• Title/Summary/Keyword: Critical Information Infrastructure

Search Result 223, Processing Time 0.025 seconds

Approaching the assessment of ageing bridge infrastructure

  • Boller, Christian;Starke, Peter;Dobmann, Gerd;Kuo, Chen-Ming;Kuo, Chung-Hsin
    • Smart Structures and Systems
    • /
    • v.15 no.3
    • /
    • pp.593-608
    • /
    • 2015
  • In many of the industrialized countries an increasing amount of infrastructure is ageing. This has become specifically critical to bridges which are a major asset with respect to keeping an economy alive. Life of this infrastructure is scattering but often little quantifiable information is known with respect to its damage condition. This article describes how a damage tolerance approach used in aviation today may even be applied to civil infrastructure in the sense that operational life can be applied in the context of modern life cycle management. This can be applied for steel structures as a complete process where much of the damage accumulation behavior is known and may even be adopted to concrete structures in principle, where much of the missing knowledge in damage accumulation has to be substituted by enhanced inspection. This enhanced and continuous inspection can be achieved through robotic systems in a first approach as well as built in sensors in the sense of structural health monitoring (SHM).

A Computationally Inexpensive Radio Propagation Model for Vehicular Communication on Flyovers and Inside Underpasses

  • Ahsan Qureshi, Muhammad;Mostajeran, Ehsan;Noor, Rafidah Md;Shamim, Azra;Ke, Chih-Heng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4123-4144
    • /
    • 2016
  • Vehicular Ad Hoc Networks (VANETs) utilize radio propagation models (RPMs) to predict path loss in vehicular environment. Modern urban vehicular environment contains road infrastructure units that include road tunnels, straight roads, curved roads flyovers and underpasses. Different RPMs were proposed in the past to predict path loss, but modern road infrastructure units especially flyovers and underpasses are neglected previously. Most of the existing RPMs are computationally complex and ignore some of the critical features such as impact of infrastructure units on the signal propagation and the effect of both static and moving radio obstacles on signal attenuation. Therefore, the existing RPMs are incapable of predicting path loss in flyovers and underpass accurately. This paper proposes an RPM to predict path loss for vehicular communication on flyovers and inside underpasses that considers both the static and moving radio obstacles while requiring only marginal overhead. The proposed RPM is validated based upon the field measurements in 5 GHz frequency band. A close agreement is found between the measured and predicted values of path loss.

Analyses of Security Model and Design of Protocol for Wireless Ad-Hoc Network (무선 Ad-Hoc 망의 프로토콜 설계 및 보안 모델 해석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.860-863
    • /
    • 2005
  • Ad-Hoc networks are a new generation of networks offering unrestricted mobility without any underlying infrastructure. Primary applications of Ad-Hoc networks are in military, tractical and other security sensitive operations, where the environment is hostile. Hence, security is a critical issue. In this paper, we ahve identified certain misbehaviors caused by mallicious node for reactive routing protocol. We also discuss the intrusion detection and intrusion prevention model to prevent several identified attacks in the networks

  • PDF

Security Analysis of AMI Using ACT (ACT를 이용한 AMI 보안 분석)

  • Wi, Miseon;Kim, Dong Seong;Park, Jong Sou
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.639-653
    • /
    • 2013
  • Smart grid is a network of computers and power infrastructure that monitor and manage energy usage efficiently. Recently, the smart grid demonstration projects around the world, including the United States, Europe, Japan, and the technology being developed. The protection of the many components of the grid against cyber-threats has always been critical, but the recent Smart grid has been threatened by a variety of cyber and physical attacks. We model and analyze advanced metering infrastructure(AMI) in smart grid. Using attack countermeasure tree(ACT) we show qualitative and probabilistic security analysis of AMI. We implement using SHARPE(Symbolic Hierarchical Automated Reliability and Performance Evaluator) tool and calculate probability, ROA, ROI, Structure Importance, Birnbaum Importance.

신규 가입자망 기술의 경제성 평가를 위한 망 구조모형과 그 응용

  • 류태규;이정동;김태유
    • Proceedings of the Korea Technology Innovation Society Conference
    • /
    • 2000.11a
    • /
    • pp.45-67
    • /
    • 2000
  • Broadband access technologies plays an important role in the national information infrastructure. In the evolution path of the information infrastructure, the relative economics of alternative access technology is the most critical determining factor. In this paper, we discuss the economics of local loop access technologies of existing technologies, such as, ADSL, HFC, and new PLC. To do this, we suggest appropriate configuration of access network system and its associated numerical equations. To modelize access network system and drive the numerical equations, we consider the DS (Double Star) and the T&B (Tree & Brench) architecture and analyse the adequate block diagram of each access system for each technology We introduce the density of subscriber as a key variable and the equation of allocating optimal number of cell in a service area. We analyze the relative economics of local loop architecture in two different situations, that is, urban and rural. From the empirical implementation, we found that for the case of urban area, where the cost of cable and infrastructure is not necessary, there is not much difference in the cost per one subscriber. However, for the case of rural region, we found that there is remarkable difference in the cost per one subscriber among technologies. Therefore we conclude that the economics of local loop architecture is depend on the density of subscriber and existing network infrastructures. we hope that this paper contribute to the optimal technology selection of consmer, technology Providers, and government.

  • PDF

An Analysis of the Security Threats and Security Requirements for Electric Vehicle Charging Infrastructure (전기자동차 충전 인프라에서의 보안위협 및 보안요구사항 분석)

  • Kang, Seong-Ku;Seo, Jung-Taek
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1027-1037
    • /
    • 2012
  • With response to the critical issue of global warming, Smart Grid system has been extensively investigated as next efficient power grid system. Domestically, Korean is trying to expand the usage of Electric Vehicles (EVs) and the charging infrastructure in order to replace the current transportation using fossil fuels holding 20% of overall CO2 emission. The EVs charging infrastructures are combined with IT technologies to build intelligent environments but have considerable number of cyber security issues because of its inherent nature of the technologies. This work not only provides logical architecture of EV charging infrastructures with security threats based on them but also analyses security requirements against security threats in order to overcome the adversarial activities to Smart Grid.

A Study on a Heat-load of IT Equipments for the Thermal Environment Control in the Data Center (데이터센터의 합리적인 환경제어를 위한 장비 발열기준에 대한 연구)

  • Cho, Jin-Kyun;Hong, Min-Ho;Jeong, Cha-Su;Kim, Byung-Seon
    • Proceedings of the SAREK Conference
    • /
    • 2006.06a
    • /
    • pp.938-943
    • /
    • 2006
  • The primary purpose of a computer room of data center and associated infrastructure is to support the operation of critical IT equipment. Traditionally, most owners of large critical data centers have been more than willing to accept a reasonable amount of computer room worker discomfort if necessary to support critical IT systems. All electrical equipment produces heat, which must be removed to prevent the equipment temperature from rising to an unacceptable level. Most information technology equipment and other equipment found in a data center or network room is air-cooled. Sizing a cooling system requires an understanding of the amount of heat produced by the equipment contained in the enclosed space, along with the heat produced by the other heat sources typically encountered.

  • PDF

Development of a Framework of Emergency Action Plan for Domestic Water Front Critical Infrastructure (국내 주요 수변시설물 EAP 프레임워크 개발)

  • Park, Su-Yeul;Choi, Soo-Young;Oh, Eun-Ho;Kim, Jin-Man
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.4
    • /
    • pp.125-134
    • /
    • 2017
  • Unusual precipitation caused by typhoons and severe rain stormscan threaten human life and property. Thus, various organizations prepare emergency action plans (EAPs) to provide proper guidelines for operators, experts, and emergency response personnel to protect and enhance critical infrastructure. For example, FEMA and DHS have various types of EAPs for dams, levees, and other structures to protect people and property. FEMA defines EAPs as official documents to decrease the damage and impact in emergency situations and to reduce casualties. These documents should consider all possible situations in an emergency and can reduce problems in facility management. This study analyzes EAPs for infrastructure from the USA, Japan, and Korea in order to suggest an ideal EAP framework. EAPcontent can include how to guide experts and operators in disaster stages (mitigation, preparedness, response, and recovery), how to operate emergency equipment, and how to protect critical infrastructure and life. The suggested EAP framework performed very well in a test location. It can therefore be used for infrastructure organizations in Korea and to inform of the appropriate processes and methods for risk reduction in flood disasters.

A Study on the Introduction of Legal EMP Protection System (고출력 전자기파 방호 제도 도입에 관한 연구)

  • Chung, Yeon-Choon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.24 no.8
    • /
    • pp.781-790
    • /
    • 2013
  • Nowadays, national critical infrastructures have been known to be highly vulnerable to the EMP threats which are internationally growing. But their realistic solutions have been not made by the lack of detailed rules and regulations in current laws, however, which cover most of cyber threats. This paper takes a look at the domestic and overseas trends on the EMP protections, and proposes the revision directives of relevant laws and the contents included into the proposed legislation. Among them, the amendment of the current "Information Infrastructure Protection Act" is considered to be the most effective, including provisions on protected informations, industrial promotions, R&D supports, education, etc. Anyway, this paper is expected to be helpful for introducing an effective legal scheme on the CIP against EMP threats. domestic rule.

A Study on Optimized Placement of Green-Gray Infrastructure for Effective Flood Mitigation (효과적인 도시 홍수 저감을 위한 그린-그레이 인프라 위치 설정에 관한 연구)

  • Bae, Chae-Young;Lee, Dong-Kun
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.25 no.6
    • /
    • pp.65-75
    • /
    • 2022
  • Urban flood management(UFM) strategy ought to consider the connections and interactions between existing and new infrastructures to manage stormwater and improve the capacity to treat water. It is also important to demonstrate strategies that can be implemented to reduce the flow at flooding sources and minimize flood risk at critical locations. Although the general theory of spatial impact is popular, modeling guidelines that can provide information for implementation in real-world plans are still lacking. Under such background, this study conducted a modeling research based on an actual target site to confirm the hypothesis that it is appropriate to install green infrastructure(GI) in the source area and to take structural protection measures in the impact area, as summarized in previous studies. The results of the study proved the hypothesis, but the results were different from the hypothesis depending on which hydrological performance indicators were targeted. This study will contribute to demonstrating the effectiveness of strategies that can be implemented to reduce the flow at flooding sources and minimize the risk of flooding in critical locations in terms of spatial planning and regeneration.