+}$ and depletion of intracellular $Ca^{2+}$ stores. While treatment with the L-type $Ca^{2+}$ channel antagonist nimodipine for 10 min inhibited the ATP-induced $[Ca^{2+}]_i$ increases significantly, treatment with fluoxetine alone blocked the ATP-induced responses. Treatment with fluoxetine also inhibited the 50 mM $K^+-induced$ $[Ca^{2+}]_i$ increases completely. However, treatment with fluoxetine did not inhibit the ATP-induced $[^3H]-IPs$ formation. Collectively, we conclude that fluoxetine inhibits ATP-indueed $[Ca^{2+}]_i$ increases in PC12 cells by inhibiting both an influx of extracellular $Ca^{2+}$ and a release of $Ca^{2+}$ from intracellular stores without affecting IPs formation.