• Title/Summary/Keyword: Fault Recover

Search Result 78, Processing Time 0.024 seconds

Fault-Tolerant Middleware for Service Robots (서비스 로봇용 결함 허용 미들웨어)

  • Baek, Bum-Hyeon;Park, Hong-Seong
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.14 no.4
    • /
    • pp.399-405
    • /
    • 2008
  • Recently, robot technology is actively going on progress to the field of various services such as home care, medical care, entertainment, and etc. Because these service robots are in use nearby person, they need to be operated safely even though hardware and software faults occur. This paper proposes a Fault-Tolerant middleware for a robot system, which has following two characteristics: supporting of heterogeneous network interface and processing of software components and network faults. The Fault-Tolerant middleware consists of a Service Layer(SL), a Network Adaptation Layer(NAL), a Network Interface Layer(NIL), a Operating System ion Layer(OSAL), and a Fault-Tolerant Manager(FTM). Especially, the Fault-Tolerant Manager consists of 4 components: Monitor, Fault Detector, Fault Notifier, and Fault Recover to detect and recover the faults effectively. This paper implements and tests the proposed middleware. Some experiment results show that the proposed Fault-Tolerant middleware is working well.

Study On The Characteristic Of System Fluctuation Under Large Generator Unit Outage (대전원타락사고시의 계통동요특성 해석)

  • 송길영;이종훈;김영창
    • 전기의세계
    • /
    • v.24 no.2
    • /
    • pp.71-77
    • /
    • 1975
  • This paper describes the results of a study for the stability of power system when the Kori Nuclear #1 P/P is operated with existing system. First, a transient disturbance, which effects the stability of entire power system, was analysed and to cope with the problem a load shedding method was studied to recover the fluctuation of the power system. Second, transient stability problem was studied when three phase fault occurs in 345 Extra High Voltage power System, and from this result, it was found to be highly effective that high speed protecting device should be provided and operated to recover the fault.

  • PDF

Fault Tolerant Control Design Using IMM Filter with an Application to a Flight Control System (IMM 필터를 이용한 고장허용 제어기법 및 비행 제어시스템에의 응용)

  • 김주호;황태현;최재원
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2000.10a
    • /
    • pp.87-87
    • /
    • 2000
  • In this paper, an integrated design of fault detection, diagnosis and reconfigurable control tot multi-input and multi-output system is proposed. It is based on the interacting multiple model estimation algorithm, which is one of the most cost-effective adaptive estimation techniques for systems involving structural and/or parametric changes. This research focuses on the method to recover the performance of a system with failed actuators by switching plant models and controllers appropriately. The proposed scheme is applied to a fault tolerant control design for flight control system.

  • PDF

A Checkpoint and Recovery Facility for the Fault-Tolerant Process on Linux Environment (리눅스 환경에서 결함 허용 프로세스를 위한 검사점 및 복구 도구)

  • Rim Seong-Rak;Kim Sin-Ho
    • The KIPS Transactions:PartA
    • /
    • v.11A no.5
    • /
    • pp.313-318
    • /
    • 2004
  • In this paper, we suggest a checkpoint and recovery facility for the fault-tolerable process which is expected to be executed for a long time. The basic concept of the suggested facility is to allow the process to be executed continuously, when the process was stopped due to a System fault, by storing the execution status of the process periodically and recovering the execution status prior to the fault was occurred. In the suggested facility, it does not need to modify the source code for the fault-tolerable process. It was designed for the user to specify directly the file name and the checkpoint frequency, and two system calls(save, recover) were added. finally, it was implemented on the Linux environment(kernel 2.4.18) for checking the feasibility.

A Differential Fault Attack against Block Cipher HIGHT (블록 암호 HIGHT에 대한 차분 오류 공격)

  • Lee, Yu-Seop;Kim, Jong-Sung;Hong, Seok-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.485-494
    • /
    • 2012
  • The block cipher HIGHT is designed suitable for low-resource hardware implementation. It established as the TTA standard and ISO/IEC 18033-3 standard. In this paper, we propose a differentail fault attack against the block cipher HIGHT. In the proposed attack, we assume that an attacker is possible to inject a random byte fault in the input value of the 28-th round. This attack can recover the secret key by using the differential property between the original ciphertext and fault cipher text pairs. Using 7 and 12 error, our attack recover secret key within a few second with success probability 87% and 51%, respectively.

Differential Fault Analysis on AES by Recovering of Intermediate Ciphertext (중간 암호문 복구 방법을 이용한 AES 차분오류공격)

  • Baek, Yi-Roo;Gil, Kwang-Eun;Park, Jea-Hoon;Moon, Sang-Jae;Ha, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.167-174
    • /
    • 2009
  • Recently, Li et al. proposed a new differential fault analysis(DFA) attack on the block cipher ARIA using about 45 ciphertexts. In this paper, we apply their DFA skill on AES and improve attack method and its analysis. The basic idea of our DFA method is that we recover intermediate ciphertexts in last round using final faulty ciphertexts and find out last round secret key. In addition, we present detail DFA procedure on AES and analysis of complexity. Furthermore computer simulation result shows that we can recover its 128-bit secret key by introducing a correct ciphertext and 2 faulty ciphertexts.

A Study on the Procedure of Fault on Electric Power Systems by Special Fibers (특수섬유에 의한 전력계통의 고장유발 과정 고찰)

  • Rim, One-Kwon;Kim, Seong-Shik;Jung, Dong-Hak
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.12 no.5
    • /
    • pp.667-675
    • /
    • 2009
  • Faults can be generated at electric power systems by variety of both certain and uncertain reasons, which may cause harmful effects on electrical apparatuses under operation and stability of electric power system operations, and may also lead to great confusions and inconveniences to individual livings, public works, industrial activities, services, military affairs, etc.. In some cases, intentional inductions of faults are committed for specific purposes, and it is necessary to understand the procedures of fault by some foreign materials. In this paper, compositions and operations of electric power systems, summaries of electrical fault phenomena and fault protection, and restrictions to power system operation were outlined. And the analogies on the procedure of faults from former papers were introduced, and test results that revealed the validity of those analogies were also introduced.

A Key Recovery Attack on HMAC using Fault Injection Attack (오류 주입 공격을 이용한 HMAC에 대한 키 복구 공격)

  • Jeong, Ki-Tae;Lee, Yu-Seop;Sung, Jae-Chul;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.27-33
    • /
    • 2011
  • At FDTC'05 and CISC-W'10, the authors showed that if they decrease the number of rounds of AES and Triple-DES by using the fault injections, it is possible to recover the secret key of the target algorithms, respectively. In this paper, we propose a key recovery attack on HMAC by using the main idea of these attacks. This attack is applicable to HMAC based on MD-family hash functions and can recover the secret key with the negligible computational complexity. Particularly, the attack result on HMAC-SHA-2 is the first known key recovery attack result on this algorithm.

Differential Fault Analysis on Block Cipher ARIA-128 (블록 암호 ARIA-128에 대한 차분 오류 공격)

  • Park, Se-Hyun;Jeong, Ki-Tae;Lee, Yu-Seop;Sung, Jae-Chul;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.15-25
    • /
    • 2011
  • A differential fault analysis(DFA) is one of the most important side channel attacks on block ciphers. Most block ciphers, such as DES, AES, ARIA, SEED and so on., have been analysed by this attack. In 2008, Wei et al. proposed the first DFA on ARIA-128. Their attack can recover the 128-bit secrey key by about 45 faulty ciphertexts. In this paper, we propose an improved DFA on ARIA-128. We can recover the 12S-bit secret key by only 4 faulty ciphertexts with the computational complexity of O($2^{32}$).

A Routing Protocol with Fast-Recovery of Failures Using Backup Paths on MANETs (MANET에서 백업경로를 이용한 빠른 경로복구 능력을 가진 라우팅 프로토콜)

  • Thai, Ahn Tran;Kim, Myung-Kyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.7
    • /
    • pp.1541-1548
    • /
    • 2012
  • This paper proposes a new multipath-based routing protocol on MANETs with Fast-Recovery of failures. The proposed protocol establishes the primary and secondary paths between a source and a destination considering the end-to-end packet reception reliability of routes. The primary path is used to transmit messages, and the secondary path is used to recover the path when detecting failures on the primary path. If a node detects a link failure during message transmission, it can recover the path locally by switching from the primary to the secondary path. By allowing the intermediate nodes to recover locally the route failure, the proposed protocol can reduce the number of packet loss and the amount of control packets for setting up new paths. The simulation result using QualNet simulator shows that the proposed protocol was about 10-20% higher than other protocols in terms of end-to-end message delivery ratio and the fault recovery time in case of link fault was about 3 times faster than the other protocols.