• Title/Summary/Keyword: Integrity verification

Search Result 253, Processing Time 0.025 seconds

Probabilistic Evaluation Methodology for Nuclear Components (원전 주요기기의 확률론적 평가 기법)

  • Lee, Joon-Seong;Kwak, Sang-Log;Kim, Young-Jin;Park, Youn-Won
    • Proceedings of the KSME Conference
    • /
    • 2001.06a
    • /
    • pp.459-464
    • /
    • 2001
  • For major nuclear power plant components periodic inspections and integrity assessments are needed for the safety. But many flaws are undetectable due to sampling inspection. Probabilistic integrity assessment is applied to take into consideration of uncertainty and variance of input parameters arise due to material properties, applied load and undetectable flaws. This paper describes a Probabilistic Fracture Mechanics(PFM) analysis based on Monte Carlo(MC) algorithms. Taking important parameters as probabilistic variables such as fracture toughness, crack growth rate and flaw shape, failure probability of major nuclear power plant components is archived as a results of MC simulation. For the verification of these analysis, a comparison study of the PFM analysis using other commercial code, mathematical method is carried out and a good agreement was observed between those results.

  • PDF

Experimental Characterization and Signal Integrity Verification of Interconnect Lines with Inter-layer Vias

  • Kim, Hye-Won;Kim, Dong-Chul;Eo, Yung-Seon
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.11 no.1
    • /
    • pp.15-22
    • /
    • 2011
  • Interconnect lines with inter-layer vias are experimentally characterized by using high-frequency S-parameter measurements. Test patterns are designed and fabricated using a package process. Then they are measured using Vector Network Analyzer (VNA) up to 25 GHz. Modeling a via as a circuit, its model parameters are determined. It is shown that the circuit model has excellent agreement with the measured S-parameters. The signal integrity of the lines with inter-layer vias is evaluated by using the developed circuit model. Thereby, it is shown that via may have a substantially deteriorative effect on the signal integrity of high-speed integrated circuits.

A Privacy-preserving Data Aggregation Scheme with Efficient Batch Verification in Smart Grid

  • Zhang, Yueyu;Chen, Jie;Zhou, Hua;Dang, Lanjun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.2
    • /
    • pp.617-636
    • /
    • 2021
  • This paper presents a privacy-preserving data aggregation scheme deals with the multidimensional data. It is essential that the multidimensional data is rarely mentioned in all researches on smart grid. We use the Paillier Cryptosystem and blinding factor technique to encrypt the multidimensional data as a whole and take advantage of the homomorphic property of the Paillier Cryptosystem to achieve data aggregation. Signature and efficient batch verification have also been applied into our scheme for data integrity and quick verification. And the efficient batch verification only requires 2 pairing operations. Our scheme also supports fault tolerance which means that even some smart meters don't work, our scheme can still work well. In addition, we give two extensions of our scheme. One is that our scheme can be used to compute a fixed user's time-of-use electricity bill. The other is that our scheme is able to effectively and quickly deal with the dynamic user situation. In security analysis, we prove the detailed unforgeability and security of batch verification, and briefly introduce other security features. Performance analysis shows that our scheme has lower computational complexity and communication overhead than existing schemes.

Practical Requirements and Verification Management for Requirements-based Development Process in Space Launch Vehicle Development Project (요구조건 기준의 개발 수행을 위한 우주발사체 개발사업의 실제적인 요구조건-검증 관리 체계)

  • Dong Hyun Cho;Jun Hyouk Jang;Il Sang Yoo
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.19 no.1
    • /
    • pp.56-63
    • /
    • 2023
  • For the success of system development, it is necessary to systematically manage the requirements that are the basis of system development and its verification results. In order to follow the principles of SE(Systems Engineering)-based V&V(Verification&Validation) process, requirements can be managed by securing the requirements and their establishments, design compliances, and verification compliances according to the system development lifecycle. Especially, in a large-complex system research and development project, such as a space launch vehicle development project, many participants establish, verify, and validate numerous requirements together during the project. Therefore, logical and systematic requirements management, including guarantee of data integrity, change history, and traceability, is very important for multiple participants to utilize numerous requirements together without errors. This paper introduces the practical requirements and verification management for the requirements-based development process in the space launch vehicle development project.

Trustworthy Mutual Attestation Protocol for Local True Single Sign-On System: Proof of Concept and Performance Evaluation

  • Khattak, Zubair Ahmad;Manan, Jamalul-Lail Ab;Sulaiman, Suziah
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2405-2423
    • /
    • 2012
  • In a traditional Single Sign-On (SSO) scheme, the user and the Service Providers (SPs) have given their trust to the Identity Provider (IdP) or Authentication Service Provider (ASP) for the authentication and correct assertion. However, we still need a better solution for the local/native true SSO to gain user confidence, whereby the trusted entity must play the role of the ASP between distinct SPs. This technical gap has been filled by Trusted Computing (TC), where the remote attestation approach introduced by the Trusted Computing Group (TCG) is to attest whether the remote platform integrity is indeed trusted or not. In this paper, we demonstrate a Trustworthy Mutual Attestation (TMutualA) protocol as a proof of concept implementation for a local true SSO using the Integrity Measurement Architecture (IMA) with the Trusted Platform Module (TPM). In our proposed protocol, firstly, the user and SP platform integrity are checked (i.e., hardware and software integrity state verification) before allowing access to a protected resource sited at the SP and releasing a user authentication token to the SP. We evaluated the performance of the proposed TMutualA protocol, in particular, the client and server attestation time and the round trip of the mutual attestation time.

A Method Verifying Execution Environment Integrity for Secure Execution of Packed Android Application (패킹된 안드로이드 어플리케이션의 안전한 실행을 위한 실행 환경 무결성 검증 기법)

  • Ha, Dongsoo;Oh, Heekuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1553-1561
    • /
    • 2018
  • The source code for Android is open and easy to modify depending on the purpose. Recently, this charateristic has been exploited to bypass the runtime protection technique and extract the original executable code. Unfortunately, Android devices are so fragmented that it is difficult to verify the integrity of the system. To solve this problem, this paper proposes a technique to verify the integrity of the execution environment indirectly using the features of the application permission. Before executing the original executable code, it loads and executes the dummy DEX file to monitor for abnormal events and determine whether the system is intact. The proposed technique shows a performance overhead of about 2 seconds and shows that it can detect the bypassing technique that is currently disclosed.

A Study on the Image Tamper Detection using Digital Signature (디지털 서명을 이용한 영상의 위변조 검출에 관한 연구)

  • Woo, Chan-Il
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.7
    • /
    • pp.4912-4917
    • /
    • 2015
  • Fragile watermarking is a technique to insert a watermark into an image without significantly degrading its visual quality so that the watermark can be extracted for the purposes of authentication or integrity verification. And the watermark for authentication and integrity verification should be erased easily when the image is changed by filtering etc. In this paper, we propose a image block-wise watermarking method for image tamper proofing using digital signature. In the proposed method, a digital signature is generated from the hash code of the initialized image block. And The proposed method is able to detect the tampered parts of the image without testing the entire block of the watermarked image.

Non-linear Structural Analysis of Main Wing Spar of High Altitude Long Endurance UAV (고고도 장기체공무인기 주익 Spar 비선형 구조 해석)

  • Park, Sang-Wook;Shin, Jeong-Woo;Lee, Mu-Hyoung;Kim, Tae-Uk
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.23 no.1
    • /
    • pp.24-29
    • /
    • 2015
  • In order to increase endurance flight efficiency of long endurance electric powered UAV, main wing of UAV should have high aspect ratio and low structural weight. Since a spar which consists of thin and slender structure for weight reduction can cause catastrophic failure during the flight, it is important to develop verification method of structural integrity of the spar with the light weight design. In this paper, process of structural analysis using non-linear finite element method was introduced for the verification of structural integrity of the spar. The static strength test of the spar was conducted to identify structural characteristic under the static load. Then, the experimental result of the spar was compared to the analytical result from the non-linear finite element analysis. It was found that the developed process of structural analysis could predict well the non-linear structural behavior of the spar under ultimate load.

Configuration of an IPSec VPN Testbed and Development of an Encryption Verification Tool (IOSec VPN 테스트 베드의 구성 및 암호화 식별 도구 개발)

  • 김윤희;이계상
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.6C
    • /
    • pp.659-667
    • /
    • 2003
  • IPsec refers to a standardized set of security protocols and algorithms which can provide the integrity, the authentication and the confidentiality services for IP packets in the Internet. Between two security gateways, IPsec provides the access control, the connectionless Integrity, data origin authentication, the anti-replay, and the confidentiality services, not only to the IP layer but also to the upper layers. In this paper, we describe a VPN (Virtual Private Network) testbed configuration using the FreeS/WAN and analyze the ISAKMP messages exchanged between the linux security gateway during the IKE SA setup. Also, we describe our development of an IPSEC encryption verification tool which can be used conveniently by VPN administrators.

Verification Test for Primary Reactor Piping in Nuclear Power Plant (원자로 주 배관계의 진동 건전성 시험)

  • Kim, Yeon-Whan;Kim, Hee-Su;Koo, Jae-Raeyang;Bea, Yong-Chae;Lee, Hyun
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2002.11b
    • /
    • pp.74-79
    • /
    • 2002
  • The piping verification tests were performed in order to verify the structural integrity during initial operation of the reactor coolant systems and the primary heat transportation systems of nuclear power plants by KEPRI in Korea. The tests were conducted at full operating temperature and pressure. The objective is to evaluate the possibility of excessive load generating on piping, piping supports, and reactor structures etc. in the steady normal operation and expected pump transient conditions. As a result, the measured vibrations have been shown acceptable level according to ASME/ANSI OMa-Standard, Part 3.

  • PDF