• Title/Summary/Keyword: Integrity Verification System

Search Result 118, Processing Time 0.026 seconds

A Study on the Reliability/Safety assessment and improvement of USN Gateway for Train Control (열차제어를 위한 USN Gateway 신뢰성, 안전성 평가 및 향상에 관한 연구)

  • Sin, Duc-Ko;Jo, Hyun-Jeong;Shin, Kyeng-Ho;Song, Yong-Soo
    • Journal of the Korean Society for Railway
    • /
    • v.14 no.5
    • /
    • pp.416-424
    • /
    • 2011
  • The recent development of USN (Ubiquitous Sensor Network) technology has broadened its applications to many fields of industry. The USN technology enables the system to monitor and control the status of distributed sensor nodes based on the low-powered communications. Applying the USN in the train control domain, the operational efficiency can be enhanced, where the reliability and the safety of the system are the key challenges. This paper suggests the system design for evaluating and improving the reliability and safety of the gateway, which is a USN component that manages the radio network among the sensors and collects the information from them. For this purpose, the reliability and the level of safety integrity of a general gateway have been predicted quantitatively and the supplementary design has been proposed for the selected week points. The verification on the reliability and the safety of the improved gateway according to the related standards has been followed. With the results of the study, the applicability of USN gateway for train control systems has been reviewed.

Monitoring of a CFRP-Stiffened Panel Manufactured by VaRTM Using Fiber-Optic Sensors

  • Takeda, Shin-Ichi;Mizutani, Tadahito;Nishi, Takafumi;Uota, Naoki;Hirano, Yoshiyasu;Iwahori, Yutaka;Nagao, Yosuke;Takeda, Nobuo
    • Advanced Composite Materials
    • /
    • v.17 no.2
    • /
    • pp.125-137
    • /
    • 2008
  • FBG (Fiber Bragg Grating) sensors and optical fibers were embedded into CFRP dry preforms before resin impregnation in VaRTM (Vacuum-assisted Resin Transfer Molding). The embedding location was the interface between the skin and the stringer in a CFRP-stiffened panel. The reflection spectra of the FBG sensors monitored the strain and temperature changes during all the molding processes. The internal residual strains of the CFRP panel could be evaluated during both the curing time and the post-curing time. The temperature changes indicated the differences between the dry preform and the outside of the vacuum bagging. After the molding, four-point bending was applied to the panel for the verification of its structural integrity and the sensor capabilities. The optical fibers were then used for the newly-developed PPP-BOTDA (Pulse-PrePump Brillouin Optical Time Domain Analysis) system. The long-range distributed strain and temperature can be measured by this system, whose spatial resolution is 100 mm. The strain changes from the FBGs and the PPP-BOTDA agreed well with those from the conventional strain gages and FE analysis in the CFRP panel. Therefore, the fiber-optic sensors and its system were very effective for the evaluation of the VaRTM composite structures.

A Study on Verification Tests according to Connection Design Methods of Steel Plate Concrete Structures (강판 콘크리트 구조 접합부의 설계방식에 따른 검증실험 연구)

  • Hwang, Kyeong Min;Lee, Kyung Jin;Yang, Hyun Jung;Kim, Won Ki
    • Journal of Korean Society of Steel Construction
    • /
    • v.26 no.1
    • /
    • pp.1-10
    • /
    • 2014
  • In this study, out-of-plane flexural test was performed to analyze behavior properties for a beam specimen which imitated a structure with connection member between reinforced concrete and steel plate concrete part. Tie bars between a upper and a lower steel plate, and tie wide flange shapes between upper and lower ribs were designed to prevent the steel plate or the ribs from breakaway in the connection of the specimen. As a result of the test, ductile failure behavior of the specimen and the functionality of the tie members were conformed as originally intended. Also, tension tests were performed to evaluate the design appropriateness of two specimens produced to anchor and connect mechanically #14 bars. The two test results showed that the anchorage connection system behaves in elastic limit during the main bars yielded, and the integrity of the designed system was verified.

Enhancing Installation Security for Naval Combat Management System through Encryption and Validation Research

  • Byeong-Wan Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.1
    • /
    • pp.121-130
    • /
    • 2024
  • In this paper, we propose an installation approach for Naval Combat Management System(CMS) software that identifies potential data anomalies during installation. With the popularization of wireless communication methods, such as Low Earth Orbit(LEO) satellite communications, various utilization methods using wireless networks are being discussed in CMS. One of these methods includes the use of wireless network communications for installation, which is expected to enhance the real-time performance of the CMS. However, wireless networks are relatively more vulnerable to security threats compared to wired networks, necessitating additional security measures. This paper presents a method where files are transmitted to multiple nodes using encryption, and after the installation of the files, a validity check is performed to determine if there has been any tampering or alteration during transmission, ensuring proper installation. The feasibility of applying the proposed method to Naval Combat Systems is demonstrated by evaluating transmission performance, security, and stability, and based on these evaluations, results sufficient for application to CMS have been derived.

Performance Verification of Korean Wide Area Differential GNSS Ground Segement (한국형 광역보정시스템(WA-DGNSS) 지상국 성능 검증)

  • Yun, Ho;Han, Duk-Hwa;Kee, Chang-Don
    • Journal of Navigation and Port Research
    • /
    • v.37 no.1
    • /
    • pp.49-54
    • /
    • 2013
  • This paper describes the progress and results of 'Wide Area Differetial GNSS (WA-DGNSS) Development' project which is supported by Korea Ministry of Land, Transport and Maritime Affairs. This project develops the main algorithm of the WA-DGNSS which can guarantee the improved accuracy, availability and integrity all over the Korean peninsula. After the establishment of WA-DGNSS ground system, a real time demonstration using pseudolite will be conducted. Product of this project will be directly utilized in Korean Satellite Based Augmentation System(SBAS) development project which is planned to be started from 2014.

Analysis of corrugated steel web beam bridges using spatial grid modelling

  • Xu, Dong;Ni, Yingsheng;Zhao, Yu
    • Steel and Composite Structures
    • /
    • v.18 no.4
    • /
    • pp.853-871
    • /
    • 2015
  • Up to now, Japan has more than 200 corrugated steel web composite beam bridges which are under construction and have been constructed, and China has more than 30 corrugated steel web composite beam bridges. The bridge type includes the simply supported beam, continuous beam, continuous rigid frame and cable stayed bridge etc. The section form has developed to the single box and multi-cell box girder from the original single box and single chamber. From the stress performance and cost saving, the span range of 50~150 m is the most competitive. At present, the design mostly adopts the computational analytical method combining the spatial bar system model, plane beam grillage model and solid model. However, the spatial bar system model is short of the refinement analysis on the space effect, such as the shear lag effect, effective distribution width problem, and eccentric load factor problem etc. Due to the similarity of the plane beam grillage method in the equivalence principle, it cannot accurately reflect the shearing stress distribution and local stress of the top and bottom plates of the box type composite beam. The solid model is very difficult to combine with the overall calculation. Moreover, the spatial grid model can achieve the refinement analysis, with the integrity of the analysis and the comprehensiveness of the stress checking calculation, and can make up the deficiency of the analytical method currently. Through the example verification of the solid model and spatial grid model, it can be seen that the calculation results for the stress and the displacement of two models are almost consistent, indicating the applicability and precision of the spatial grid model.

Vulnerability Analysis and Improvement in Man-in-the-Middle Attack for Remote User Authentication Scheme of Shieh and Wang's using Smart Card (Shieh and Wang's의 스마트카드 상호인증 스킴에 대한 중간자공격 개선)

  • Shin, Kwang-Cheul
    • The Journal of Society for e-Business Studies
    • /
    • v.17 no.4
    • /
    • pp.1-16
    • /
    • 2012
  • Shieh and Wang [10] recently proposed an efficient mutual authentication scheme that combined the cost-effectiveness of operations of Lee et al. [6]. scheme and the security and key agreement of Chen and Yeh scheme. Shieh and Wang [10] scheme, however, does not satisfy the security requirements against a third party (the man-in the middle, attacker) that have to be considered in remote user authentication scheme using password-based smart cards. Shieh and Wang weaknesses are the inappropriateness that it cannot verify the forged message in 3-way handshaking mutual authentication, and the vulnerability that the system (server) secret key can easily be exposed. This paper investigates the problems of Shieh and Wang scheme in the verification procedure of the forged messages intercepted by the eavesdrop. An enhanced two-way remote user authentication scheme is proposed that is safe and strong against multiple attacks by adding the ability to perform integrity check on the server and proposed scheme is not expose user password information and the system's confidential information.

A Study on Insider Threat Dataset Sharing Using Blockchain (블록체인을 활용한 내부자 유출위협 데이터 공유 연구)

  • Wonseok Yoon;Hangbae Chang
    • Journal of Platform Technology
    • /
    • v.11 no.2
    • /
    • pp.15-25
    • /
    • 2023
  • This study analyzes the limitations of the insider threat datasets used for insider threat detection research and compares and analyzes the solution-based insider threat data with public insider threat data using a security solution to overcome this. Through this, we design a data format suitable for insider threat detection and implement a system that can safely share insider threat information between different institutions and companies using blockchain technology. Currently, there is no dataset collected based on actual events in the insider threat dataset that is revealed to researchers. Public datasets are virtual synthetic data randomly created for research, and when used as a learning model, there are many limitations in the real environment. In this study, to improve these limitations, a private blockchain was designed to secure information sharing between institutions of different affiliations, and a method was derived to increase reliability and maintain information integrity and consistency through agreement and verification among participants. The proposed method is expected to collect data through an outflow threat collector and collect quality data sets that posed a threat, not synthetic data, through a blockchain-based sharing system, to solve the current outflow threat dataset problem and contribute to the insider threat detection model in the future.

  • PDF

A Study on the Software Supply Chain Security Policy for the Strengthening of Cybersecurity: Based on SBOM Policy Cases (사이버안보 강화를 위한 소프트웨어 공급망 보안 정책 연구: SBOM 정책 추진 사례를 중심으로)

  • Son, Hyo-Hyun;Kim, Dong-Hee;Kim, So-Jeong
    • Journal of Digital Convergence
    • /
    • v.20 no.2
    • /
    • pp.9-20
    • /
    • 2022
  • Supply chain attacks target critical infrastructure, causing large amounts of damage and evolving into a threat to public safety and national security. Accordingly, when establishing cybersecurity strategies and policies, supply chain risk management is specified to enhance security, and the US Biden administration recently issued the Executive Order on Improving the Nation's Cybersecurity, SBOM was mentioned as part of the guidelines for strengthening software supply chain security. If the government mandates SBOM and uses it as a security verification tool for supply chains, it can be affected by the domestic procurement system in the future and can be referenced when establishing a security system for domestic supply chains according to the progress of policy implementation. Accordingly, in this paper, countries that are promoting the SBOM policy as a way to strengthen the security of the software supply chain were selected and analyzed with a focus on related cases. In addition, through comparison and analysis of foreign SBOM policy trends, methods for using domestic SBOM in terms of technology, policy, and law were considered. As the value of using SBOM as a supply chain integrity/transparency verification tool is expected in the future, it is necessary to continuously identify trends in the establishment of international standardization and policy development for SBOM and study the standard format.

APPLICATION OF FUZZY SET THEORY IN SAFEGUARDS

  • Fattah, A.;Nishiwaki, Y.
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1993.06a
    • /
    • pp.1051-1054
    • /
    • 1993
  • The International Atomic Energy Agency's Statute in Article III.A.5 allows it“to establish and administer safeguards designed to ensure that special fissionable and other materials, services, equipment, facilities and information made available by the Agency or at its request or under its supervision or control are not used in such a way as to further any military purpose; and to apply safeguards, at the request of the parties, to any bilateral or multilateral arrangement, or at the request of a State, to any of that State's activities in the field of atomic energy”. Safeguards are essentially a technical means of verifying the fulfilment of political obligations undertaken by States and given a legal force in international agreements relating to the peaceful uses of nuclear energy. The main political objectives are: to assure the international community that States are complying with their non-proliferation and other peaceful undertakings; and to deter (a) the diversion of afeguarded nuclear materials to the production of nuclear explosives or for military purposes and (b) the misuse of safeguarded facilities with the aim of producing unsafeguarded nuclear material. It is clear that no international safeguards system can physically prevent diversion. The IAEA safeguards system is basically a verification measure designed to provide assurance in those cases in which diversion has not occurred. Verification is accomplished by two basic means: material accountancy and containment and surveillance measures. Nuclear material accountancy is the fundamental IAEA safeguards mechanism, while containment and surveillance serve as important complementary measures. Material accountancy refers to a collection of measurements and other determinations which enable the State and the Agency to maintain a current picture of the location and movement of nuclear material into and out of material balance areas, i. e. areas where all material entering or leaving is measurab e. A containment measure is one that is designed by taking advantage of structural characteristics, such as containers, tanks or pipes, etc. To establish the physical integrity of an area or item by preventing the undetected movement of nuclear material or equipment. Such measures involve the application of tamper-indicating or surveillance devices. Surveillance refers to both human and instrumental observation aimed at indicating the movement of nuclear material. The verification process consists of three over-lapping elements: (a) Provision by the State of information such as - design information describing nuclear installations; - accounting reports listing nuclear material inventories, receipts and shipments; - documents amplifying and clarifying reports, as applicable; - notification of international transfers of nuclear material. (b) Collection by the IAEA of information through inspection activities such as - verification of design information - examination of records and repo ts - measurement of nuclear material - examination of containment and surveillance measures - follow-up activities in case of unusual findings. (c) Evaluation of the information provided by the State and of that collected by inspectors to determine the completeness, accuracy and validity of the information provided by the State and to resolve any anomalies and discrepancies. To design an effective verification system, one must identify possible ways and means by which nuclear material could be diverted from peaceful uses, including means to conceal such diversions. These theoretical ways and means, which have become known as diversion strategies, are used as one of the basic inputs for the development of safeguards procedures, equipment and instrumentation. For analysis of implementation strategy purposes, it is assumed that non-compliance cannot be excluded a priori and that consequently there is a low but non-zero probability that a diversion could be attempted in all safeguards ituations. An important element of diversion strategies is the identification of various possible diversion paths; the amount, type and location of nuclear material involved, the physical route and conversion of the material that may take place, rate of removal and concealment methods, as appropriate. With regard to the physical route and conversion of nuclear material the following main categories may be considered: - unreported removal of nuclear material from an installation or during transit - unreported introduction of nuclear material into an installation - unreported transfer of nuclear material from one material balance area to another - unreported production of nuclear material, e. g. enrichment of uranium or production of plutonium - undeclared uses of the material within the installation. With respect to the amount of nuclear material that might be diverted in a given time (the diversion rate), the continuum between the following two limiting cases is cons dered: - one significant quantity or more in a short time, often known as abrupt diversion; and - one significant quantity or more per year, for example, by accumulation of smaller amounts each time to add up to a significant quantity over a period of one year, often called protracted diversion. Concealment methods may include: - restriction of access of inspectors - falsification of records, reports and other material balance areas - replacement of nuclear material, e. g. use of dummy objects - falsification of measurements or of their evaluation - interference with IAEA installed equipment.As a result of diversion and its concealment or other actions, anomalies will occur. All reasonable diversion routes, scenarios/strategies and concealment methods have to be taken into account in designing safeguards implementation strategies so as to provide sufficient opportunities for the IAEA to observe such anomalies. The safeguards approach for each facility will make a different use of these procedures, equipment and instrumentation according to the various diversion strategies which could be applicable to that facility and according to the detection and inspection goals which are applied. Postulated pathways sets of scenarios comprise those elements of diversion strategies which might be carried out at a facility or across a State's fuel cycle with declared or undeclared activities. All such factors, however, contain a degree of fuzziness that need a human judgment to make the ultimate conclusion that all material is being used for peaceful purposes. Safeguards has been traditionally based on verification of declared material and facilities using material accountancy as a fundamental measure. The strength of material accountancy is based on the fact that it allows to detect any diversion independent of the diversion route taken. Material accountancy detects a diversion after it actually happened and thus is powerless to physically prevent it and can only deter by the risk of early detection any contemplation by State authorities to carry out a diversion. Recently the IAEA has been faced with new challenges. To deal with these, various measures are being reconsidered to strengthen the safeguards system such as enhanced assessment of the completeness of the State's initial declaration of nuclear material and installations under its jurisdiction enhanced monitoring and analysis of open information and analysis of open information that may indicate inconsistencies with the State's safeguards obligations. Precise information vital for such enhanced assessments and analyses is normally not available or, if available, difficult and expensive collection of information would be necessary. Above all, realistic appraisal of truth needs sound human judgment.

  • PDF