• 제목/요약/키워드: Control System Security

검색결과 1,725건 처리시간 0.027초

Formal Verification of Twin Clutch Gear Control System

  • Muhammad Zaman;Amina Mahmood;Muhammad Atif;Muhammad Adnan Hashmi;Muhammad Kashif;Mudassar Naseer
    • International Journal of Computer Science & Network Security
    • /
    • 제24권3호
    • /
    • pp.151-159
    • /
    • 2024
  • Twin clutch model enables the power-shifts as conventional planetary automatic transmission and eradicates the disadvantages of single clutch trans- mission. The automatic control of the dual clutches is a problem. Particularly to control the clutching component that engages when running in one direction of revolution and disengages when running the other direction, which exchange the torque smoothly during torque phase of the gearshifts on planetary-type automatic transmissions, seemed for quite a while hard to compensate through clutch control. Another problem is to skip gears during multiple gearshifts. However, the twin clutch gear control described in ["M Goetz, M C Levesley and D A Crolla. Dynamics and control of gearshifts on twin clutch transmissions, Proceedings of the Institution of Mechanical Engineers, Part D: Journal of Automobile Engineering 2005"], a significant improvement in twin clutch gear control system is discussed. In this research our objective is to formally specify the twin clutch gear control system and verify it with the help of formal methods. Formal methods have a high potential to give correctness estimating techniques. We use UPPAAL for formal specification and verification. Our results show that the twin clutch gear control model partially fulfills its functional requirements.

A Privacy-aware Graph-based Access Control System for the Healthcare Domain

  • Tian, Yuan;Song, Biao;Hassan, M.Mehedi.;Huh, Eui-Nam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권10호
    • /
    • pp.2708-2730
    • /
    • 2012
  • The growing concern for the protection of personal information has made it critical to implement effective technologies for privacy and data management. By observing the limitations of existing approaches, we found that there is an urgent need for a flexible, privacy-aware system that is able to meet the privacy preservation needs at both the role levels and the personal levels. We proposed a conceptual system that considered these two requirements: a graph-based, access control model to safeguard patient privacy. We present a case study of the healthcare field in this paper. While our model was tested in the field of healthcare, it is generic and can be adapted to use in other fields. The proof-of-concept demos were also provided with the aim of valuating the efficacy of our system. In the end, based on the hospital scenarios, we present the experimental results to demonstrate the performance of our system, and we also compared those results to existing privacy-aware systems. As a result, we ensured a high quality of medical care service by preserving patient privacy.

인터넷 웜 공격으로부터 서버를 보호하기 위한 악성 프로세스 제어 시스템 (A Malicious Process Control System for Protecting Servers from Internet Worm Attacks)

  • 김익수
    • 한국통신학회논문지
    • /
    • 제35권3B호
    • /
    • pp.431-439
    • /
    • 2010
  • 탐지룰을 기반으로 하는 보안 시스템들은 신종 인터넷 웜에 대응할 수 없다는 문제가 있다. 본 논문에서는 탐지룰을 사용하지 않고 인터넷 웜 공격으로부터 서버를 보호하는 악성 프로세스 및 실행파일 제거 시스템을 제안한다. 제안 시스템은 보호대상서버와 동일한 서비스 프로그램을 구동하면서 인터넷 웜에 의한 멀티캐스팅 공격을 탐지하는 제어서버와 제어서버의 지시에 따라 보호대상서버에 생성된 악성 프로세스와 악성 실행파일을 제거하는 에이전트로 구성된다. 제안 시스템은 탐지룰을 사용하지 않기 때문에 신종 인터넷 웜에 효과적으로 대응할 수 있으며, 기존의 보안 시스템들과 통합될 경우 보안을 더욱 강화할 수 있다.

The Intelligent Blockchain for the Protection of Smart Automobile Hacking

  • Kim, Seong-Kyu;Jang, Eun-Sill
    • Journal of Multimedia Information System
    • /
    • 제9권1호
    • /
    • pp.33-42
    • /
    • 2022
  • In this paper, we have recently created self-driving cars and self-parking systems in human-friendly cars that can provide high safety and high convenience functions by recognizing the internal and external situations of automobiles in real time by incorporating next-generation electronics, information communication, and function control technologies. And with the development of connected cars, the ITS (Intelligent Transportation Systems) market is expected to grow rapidly. Intelligent Transportation System (ITS) is an intelligent transportation system that incorporates technologies such as electronics, information, communication, and control into the transportation system, and aims to implement a next-generation transportation system suitable for the information society. By combining the technologies of connected cars and Internet of Things with software features and operating systems, future cars will serve as a service platform to connect the surrounding infrastructure on their own. This study creates a research methodology based on the Enhanced Security Model in Self-Driving Cars model. As for the types of attacks, Availability Attack, Man in the Middle Attack, Imperial Password Use, and Use Inclusive Access Control attack defense methodology are used. Along with the commercialization of 5G, various service models using advanced technologies such as autonomous vehicles, traffic information sharing systems using IoT, and AI-based mobility services are also appearing, and the growth of smart transportation is accelerating. Therefore, research was conducted to defend against hacking based on vulnerabilities of smart cars based on artificial intelligence blockchain.

전력계통의 신뢰도제어 -상정사고해석을 중심으로- (Security Control of Power Systems)

  • 양흥석;박영문
    • 전기의세계
    • /
    • 제26권3호
    • /
    • pp.84-91
    • /
    • 1977
  • A modified version of algorithm and computer program is proposed to improve the currently available contingency analysis methode for the security control of power system. The underlying principle is based upon the reasonable modification of the current methods suggested by Stagg, Tinny, Alsac, and Stott in consideration of speed, aceuracy, reliability and convergency characteristics. The algorithm and program are desirgned especially for On-Line operation, although Off-Line applications are readily available. Several case studies on the Koren Power Company's 48-bus, 91-line system have shown that the method proposed is efficiently powerful in a sense of practical applicability.

  • PDF

Duty Ratio Predictive Control Scheme for Digital Control of DC-DC Switching Converters

  • Sun, Pengju;Zhou, Luowei
    • Journal of Power Electronics
    • /
    • 제11권2호
    • /
    • pp.156-162
    • /
    • 2011
  • The control loop time delay caused by sampling, the zero-order-holder effect and calculations is inevitable in the digital control of dc-dc switching converters. The time delay will limit the bandwidth of the control loop and therefore degrade the transient performance of digital systems. In this paper, the quantization time delay effects with different time delay values based on a generic second-order system are analyzed. The conclusion that the bandwidth of digital control is reduced by about 20% with a one cycle delay and by 50% with two cycles of delay in comparison with no time delay is obtained. To compensate the time delay and to increase the control loop bandwidth, a duty ratio predictive control scheme based on linear extrapolation is proposed. The compensation effect and a comparison of the load variation transient response characteristics with analogy control, conventional digital control and duty ratio predictive control with different time delay values are performed on a point-of-load Buck converter by simulations and experiments. It is shown that, using the proposed technique, the control loop bandwidth can be increased by 50% for a one cycle delay and 48.2% for two cycles of delay when compared to conventional digital control. Simulations and experimental results prove the validity of the conclusion of the quantization effects of the time delay and the proposed control scheme.

IP 주소 제한을 이용한 PC 절전 시스템 보안 설계 (A Design of PC Power-Saving System Security Using IP Address Restriction)

  • 김홍윤
    • 디지털산업정보학회논문지
    • /
    • 제9권3호
    • /
    • pp.49-57
    • /
    • 2013
  • Power-saving PC software enables the inexpensive power control, but the installation of the power-saving software in all computers in the organization is not an easy task. Computer users in the organization are usually not cooperative as they do not think the power-saving cost is directly related to themselves. The PC power-saving system provides advantage to driving active participation in which users installs the power saving software by restricting IP address through the power management server. However, the problem with this approach is the security vulnerability to IP spoofing attacks, therefore we need to solve the problem that disrupt the entire network system rather than saving electric power. This paper proposes the security authentication system that can implement the efficiency saving power by providing high security for the members' computer system of the public institutions based on the PC power-saving system. Also, by analyzing it in comparison with other method, it is possible to check that the prospects of safety and efficiency are strengthened.

Adaptive GMM을 활용한 BEMS용 조명제어 연구 (A Study on the control of lights for BEMS using Adaptive GMM)

  • 고광석;이주영;강용식;심동하;김재문;김은수;이종성;차재상
    • 한국위성정보통신학회논문지
    • /
    • 제7권3호
    • /
    • pp.116-120
    • /
    • 2012
  • 전 세계적으로 빌딩 에너지 세이빙에 대한 관심이 증가하고 있으며, BEMS(Building Energy Management System)을 효율적으로 운용하기 위한 IT 기술에 대한 연구를 지속적으로 진행하고 있다. 최근 LED 조명기술의 발전으로 LED를 제어하여 에너지 절감효과를 극대화 할 수 있으며 BEMS에 이러한 LED 조명 제어기술들이 개발되고 있다. 본 논문에서는 건물에 설치되어 있는 IP 카메라와 Adaptive GMM(Gaussian Mixture Model)을 이용하여 BEMS용 LED 조명제어에 대한 시스템을 제안하였다. 설계한 구조를 기반으로 빌딩의 영상을 실시간으로 모니터링하고, 동적 객체를 영상추적하며, 다수의 객체를 클러스터링하고 인체 이동을 감지하여 LED 조명을 제어하는 기능을 제안하고, 관련 Software 개발을 통해 구현가능성을 입증하였다.

문서 읽기 행위를 이용한 연속적 사용자 인증 기반의 내부자 문서유출 탐지기술 연구 (A system for detecting document leakage by insiders through continuous user authentication by using document reading behavior)

  • 조성영;김민수;원종일;권상은;임채호;강병훈;김세헌
    • 정보보호학회논문지
    • /
    • 제23권2호
    • /
    • pp.181-192
    • /
    • 2013
  • 기업 내의 문서 유출을 탐지 제어하기 위한 다양한 기술들이 연구되고 있다. 하지만 이러한 기술들은 대부분 외부에 의한 문서 유출을 대상으로 하고 있으며, 문서에 대한 정당한 권한을 가지고 있는 내부자에 의한 문서 유출을 탐지하고 제어하는 연구는 미비한 수준이다. 본 연구에서는 내부자에 의한 문서 유출을 탐지하고 제어하기 위하여 사용자의 문서 읽기 행위를 관찰한다. Microsoft Word 로거에서 추출할 수 있는 속성으로부터 각 사용자의 관찰된 문서 읽기 행위에 대한 패턴을 만들고 시스템에 적용함으로써 문서를 읽고 있는 사용자가 실제 사용자인지 여부를 판단한다. 이를 통하여 사용자가 문서를 읽는 행위를 바탕으로 효과적으로 문서 유출을 방지할 수 있을 것으로 기대한다.

클라우드 융합을 위한 MAC 정책 기반 접근통제 메커니즘 (Access Control Mechanism based on MAC for Cloud Convergence)

  • 최은복;이상준
    • 한국융합학회논문지
    • /
    • 제7권1호
    • /
    • pp.1-8
    • /
    • 2016
  • 클라우드 컴퓨팅 환경은 가상화 기술을 이용하여 네트워크에 기반한 컴퓨터 자원, 소프트웨어, 인프라 등을 서로 공유하는 기능을 제공한다. 가상화는 기업의 서버 운영효율과 비용절감을 위해 매우 유용한 기술이지만 보안을 고려하지 않고 수행할 경우 새로운 보안 위협의 대상이 될 수 있다. 본 논문에서는 클라우드 시스템 환경에서 발생할 수 있는 다양한 문제점을 해결하는 클라우드 융합을 위한 MAC 기반 접근통제 메커니즘을 제안한다. 이 메커니즘은 접근통제 시스템 모니터의 상태규칙 집합, 보안특성 그리고 알고리즘으로 구성된다. 본 논문에서는 제안된 접근통제 메커니즘을 갖는 제어 시스템과 초기 보안 상태가 안전한 시스템임을 증명하였다. 본 메커니즘은 정책 모듈을 통해 접근통제 시스템들 간의 통제된 자원들이 서로 안전하게 공유되며 유지 관리되어질 수 있는 장점을 제공한다.