• Title/Summary/Keyword: Hardware Resources

Search Result 442, Processing Time 0.028 seconds

Auto-configurable Security Mechanism for NFV

  • Kim, HyunJin;Park, PyungKoo;Ryou, Jaecheol
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.786-799
    • /
    • 2018
  • Recently, NFV has attracted attention as a next-generation network virtualization technology for hardware -independent and efficient utilization of resources. NFV is a technology that not only virtualize computing, server, storage, network resources based on cloud computing but also connect Multi-Tenant of VNFs, a software network function. Therefore, it is possible to reduce the cost for constructing a physical network and to construct a logical network quickly by using NFV. However, in NFV, when a new VNF is added to a running Tenant, authentication between VNFs is not performed. Because of this problem, it is impossible to identify the presence of Fake-VNF in the tenant. Such a problem can cause an access from malicious attacker to one of VNFs in tenant as well as other VNFs in the tenant, disabling the NFV environment. In this paper, we propose Auto-configurable Security Mechanism in NFV including authentication between tenant-internal VNFs, and enforcement mechanism of security policy for traffic control between VNFs. This proposal not only authenticate identification of VNF when the VNF is registered, but also apply the security policy automatically to prevent malicious behavior in the tenant. Therefore, we can establish an independent communication channel for VNFs and guarantee a secure NFV environment.

A Development on Consumer Portal System based on Advanced Metering Infrastructure (Advanced Metering Infrastructure를 이용한 Consumer Portal 개발)

  • Jin, Sung-Il;Jung, Nam-Jun;Yu, In-Hyeob;Kim, Sun-Ic;Ko, Gong-Min
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.56 no.11
    • /
    • pp.1903-1909
    • /
    • 2007
  • As the electric power industry has been revolutionarily transformed such that the distributed energy resources have been interconnected with power systems and a variety of energy service providers have been appeared, the need of Consumer Energy Portal as a core of two-way communication and service infrastructure between power suppliers and consumers has been gradually increased. Consumer Energy Portal can be thought of as a combination of hardware and software enabling two-way communication between energy service providers and equipment within the consumers' premises or a physical and logical link between consumers' in-building networks and wide-area access networks. In other words, Consumer Energy Portal can make the way the power industry has been traditionally operated the web-based way, enabling two-way interactions between energy service providers and consumers and mutual networking between end users' equipment. Thus, Consumer Energy Portal can be a kind of Service portal that provides new value-added services and efficient power operations that in the past. In this paper, for ESPs' integrated resources management, demand side management and value-added service provision, we have established the two-way access network that can gather real-time metering data using ZigBee technology and control physically networked equipment.

Implementation of efficient multi-view system through function distribution in digital multi-channel broadcasting service

  • Kwon, Myung-Kyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.6
    • /
    • pp.17-24
    • /
    • 2017
  • In recent digital broadcasting, up to 250 channels are multiplexed and transmitted. The channel transmission is made in the form of MPEG-2 Transport Stream (TS) and transmits one channel (Video, Audio). In order to check if many broadcast channels are transmitted normally, in multi-channel multi-view system, ability of real-time monitoring is required. In order to monitor efficient multi-channel, a distributed system in which functions and load are distributed should be implemented. In the past, we used an inefficient system that gave all of the functionality to a piece of hardware, which limited the channel acceptance and required a lot of resources. In this paper, we implemented a distributed multi-view system which can reduce resources and monitor them economically through efficient function and load balancing. It is able to implement efficient system by taking charge of decoding, resizing and encoding function in specific server and viewer function in separate server. Through this system, the system was stabilized, the investment cost was reduced by 19.7%, and the wall monitor area was reduced by 52.6%. Experimental results show that efficient real-time channel monitoring for multi-channel digital broadcasting is possible.

Developing Trend of an Adaptive Mobile Terminal in Ubiquitous Sensor Network Environments (USN 환경에서 적응형 이동 단말의 개발 동향)

  • Lee, Hyun-Jae;Oh, Chang-Heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.1027-1030
    • /
    • 2005
  • The article introduces developing trends of an adaptive mobile terminal as an interface for use of various network resources, such as public wireless networks and un-licensed wireless networks in ubiquitous sensor network environments, without troublesome settings or operations by users. These adaptive mobile terminals able to provide seamless services that adapt autonomously to the user's movements and changes in the state of wireless resources. Consequently, adaptive mobile terminals should be had respective independent hardware structure of usable wireless networks.

  • PDF

A Finite field multiplying unit using Mastrovito's arhitecture

  • Moon, San-Gook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.925-927
    • /
    • 2005
  • The study is about a finite field multiplying unit, which performs a calculation t-times as fast as the Mastrovito's multiplier architecture, suggesting and using the 2-times faster multiplier architecture. Former studies on finite field multiplication architecture includes the serial multiplication architecture, the array multiplication architecture, and the hybrid finite field multiplication architecture. Mastrovito's serial multiplication architecture has been regarded as the basic architecture for the finite field multiplication, and in order to exploit parallelism, as much resources were expensed to get as much speed in the finite field array multipliers. The array multiplication architecture has weakness in terms of area/performance ratio. In 1999, Parr has proposed the hybrid multipcliation architecture adopting benefits from both architectures. In the hybrid multiplication architecture, the main hardware frame is based on the Mastrovito's serial multiplication architecture with smaller 2-dimensional array multipliers as processing elements, so that its calculation speed is fairly fast costing intermediate resources. However, as the order of the finite field, complex integers instead of prime integers should be used, which means it cannot be used in the high-security applications. In this paper, we propose a different approach to devise a finite field multiplication architecture using Mastrovito's concepts.

  • PDF

Measuring Angular Speed and Angular Acceleration for Automotive Windshield Wiper Pivot (자동차 와이퍼 피봇의 각속도 및 각가속도 측정)

  • Lee Byoungsoo
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.13 no.4
    • /
    • pp.58-65
    • /
    • 2005
  • A method measuring angular speed and estimating angular acceleration of an automotive wind shield wiper pivot with limited resources has been proposed. Limited resources refer to the fact that processes cannot be operated in real-time with a regular notebook running a Microsoft Windows. Also, they refer to the fact that data acquisition cards have only two general purpose counters as many generic cards do. An optical incremental encoder has been employed for measuring angular motion. To measure the angular speed of the pivot, periods for the encoder's output pulses have been measured as the speed is related to the reciprocal of the period. Since only information acquired from one counter channel is the magnitude of the angular speed, sign correction is necessary. Also the information for the exact time when a pivot passes left and right dead points is also missing and the situation is inherent to the hardware setup. To find out the zero-crossing time of the angular speed, a linear interpolation technique has been employed. Lastly, to overcome the imperfection of the mechanical encoders, the angular speed has been curve fitted to a spline. Angular acceleration can be obtained by a differentiation of the angular speed.

Related-Key Differential Attacks on CHESS-64

  • Luo, Wei;Guo, Jiansheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.9
    • /
    • pp.3266-3285
    • /
    • 2014
  • With limited computing and storage resources, many network applications of encryption algorithms require low power devices and fast computing components. CHESS-64 is designed by employing simple key scheduling and Data-Dependent operations (DDO) as main cryptographic components. Hardware performance for Field Programmable Gate Arrays (FPGA) and for Application Specific Integrated Circuits (ASIC) proves that CHESS-64 is a very flexible and powerful new cipher. In this paper, the security of CHESS-64 block cipher under related-key differential cryptanalysis is studied. Based on the differential properties of DDOs, we construct two types of related-key differential characteristics with one-bit difference in the master key. To recover 74 bits key, two key recovery algorithms are proposed based on the two types of related-key differential characteristics, and the corresponding data complexity is about $2^{42.9}$ chosen-plaintexts, computing complexity is about $2^{42.9}$ CHESS-64 encryptions, storage complexity is about $2^{26.6}$ bits of storage resources. To break the cipher, an exhaustive attack is implemented to recover the rest 54 bits key. These works demonstrate an effective and general way to attack DDO-based ciphers.

Implementation of a 3D Graphics Simulator for GP-GPU (GP-GPU 개발을 위한 3차원 그래픽 시뮬레이터 구현)

  • Yeo, Dong-young;Kim, Woo-young;Jung, Hyung-Ki;Lee, Kwang-Yeob
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.337-340
    • /
    • 2009
  • Since a hardware accelerator for 3D graphics processing GPU(Graphics Processing Unit)'s performance has been improving constantly. This is the efficient way was introduced for complex graphics application, but it is rarely used to utilize 100% resources on GPU. GP-GPU(general-purpose GPU), including operations on the GPU and supporting common operations can be handled by the processor, is noted by depending on the distribution of resources that can be effectively controlled. In this paper, the simulator was implemented that supports virtual environment of GP-GPU and available for program design and debugging. Through this, the co-design development environment support simultaneous design fast and reliable verification that are available to build the interface of three-dimensional graphics display.

  • PDF

Ship network security system research that apply Green IT (Green IT를 적용한 선박 네트워크 보안 시스템 연구)

  • Baek, Jong-Il;Park, Dea-Woo;An, Jae-Min;Chang, Young-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.379-382
    • /
    • 2009
  • As IT becomes leading part of futurity industry, issue about Green IT is being on the increase and resources recycling, toxicity water use resection, saveenergy etc. are emphasized. Fundamental purpose for Neteuwokeusiseutem's Green IT realization that is constructed on ship studied about network security system that can control access that use resources as efficient and safe and is enemy of evil which can give subordinate of system for this and resect unnecessary hardware waste by back more.

  • PDF

Efficient Hardware Architecture of SEED S-box for Smart Cards

  • Hwang, Joon-Ho
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.4 no.4
    • /
    • pp.307-311
    • /
    • 2004
  • This paper presents an efficient architecture that optimizes the design of SEED S-box using composite field arithmetic. SEED is the Korean standard 128-bit block cipher algorithm developed by Korea Information Security Agency. The nonlinear function S-box is the most costly operation in terms. of size and power consumption, taking up more than 30% of the entire SEED circuit. Therefore the S-box design can become a crucial factor when implemented in systems where resources are limited such as smart cards. In this paper, we transform elements in $GF(2^8)$ to composite field $GF(((2^2)^2)^2)$ where more efficient computations can be implemented and transform the computed result back to $GF(2^8)$. This technique reduces the S-box portion to 15% and the entire SEED algorithm can be implemented at 8,700 gates using Samsung smart card CMOS technology.