• Title/Summary/Keyword: secure aggregation

Search Result 33, Processing Time 0.019 seconds

Secure Data Aggregation Using Enhanced Homomorphism in Smart Grids (스마트 그리드에서 향상된 Homomorphism 을 이용한 안전한 데이터 애그리게이션)

  • Park, Ji-Hae;Choi, Kyung;Doh, In-Shil;Chae, Ki-Joon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.993-996
    • /
    • 2011
  • 최근 그린 IT 에 대한 관심이 점차 고조되면서, 이 사업의 일환으로 저탄소, 녹색 성장을 위한 지능형 전력망인 스마트 그리드의 도입이 발 빠르게 진행되고 있다. 스마트 그리드를 통해 전력 공급자와 소비자의 양방향 통신으로 에너지 효율의 최적화가 가능하지만, 동시에 사이버 공격에 의한 개인정보의 노출위험에 대한 우려도 제기되고 있는 상황이다. 데이터의 안전한 전송을 위해 다양한 암호화 방식이 제안되고 있으며, 본 논문에서는 기밀성에만 초점을 맞춘 Homomorphic 암호화의 허점을 보완하기 위하여 additive Homomorphic 방식을 기반으로 하여 데이터 무결성을 보장 할 수 있는 새로운 방식을 제안하였다. 이 메커니즘을 통해 데이터는 최종 목적지까지 안전하게 도달했으며, 위조 및 변조 되지 않았다는 것을 보장받을 수 있다.

The research of transmission delay reduction for selectively encrypted video transmission scheme on real-time video streaming (실시간 비디오 스트리밍 서비스를 위한 선별적 비디오 암호화 방법의 전송지연 저감 연구)

  • Yoon, Yohann;Go, Kyungmin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.4
    • /
    • pp.581-587
    • /
    • 2021
  • Real-time video streaming scheme for multimedia content delivery and remote conference services is one of technologies that are significantly sensitive to data transmission delay. Recently, because of COVID-19, real-time video streaming contents for the services are significantly increased such as personal broadcasting and remote school class. In order to support the services, there is a growing emphasis on low transmission delay and secure content delivery, respectively. Therefore, our research proposed a packet aggregation algorithm to reduce the transmission delay of selectively encrypted video transmission for real-time video streaming services. Through the application of the proposed algorithm, the selectively encrypted video framework can control the amount of MPEG-2 TS packets for low latency transmission with a consideration of packet priorities. Evaluation results on testbed show that the application of the proposed algorithm to the video framework can reduce approximately 11% of the transmission delay for high and low resolution video.

Effects of Catalyst Dispersion for Reaction Energy Control on Eco-AZ91 MgH2 (Eco-AZ91 MgH2의 반응열 제어에 미치는 촉매 분산 효과)

  • SOOSUN LEE;SONG SEOK;TAE-WHAN HONG
    • Journal of Hydrogen and New Energy
    • /
    • v.34 no.6
    • /
    • pp.631-640
    • /
    • 2023
  • This study selected Eco-AZ91 MgH2, which shows high enthalpy as a material for this purpose, as the basic material, and analyzed the change in characteristics by synthesizing TiNi as a catalyst to control the thermodynamic behavior of MgH2. In addition, the catalyst dispersion technology using graphene oxide (GO) was studied to improve the high-temperature aggregation phenomenon of Ni catalyst and to secure a source technology that can properly disperse the catalyst. XRD, SEM, and BET analysis were conducted to analyze the metallurgical properties of the material, and TGA and DSC analysis were conducted to analyze the dehydrogenation temperature and calorific value, and the correlation between MgH2, TiNi catalyst, and GO reforming catalyst was analyzed. As a result, the MgH2-5 wt% TiNi at GO composite could lower the dehydrogenation temperature to 478-492 K due to the reduction of the catalyst aggregation phenomenon and the increase in the reaction specific surface area, and an experimental result for the catalyst dispersion technology by GO could be ensured.

Clustered Tributaries-Deltas Architecture for Energy Efficient and Secure Wireless Sensor Network (무선 센서 네트워크에서 에너지 효율성과 보안성을 제공하기 위한 클러스터 기반의 Tributaries-Deltas)

  • Kim, Eun-Kyung;Seo, Jae-Won;Chae, Ki-Joon;Choi, Doo-Ho;Oh, Kyung-Hee
    • The KIPS Transactions:PartC
    • /
    • v.15C no.5
    • /
    • pp.329-342
    • /
    • 2008
  • The Sensor Networks have limitations in utilizing energies, developing energy-efficient routing protocol and secure routing protocol are important issues in Sensor Network. In the field of data management, Tributaries and Deltas(TD) which incorporates tree topology and multi-path topology effectively have been suggested to provide efficiency and robustness in data aggregation. And our research rendered hierarchical property to TD and proposed Clustering-based Tributaries-Deltas. Through this new structure, we integrated efficiency and robustness of TD structure and advantages of hierarchical Sensor Network. Clustering-based Tributaries-Deltas was proven to perform better than TD in two situations through our research. The first is when a Base Station (BS) notices received information as wrong and requests the network's sensing data retransmission and aggregation. And the second is when the BS is mobile agent with mobility. In addition, we proposed key establishment mechanism proper for the newly proposed structure which resulted in new Sensor Network structure with improved security and energy efficiency as well. We demonstrated that the new mechanism is more energy-efficient than previous one by analyzing consumed amount of energy, and realized the mechanism on TmoteSKY sensor board using TinyOS 2.0. Through this we proved that the new mechanism could be actually utilized in network design.

Desing of Secure Adaptive Clustering Algorithm Using Symmetric Key and LEAP in Sensor Network (센서네트워크 통신에서 대칭키 방식과 LEAP을 적용한 안전한 동적 클러스터링 알고리즘 설계)

  • Jang Kun-Won;Shin Dong-Gyu;Jun Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.3
    • /
    • pp.29-38
    • /
    • 2006
  • Recent advances in wireless communication technology promotes many researches related to sensor network and brings several proposals to fit into various types of sensor network communication. The research direction for sensor network is divided into the method to maximize an energy efficiency and security researches that has not been remarkable so far. To maximize an energy efficiency, the methods to support data aggregation and cluster-head selection algorithm are proposed. To strengthen the security, the methods to support encryption techniques and manage a secret key that is applicable to sensor network are proposed, In. However, the combined method to satisfy both energy efficiency and security is in the shell. This paper is devoted to design the protocol that combines an efficient clustering protocol with key management algorithm that is fit into various types of sensor network communication. This protocol may be applied to sensor network systems that deal with sensitive data.

A Study on Customer Knowledge Acquisition Strategy via a Customer Center: A Case of Voice Recognition Technology Application (고객센터를 통한 고객지식 확보 전략: 음성인식기술의 적용 사례)

  • Hong, Byoung Sun;Koh, Joon
    • Knowledge Management Research
    • /
    • v.19 no.1
    • /
    • pp.147-174
    • /
    • 2018
  • Recently, firms have been putting forth significant efforts to fulfill various demands and high expectations of customers. The role and importance of customer centers as a direct contact point for customer relationship management are more emphasized than previously. A customer center draws attention as a new alternative to secure corporate competitiveness as it contributes to sales increase, being in a position to satisfy customers' needs by ensuring customers' access to information. A customer center is an aggregation of various information and communication technologies. In particular, a voice recognition/analysis technology based on big data can elaborate customer services further, enhance customer satisfaction, and trigger constant interactions with customers. A customer center can be transformed to a hub of customer knowledge and the embodiment of business intelligence in the front line of business. This article is a case study on how the customer center of the K life insurance company regarding customer center operation collects and analyzes customer information and how it has established its voice recognition/analysis system based on big data to improve customer experience management. Factors affecting the successful introduction and implementation of voice recognition/analysis system to a firm, are examined.

A Secure, Hierarchical and Clustered Multipath Routing Protocol for Homogenous Wireless Sensor Networks: Based on the Numerical Taxonomy Technique

  • Hossein Jadidoleslamy
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.121-136
    • /
    • 2023
  • Wireless Sensor Networks (WSNs) have many potential applications and unique challenges. Some problems of WSNs are: severe resources' constraints, low reliability and fault tolerant, low throughput, low scalability, low Quality of Service (QoS) and insecure operational environments. One significant solution against mentioned problems is hierarchical and clustering-based multipath routing. But, existent algorithms have many weaknesses such as: high overhead, security vulnerabilities, address-centric, low-scalability, permanent usage of optimal paths and severe resources' consumption. As a result, this paper is proposed an energy-aware, congestion-aware, location-based, data-centric, scalable, hierarchical and clustering-based multipath routing algorithm based on Numerical Taxonomy technique for homogenous WSNs. Finally, performance of the proposed algorithm has been compared with performance of LEACH routing algorithm; results of simulations and statistical-mathematical analysis are showing the proposed algorithm has been improved in terms of parameters like balanced resources' consumption such as energy and bandwidth, throughput, reliability and fault tolerant, accuracy, QoS such as average rate of packet delivery and WSNs' lifetime.

An Hierarchical Key Management Scheme for Assure Data Integrity in Wireless Sensor Network (WSN에서 데이터 무결성을 보장하는 계층적인 키 관리 기법)

  • Jeong, Yoon-Su;Hwang, Yoon-Cheol;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.3C
    • /
    • pp.281-292
    • /
    • 2008
  • A main application of sensor networks are to monitor and to send information about a possibly hostile environment to a powerful base station connected to a wired network. To conserve power from each sensor, intermediate network nodes should aggregate results from individual sensors. However, it can make it that a single compromised sensor can render the network useless, or worse, mislead the operator into trusting a false reading. In this paper, we propose a protocol to give us a key aggregation mechanism that intermediate network nodes could aggregate data more safely. The proposed protocol is more helpful at multi-tier network architecture in secure sessions established between sensor nodes and gateways. From simulation study, we compare the amount of the energy consumption overhead, the time of key transmission and the ratio of of key process between the proposed method and LHA-SP. The simulation result of proposed protocol is low 3.5% a lord of energy consumption than LHA-SP, the time of key transmission and the ration of key process is get improved result of each 0.3% and 0.6% than LHA-SP.

Intrusion detection agents on the wireless network design (무선네트워크 상에서의 침입탐지 에이전트 설계)

  • Yun, Dong Sic
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.59-70
    • /
    • 2013
  • Along with the rapid development of the wireless network (Wireless Network) technology for secure wireless communications, security problems have emerged as an important issue. In order to operate the wireless network intrusion detection system detects the agent installed on each wireless node should be. Ad-hoc network structures scattered in the AP over a wireless network without the node is a structure that makes it possible to communicate to connect. Intrusion detection agent to be installed on the node, and the corresponding energy consumption occurs when the survival time is reduced. On a node that can monitor a lot of traffic in order to increase the effect of intrusion detection, an intrusion detection agent should be placed. Therefore, in this paper, by taking advantage of the structure of Ad-hoc wireless network, considering the maximum living time of the network, while at the same time, the effectiveness of intrusion detection and intrusion detection by proposing a plan for installing the agent. Also improve the system performance by reducing the network load on each network, a system designed for data aggregation to reduce data redundancy, network energy consumption by reducing.

Blockchain for Securing Smart Grids

  • Aldabbagh, Ghadah;Bamasag, Omaimah;Almasari, Lola;Alsaidalani, Rabab;Redwan, Afnan;Alsaggaf, Amaal
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.255-263
    • /
    • 2021
  • Smart grid is a fully-automated, bi-directional, power transmission network based on the physical grid system, which combines sensor measurement, computer, information communication, and automatic control technology. Blockchain technology, with its security features, can be integrated with Smart Grids to provide secure and efficient power management and transmission. This paper dicusses the deployment of Blockchain technology in Smart Grid. It presents application areas and protocols in which blockchain can be applied to in securing smart grid. One application of each area is explored in detail, such as efficient peer-to-peer transaction, lower platform costs, faster processes, greater flexibility in power generation to transmission, distribution and power consumption in different energy storage systems, current barriers obstructing the implementation of blockchain applications with some level of maturity in financial services but concepts only in energy and other sectors. Wide range of energy applications suggesting a suitable blockchain architecture in smart grid operations, a sample block structure and the potential blockchain technicalities employed in it. Also, added with efficient data aggregation schemes based on the blockchain technology to overcome the challenges related to privacy and security in the smart grid. Later on, consensus algorithms and protocols are discussed. Monitoring of the usage and statistics of energy distribution systems that can also be used to remotely control energy flow to a particular area. Further, the discussion on the blockchain-based frameworks that helps in the diagnosis and maintenance of smart grid equipment. We have also discussed several commercial implementations of blockchain in the smart grid. Finally, various challenges have been discussed for integrating these technologies. Overall, it can be said at the present point in time that blockchain technology certainly shows a lot of potentials from a customer perspective too and should be further developed by market participants. The approaches seen thus far may have a disruptive effect in the future and might require additional regulatory intervention in an already tightly regulated energy market. If blockchains are to deliver benefits for consumers (whether as consumers or prosumers of energy), a strong focus on consumer issues will be needed.