• Title/Summary/Keyword: Dual Security

Search Result 143, Processing Time 0.022 seconds

Enforcement of opacity security properties for ship information system

  • Xing, Bowen;Dai, Jin;Liu, Sheng
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.8 no.5
    • /
    • pp.423-433
    • /
    • 2016
  • In this paper, we consider the cybersecurity issue of ship information system (SIS) from a new perspective which is called opacity. For a SIS, its confidential information (named as "secret") may be leaked through the working behaviors of each Distributed Control Unit (DCU) from an outside observer called an "intruder" which is able to determine ship's mission state by detecting the source of each data flow from the corresponding DCUs in SIS. Therefore we proposed a dual layer mechanism to enforce opacity by activating non-essential DCU during secret mission. This mechanism is calculated by two types of insertion functions: Safety-assured insertion function ($f_{IS}$) and Admissibility-assured insertion function ($f_{IA}$). Due to different objectives, $f_{IS}$ is designed to confuse intruder by constructing a non-secret behaviors from a unsafe one, and the division of $f_{IA}$ is to polish the modified output behaviors back to normal. We define the property of "$I_2$-Enforceability" that dual layer insertion functions has the ability to enforce opacity. By a given mission map of SIS and the marked secret missions, we propose an algorithm to select $f_{IS}$ and compute its matchable $f_{IA}$ and then the DCUs which should be activated to release non-essential data flow in each step is calculable.

CoMP Transmission for Safeguarding Dense Heterogeneous Networks with Imperfect CSI

  • XU, Yunjia;HUANG, Kaizhi;HU, Xin;ZOU, Yi;CHEN, Yajun;JIANG, Wenyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.1
    • /
    • pp.110-132
    • /
    • 2019
  • To ensure reliable and secure communication in heterogeneous cellular network (HCN) with imperfect channel state information (CSI), we proposed a coordinated multipoint (CoMP) transmission scheme based on dual-threshold optimization, in which only base stations (BSs) with good channel conditions are selected for transmission. First, we present a candidate BSs formation policy to increase access efficiency, which provides a candidate region of serving BSs. Then, we design a CoMP networking strategy to select serving BSs from the set of candidate BSs, which degrades the influence of channel estimation errors and guarantees qualities of communication links. Finally, we analyze the performance of the proposed scheme, and present a dual-threshold optimization model to further support the performance. Numerical results are presented to verify our theoretical analysis, which draw a conclusion that the CoMP transmission scheme can ensure reliable and secure communication in dense HCNs with imperfect CSI.

A Study on the Activation of Dual Use Technology Program (민.군겸용기술사업 활성화 방안 연구)

  • Kim, Chul-Whan;Choi, Eun-Ho;Heo, Whan
    • Journal of the military operations research society of Korea
    • /
    • v.32 no.1
    • /
    • pp.13-35
    • /
    • 2006
  • This study aims to propose alternative suggestions for practical and efficient implementation of Dual Use Technology Programs(CUTP) in Korea which can strengthen both national security and industrial competitiveness. DUTP of Korea has suffered from inefficiency and inactivity. This study analyzes the Inefficiency and negative factors of DUTP of Korea by examining the previous cases of the advanced countries. It also examines individual problems of DUTP carefully and attempts to derive alternative solutions to improve the current situation. First, a global government plan should be made considering Korea's weapon system and Korea's industrial characteristics. Second, DUTP should begin to develop core technology in connection with technology level evaluation and technology exchange project should establish a comprehensive information network system which links any civilian and military technology data. Third, technology transfer project should be promoted by utilizing cyber technology exchange market and military defense venture center. Fourth, standardization project should be expanded by establishing a national standard information system.

A Study of the Improvement for the Military Logistics, focusing on the PLS Truck and the Dual Pallet Standard (PLS트럭 및 표준 파렛트 규격 복수화 적용이 군수지원에 미치는 영향 연구)

  • Kwon, Kang-Min;Kim, Min-Woo;Kang, Seong-Jin;Kang, Kyung-Woo;Suh, Sun-Duck
    • Journal of the military operations research society of Korea
    • /
    • v.35 no.2
    • /
    • pp.87-98
    • /
    • 2009
  • In the military logistics, the Outsourcing such as 3PL (3rd Party Logistics) and 4PL has emerged recently as an important agenda. However, when 3PL applied prematurely, side effects will occur such as the loss of combat power in wartime, the security vulnerabilities and the high cost by a small amount of military order. Recently, the developed countries such as the United States and the Britain want to compensate for these side effects. Therefore, They are developing the private-public competitive sourcing concept for the complementary partnership and the foster competition with the private sector. To apply this concept to the Korean Military, they need to be reorganized and promote the efficiency in the military logistics. Especially, the transportation sector. Therefore, this study, which is focused on the transportation sector, offers two kinds of measures to improve such as the Dual Pallet Standard (T11, T12) and the PLS(Palletized Loading System) truck system. Finally, these improvements will be analyzed by the simulation in this paper.

Conceptual design of a dual drum-controlled space molten salt reactor (D2 -SMSR): Neutron physics and thermal hydraulics

  • Yongnian Song;Nailiang Zhuang;Hangbin Zhao;Chen Ji;Haoyue Deng;Xiaobin Tang
    • Nuclear Engineering and Technology
    • /
    • v.55 no.6
    • /
    • pp.2315-2324
    • /
    • 2023
  • Space nuclear reactors are becoming popular in deep space exploration owing to their advantages of high-power density and stability. Following the fourth-generation nuclear reactor technology, a conceptual design of the dual drum-controlled space molten salt reactor (D2-SMSR) is proposed. The reactor concept uses molten salt as fuel and heat pipes for cooling. A new reactivity control strategy that combines control drums and safety drums was adopted. Critical physical characteristics such as neutron energy spectrum, neutron flux distribution, power distribution and burnup depth were calculated. Flow and heat transfer characteristics such as natural convection, velocity and temperature distribution of the D2-SMSR under low gravity conditions were analyzed. The reactivity control effect of the dual-drums strategy was evaluated. Results showed that the D2-SMSR with a fast spectrum could operate for 10 years at the full power of 40 kWth. The D2-SMSR has a high heat transfer coefficient between molten salt and heat pipe, which means that the core has a good heat-exchange performance. The new reactivity control strategy can achieve shutdown with one safety drum or three control drums, ensuring high-security standards. The present study can provide a theoretical reference for the design of space nuclear reactors.

A Study on Preprocessing Method in Deep Learning for ICS Cyber Attack Detection (ICS 사이버 공격 탐지를 위한 딥러닝 전처리 방법 연구)

  • Seonghwan Park;Minseok Kim;Eunseo Baek;Junghoon Park
    • Smart Media Journal
    • /
    • v.12 no.11
    • /
    • pp.36-47
    • /
    • 2023
  • Industrial Control System(ICS), which controls facilities at major industrial sites, is increasingly connected to other systems through networks. With this integration and the development of intelligent attacks that can lead to a single external intrusion as a whole system paralysis, the risk and impact of security on industrial control systems are increasing. As a result, research on how to protect and detect cyber attacks is actively underway, and deep learning models in the form of unsupervised learning have achieved a lot, and many abnormal detection technologies based on deep learning are being introduced. In this study, we emphasize the application of preprocessing methodologies to enhance the anomaly detection performance of deep learning models on time series data. The results demonstrate the effectiveness of a Wavelet Transform (WT)-based noise reduction methodology as a preprocessing technique for deep learning-based anomaly detection. Particularly, by incorporating sensor characteristics through clustering, the differential application of the Dual-Tree Complex Wavelet Transform proves to be the most effective approach in improving the detection performance of cyber attacks.

[Retracted] A Study on the Export Control System and its Effective Implementation Plan in Korea ([논문 철회] 한국의 전략물자 수출통제제도의 문제점과 효율적 이행방안)

  • Lee, Sang-Ok
    • International Commerce and Information Review
    • /
    • v.13 no.3
    • /
    • pp.353-375
    • /
    • 2011
  • Export control was first triggered by international export control system at US led COCOM in 1949. Numerous international efforts such as NPT in 1969, ZC in 1970, NSG in 1978, AG in 1985, MTCR in 1987, Wassenaar Arrangement(WA) establishment in 1995 with 1990's the fall of the Berlin Wall, have been made since. The concept of export control has been changed from weaponry and parts export control to preventing or blocking weaponry, respective goods and relevant technology from the hand of troubled regions and non-state actors as terrorist groups; and the new concept is described as Nonproliferation Control. Extent of control items is not only limited to conventional weaponry, but also includes weapons of mass destruction(WMD) and even dual use items which can be used for production, development, usage or storage. Control items include all items defined by NSG, MTCR, AG, WA, and CMC-Opec. The 9.11 terror had a strong influence on international society. Effort to prevent WMD proliferation has now become the most important issue for international security. This study aims to suggest improvement points for nonproliferation law and its effective implementation, based on problem and limitation identification along with analysis of nonproliferation law and implementation examples by type. Furthermore for the purpose of national and global security, export control system on strategic items which are considered to be a key issue in South and North Korea relationship needs to be effectively managed. Recently, North Korea's missile and nuclear tests have been criticized globally; and the global society including respective countries as China and South Korea is striving to urge export control in line with the UN resolution.

  • PDF

Image Encryption Based on Quadruple Encryption using Henon and Circle Chaotic Maps

  • Hanchinamani, Gururaj;Kulkarni, Linganagouda
    • Journal of Multimedia Information System
    • /
    • v.2 no.2
    • /
    • pp.193-206
    • /
    • 2015
  • In this paper a new approach for image encryption based on quadruple encryption with dual chaotic maps is proposed. The encryption process is performed with quadruple encryption by invoking the encrypt and decrypt routines with different keys in the sequence EDEE. The decryption process is performed in the reverse direction DDED. The key generation for the quadruple encryption is achieved with a 1D Circle map. The chaotic values for the encrypt and decrypt routines are generated by using a 2D Henon map. The Encrypt routine E is composed of three stages i.e. permutation, pixel value rotation and diffusion. The permutation is achieved by: row and column scrambling with chaotic values, exchanging the lower and the upper principal and secondary diagonal elements based on the chaotic values. The second stage circularly rotates all the pixel values based on the chaotic values. The last stage performs the diffusion in two directions (forward and backward) with two previously diffused pixels and two chaotic values. The security and performance of the proposed scheme are assessed thoroughly by using the key space, statistical, differential, entropy and performance analysis. The proposed scheme is computationally fast with security intact.

Secrecy Performances of Multicast Underlay Cognitive Protocols with Partial Relay Selection and without Eavesdropper's Information

  • Duy, Tran Trung;Son, Pham Ngoc
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4623-4643
    • /
    • 2015
  • This paper considers physical-layer security protocols in multicast cognitive radio (CR) networks. In particular, we propose dual-hop cooperative decode-and-forward (DF) and randomize-and-forward (RF) schemes using partial relay selection method to enhance secrecy performance for secondary networks. In the DF protocol, the secondary relay would use same codebook with the secondary source to forward the source's signals to the secondary destination. Hence, the secondary eavesdropper can employ either maximal-ratio combining (MRC) or selection combining (SC) to combine signals received from the source and the selected relay. In RF protocol, different codebooks are used by the source and the relay to forward the source message secretly. For each scheme, we derive exact and asymptotic closed-form expressions of secrecy outage probability (SOP), non-zero secrecy capacity probability (NzSCP) in both independent and identically distributed (i.i.d.) and independent but non-identically distributed (i.n.i.d.) networks. Moreover, we also give a unified formula in an integral form for average secrecy capacity (ASC). Finally, our derivations are then validated by Monte-Carlo simulations.

Prospects of Dual Form of Teaching and Learning in the Realities of the Covid-19 Pandemic and the Post-pandemicPeriod

  • Bratitsel, Maryna;Kravchuk, Olena;Tishko, Liliya;Osiievskyi, Valerii;Bellie, Victoriia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.483-490
    • /
    • 2021
  • The COVID-19 pandemic has posed significant community challenges towards higher education around the world. The urgent and unexpected request for full-time university courses to switch over to online teaching was a particular challenge. Online learning and learning imply a certain pedagogical knowledge content (PKC), mainly related to the design and organization for better learning and the creation of unique learning environments using digital technologies. With the help of the present academic paper, we provide some expert opinion on the PKC connected with online learning with the aim of helping non-university professionals (that is, those with lack of online learning experience) navigate these challenging times. Our findings point to the planning of learning activities with certain features, a combination of three types of presence (social, cognitive and facilitative) and the need to adapt the assessment system to new learning requirements. We will conclude by contemplating on how responding to a crisis can improve teaching and learning practices in the post-digital era.