• Title/Summary/Keyword: secure transmission

Search Result 431, Processing Time 0.033 seconds

IBC-Based Entity Authentication Protocols for Federated Cloud Systems

  • Cao, Chenlei;Zhang, Ru;Zhang, Mengyi;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.1291-1312
    • /
    • 2013
  • Cloud computing changes the service models of information systems and accelerates the pace of technological innovation of consumer electronics. However, it also brings new security issues. As one of the important foundations of various cloud security solutions, entity authentication is attracting increasing interest of many researchers. This article proposes a layered security architecture to provide a trust transmission mechanism among cloud systems maintained by different organizations. Based on the security architecture, four protocols are proposed to implement mutual authentication, data sharing and secure data transmission in federated cloud systems. The protocols not only can ensure the confidentiality of the data transferred, but also resist man-in-the-middle attacks and masquerading attacks. Additionally, the security properties of the four protocols have been proved by S-pi calculus formal verification. Finally, the performance of the protocols is investigated in a lab environment and the feasibility of the security architecture has been verified under a hybrid cloud system.

Development of Hold on Swing a Jumper Support String for Overhead Transmission Line (송전선로 점퍼선 횡진방지용 지지애자장치 개발)

  • Baik, Seung-Do;Min, Byeong-Wook;Wi, Hwa-Bog;Park, Kee-Yong;Keum, Eui-Yeon;Jeong, Heon-Soo
    • Proceedings of the KIEE Conference
    • /
    • 2005.07a
    • /
    • pp.521-523
    • /
    • 2005
  • A Jumper wire is currently used to connect each fixed power line on both sides of dead end tower for overhead transmission line, but in case of a jumper wire swing under circumstances of typhoon, etc. and the air clearance is deficient then a flashover fault may Happen. Now the angle tower has the jumper support string to prevent a swing of jumper wire and to secure the air clearance between jumper wire and tower main body, but the flashover fault by swing of jumper wire was happened yl times across all over the country, because of the typhoon 'Rusa' in year 2002 and 'Maemi' in year 2003. This paper presents the design and development of 'Counter Weight' which enables to keep the swing angle of jumper wire under 40 degree in design condition to prevent a flashover fault by swing of jumper wire by a high wind pressure load in case of typhoon and have completed a mechanical and electrical characteristic test.

  • PDF

Efficient Energy and Position Aware Routing Protocol for Wireless Sensor Networks

  • Shivalingagowda, Chaya;Jayasree, P.V.Y;Sah, Dinesh.K.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.5
    • /
    • pp.1929-1950
    • /
    • 2020
  • Reliable and secure data transmission in the application environment assisted by the wireless sensor network is one of the major challenges. Problem like blind forwarding and data inaccessibility affect the efficiency of overall infrastructure performance. This paper proposes routing protocol for forwarding and error recovery during packet loss. The same is achieved by energy and hops distance-based formulation of the routing mechanism. The reachability of the intermediate node to the source node is the major factor that helps in improving the lifetime of the network. On the other hand, intelligent hop selection increases the reliability over continuous data transmission. The number of hop count is factor of hop weight and available energy of the node. The comparison over the previous state of the art using QualNet-7.4 network simulator shows the effectiveness of proposed work in terms of overall energy conservation of network and reliable data delivery. The simulation results also show the elimination of blind forwarding and data inaccessibility.

Vehicle Communication System Implementation for u-TSN and Its Performance Evaluations (u-TSN에서 차량 통신시스템 구성 및 성능평가)

  • Jeon, Sung-Hee
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.7
    • /
    • pp.35-40
    • /
    • 2011
  • In u-TSN environment, the communication between vehicle terminal and roadside equipment is very important to support prompt service and to secure road traffic information in real-time upon organizing traffic system. This study suggested V2I or I2V communication service scenario for performance test on vehicle communication system as well as V2V inter-vehicle communication service scenario for emergency information transmission which requires rapidity and accuracy. After implementing real inter-vehicle communication system, we performed vehicle communication experiment following suggested communication service scenario to test the performance. Consequently, we could draw out the optimal transmission mode setup condition, and the result can be applied to the development of stable and efficient u-TSN vehicle communication system.

Intelligent On-demand Routing Protocol for Ad Hoc Network

  • Ye, Yongfei;Sun, Xinghua;Liu, Minghe;Mi, Jing;Yan, Ting;Ding, Lihua
    • Journal of Information Processing Systems
    • /
    • v.16 no.5
    • /
    • pp.1113-1128
    • /
    • 2020
  • Ad hoc networks play an important role in mobile communications, and the performance of nodes has a significant impact on the choice of communication links. To ensure efficient and secure data forwarding and delivery, an intelligent routing protocol (IAODV) based on learning method is constructed. Five attributes of node energy, rate, credit value, computing power and transmission distance are taken as the basis of segmentation. By learning the selected samples and calculating the information gain of each attribute, the decision tree of routing node is constructed, and the rules of routing node selection are determined. IAODV algorithm realizes the adaptive evaluation and classification of network nodes, so as to determine the optimal transmission path from the source node to the destination node. The simulation results verify the feasibility, effectiveness and security of IAODV.

Secure and Efficient Identity-based Batch Verification Signature Scheme for ADS-B System

  • Zhou, Jing-xian;Yan, Jian-hua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.12
    • /
    • pp.6243-6259
    • /
    • 2019
  • As a foundation of next-generation air transportation systems, automatic dependent surveillance-broadcast (ADS-B) helps pilots and air traffic controllers create a safer and more efficient national airspace system. Owing to the open communication environment, it is easy to insert fake aircraft into the system via spoofing or the insertion of false messages. Efforts have thus been made in academic research and practice in the aviation industry to ensure the security of transmission of messages of the ADS-B system. An identity-based batch verification (IBV) scheme was recently proposed to enhance the security and efficiency of the ADS-B system, but current IBV schemes are often too resource intensive because of the application of complex hash-to-point operations or bilinear pairing operations. In this paper, we propose a lightweight IBV signature scheme for the ADS-B system that is robust against adaptive chosen message attacks in the random oracle model, and ensures the security of batch message verification and against the replaying attack. The proposed IBV scheme needs only a small and constant number of point multiplication and point addition computations instead of hash-to-point or pairing operations. Detailed performance analyses were conducted to show that the proposed IBV scheme has clear advantages over prevalent schemes in terms of computational cost and transmission overhead.

Implementation and performance evaluation of the ONU&OLT supporting VPN in the ATM-PON (ATM-PON 환경에서 VPN지원을 위한 ONU와 OLT 기능 구현 및 성능 분석)

  • 박미리;장성호;이대봉;장종옥
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.306-310
    • /
    • 2002
  • Today, corporations are approach to inside information using public network such as Internet groping economical way to utilize public network to corporation information network without buying equipment. But, special quality of internet, Virtual Private Net (VPN) that it uses net that is observed as technology that can be guaranteed public safety division transmission and data securitybecause of can not secure data transmission. In this paper. add VPN function ONU&OLT of ATM-PON system and propose SCB (Single Copy Broadcasting). When there is VPN function to ATM network, the speed can be fast, and reduce rain track pick quantity during time more. Performance analysis network simulation that use NS-2.

  • PDF

AES Encryption Algorithm for safe PACS data Transmission in the Cloud Environment (클라우드 환경에서 안전한 PACS 데이터 전송을 위한 AES 암호화 알고리즘)

  • Cho, Young-bok;Woo, Sung-hee;Lee, Sang-ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.759-762
    • /
    • 2017
  • The proposed scheme is proposed secure transmission of fixed data and unstructured data among medical information transmitted in PACS. Unstructured data uses the AES encryption algorithm as sensitive data And transmitted using encrypted mosaic encryption techniques for the non-identification of medical images, which are regular data. In addition, we have experimented with increasing the key size for encryption. As a result, we did not notice any significant difference between 128 - bit size and 128 - key size even when encrypting the size of 196,256.

  • PDF

Analysis and Compensation of I/Q Amplitude Imbalance In Coherent PON Systems (코히어런트 PON시스템의 I/Q 진폭불균형 분석 및 보상)

  • Kim, Nayeong;Lee, Seungwoo;Park, Youngil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.10
    • /
    • pp.1940-1946
    • /
    • 2015
  • An optical coherent system is considered for the next-generation optical access networks in enhancing the data rate and transmission distance. In this system, however, I/Q amplitude imbalance may occur at several parts of the system, leading to serious performance degradation. Asymmetric structure of a coherent receiver at the location of subscriber is one of the sources of I/Q imbalance. Therefore, this imbalance parameters must be removed or compensated to secure the transmission performance. In this paper, the source of I/Q amplitude imbalance is analyzed, and then the way to compensate for the imbalance at the receiver side is suggested. Performance after the compensation is estimated using simulation.

A Study on an Improving Contingency Constrained Pre-Dispatch Algorithm in a Competitive Electricity Market (경쟁적 전력시장에서 송전선로 상정사고를 고려한 선행급전 알고리즘 개선에 관한 연구)

  • Kim, Kwang-Mo;Shin, Hye-Kyeong;Kang, Dong-Ju;Han, Seok-Man;Chung, Koo-Hyung;H.Kim, Bal-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2007.07a
    • /
    • pp.806-807
    • /
    • 2007
  • Systematic studies on the dispatch scheduling algorithm and related constraints can enhance the effectiveness of electricity market operation. When System Operator (SO) establishes a dispatch schedule, the bid information should be preserved in the schedule as much as possible. In this paper, we introduce a new type of sensitivity factor called Line Outage Impact Factor (LOIF) to screen a transmission line causing the most severe outage when scheduling the dispatch. This screening can assure the stable system operation and make an efficient feedback between the SO and market participants. We propose a transmission line contingency constrained Pre-dispatch algorithm using sensitivity indices in a suitable Pre-dispatch scheduling. The proposed algorithm has been tested on sample system and the results show more secure operation against critical contingencies.

  • PDF