• Title/Summary/Keyword: Integrity verification

Search Result 253, Processing Time 0.024 seconds

Verification of failover effects from distributed control system communication networks in digitalized nuclear power plants

  • Min, Moon-Gi;Lee, Jae-Ki;Lee, Kwang-Hyun;Lee, Dongil;Lim, Hee-Taek
    • Nuclear Engineering and Technology
    • /
    • v.49 no.5
    • /
    • pp.989-995
    • /
    • 2017
  • Distributed Control System (DCS) communication networks, which use Fast Ethernet with redundant networks for the transmission of information, have been installed in digitalized nuclear power plants. Normally, failover tests are performed to verify the reliability of redundant networks during design and manufacturing phases; however, systematic integrity tests of DCS networks cannot be fully performed during these phases because all relevant equipment is not installed completely during these two phases. In additions, practical verification tests are insufficient, and there is a need to test the actual failover function of DCS redundant networks in the target environment. The purpose of this study is to verify that the failover functions works correctly in certain abnormal conditions during installation and commissioning phase and identify the influence of network failover on the entire DCS. To quantify the effects of network failover in the DCS, the packets (Protocol Data Units) must be collected and resource usage of the system has to be monitored and analyzed. This study introduces the use of a new methodology for verification of DCS network failover during the installation and commissioning phases. This study is expected to provide insight into verification methodology and the failover effects from DCS redundant networks. It also provides test results of network performance from DCS network failover in digitalized domestic nuclear power plants (NPPs).

Development of Automated Structural Design and Analysis Aided-Program of Aluminum Extrusion Carbody Structures for Railway Vehicle (알루미늄 압출재 철도차량 차체 구조물의 자동화 구조 설계 및 해석 지원 프로그램 개발)

  • Kim, Jun-Hwan;Shin, Kwang-Bok;Kang, Seung-Gu;Lee, Young-Ju
    • Proceedings of the KSR Conference
    • /
    • 2011.10a
    • /
    • pp.2679-2683
    • /
    • 2011
  • The purpose of this study is to develop automated structural design and analysis aided-program of aluminum extrusion carbody structures for railway vehicle. This developed program is possible to perform simultaneously structural design and design verification of aluminum extrusion profiles independent of expertise and experience of design engineers. Design engineers was able to design it using database of existing aluminum extrusion profiles or user-defined function. The design verification was programmed to evaluate its structural integrity according to Korean Railway Safety Law or Urban Transit Safety Law. Also, this program could automatically generate an executable file of various commercial finite element program and CAD files such as stp and iges by GUI environment applications using MFC(Microsoft Foundation Classes). In conclusion, it is expected to contribute to reduce product development time and improve product quality of aluminum extrusion profile and structures in railway industry.

  • PDF

Enabling Efficient Verification of Dynamic Data Possession and Batch Updating in Cloud Storage

  • Qi, Yining;Tang, Xin;Huang, Yongfeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2429-2449
    • /
    • 2018
  • Dynamic data possession verification is a common requirement in cloud storage systems. After the client outsources its data to the cloud, it needs to not only check the integrity of its data but also verify whether the update is executed correctly. Previous researches have proposed various schemes based on Merkle Hash Tree (MHT) and implemented some initial improvements to prevent the tree imbalance. This paper tries to take one step further: Is there still any problems remained for optimization? In this paper, we study how to raise the efficiency of data dynamics by improving the parts of query and rebalancing, using a new data structure called Rank-Based Merkle AVL Tree (RB-MAT). Furthermore, we fill the gap of verifying multiple update operations at the same time, which is the novel batch updating scheme. The experimental results show that our efficient scheme has better efficiency than those of existing methods.

A Study on the Safety Plan for a Train Control System (열차제어시스템의 안전계획 수립에 관한 연구)

  • Kim Jong-Ki;Shin Duc-Ko;Lee Key-Seo
    • Journal of the Korean Society for Railway
    • /
    • v.9 no.3 s.34
    • /
    • pp.264-270
    • /
    • 2006
  • In this paper we present a safety plan to be applied to the development of the TCS(Train Control System). The safety plan that can be applied to the life cycle of a system, from the conceptual design to the dismantlement, shows the whole process of the paper work in detail through the establishment of a goal, analysis and assessment, the verification. In this paper we study about the making a plan, the preliminary hazard analysis, the hazard identification and analysis to guarantee the safety of the TCS. The process far the verification of the system safety is divided into several steps based on the target system and the approaching method. The guarantee of the system safety and the improvement of the system reliability is fellowed by the recommendation of the international standards.

Thermal Aging Embrittlement in LWR Primary Pressure Boundary Components

  • Kim, Sunki;Kim, Yongsoo;Wonmok Jae
    • Proceedings of the Korean Nuclear Society Conference
    • /
    • 1995.05b
    • /
    • pp.635-640
    • /
    • 1995
  • Two techniques for the verification of the phase separation in ferrite phase of primary pressure bounary component materials, the primary cause of thermal aging embrittlement, are presented. Data base of room-temperature Charpy V-notch impact energy during reactor service was estimated as a measure of the degree of embrittlement. The serviceable period of CF-3 and CF-8 alloys as the primary pressure boundary components may be acceptably extended for 60 years of lifetime. However, the integrity of CF-8M alloys can be degraded seriously after several years of service in the nuclear reactor.

  • PDF

Secret Key Watermarking for Image Authentication

  • Woo, Chan-Il;In-Chul shin
    • Proceedings of the IEEK Conference
    • /
    • 2000.07b
    • /
    • pp.815-818
    • /
    • 2000
  • As the growth of internet and the diffusion of wide multimedia applications are increased, the ownership verification and authentication in communication channel for a digital image become more important. For these purpose there are many watermarking scheme available for image, video stream and audio data. In this paper we studied on techniques for integrity and authentication of digital images and proposed new watermarking algorithm. The proposed algorithm is implemented in C language on IBM-PC and the test results are shown.

  • PDF

A Study on Integrity Verification and Tamper Detection of Digital Image (디지털 영상의 무결성 검증과 변형 검출에 관한 연구)

  • Woo, Chan-Il;Goo, Eun-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.10
    • /
    • pp.203-208
    • /
    • 2019
  • Digital watermarking was developed to protect copyright by discouraging the illegal copying of digital content. On the other hand, recently, watermarking has also been used to verify the integrity of digital content, such as medical images, and detect illegal manipulation or distortion locations. Watermarking should be tenacious so as to protect copyright from illegal copying and should remain firm to the content through a range of attacks, such as distortion or filtering. At the same time, however, it should be removed easily even in a slight transformation of the material to verify the integrity. Therefore, this paper proposes a watermarking technique that easily checks and verifies the deformation or manipulation of digital images. In the proposed method, the entire image was examined in $16{\times}16$ blocks to check for deformation of the image. When deformation was detected, further inspection proceeded in $4{\times}4$ blocks and the location where deformation occurred was identified.

A Technique for Protecting Android Applications using Executable Code Encryption and Integrity Verification (실행코드 암호화 및 무결성 검증을 적용한 안드로이드앱 보호 기법)

  • Shim, HyungJoon;Cho, Sangwook;Jeong, Younsik;Lee, Chanhee;Han, Sangchul;Cho, Seong-je
    • Journal of Software Assessment and Valuation
    • /
    • v.10 no.1
    • /
    • pp.19-26
    • /
    • 2014
  • In this paper, we propose a method for protecting Android applications against reverse engineering attacks. In this method, the server encrypts the original executable code (DEX) included in an APK file, inserts into the APK file a stub code that decrypts the encrypted DEX later at run-time, and distributes the modified APK file. The stub code includes an integrity validation code to detect attacks on itself. When a user installs and executes the APK file, the stub code verifies the integrity of itself, decrypts the encrypted DEX, and loads it dynamically to execute. Since the original DEX is distributed as an encrypted one, we can effectively protect the intellectual property. Further, by verifying the integrity of the stub code, we can prevent malicious users from bypassing our method. We applied the method to 15 Android apps, and evaluated its effectiveness. We confirmed that 13 out of them operates normally.

Verification Methods for Vulnerabilities of Airborne Object-Oriented Software (항공용 객체지향 소프트웨어에 대한 취약점 검증 방안)

  • Jang, Jeong-hoon;Kim, Sung-su;Lee, Ji-hyun
    • Journal of Aerospace System Engineering
    • /
    • v.16 no.2
    • /
    • pp.13-24
    • /
    • 2022
  • As the scale of airborne system software increases, the use of OOT (Object-Oriented Technology) is increasing for functional expansion, efficient development, and code reuse, but the verification method for airborne object-oriented software is conducted from the perspective of the existing procedure-oriented program. The purpose of this paper was to analyze the characteristics of OOT and the vulnerabilities derived from the functional characteristics of OOT, and present a verification method applicable to each software development process (Design, Coding and Testing) to ensure the functional safety integrity of aviation software to which OOT is applied. Additionally, we analyzed the meaning of the static analysis results among the step-by-step verification measures proposed by applying LDRA, a static analysis automation tool, to PX4, an open source used to implement flight control software.

Digital Watermarking of Medical Image Based on Public Key Encryption Algorithm Considering ROI (ROI를 고려한 공개키 암호화 알고리즘 기반 의료영상 디지털 워터마킹)

  • Lee Hyung-Kyo;Kim Hee-Jung;Seong Tack-Young;Kwon Ki-Ryong;Lee Jong-Keuk
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.11
    • /
    • pp.1462-1471
    • /
    • 2005
  • Recently, the medical image has been digitized by the development of computer science and digitization of the medical devices. There are needs for database service of the medical image and long term storage because of the construction of PACS(picture archiving and communication system) following DICOM(digital imaging communications in medicine) standards, telemedicine, and et al. However, it also caused some kinds of problems, such as illegal reproduction of medical image, proprietary rights and data authentication. In this paper, we propose the new digital watermarking technique for medical image based on public key encryption algorithm for integrity verification. It prevents illegal forgery that can be caused after transmitting medical image data remotely. The watermark is the value of bit-plane in wavelet transform of the original image for certification method of integrity verification. We proposed the embedding regions are randomly chosen considering ROI, and a digital signature is made using hash function of MD5 which input is a secret key. The experimental results show that the watermark embedded by the proposed algorithm can survive successfully in image processing operations and that the watermark's invisibility is good.

  • PDF