• Title/Summary/Keyword: Control System Security

Search Result 1,742, Processing Time 0.03 seconds

Knowledge-based modeling and simulation of access control system representing security policies (보안정책을 표현하는 침입차단시스템의 지식기반 모델링 및 시뮬레이션)

  • 고종영;이미라;김형종;김홍근;조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.10 no.4
    • /
    • pp.51-64
    • /
    • 2001
  • It is quite necessary that an organization's information network should be equipped with a proper security system based on its scale and importance. One of the effective methods is to use the simulation model for deciding which security policy and mechanism is appropriate for the complex network. Our goal is to build a foundation of knowledge-based modeling and simulation environment for the network security. With this environment, users can construct the abstracted model of security mechanisms, apply various security policies, and quantitatively analyze their security performance against possible attacks. In this study, we considered security domain from several points of view and implemented the models based on a systematic modeling approach. We enabled the model to include knowledge in modular fashion and provided well-defined guidelines for transforming security policy to concrete rule set.

  • PDF

Novel VNFI Security Management Function Block For Improved Security Framework For SDN/NFV Networks

  • Alruwaili, Rahaf Hamoud;Alanazi, Haifa Khaled;Hendaoui, Saloua
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.303-309
    • /
    • 2022
  • Software Defined Networking (SDN) is a novel approach that have accelerated the development of numerous technologies such as policy-based access control, network virtualization, and others. It allows to boost network architectural flexibility and expedite the return on investment. However, this increases the system's complexity, necessitating the expenditure of dollars to assure the system's security. Network Function Virtualization (NFV) opens up new possibilities for network engineers, but it also raises security concerns. A number of Internet service providers and network equipment manufacturers are grappling with the difficulty of developing and characterizing NFVs and related technologies. Through Moodle's efforts to maintain security, this paper presents a detailed review of security-related challenges in software-defined networks and network virtualization services.

On The Security of RFID-based Monitoring Mechanism for Retail Inventory Management

  • Chen, Yu Yi;Jan, Jinn Ke;Tsai, Meng Lin;Ku, Chun Ching;Huang, Der Chen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.515-528
    • /
    • 2012
  • The aim of this article is to provide a study on the issue of inventory inaccuracy and to show the manner in which RFID technology can improve the inventory management performance. The objective of inventory control is to monitor the stock flow of merchandises in order to understand the operating profit and loss. A proper mechanism of inventory control could be made to help the profitability. As RFID is applied to inventory control, it can improve efficiency, enhance accuracy and achieve security. In this paper, we introduce the evolution of different mechanisms of inventory control with RFID system-counting method, collect-all method, and continuous monitoring method. As for improving the accuracy of inventory check during business hours, continuous monitoring is the solution. We introduce the infrastructure of the RFID inventory management system based on M2M architecture can make the inventory be efficiently monitored with instant warnings.

A New Control Strategy for a Three-Phase PWM Current-Source Rectifier in the Stationary Frame

  • Guo, Qiang;Liu, Heping;Zhang, Yi
    • Journal of Power Electronics
    • /
    • v.15 no.4
    • /
    • pp.994-1005
    • /
    • 2015
  • This paper presents a novel power control strategy for PWM current-source rectifiers (CSRs) in the stationary frame based on the instantaneous power theory. In the proposed control strategy, a virtual resistance based on the capacitor voltage feedback is used to realize the active damping. In addition, the proportional resonant (PR) controller under the two-phase stationary coordinate is designed to track the ac reference current and to avoid the strong coupling brought about by the coordinate transformation. The limitations on improving steady-state performance of the PR controller is investigated and mitigated using a cascaded lead-lag compensator. In the z-domain, a straightforward procedure is developed to analyze and design the control-loop with the help of MATLAB/SISO software tools. In addition, robustness against parameter variations is analyzed. Finally, simulation and experimental results verify the proposed control scheme and design method.

Power System Security Control Method for Quench Characteristic of High-Temperature Superconducting Cable (초전도 케이블의 퀜치 특성에 대한 계통안전성 제어방식)

  • Lee, Geun-Joon;Hwang, Si-Dol;Lee, Jeong-Phil;Kim, Chang-Hyun;Park, Hye-Chul
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2004.11a
    • /
    • pp.375-380
    • /
    • 2004
  • This paper presents the basic quench protection idea for the HTS(High-Temperature Superconducting) cable. In Korea power system, the transfer capability of transmission line is limited by the voltage stability, and HTS cable could be one of the countermeasure to solve the transfer limit as its higher current capacity and lower impedance[1]. However, the quench characteristic of HTS cable makes HTS cable to loss its superconductivity, and therefore change the impedance of the line and power system operating condition dramatically. This pheonominum threats not only HTS cable safety but also power system security, therefore a proper protection scheme and security control counterplan have to be established before HTS cable implementation. In this paper, the quench characteristics of HTS cable for the fault current based on heat balance equation was established and a proper protection method by FCL(Fault Current Limiter) was suggested.

  • PDF

Ensuring Securityllable Real-Time Systems by Static Program Analysis (원격 실시간 제어 시스템을 위한 정적 프로그램 분석에 의한 보안 기법)

  • Lim Sung-Soo;Lee Kihwal
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.75-88
    • /
    • 2005
  • This paper proposes a method to ensure security attacks caused by insertion of malicious codes in a real-time control system that can be accessed through networks. The proposed technique is for dynamically upgradable real-time software through networks and based on a static program analysis technique to detect the malicious uses of memory access statements. Validation results are shown using a remotely upgradable real-time control system equipped with a modified compiler where the proposed security technique is applied.

  • PDF

Modeling and Control of Integrated STATCOM-SMES System to Improve Power System Oscillations Damping

  • Molina, Marcelo G.;Mercado, Pedro E.
    • Journal of Electrical Engineering and Technology
    • /
    • v.3 no.4
    • /
    • pp.528-537
    • /
    • 2008
  • Primary frequency control(PFC) has the ability to regulate short period random variations of frequency during normal operation conditions and also to respond rapidly to emergencies. However, during the past decade, numerous significant sized blackouts occurred worldwide that resulted in serious economic losses. Therefore, the conclusion has been reached that the ability of the current PFC to meet an emergency is poor, and security of power systems should be improved. An alternative to enhance the PFC and thus security is to store excessive amounts of energy during off-peak load periods in efficient energy storage systems for substituting the primary control reserve. In this sense, superconducting magnetic energy storage(SMES) in combination with a static synchronous compensator(STATCOM) is capable of supplying power systems with both active and reactive powers simultaneously and very rapidly, and thus is able to enhance the security dramatically. In this paper, a new concept of PFC based on incorporating a STATCOM-SMES is presented. A complete detailed model is proposed and a new control scheme is designed, comprising an enhanced frequency control scheme, and a fully decoupled current control strategy in d-q coordinates with a novel controller to prevent dc bus capacitors voltage drift/imbalance. The performance of the proposed control schemes is validated through digital simulation carried out using MATLAB/Simulink.

Next Generation Convergence Security Framework for Advanced Persistent Threat (지능형 지속 위협에 대한 차세대 융합 보안 프레임워크)

  • Lee, Moongoo;Bae, Chunsock
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.9
    • /
    • pp.92-99
    • /
    • 2013
  • As a recent cyber attack has a characteristic that is intellectual, advanced, and complicated attack against precise purpose and specified object, it becomes extremely hard to recognize or respond when accidents happen. Since a scale of damage is very large, a corresponding system about this situation is urgent in national aspect. Existing data center or integration security framework of computer lab is evaluated to be a behind system when it corresponds to cyber attack. Therefore, this study suggests a better sophisticated next generation convergence security framework in order to prevent from attacks based on advanced persistent threat. Suggested next generation convergence security framework is designed to have preemptive responses possibly against APT attack consisting of five hierarchical steps in domain security layer, domain connection layer, action visibility layer, action control layer and convergence correspondence layer. In domain connection layer suggests security instruction and direction in domain of administration, physical and technical security. Domain security layer have consistency of status information among security domain. A visibility layer of Intellectual attack action consists of data gathering, comparison, decision, lifespan cycle. Action visibility layer is a layer to control visibility action. Lastly, convergence correspond layer suggests a corresponding system of before and after APT attack. An introduction of suggested next generation convergence security framework will execute a better improved security control about continuous, intellectual security threat.

Novel Method for DNA-Based Elliptic Curve Cryptography for IoT Devices

  • Tiwari, Harsh Durga;Kim, Jae Hyung
    • ETRI Journal
    • /
    • v.40 no.3
    • /
    • pp.396-409
    • /
    • 2018
  • Elliptic curve cryptography (ECC) can achieve relatively good security with a smaller key length, making it suitable for Internet of Things (IoT) devices. DNA-based encryption has also been proven to have good security. To develop a more secure and stable cryptography technique, we propose a new hybrid DNA-encoded ECC scheme that provides multilevel security. The DNA sequence is selected, and using a sorting algorithm, a unique set of nucleotide groups is assigned. These are directly converted to binary sequence and then encrypted using the ECC; thus giving double-fold security. Using several examples, this paper shows how this complete method can be realized on IoT devices. To verify the performance, we implement the complete system on the embedded platform of a Raspberry Pi 3 board, and utilize an active sensor data input to calculate the time and energy required for different data vector sizes. Connectivity and resilience analysis prove that DNA-mapped ECC can provide better security compared to ECC alone. The proposed method shows good potential for upcoming IoT technologies that require a smaller but effective security system.

Comparison of IT Security Risk Analysis and Internal Control Evaluation (정보시스템 보안을 위한 위험분석활동과 내부통제평가와의 비교)

  • Cho, Sungbaek;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.3 no.3
    • /
    • pp.81-90
    • /
    • 2003
  • Risk analysis and internal control evaluation are key security management activities for securing organizational assets. Risk analysis is used to identify areas that need safeguarding while internal control evaluation is used to check whether the current control system is effective with a reasonable degree of assurance. Risk analysis usually focuses on unauthorised activities of unauthorised people and has not paid much attention to threats that could be committed by authorized users. As attention to fraud increases, these threats should be appropriately treated within organizations. This paper compares the difference between these two approaches.

  • PDF