• Title/Summary/Keyword: Data Integrity Verification

Search Result 105, Processing Time 0.024 seconds

Configuration of an IPSec VPN Testbed and Development of an Encryption Verification Tool (IOSec VPN 테스트 베드의 구성 및 암호화 식별 도구 개발)

  • 김윤희;이계상
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.6C
    • /
    • pp.659-667
    • /
    • 2003
  • IPsec refers to a standardized set of security protocols and algorithms which can provide the integrity, the authentication and the confidentiality services for IP packets in the Internet. Between two security gateways, IPsec provides the access control, the connectionless Integrity, data origin authentication, the anti-replay, and the confidentiality services, not only to the IP layer but also to the upper layers. In this paper, we describe a VPN (Virtual Private Network) testbed configuration using the FreeS/WAN and analyze the ISAKMP messages exchanged between the linux security gateway during the IKE SA setup. Also, we describe our development of an IPSEC encryption verification tool which can be used conveniently by VPN administrators.

A Systems Engineering Approach to Implementing Hardware Cybersecurity Controls for Non-Safety Data Network

  • Ibrahim, Ahmad Salah;Jung, Jaecheon
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.12 no.2
    • /
    • pp.101-114
    • /
    • 2016
  • A model-based systems engineering (MBSE) approach to implementing hardware-based network cybersecurity controls for APR1400 non-safety data network is presented in this work. The proposed design was developed by implementing packet filtering and deep packet inspection functions to control the unauthorized traffic and malicious contents. Denial-of-Service (DoS) attack was considered as a potential cybersecurity issue that may threaten the data availability and integrity of DCS gateway servers. Logical design architecture was developed to simulate the behavior of functions flow. HDL-based physical architecture was modelled and simulated using Xilinx ISE software to verify the design functionality. For effective modelling process, enhanced function flow block diagrams (EFFBDs) and schematic design based on FPGA technology were together developed and simulated to verify the performance and functional requirements of network security controls. Both logical and physical design architectures verified that hardware-based cybersecurity controls are capable to maintain the data availability and integrity. Further works focus on implementing the schematic design to an FPGA platform to accomplish the design verification and validation processes.

Verification of failover effects from distributed control system communication networks in digitalized nuclear power plants

  • Min, Moon-Gi;Lee, Jae-Ki;Lee, Kwang-Hyun;Lee, Dongil;Lim, Hee-Taek
    • Nuclear Engineering and Technology
    • /
    • v.49 no.5
    • /
    • pp.989-995
    • /
    • 2017
  • Distributed Control System (DCS) communication networks, which use Fast Ethernet with redundant networks for the transmission of information, have been installed in digitalized nuclear power plants. Normally, failover tests are performed to verify the reliability of redundant networks during design and manufacturing phases; however, systematic integrity tests of DCS networks cannot be fully performed during these phases because all relevant equipment is not installed completely during these two phases. In additions, practical verification tests are insufficient, and there is a need to test the actual failover function of DCS redundant networks in the target environment. The purpose of this study is to verify that the failover functions works correctly in certain abnormal conditions during installation and commissioning phase and identify the influence of network failover on the entire DCS. To quantify the effects of network failover in the DCS, the packets (Protocol Data Units) must be collected and resource usage of the system has to be monitored and analyzed. This study introduces the use of a new methodology for verification of DCS network failover during the installation and commissioning phases. This study is expected to provide insight into verification methodology and the failover effects from DCS redundant networks. It also provides test results of network performance from DCS network failover in digitalized domestic nuclear power plants (NPPs).

Integrity Assessment and Verification Procedure of Angle-only Data for Low Earth Orbit Space Objects with Optical Wide-field PatroL-Network (OWL-Net)

  • Choi, Jin;Jo, Jung Hyun;Kim, Sooyoung;Yim, Hong-Suh;Choi, Eun-Jung;Roh, Dong-Goo;Kim, Myung-Jin;Park, Jang-Hyun;Cho, Sungki
    • Journal of Astronomy and Space Sciences
    • /
    • v.36 no.1
    • /
    • pp.35-43
    • /
    • 2019
  • The Optical Wide-field patroL-Network (OWL-Net) is a global optical network for Space Situational Awareness in Korea. The primary operational goal of the OWL-Net is to track Low Earth Orbit (LEO) satellites operated by Korea and to monitor the Geostationary Earth Orbit (GEO) region near the Korean peninsula. To obtain dense measurements on LEO tracking, the chopper system was adopted in the OWL-Net's back-end system. Dozens of angle-only measurements can be obtained for a single shot with the observation mode for LEO tracking. In previous work, the reduction process of the LEO tracking data was presented, along with the mechanical specification of the back-end system of the OWL-Net. In this research, we describe an integrity assessment method of time-position matching and verification of results from real observations of LEO satellites. The change rate of the angle of each streak in the shot was checked to assess the results of the matching process. The time error due to the chopper rotation motion was corrected after re-matching of time and position. The corrected measurements were compared with the simulated observation data, which were taken from the Consolidated Prediction File from the International Laser Ranging Service. The comparison results are presented in the In-track and Cross-track frame.

Thermal Aging Embrittlement in LWR Primary Pressure Boundary Components

  • Kim, Sunki;Kim, Yongsoo;Wonmok Jae
    • Proceedings of the Korean Nuclear Society Conference
    • /
    • 1995.05b
    • /
    • pp.635-640
    • /
    • 1995
  • Two techniques for the verification of the phase separation in ferrite phase of primary pressure bounary component materials, the primary cause of thermal aging embrittlement, are presented. Data base of room-temperature Charpy V-notch impact energy during reactor service was estimated as a measure of the degree of embrittlement. The serviceable period of CF-3 and CF-8 alloys as the primary pressure boundary components may be acceptably extended for 60 years of lifetime. However, the integrity of CF-8M alloys can be degraded seriously after several years of service in the nuclear reactor.

  • PDF

Secret Key Watermarking for Image Authentication

  • Woo, Chan-Il;In-Chul shin
    • Proceedings of the IEEK Conference
    • /
    • 2000.07b
    • /
    • pp.815-818
    • /
    • 2000
  • As the growth of internet and the diffusion of wide multimedia applications are increased, the ownership verification and authentication in communication channel for a digital image become more important. For these purpose there are many watermarking scheme available for image, video stream and audio data. In this paper we studied on techniques for integrity and authentication of digital images and proposed new watermarking algorithm. The proposed algorithm is implemented in C language on IBM-PC and the test results are shown.

  • PDF

Scale Development on Health Conservation of the Institutionalized Elderly (시설 노인의 건강보존에 관한 도구 개발)

  • Sung, Ki-Wol
    • Journal of Korean Academy of Nursing
    • /
    • v.35 no.1
    • /
    • pp.113-124
    • /
    • 2005
  • Purpose: The purpose of this study was to develop a health conservation scale with high validity and reliability for institutionalized elderly. Method: The process of development of this scale was as follows. A conceptual framework composed of 4 phases of health conservation of institutionalized elderly was identified based on the literature review with elderlies and discussions with experts in health conservation. A total of 75 items, on a 4-point scale were developed. Through reliability testing and factor analysis, 57 preliminary items were selected. By means of internal consistency of the 57 items, 18 items whose inner-items correlation coefficient was below .40 were deleted. Through factor analysis, 2 items whose factor loading was below .40 were deleted. Finally 37 items remained. To verity the 37 items, factor analysis, reliability testing, and correlation was done. Data were collected from 207 institutionalized elderly subjects in Daegu, Kyungpook, Busan, and KyungNam Province from August. 2003 to February. 2004. Result: In the result of factor analysis of the 37 items, 4 factors were extracted. These factors were labeled as ‘personal integrity’, ‘conservation of energy', ‘structural integrity’, and ‘social integrity'. These factors included 4 phases of health conservation. Cronbach's Alpha of 37 the items was .9424 and the correlation coefficient of HPLP was .723. Conclusion: The researchers recommend the following: An explorative study on the variables related to health conservation is needed for criterion validity of this scale. Studies on health conservation of different age groups, and subjects are needed for verification.

Application of Probabilistic Fracture Mechanics Technique Using Monte Carlo Simulation (몬테카를로 시뮬레이션을 이용한 확률론적 파괴역학 수법의 적용성 검토)

  • Lee, Joon-Seong;Kwak, Sang-Log;Kim, Young-Jin
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.18 no.10
    • /
    • pp.154-160
    • /
    • 2001
  • For major structural components periodic inspections and integrity assessments are needed for the safety. However, many flaws are undetectable because sampling inspection is carried out during in-service inspection. Probabilistic integrity assessment is applied to take into consideration of uncertainty and variance of input parameters arise due to material properties and undetectable cracks. This paper describes a Probabilistic Fracture Mechanics(PFM) analysis based on the Monte Carlo(MC) algorithms. Taking a number of sampling data of probabilistic variables such as fracture toughness value, crack depth and aspect ratio of an initial surface crack, a MC simulation of failure judgement of samples is performed. for the verification of this analysis, a comparison study of the PFM analysis using a commercial code, mathematical method is carried out and a good agreement was observed between those results.

  • PDF

A Study on the Achievement of Required Safety Integrity Level to Reduce Risk for SMR On-Site Hydrogen Refueling Stations (개질형 On-Site 수소충전소의 리스크 감소를 위해 요구되는 SIL 등급 달성 방안에 관한 연구)

  • Lee, Jin Ho;Lim, Jae-Yong
    • Journal of the Korean Society of Safety
    • /
    • v.35 no.6
    • /
    • pp.1-8
    • /
    • 2020
  • In recent years, hydrogen has received much attention as an alternative energy source to fossil fuels. In order to ensure safety from the increasing number of hydrogen refueling stations, prevention methods have been required. In this regard, this study suggested an approach to reduce the risk of hydrogen refueling station by increasing Safety Integrity Level (SIL) for a Steam Methane Reformer (SMR) in On-Site Hydrogen Refueling Station. The worst scenario in the SMR was selected by HAZOP and the required SIL for the worst scenario was identified by LOPA. To verify the required SIL, the PFDavg.(1/RRF) of Safety Instrumented System (SIS) in SMR was calculated by using realistic failure rate data of SIS. Next, several conditions were tested by varying the sensor redundancy and proof test interval reduction and their effects on risk reduction factor were investigated. Consequently, an improved condition, which were the redundancy of two-out-of-three and the proof test interval of twelve months, achieved the tolerable risk resulting in the magnitude of risk reduction factor ten times greater than that of the baseline condition.

Digital Watermarking of Medical Image Based on Public Key Encryption Algorithm Considering ROI (ROI를 고려한 공개키 암호화 알고리즘 기반 의료영상 디지털 워터마킹)

  • Lee Hyung-Kyo;Kim Hee-Jung;Seong Tack-Young;Kwon Ki-Ryong;Lee Jong-Keuk
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.11
    • /
    • pp.1462-1471
    • /
    • 2005
  • Recently, the medical image has been digitized by the development of computer science and digitization of the medical devices. There are needs for database service of the medical image and long term storage because of the construction of PACS(picture archiving and communication system) following DICOM(digital imaging communications in medicine) standards, telemedicine, and et al. However, it also caused some kinds of problems, such as illegal reproduction of medical image, proprietary rights and data authentication. In this paper, we propose the new digital watermarking technique for medical image based on public key encryption algorithm for integrity verification. It prevents illegal forgery that can be caused after transmitting medical image data remotely. The watermark is the value of bit-plane in wavelet transform of the original image for certification method of integrity verification. We proposed the embedding regions are randomly chosen considering ROI, and a digital signature is made using hash function of MD5 which input is a secret key. The experimental results show that the watermark embedded by the proposed algorithm can survive successfully in image processing operations and that the watermark's invisibility is good.

  • PDF