• Title/Summary/Keyword: Managed Security

Search Result 277, Processing Time 0.025 seconds

Prediction of Energy Consumption in a Smart Home Using Coherent Weighted K-Means Clustering ARIMA Model

  • Magdalene, J. Jasmine Christina;Zoraida, B.S.E.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.177-182
    • /
    • 2022
  • Technology is progressing with every passing day and the enormous usage of electricity is becoming a necessity. One of the techniques to enjoy the assistances in a smart home is the efficiency to manage the electric energy. When electric energy is managed in an appropriate way, it drastically saves sufficient power even to be spent during hard time as when hit by natural calamities. To accomplish this, prediction of energy consumption plays a very important role. This proposed prediction model Coherent Weighted K-Means Clustering ARIMA (CWKMCA) enhances the weighted k-means clustering technique by adding weights to the cluster points. Forecasting is done using the ARIMA model based on the centroid of the clusters produced. The dataset for this proposed work is taken from the Pecan Project in Texas, USA. The level of accuracy of this model is compared with the traditional ARIMA model and the Weighted K-Means Clustering ARIMA Model. When predicting,errors such as RMSE, MAPE, AIC and AICC are analysed, the results of this suggested work reveal lower values than the ARIMA and Weighted K-Means Clustering ARIMA models. This model also has a greater loglikelihood, demonstrating that this model outperforms the ARIMA model for time series forecasting.

The Development of an Intelligent Home Energy Management System Integrated with a Vehicle-to-Home Unit using a Reinforcement Learning Approach

  • Ohoud Almughram;Sami Ben Slama;Bassam Zafar
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.87-106
    • /
    • 2024
  • Vehicle-to-Home (V2H) and Home Centralized Photovoltaic (HCPV) systems can address various energy storage issues and enhance demand response programs. Renewable energy, such as solar energy and wind turbines, address the energy gap. However, no energy management system is currently available to regulate the uncertainty of renewable energy sources, electric vehicles, and appliance consumption within a smart microgrid. Therefore, this study investigated the impact of solar photovoltaic (PV) panels, electric vehicles, and Micro-Grid (MG) storage on maximum solar radiation hours. Several Deep Learning (DL) algorithms were applied to account for the uncertainty. Moreover, a Reinforcement Learning HCPV (RL-HCPV) algorithm was created for efficient real-time energy scheduling decisions. The proposed algorithm managed the energy demand between PV solar energy generation and vehicle energy storage. RL-HCPV was modeled according to several constraints to meet household electricity demands in sunny and cloudy weather. Simulations demonstrated how the proposed RL-HCPV system could efficiently handle the demand response and how V2H can help to smooth the appliance load profile and reduce power consumption costs with sustainable power generation. The results demonstrated the advantages of utilizing RL and V2H as potential storage technology for smart buildings.

D.E.Cho : A Study on Smart City Data Security Model Using Blockchain Technology (블록체인 기술을 이용한 스마트시티 데이터 보안 모델 연구)

  • Do-Eun Cho
    • Journal of Platform Technology
    • /
    • v.12 no.2
    • /
    • pp.45-57
    • /
    • 2024
  • Smart cities are the product of modern urban planning that seeks to innovate information and communication technology and improve the quality of urban life. For the efficient operation of smart cities, data collected, stored, and processed in real time is a key resource. Therefore, data from smart cities collected in various fields must be managed safely, and personal information protection is paramount. In this study, a smart city data security model using blockchain technology was proposed to safely manage smart city data. The proposed model integrates IPFS into the blockchain network to distribute and store data to ensure data confidentiality and integrity, and encrypts data using CP-ABE to efficiently control access to data from users. In addition, privacy was guaranteed while enhancing the usability of data by using Homomorphic Encryption with data access control policies.

  • PDF

POS System Integrated with Cross-Platform for Supervision of Restaurant's

  • Alisha Farman;Hira Farman;Saad Ahmed;Anees Ahmed
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.8
    • /
    • pp.205-213
    • /
    • 2024
  • As the Restaurant industry is growing rapidly. The demand for an effortless POS (Point Of Sale) system which can make management easy is increasing. So, the purpose of this study is to digitalise the growing industry of restaurants and its consumers by utilizing cross-platform development. Crossplatform development frameworks provide great opportunities to solve the issues of handling ubiquitous devices with minimum efforts to reduce the cost and increase the stability, accessibility of the end consumers. By availing those opportunities, an Integrated POS system with cross platform is proposed. This integrated cross-platform POS system is originally designed for a single restaurant managed by its own private cloud server. This research solves the 2 major problems. One of them is the accessibility of the system on modern devices without even writing platform-specific code with the help of cross-platform development. This included web, mobile, desktops & tablets at the same time with the same codebase. Second one is handling data consistency with ubiquitous devices with the help of cloud infrastructure to make data safe and consistent more than ever. In the Development of this system Dart will be used as the primary programming language for cross-platform development. On the Cloud server system apache will be used as the web server and PHP as server side language. System will be using MySQL as the database server.

Learning from the Licensing and Training Requirements of the USA Private Security Industry : focused on the Private Security Officer Employment Authorization Act & California System (미국의 민간경비 자격 및 교육훈련 제도에 관한 연구 - 민간경비원고용인가법(PSOEAA) 및 캘리포니아 주(州) 제도 중심으로 -)

  • Lee, Seong-Ki;Kim, Hak-Kyong
    • Korean Security Journal
    • /
    • no.33
    • /
    • pp.197-228
    • /
    • 2012
  • The private security industry in Korea has rapidly proliferated. While the industry has grown quickly, though, private security officers have recently been implicated in incidents involving violence, demonstrating an urgent need for systematic reform and regulation of private security practices in Korea. Due to its quasi-public service character, the industry also risks losing the public's favor if it is not quickly disciplined and brought under legitimate government regulation: the industry needs professional standards for conduct and qualification for employment of security officers. This paper shares insights for the reform of the Korean private security industry through a study of the licensing and training requirements for private security businesses in the United States, mainly focusing on the Private Security Officer Employment Authorization Act (hereinafter the PSOEAA) and the California system. According to the PSOEAA, aspiring security officers shall submit to a criminal background check (a check of the applicants' criminal records). Applicants' criminal records should include not only felony convictions but also any other moral turpitude offenses (involving dishonesty, false statement, and information on pending cases). The PSOEAA also allows businesses to do background checks of their employees every twelve months, enabling the employers to make sure that their employees remain qualified for their security jobs during their employment. It also must be mentioned that the state of California, for effective management of its private security sector, has established a professional government authority, the Bureau of Security and Investigative Services, a tacit recognition that the private security industry needs to be thoroughly, professionally, and actively managed by a professional government authority. The American system provides a workable model for the Korean private security industry. First, this paper argues that the Korean private security industry should implement a more strict criminal background check system similar to that required by the PSOEAA. Second, it recommends that an independent professional government authority be established to oversee and enforce regulation of Korea's private security industry. Finally, this article suggests that education and training course be implemented to provide both diverse training as well as specialization and phasing.

  • PDF

Designing an evaluation model for cyber security management system implementation for companies participating in the automobile supply chain (based on ISO/SAE 21434 standard and TISAX assessment requirements) (자동차 공급망 참여기업 대상 사이버보안 관리체계 구현 평가모델설계 (ISO/SAE 21434 표준 및 TISAX 평가 요구사항을 기반으로))

  • Baek Eun Ho
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.49-59
    • /
    • 2022
  • Cyber security in the automobile sector is a key factor in the life cycle of automobiles, and cyber security evaluation standards are being strengthened worldwide. In addition, not only manufacturers who design and produce automobiles, but also due to the nature of automobiles consisting of complex components and various parts, the safety of cybersecurity can be secured only when the implementation level of the cybersecurity management system of companies participating in the entire supply chain is evaluated and managed. In this study, I analyzed the requirements of ISO/SAE 21434 and TISAX, which are representative standards for evaluating automotive cybersecurity. Through a survey conducted on domestic/overseas company security officers and related experts, suitability and feasibility were reviewed according to priorities and industries, so 6 areas and 45 evaluation criteria were derived and presented as final evaluation items. This study is meaningful as a study in that it presented a model that allows companies participating in the automotive supply chain to evaluate the current cybersecurity management level of the company by first applying ISO/SAE 21434 and TISAX overall control processes before uniformly introducing them.

CIA-Level Driven Secure SDLC Framework for Integrating Security into SDLC Process (CIA-Level 기반 보안내재화 개발 프레임워크)

  • Kang, Sooyoung;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.909-928
    • /
    • 2020
  • From the early 1970s, the US government began to recognize that penetration testing could not assure the security quality of products. Results of penetration testing such as identified vulnerabilities and faults can be varied depending on the capabilities of the team. In other words none of penetration team can assure that "vulnerabilities are not found" is not equal to "product does not have any vulnerabilities". So the U.S. government realized that in order to improve the security quality of products, the development process itself should be managed systematically and strictly. Therefore, the US government began to publish various standards related to the development methodology and evaluation procurement system embedding "security-by-design" concept from the 1980s. Security-by-design means reducing product's complexity by considering security from the initial phase of development lifecycle such as the product requirements analysis and design phase to achieve trustworthiness of product ultimately. Since then, the security-by-design concept has been spread to the private sector since 2002 in the name of Secure SDLC by Microsoft and IBM, and is currently being used in various fields such as automotive and advanced weapon systems. However, the problem is that it is not easy to implement in the actual field because the standard or guidelines related to Secure SDLC contain only abstract and declarative contents. Therefore, in this paper, we present the new framework in order to specify the level of Secure SDLC desired by enterprises. Our proposed CIA (functional Correctness, safety Integrity, security Assurance)-level-based security-by-design framework combines the evidence-based security approach with the existing Secure SDLC. Using our methodology, first we can quantitatively show gap of Secure SDLC process level between competitor and the company. Second, it is very useful when you want to build Secure SDLC in the actual field because you can easily derive detailed activities and documents to build the desired level of Secure SDLC.

Recovery Phrase Management Scheme for Public Blockchain Wallets based on OTP (공용 블록체인 지갑을 위한 OTP 기반 계정 복구 문자열 관리 체계)

  • Song, Seounghan;Kim, Suntae;Shin, Jung-Hoon;Lee, Jeong-Hyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.1
    • /
    • pp.35-44
    • /
    • 2020
  • The growing use of public blockchain-based virtual cryptocurrency calls for secure management of blockchain account information managed through cryptocurrency wallet programs. The previously proposed wallet program has high security in terms of managing an account's private key, but low security in managing an account's recovery phrase. Therefore, in this paper, we propose a safe management system of blockchain account recovery string based on the new user authentication method using the user's mobile device information and OTP technique to overcome the problem of the existing account recovery string management method. It also conducts an analysis of the proposed blockchain account recovery string management system based on the expected behavior scenario.

A Study on Distributed Cooperation Intrusion Detection Technique based on Region (영역 기반 분산협력 침입탐지 기법에 관한 연구)

  • Yang, Hwan Seok;Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.53-58
    • /
    • 2014
  • MANET can quickly build a network because it is configured with only the mobile node and it is very popular today due to its various application range. However, MANET should solve vulnerable security problem that dynamic topology, limited resources of each nodes, and wireless communication by the frequent movement of nodes have. In this paper, we propose a domain-based distributed cooperative intrusion detection techniques that can perform accurate intrusion detection by reducing overhead. In the proposed intrusion detection techniques, the local detection and global detection is performed after network is divided into certain size. The local detection performs on all the nodes to detect abnormal behavior of the nodes and the global detection performs signature-based attack detection on gateway node. Signature DB managed by the gateway node accomplishes periodic update by configuring neighboring gateway node and honeynet and maintains the reliability of nodes in the domain by the trust management module. The excellent performance is confirmed through comparative experiments of a multi-layer cluster technique and proposed technique in order to confirm intrusion detection performance of the proposed technique.

Visualization of network traffic attack using time series radial axis and cylindrical coordinate system (시계열 방사축과 원통좌표계를 이용한 네트워크 트래픽 공격 시각화)

  • Chang, Beom-Hwan;Choi, Younsung
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.12
    • /
    • pp.17-22
    • /
    • 2019
  • Network attack analysis and visualization methods using network traffic session data detect network anomalies by visualizing the sender's and receiver's IP addresses and the relationship between them. The traffic flow is a critical feature in detecting anomalies, but simply visualizing the source and destination IP addresses symmetrically from up-down or left-right would become a problematic factor for the analysis. Also, there is a risk of losing timely security situation when designing a visualization interface without considering the temporal characteristics of time-series traffic sessions. In this paper, we propose a visualization interface and analysis method that visualizes time-series traffic data by using the radial axis, divide IP addresses into network and host portions which then projects on the cylindrical coordinate system that could effectively monitor network attacks. The proposed method has the advantage of intuitively recognizing network attacks and identifying attack activity over time.