• Title/Summary/Keyword: Control System Security

Search Result 1,725, Processing Time 0.03 seconds

Formal Verification of Twin Clutch Gear Control System

  • Muhammad Zaman;Amina Mahmood;Muhammad Atif;Muhammad Adnan Hashmi;Muhammad Kashif;Mudassar Naseer
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.151-159
    • /
    • 2024
  • Twin clutch model enables the power-shifts as conventional planetary automatic transmission and eradicates the disadvantages of single clutch trans- mission. The automatic control of the dual clutches is a problem. Particularly to control the clutching component that engages when running in one direction of revolution and disengages when running the other direction, which exchange the torque smoothly during torque phase of the gearshifts on planetary-type automatic transmissions, seemed for quite a while hard to compensate through clutch control. Another problem is to skip gears during multiple gearshifts. However, the twin clutch gear control described in ["M Goetz, M C Levesley and D A Crolla. Dynamics and control of gearshifts on twin clutch transmissions, Proceedings of the Institution of Mechanical Engineers, Part D: Journal of Automobile Engineering 2005"], a significant improvement in twin clutch gear control system is discussed. In this research our objective is to formally specify the twin clutch gear control system and verify it with the help of formal methods. Formal methods have a high potential to give correctness estimating techniques. We use UPPAAL for formal specification and verification. Our results show that the twin clutch gear control model partially fulfills its functional requirements.

A Privacy-aware Graph-based Access Control System for the Healthcare Domain

  • Tian, Yuan;Song, Biao;Hassan, M.Mehedi.;Huh, Eui-Nam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.10
    • /
    • pp.2708-2730
    • /
    • 2012
  • The growing concern for the protection of personal information has made it critical to implement effective technologies for privacy and data management. By observing the limitations of existing approaches, we found that there is an urgent need for a flexible, privacy-aware system that is able to meet the privacy preservation needs at both the role levels and the personal levels. We proposed a conceptual system that considered these two requirements: a graph-based, access control model to safeguard patient privacy. We present a case study of the healthcare field in this paper. While our model was tested in the field of healthcare, it is generic and can be adapted to use in other fields. The proof-of-concept demos were also provided with the aim of valuating the efficacy of our system. In the end, based on the hospital scenarios, we present the experimental results to demonstrate the performance of our system, and we also compared those results to existing privacy-aware systems. As a result, we ensured a high quality of medical care service by preserving patient privacy.

A Malicious Process Control System for Protecting Servers from Internet Worm Attacks (인터넷 웜 공격으로부터 서버를 보호하기 위한 악성 프로세스 제어 시스템)

  • Kim, Ik-Su
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.431-439
    • /
    • 2010
  • The security systems using signatures cannot protect servers from new types of Internet worms. To protect servers from Internet worms, this paper proposes a system removing malicious processes and executable files without using signatures. The proposed system consists of control servers which offer the same services as those on protected servers, and agents which are installed on the protected servers. When a control server detects multicasting attacks of Internet worm, it sends information about the attacks to an agent. The agent kills malicious processes and removes executable files with this information. Because the proposed system do not use signatures, it can respond to new types of Internet worms effectively. When the proposed system is integrated with legacy security systems, the security of the protected server will be further enhanced.

The Intelligent Blockchain for the Protection of Smart Automobile Hacking

  • Kim, Seong-Kyu;Jang, Eun-Sill
    • Journal of Multimedia Information System
    • /
    • v.9 no.1
    • /
    • pp.33-42
    • /
    • 2022
  • In this paper, we have recently created self-driving cars and self-parking systems in human-friendly cars that can provide high safety and high convenience functions by recognizing the internal and external situations of automobiles in real time by incorporating next-generation electronics, information communication, and function control technologies. And with the development of connected cars, the ITS (Intelligent Transportation Systems) market is expected to grow rapidly. Intelligent Transportation System (ITS) is an intelligent transportation system that incorporates technologies such as electronics, information, communication, and control into the transportation system, and aims to implement a next-generation transportation system suitable for the information society. By combining the technologies of connected cars and Internet of Things with software features and operating systems, future cars will serve as a service platform to connect the surrounding infrastructure on their own. This study creates a research methodology based on the Enhanced Security Model in Self-Driving Cars model. As for the types of attacks, Availability Attack, Man in the Middle Attack, Imperial Password Use, and Use Inclusive Access Control attack defense methodology are used. Along with the commercialization of 5G, various service models using advanced technologies such as autonomous vehicles, traffic information sharing systems using IoT, and AI-based mobility services are also appearing, and the growth of smart transportation is accelerating. Therefore, research was conducted to defend against hacking based on vulnerabilities of smart cars based on artificial intelligence blockchain.

Security Control of Power Systems (전력계통의 신뢰도제어 -상정사고해석을 중심으로-)

  • 양흥석;박영문
    • 전기의세계
    • /
    • v.26 no.3
    • /
    • pp.84-91
    • /
    • 1977
  • A modified version of algorithm and computer program is proposed to improve the currently available contingency analysis methode for the security control of power system. The underlying principle is based upon the reasonable modification of the current methods suggested by Stagg, Tinny, Alsac, and Stott in consideration of speed, aceuracy, reliability and convergency characteristics. The algorithm and program are desirgned especially for On-Line operation, although Off-Line applications are readily available. Several case studies on the Koren Power Company's 48-bus, 91-line system have shown that the method proposed is efficiently powerful in a sense of practical applicability.

  • PDF

Duty Ratio Predictive Control Scheme for Digital Control of DC-DC Switching Converters

  • Sun, Pengju;Zhou, Luowei
    • Journal of Power Electronics
    • /
    • v.11 no.2
    • /
    • pp.156-162
    • /
    • 2011
  • The control loop time delay caused by sampling, the zero-order-holder effect and calculations is inevitable in the digital control of dc-dc switching converters. The time delay will limit the bandwidth of the control loop and therefore degrade the transient performance of digital systems. In this paper, the quantization time delay effects with different time delay values based on a generic second-order system are analyzed. The conclusion that the bandwidth of digital control is reduced by about 20% with a one cycle delay and by 50% with two cycles of delay in comparison with no time delay is obtained. To compensate the time delay and to increase the control loop bandwidth, a duty ratio predictive control scheme based on linear extrapolation is proposed. The compensation effect and a comparison of the load variation transient response characteristics with analogy control, conventional digital control and duty ratio predictive control with different time delay values are performed on a point-of-load Buck converter by simulations and experiments. It is shown that, using the proposed technique, the control loop bandwidth can be increased by 50% for a one cycle delay and 48.2% for two cycles of delay when compared to conventional digital control. Simulations and experimental results prove the validity of the conclusion of the quantization effects of the time delay and the proposed control scheme.

A Design of PC Power-Saving System Security Using IP Address Restriction (IP 주소 제한을 이용한 PC 절전 시스템 보안 설계)

  • Kim, Hong Yoon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.3
    • /
    • pp.49-57
    • /
    • 2013
  • Power-saving PC software enables the inexpensive power control, but the installation of the power-saving software in all computers in the organization is not an easy task. Computer users in the organization are usually not cooperative as they do not think the power-saving cost is directly related to themselves. The PC power-saving system provides advantage to driving active participation in which users installs the power saving software by restricting IP address through the power management server. However, the problem with this approach is the security vulnerability to IP spoofing attacks, therefore we need to solve the problem that disrupt the entire network system rather than saving electric power. This paper proposes the security authentication system that can implement the efficiency saving power by providing high security for the members' computer system of the public institutions based on the PC power-saving system. Also, by analyzing it in comparison with other method, it is possible to check that the prospects of safety and efficiency are strengthened.

A Study on the control of lights for BEMS using Adaptive GMM (Adaptive GMM을 활용한 BEMS용 조명제어 연구)

  • Ko, Kwangseok;Lee, Juyoung;Kang, Yongsik;Shim, Dongha;Kim, Jaemoon;Kim, Eunsoo;Lee, Jongsung;Cha, Jaesang
    • Journal of Satellite, Information and Communications
    • /
    • v.7 no.3
    • /
    • pp.116-120
    • /
    • 2012
  • There has been increased interest for building energy-saving for worldwide. There is continuing research on IT technology for efficient management of BEMS. Recently, It be able to control of LED and to maximize energy savings to the development of LED lighting technology. We propose the security image processing system to improve efficiency and we implement the real-time status monitoring system to surveil the object in the building energy management system. In this paper, we proposed the system of LED control using IP camera and Adaptive Gaussian Mixture Model for BEMS. We implement LED light control software on the based of the security camera image processing so the reliable controling based on the security camera is possible efficiently.

A system for detecting document leakage by insiders through continuous user authentication by using document reading behavior (문서 읽기 행위를 이용한 연속적 사용자 인증 기반의 내부자 문서유출 탐지기술 연구)

  • Cho, Sungyoung;Kim, Minsu;Won, Jongil;Kwon, SangEun;Lim, Chaeho;Kang, Brent ByungHoon;Kim, Sehun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.181-192
    • /
    • 2013
  • There have been various techniques to detect and control document leakage; however, most techniques concentrate on document leakage by outsiders. There are rare techniques to detect and monitor document leakage by insiders. In this study, we observe user's document reading behavior to detect and control document leakage by insiders. We make each user's document reading patterns from attributes gathered by a logger program running on Microsoft Word, and then we apply the proposed system to help determine whether a current user who is reading a document matches the true user. We expect that our system based on document reading behavior can effectively prevent document leakage.

Access Control Mechanism based on MAC for Cloud Convergence (클라우드 융합을 위한 MAC 정책 기반 접근통제 메커니즘)

  • Choi, Eun-Bok;Lee, Sang-Joon
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.1
    • /
    • pp.1-8
    • /
    • 2016
  • Cloud computing technology offers function that share each other computer resource, software and infra structure based on network. Virtualization is a very useful technology for operation efficiency of enterprise's server and reducing cost, but it can be target of new security threat when it is used without considering security. This paper proposes access control mechanism based on MAC(Mandatory Access Control) for cloud convergence that solve various problem that can occur in cloud environment. This mechanism is composed of set of state rules, security characteristics and algorithm. Also, we prove that the machine system with access control mechanism and an initial secure state is a secure system. This policy module of mechanism is expected to not only provide the maintenance but also provide secure resource sharing between virtual machines.