• 제목/요약/키워드: Integrated Security Algorithm

검색결과 64건 처리시간 0.021초

분산 환경에서 이종의 보안시스템 관리를 위한 정책 충돌 모델링 (Modeling on Policy Conflict for Managing Heterogeneous Security Systems in Distributed Network Environment)

  • 이동영;서희석;김태경
    • 한국시뮬레이션학회논문지
    • /
    • 제18권2호
    • /
    • pp.1-8
    • /
    • 2009
  • 이종의 분산환경에서 다양한 보안시스템에 대한 효율적인 보안 관리를 위해서 관리자는 보안 시스템들이 설치된 네트워크 환경에 대한 사전에 전문적인 보안 지식을 갖고 있어야하며, 개방형 네트워크 환경의 경우 새로운 보안시스템이 추가되면 새로운 보안 정책과 기술을 적용해야 한다. 이는 전산망 운영 기관의 보안 관리 비용을 가중시키며 체계적이고 일괄적인 보안 정책 및 기술 구현을 불가능하게 하여 오히려 보안 문제를 야기시키는 역기능을 초래할 수 있다. 그리고, 보안 제품의 개발과 공급이 다수의 공급자에 의해서 공급되므로 서로 상이한 특성을 갖는 보안 시스템들로 구성된 보안 관리 구조의 효율적인 운용과 유지에 상당한 어려움이 있다. 이에 본 논문에서는 이종의 보안시스템을 관리하는 통합보안시스템의 보안정책을 Z-Notation을 통해서 정의하고 통합관리에서 발생되는 정책 충돌 문제를 대표적인 보안시스템인 침입차단시스템(Firewall : 방화벽)을 대상으로 모델링하고 이를 해결하는 알고리즘을 제시하고자 한다.

Integrated Power Optimization with Battery Friendly Algorithm in Wireless Capsule Endoscopy

  • Mehmood, Tariq;Naeem, Nadeem;Parveen, Sajida
    • International Journal of Computer Science & Network Security
    • /
    • 제21권11호
    • /
    • pp.338-344
    • /
    • 2021
  • The recently continuous enhancement and development in the biomedical side for the betterment of human life. The Wireless Body Area Networks is a significant tool for the current researcher to design and transfer data with greater data rates among the sensors and sensor nodes for biomedical applications. The core area for research in WBANs is power efficiency, battery-driven devices for health and medical, the Charging limitation is a major and serious problem for the WBANs.this research work is proposed to find out the optimal solution for battery-friendly technology. In this research we have addressed the solution to increasing the battery lifetime with variable data transmission rates from medical equipment as Wireless Endoscopy Capsules, this device will analyze a patient's inner body gastrointestinal tract by capturing images and visualization at the workstation. The second major issue is that the Wireless Endoscopy Capsule based systems are currently not used for clinical applications due to their low data rate as well as low resolution and limited battery lifetime, in case of these devices are more enhanced in these cases it will be the best solution for the medical applications. The main objective of this research is to power optimization by reducing the power consumption of the battery in the Wireless Endoscopy Capsule to make it battery-friendly. To overcome the problem we have proposed the algorithm for "Battery Friendly Algorithm" and we have compared the different frame rates of buffer sizes for Transmissions. The proposed Battery Friendly Algorithm is to send the images on average frame rate instead of transmitting the images on maximum or minimum frame rates. The proposed algorithm extends the battery lifetime in comparison with the previous baseline proposed algorithm as well as increased the battery lifetime of the capsule.

그래픽 통합 환경을 갖춘 배전계통 운용 전문가 시스템 개발 (Development of Expert System for Operation in Distribution Systems with Graphic Integrated Environments)

  • Kim, Se-Ho;Seo, Ki-Sung;Kim, Jeong-Keun;Park, Byoung-Youn;Woo, Kwang-Bang
    • 대한전기학회논문지
    • /
    • 제41권9호
    • /
    • pp.960-972
    • /
    • 1992
  • This paper deals with the development of expert system in distribution system which combined with graphic user interface. The proposed expert system can recognize and adjust to the system change, and includes the rule bases of security monitoring. Also it provides load transfer algorithm for efficient load distribution. The graphic user environment for expert system is implemented in the mouse-oriented user interface with overlapped window functions and pull-down menus. Therefore, the developed graphic integrated expert system can afford to assist system operators very conveniently through the various graphic function in proposing an optimal plan of load transfer for fault restoration and outage schedule.

단일 데이터패스 구조에 기반한 AES 암호화 및 복호화 엔진의 효율적인 통합설계 (Efficient Integrated Design of AES Crypto Engine Based on Unified Data-Path Architecture)

  • 정찬복;문용호
    • 대한임베디드공학회논문지
    • /
    • 제7권3호
    • /
    • pp.121-127
    • /
    • 2012
  • An integrated crypto engine for encryption and decryption of AES algorithm based on unified data-path architecture is efficiently designed and implemented in this paper. In order to unify the design of encryption and decryption, internal steps in single round is adjusted so as to operate with columns after row operation is completed and efficient method for a buffer is developed to simplify the Shift Rows operation. Also, only one S-box is used for both key expansion and crypto operation and Key-Box saving expended key is introduced provide the key required in encryption and decryption. The functional simulation based on ModelSim simulator shows that 164 clocks are required to process the data of 128bits in the proposed engine. In addition, the proposed engine is implemented with 6,801 gates by using Xilinx Synthesizer. This demonstrate that 40% gates savings is achieved in the proposed engine, compared to individual designs of encryption and decryption engine.

WAVE 시스템 지원을 위한 CRL 다운로드 프로토콜의 설계 및 구현 (Design and Implementation of CRL download protocol for supporting of WAVE systems)

  • 유권정;선설희;최범진;김은기
    • 한국정보통신학회논문지
    • /
    • 제19권4호
    • /
    • pp.800-806
    • /
    • 2015
  • WAVE(Wireless Access in Vehicular Environments) 시스템은 차량이 고속 이동 환경에서 차량 간 또는 차량과 인프라 간 패킷을 주고받을 수 있는 무선 통신 기술이다. 본 연구에서는 차량이 WAVE 시스템에서 통신 할 때 상대방의 인증서가 폐기 되었는지 확인하기 위한 CRL(Certificate Revocation List) 다운로드 프로토콜을 설계하고 구현하였다. WAVE 시스템은 UDP 상에서 동작하도록 하였으며, 보안기능을 지원하기 위해 ECDSA(Elliptic Curve Digital Signature Algorithm)를 사용하여 상호 인증을 하고 ECIES(Elliptic Curve Integrated Encryption Scheme)를 사용하여 기밀성을 보장한다. 또한 CRL 데이터에 MAC(Message Authentication Code)을 추가하여 데이터의 무결성을 보장하고, 선택적 재전송 방식(Selective Repeat Automatic Repeat Request)을 이용하여 데이터의 에러 및 흐름 제어를 수행한다.

Towards a Deep Analysis of High School Students' Outcomes

  • Barila, Adina;Danubianu, Mirela;Paraschiv, Andrei Marcel
    • International Journal of Computer Science & Network Security
    • /
    • 제21권6호
    • /
    • pp.71-76
    • /
    • 2021
  • Education is one of the pillars of sustainable development. For this reason, the discovery of useful information in its process of adaptation to new challenges is treated with care. This paper aims to present the initiation of a process of exploring the data collected from the results obtained by Romanian students at the BBaccalaureate (the Romanian high school graduation) exam, through data mining methods, in order to try an in-depth analysis to find and remedy some of the causes that lead to unsatisfactory results. Specifically, a set of public data was collected from the website of the Ministry of Education, on which several classification methods were tested in order to find the most efficient modeling algorithm. It is the first time that this type of data is subjected to such interests.

SEED 블록암호알고리즘을 적용한 통합 사례관리 시스템(ICMP) 개발에 관한 연구 (A study on SEED block cipher algorithm for ICMP development)

  • 오동식;김영혁;임일권;이계귀;이재광
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2010년도 추계학술대회
    • /
    • pp.244-247
    • /
    • 2010
  • 본 논문에서는 보안성과 신뢰성에 우수한 특성을 갖는 국제 표준 SEED 블록 암호 알고리즘을 적용한 통합 사례관리 시스템(ICMP)을 제안하였다. 기존 통합 사례관리 시스템의 취약부분인 보안성과 신뢰성, 사용자 편의성 부분을 개선하여 최적화된 시스템에 탑재 되도록 Spring 기반 JAVA Framework 기술에 SEED 블록 암호 알고리즘을 적용하여 성능을 개선하였다. 그 결과로 사용자 인터페이스 부분의 성능을 개선하였으며 실제 응용분야에 적용 가능하다.

  • PDF

The Development of an Intelligent Home Energy Management System Integrated with a Vehicle-to-Home Unit using a Reinforcement Learning Approach

  • Ohoud Almughram;Sami Ben Slama;Bassam Zafar
    • International Journal of Computer Science & Network Security
    • /
    • 제24권4호
    • /
    • pp.87-106
    • /
    • 2024
  • Vehicle-to-Home (V2H) and Home Centralized Photovoltaic (HCPV) systems can address various energy storage issues and enhance demand response programs. Renewable energy, such as solar energy and wind turbines, address the energy gap. However, no energy management system is currently available to regulate the uncertainty of renewable energy sources, electric vehicles, and appliance consumption within a smart microgrid. Therefore, this study investigated the impact of solar photovoltaic (PV) panels, electric vehicles, and Micro-Grid (MG) storage on maximum solar radiation hours. Several Deep Learning (DL) algorithms were applied to account for the uncertainty. Moreover, a Reinforcement Learning HCPV (RL-HCPV) algorithm was created for efficient real-time energy scheduling decisions. The proposed algorithm managed the energy demand between PV solar energy generation and vehicle energy storage. RL-HCPV was modeled according to several constraints to meet household electricity demands in sunny and cloudy weather. Simulations demonstrated how the proposed RL-HCPV system could efficiently handle the demand response and how V2H can help to smooth the appliance load profile and reduce power consumption costs with sustainable power generation. The results demonstrated the advantages of utilizing RL and V2H as potential storage technology for smart buildings.

Lightweight and adaptable solution for security agility

  • Vasic, Valter;Mikuc, Miljenko;Vukovic, Marin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권3호
    • /
    • pp.1212-1228
    • /
    • 2016
  • Secure communication is an important aspect of today's interconnected environments and it can be achieved by the use of cryptographic algorithms and protocols. However, many existing cryptographic mechanisms are tightly integrated into communication protocols. Issues emerge when security vulnerabilities are discovered in cryptographic mechanisms because their replacement would eventually require replacing deployed protocols. The concept of cryptographic agility is the solution to these issues because it allows dynamic switching of cryptographic algorithms and keys prior to and during the communication. Most of today's secure protocols implement cryptographic agility (IPsec, SSL/TLS, SSH), but cryptographic agility mechanisms cannot be used in a standalone manner. In order to deal with the aforementioned limitations, we propose a lightweight cryptographically agile agreement model, which is formally verified. We also present a solution in the Agile Cryptographic Agreement Protocol (ACAP) that can be adapted on various network layers, architectures and devices. The proposed solution is able to provide existing and new communication protocols with secure communication prerequisites in a straightforward way without adding substantial communication overhead. Furthermore, it can be used between previously unknown parties in an opportunistic environment. The proposed model is formally verified, followed by a comprehensive discussion about security considerations. A prototype implementation of the proposed model is demonstrated and evaluated.

퍼지회귀분석과 physical programming을 활용한 정보보호 도구 선정 통합 프레임워크 (An integrated framework of security tool selection using fuzzy regression and physical programming)

  • ;;신상문;최용선;김상균
    • 한국컴퓨터정보학회논문지
    • /
    • 제15권11호
    • /
    • pp.143-156
    • /
    • 2010
  • 근거리통신망과 인터넷으로부터 유입되는 정보보호 위협이 증가하는 상황에 대처하기 위하여, 많은 기업들이 정보보호 시스템 구축을 고려하고 있다. 기업 내 의사결정자의 정보보호 도구 선택을 지원하기 위하여, 본 논문은 선형퍼지회귀분석 및 physical programming을 이용하는 세 가지 단계로 구성된 통합 프레임워크를 제안하였다. 첫째, 정보보호도구 선정 기준 및 평가 기준에 대한 전문가들의 상대평가 의견을 바탕으로, 각 정보보호 기준들 간의 관계를 정량화시키기 위하여 analytic hierarchy process 및 quality function deployment 방법을 적용하였다. 그리고, 선형퍼지회귀분석법을 활용하여 각 기준별 평가값을 산출하였다. 마지막으로, 정보보호 시스템의 품질, 정보보호 수준, 비용 등의 다수 목적함수를 효과적으로 고려하기 위하여, physical programming weights 알고리즘을 통하여 도출된 가중치에 기반한 목표계획법을 활용하여 가장 적절한 정보보호 도구를 선정하였다. 이와 같은 과정은 구체적인 예제를 통해 단계별로 설명하고 그 장점을 가시적으로 제시하였다. 본 연구에서 제안한 방법은 전문가 제공 정보에서 발생 가능한 노이즈를 효과적으로 제거함으로써, 전문가의 경험을 통한 표준 정보보호 기준의 확보와 수학적 최적화 방법을 통한 정확성 확보의 장점을 의사결정자에게 제공할 것으로 기대된다.