• Title/Summary/Keyword: one time random number

Search Result 134, Processing Time 0.026 seconds

Quantum cryptography-used Key Distribution Model Design of U-healthcare environment (양자 암호를 이용한 유헬스케어 환경의 키 분배 모델 설계)

  • Jeong, Yoon-Su;Han, Kun-Hee
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.389-395
    • /
    • 2013
  • As fusing IT and medical technique, the number of patients who adhere medical equipment inside of them is increasing. However there is a problem of for the third person to tap or modulate the patient's biometric data viciously. This paper suggests quantum encryption-based key distribution model to share key for the third person not to tap or modulate the patient's biometric data between patient and hospital staff. The proposed model uses one-time pad key that shares key sending random bits not direct sending message of quantum data. Also, it guarantees patient's anonymity because the biometric data of injected-device in the body doesn't be exposed unnecessarily.

Ramp Metering under Exogenous Disturbance using Discrete-Time Sliding Mode Control (이산 슬라이딩모드 제어를 이용한 램프 미터링 제어)

  • Jin, Xin;Chwa, Dongkyoung;Hong, Young-Dae
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.12
    • /
    • pp.2046-2052
    • /
    • 2016
  • Ramp metering is one of the most efficient and widely used control methods for an intelligent transportation management system on a freeway. Its objective is to control and upgrade freeway traffic by regulating the number of vehicles entering the freeway entrance ramp, in such a way that not only the alleviation of the congestion but also the smoothing of the traffic flow around the desired density level can be achieved for the maintenance of the maximum mainline throughput. When the cycle of the signal detection is larger than that of the system process, the density tracking problem needs to be considered in the form of the discrete-time system. Therefore, a discrete-time sliding mode control method is proposed for the ramp metering problem in the presence of both input constraint in the on-ramp and exogenous disturbance in the off-ramp considering the random behavior of the driver. Simulations were performed using a validated second-order macroscopic traffic flow model in Matlab environment and the simulation results indicate that proposed control method can achieve better performance than previously well-known ALINEA strategy in the sense that mainstream flow throughput is maximized and congestion is alleviated even in the presence of input constraint and exogenous disturbance.

Ensemble of Nested Dichotomies for Activity Recognition Using Accelerometer Data on Smartphone (Ensemble of Nested Dichotomies 기법을 이용한 스마트폰 가속도 센서 데이터 기반의 동작 인지)

  • Ha, Eu Tteum;Kim, Jeongmin;Ryu, Kwang Ryel
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.4
    • /
    • pp.123-132
    • /
    • 2013
  • As the smartphones are equipped with various sensors such as the accelerometer, GPS, gravity sensor, gyros, ambient light sensor, proximity sensor, and so on, there have been many research works on making use of these sensors to create valuable applications. Human activity recognition is one such application that is motivated by various welfare applications such as the support for the elderly, measurement of calorie consumption, analysis of lifestyles, analysis of exercise patterns, and so on. One of the challenges faced when using the smartphone sensors for activity recognition is that the number of sensors used should be minimized to save the battery power. When the number of sensors used are restricted, it is difficult to realize a highly accurate activity recognizer or a classifier because it is hard to distinguish between subtly different activities relying on only limited information. The difficulty gets especially severe when the number of different activity classes to be distinguished is very large. In this paper, we show that a fairly accurate classifier can be built that can distinguish ten different activities by using only a single sensor data, i.e., the smartphone accelerometer data. The approach that we take to dealing with this ten-class problem is to use the ensemble of nested dichotomy (END) method that transforms a multi-class problem into multiple two-class problems. END builds a committee of binary classifiers in a nested fashion using a binary tree. At the root of the binary tree, the set of all the classes are split into two subsets of classes by using a binary classifier. At a child node of the tree, a subset of classes is again split into two smaller subsets by using another binary classifier. Continuing in this way, we can obtain a binary tree where each leaf node contains a single class. This binary tree can be viewed as a nested dichotomy that can make multi-class predictions. Depending on how a set of classes are split into two subsets at each node, the final tree that we obtain can be different. Since there can be some classes that are correlated, a particular tree may perform better than the others. However, we can hardly identify the best tree without deep domain knowledge. The END method copes with this problem by building multiple dichotomy trees randomly during learning, and then combining the predictions made by each tree during classification. The END method is generally known to perform well even when the base learner is unable to model complex decision boundaries As the base classifier at each node of the dichotomy, we have used another ensemble classifier called the random forest. A random forest is built by repeatedly generating a decision tree each time with a different random subset of features using a bootstrap sample. By combining bagging with random feature subset selection, a random forest enjoys the advantage of having more diverse ensemble members than a simple bagging. As an overall result, our ensemble of nested dichotomy can actually be seen as a committee of committees of decision trees that can deal with a multi-class problem with high accuracy. The ten classes of activities that we distinguish in this paper are 'Sitting', 'Standing', 'Walking', 'Running', 'Walking Uphill', 'Walking Downhill', 'Running Uphill', 'Running Downhill', 'Falling', and 'Hobbling'. The features used for classifying these activities include not only the magnitude of acceleration vector at each time point but also the maximum, the minimum, and the standard deviation of vector magnitude within a time window of the last 2 seconds, etc. For experiments to compare the performance of END with those of other methods, the accelerometer data has been collected at every 0.1 second for 2 minutes for each activity from 5 volunteers. Among these 5,900 ($=5{\times}(60{\times}2-2)/0.1$) data collected for each activity (the data for the first 2 seconds are trashed because they do not have time window data), 4,700 have been used for training and the rest for testing. Although 'Walking Uphill' is often confused with some other similar activities, END has been found to classify all of the ten activities with a fairly high accuracy of 98.4%. On the other hand, the accuracies achieved by a decision tree, a k-nearest neighbor, and a one-versus-rest support vector machine have been observed as 97.6%, 96.5%, and 97.6%, respectively.

On Recovering Erased RSA Private Key Bits

  • Baek, Yoo-Jin
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.10 no.3
    • /
    • pp.11-25
    • /
    • 2018
  • While being believed that decrypting any RSA ciphertext is as hard as factorizing the RSA modulus, it was also shown that, if additional information is available, breaking the RSA cryptosystem may be much easier than factoring. For example, Coppersmith showed that, given the 1/2 fraction of the least or the most significant bits of one of two RSA primes, one can factorize the RSA modulus very efficiently, using the lattice-based technique. More recently, introducing the so called cold boot attack, Halderman et al. showed that one can recover cryptographic keys from a decayed DRAM image. And, following up this result, Heninger and Shacham presented a polynomial-time attack which, given 0.27-fraction of the RSA private key of the form (p, q, d, $d_p$, $d_q$), can recover the whole key, provided that the given bits are uniformly distributed. And, based on the work of Heninger and Shacham, this paper presents a different approach for recovering RSA private key bits from decayed key information, under the assumption that some random portion of the private key bits is known. More precisely, we present the algorithm of recovering RSA private key bits from erased key material and elaborate the formula of describing the number of partially-recovered RSA private key candidates in terms of the given erasure rate. Then, the result is justified by some extensive experiments.

A Preventive Maintenance Scheduling Model of the Cluster Tool (클러스터 툴의 예방유지보수 스케줄링 모형)

  • Lee, Hyun;Park, You-Jin;Hur, Sun
    • IE interfaces
    • /
    • v.25 no.1
    • /
    • pp.127-133
    • /
    • 2012
  • This paper considers the preventive maintenance scheduling problem of the cluster tool which is one of the most important manufacturing equipments in the next-generation semiconductor production environment. We define a random process that expresses the successive amount of chemicals accumulating inside the tool. Based on the renewal theory, we find the expected value and probability distribution of the time that the amount of accumulated chemicals exceeds a predetermined level. For a given probability that the accumulated chemicals exceeds the predetermined level we present a method to obtain the number of chamber operations to perform the preventive maintenance of that chamber. In addition, a method to get the preventive maintenance schedule for the whole cluster tool is presented. A numerical example is provided to illustrate our method.

A Study on Mobile OTP Generation Model (모바일 OTP 생성 모델에 관한 연구)

  • Jeong, Yoon-Su;Han, Sang-Ho;Shin, Seung-Soo
    • Journal of Digital Convergence
    • /
    • v.10 no.2
    • /
    • pp.183-191
    • /
    • 2012
  • This study proposes dual certification model using both what users know and what users own. In detail, this mobile OTP generation model is made up of mobile OTP generation and extraction algorithm satisfying the conditions for reviewing mobile OTP implementation. In order to improve the security of the existing OTP-based systems, the suggested method utilizes user's ID and random number at the mobile OTP generation stage.

A Study on the Optimal Design for Smart Distribution System (스마트 배전시스템의 최적 구성 방안에 관한 연구)

  • Ji, Seong-Ho;Son, Jun-Ho;Song, Seok-Hwan;Rho, Dae-Seok
    • Proceedings of the KAIS Fall Conference
    • /
    • 2009.12a
    • /
    • pp.834-836
    • /
    • 2009
  • The authors have been discussed the optimal voltage regulation method and on-line real time method using artificial neural networks in the distribution system interconnected with Distributed Generation and Storage(DSG) systems. However, these methods have difficulty in dealing with the random load variations and operation characteristics of a number of DSG systems. To overcome these problems, this paper shows the basic concepts of smart grid system which is considered as one of the power delivery system in the near future and presents an evaluation method on the impacts of customer voltages by the operation of smart grid system. The smart grid system can change the system configuration in a flexible manner by using the static switches and offer the different power qualities in power services through the power quality control centers.

  • PDF

Design of RFID Mutual Authentication Protocol for Mobile RFID (모바일 RFID를 위한 보안 RFID 상호인증 프로토콜 설계)

  • Lee, Seung-Min;Kim, Eun-Hwan;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2B
    • /
    • pp.183-190
    • /
    • 2010
  • Recently, there is still vulnerability of attack, such as location tracking attack, replay attack, spoofing attack etc for all that is much research for Mobile RFID authentication. This paper designed method of making one time random number in DB server side unlike previously researched protocols, and it protects RFID communication from location tracking, replay attack and spoofing attack.

A Method for the Measurement of Flow Rate in Pipe using a Microphone Array (등간격으로 배열된 마이크로폰을 이용한 관내 유량측정 방법)

  • Kim, Yong-Beum;Kim, Yang-Hann
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2000.06a
    • /
    • pp.1667-1674
    • /
    • 2000
  • A new method is proposed to measure the flow rate in a pipe by multiple measurements of acoustic pressure using a microphone array. It is based on the realization that variation in flow velocity affects the change in wave number. The method minimizes measurement random errors and sensor mismatch errors thereby providing practically realizable flow rate measurement. One of the advantages of the method is that it does not obstruct the flow field and can provide the time-spatial mean flow rate. Numerical simulations and experiments were conducted to verify the utility of this method.

  • PDF

An RFID mutual authentication protocol using one-time random number (일회성 난수를 사용하는 RFID 상호인증 프로토콜)

  • Oh, Sejin;Chung, Kyungho;Ahn, Kwangseon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.611-612
    • /
    • 2009
  • 무선을 이용한 RFID 시스템의 메시지 전송은 보안에 취약하다. 그 중 서비스 거부 공격은 백-앤드 서버, 리더 또는 태그에게 많은 연산량으로 비동기화를 일으키는 것을 말한다. 특히, 서버에서 ID를 검색하는데 많은 시간 및 연산량으로 인한 문제점들이 있다. 이를 해결하고자 인증된 개체와의 메시지를 서버에 전달한 후 ID를 검색하도록 하여 서버에 대한 부하를 최소화 한다. 또한 인증에 사용되는 값은 일회용 난수를 키와 메시지로 활용하여 보안에 안전한 프로토콜을 제안한다.