• Title/Summary/Keyword: Physical network separation

Search Result 32, Processing Time 0.026 seconds

Enhanced Operator Authentication Method in SCADA Control Network (SCADA제어망에서 강화된 운용자 인증 방안)

  • Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.12
    • /
    • pp.416-424
    • /
    • 2019
  • The authentication technologies used to access computers in both IT and operational technology (OT) network areas include ID/PW, public certificate, and OTP. These authentication technologies can be seen as reflecting the nature of the business-driven IT network. The same authentication technologies is used in SCADA control networks where the operational technology is centered. However, these authentication technologies do not reflect the characteristics of the OT control network environment, which requires strict control. In this paper, we proposed a new enhanced user authentication method suitable for the OT SCADA control network centered on control information processing, utilizing the physical terminal address and operator location information characteristics of the operator's mobile terminal and control network.

A Study on Zero Trust Establishment Plan for Korean Military (한국군 맞춤형 제로 트러스트(Zero Trust) 구축방안 연구)

  • Kyuyong Shin;Chongkyung Kil;Keungsik Choi;Yongchul Kim
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.131-139
    • /
    • 2023
  • In recent years, there have been frequent incidents of invasion of national defense networks by insiders. This trend can be said to disprove that the physical network separation policy currently applied by the Korea Ministry of National Defense can no longer guarantee military cyber security. Therefore, stronger cybersecurity measures are needed. In this regard, Zero Trust with a philosophy of never trusting and always verifying is emerging as a new alternative security paradigm. This paper analyzes the zero trust establishment trends currently being pursued by the US Department of Defense, and based on the implications derived from this, proposes a zero trust establishment plan tailored to the Korean military. The zero trust establishment plan tailored to the Korean military proposed in this paper includes a zero trust establishment strategy, a plan to organize a dedicated organization and secure budget, and a plan to secure zero trust establishment technology. Compared to cyber security based on the existing physical network separation policy, it has several advantages in terms of cyber security.

Morphology Formation and Application of Interpenetrating Polymer Network (IPN) Materials (Interpenetrating Polymer Network(IPN)의 모폴로지 형성과 그 응용)

  • Kim, Sung-Chul
    • Polymer(Korea)
    • /
    • v.29 no.1
    • /
    • pp.1-7
    • /
    • 2005
  • Interpenetrating polymer network (PN) is a mixture of network polymers. The characteristics of IPN material is the control of morphology during the IPN synthesis. By controlling the relative kinetics of chemical reaction (as well as gellation) and phase separation, the morphology of IPN can be controlled to obtain materials with nano-scale domain and also the co-continuous phase. Other important advantage is the fact that the morphology is permanent due to the presence of the physical interlocking between the networks. The combination of hydrophilic polyurethane and hydrophobic polystyrene in IPN form provides enhanced blood compatibility due to the co-existence of the hydrophilic and hydrophobic domains in nano-scale on the surface. The reaction temperature, reaction pressure and the degree of crosslinking were varied during the IPN synthesis and the morphology and blood compatibility of the resulting IPN materials were studied.

A Model-based Rate Separation Algorithm Using Multiple Channels in Multi-Radio Ad Hoc Networks (멀티 라디오 애드혹 네트워크에서의 멀티 채널을 이용한 모델 기반 레이트 분할 알고리즘)

  • Kim, Sok-Hyong;Kim, Dong-Wook;Suh, Young-Joo;Kwon, Dong-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.1A
    • /
    • pp.73-81
    • /
    • 2011
  • IEEE 802.11 PHY and MAC layer provide multiple channels and data rates. To improve the performance of IEEE 802.11 multi-radio ad hoc networks, it is required to utilize available channels and data rates efficiently. However, in IEEE 802.11 multi-rate networks, the rate anomaly (RA) problem occurs that the network performance is severely degraded as low-rate links affect high-rate links. Hence, in this paper, we propose a model-based rate separation (MRS) algorithm that uses multiple channels to separate different data rate links so that the RA problem is mitigated. MRS algorithm utilizes an existing throughput model that estimates the throughput of IEEE 802.11 single-hop networks to separate low-rate links and high-rate links. Through simulations, we demonstrate that the MRS algorithm shows improved network performance compared with existing algorithms in multi-radio ad hoc networks.

Deterministic Data Communication Architecture for Safety-Critical Networks in Nuclear Power Plants (원전 안전통신망을 위한 결정론적 데이터 통신 구조)

  • Park, Sung-Woo;Kim, Dong-Hoon
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.55 no.5
    • /
    • pp.199-204
    • /
    • 2006
  • To develop a safety-critical network in nuclear power plants that puts more stringent requirements than the competitive commercial ones do, we establish four design criteria - deterministic communication, explicit separation/isolation structure, reliability, verification & validation. According to those design criteria, the fundamental design elements are chosen as follows - a star topology, point-to-point physical link, connection-oriented link control and fixed allocation access control. After analyzing the design elements, we also build a communication architecture with TDM (Time Division Multiplexing) bus switching scheme. Finally, We develop a DDCNet (Deterministic Data Communication Network) based on the established architecture. The DDCNet is composed of 64 nodes and guarantees the transmission bandwidth of 10Mbps and the delay of 10 msec for each node. It turns out that the DDCNet satisfies the aforementioned design criteria and can be adequately utilized for our purpose.

INTERFERENCE CHARACTERISTICS OF CONSTRUCTION ENVIRONMENT FOR WSN APPLICATIONS

  • Sun-Chan Bae;Won-Sik Jang;Sang-Dae Park;Won-Suk Jang
    • International conference on construction engineering and project management
    • /
    • 2013.01a
    • /
    • pp.592-595
    • /
    • 2013
  • Advent of Wireless Sensor Networks (WSN) has provided potentials to a variety of construction applications. It is well appreciated that WSNs have advantages over traditional wired system, such as ease of installation and maintenance with increased cost savings and efficiencies. However, the obstruction of wireless signal from physical objects in the heterogeneous construction environment often brings challenges to WSN measurement system. This paper analyzed the obstruction characteristic of construction environment where construction materials, equipment, and built structures obstruct the wireless signal yielding negative effect of measurement system. By adopting evaluation criteria, such as packet reception rate, field experiments have been implemented to quantitatively identify the interference of wireless signal from penetration, reflection, and network traffic under the construction environment. The results show that reliable performance of wireless sensor in construction environment depends on the optimal separation distance between a receiver and a transmitter, obstruction types, obstruction thickness, and transmission interval. In addition, the methodology and experimental results of this paper could be used in the practical design of network topology when hundreds of sensor nodes form a mesh network in the large scale construction applications.

  • PDF

A Study on Cloud Network and Security System Analysis for Enhanced Security of Legislative Authority (입법기관의 보안강화를 위한 Cloud 네트워크 분석 및 보안 시스템 연구)

  • Nam, Won-Hee;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.6
    • /
    • pp.1320-1326
    • /
    • 2011
  • National institutions on the importance of information security is being recognized, information security laws are being discussed in Congress 3.4 DDoS incident and Nonghyup hacking, etc. However, National Assembly Secretariat when the results of the Information Security Consulting has been assessed very low 61.2 points, evaluation of hardware and software in secure areas were vulnerable. This paper, the legislative support agencies National Assembly and National Assembly Secretariat on the network and computer systems, and managerial, technical and physical security elements are analyzed for the status. And network should have the legislative support agencies and system for the physical network separation, DDoS attack response, Virus attack response, hacking attacks response, and Cyber Emergency Response Team/Coordination Center for Cyber infringing design and research through the confidentiality, integrity, availability, access control, authentication and security analysis is based on the evaluation criteria. Through this study, the legislative support agencies to strengthen the security of data and security laws enacted to provide the basis for.

Input Time-Delay Compensation for a Nonlinear Control System

  • Choi, Yong-Ho;Chong, Kil-To
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.395-400
    • /
    • 2004
  • In most physical processes, the transfer function includes time-delay, and in the general distributed control system using computer network, there exists inherent time-delay caused by the spatial separation between controllers and actuators. This work deals with the synthesis of a discrete-time controller for a nonlinear system and proposes a new effective method to compensate the influence of input time-delay. The controller is synthesized by using input/output linearization. Under the circumstance that input time-delay exists, the system response has more overshoot and tends to diverge. For these reasons, the controller has to produce future input value that will be needed for the system. In order to calculate the future input value, some predictors are adopted. Using the discretization via Euler's method, numerical simulations about the Van der Pol system are performed to evaluate the performance of the proposed method.

  • PDF

Design of a controller for input time-delay nonlinear system

  • Choi, Hyung-Jo;Choi, Yong-Ho;Chong, Kil-To
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.548-552
    • /
    • 2005
  • In most physical processes, the transfer function includes a time-delay, and in the general distributed control system using a computer network, an inherent time-delay exists due to the spatial separation between controllers and actuators. Under the circumstance where an input time-delay exits, the system response overshoots and tends to diverge. For this reasons described above, a controller design method is proposed for a discrete nonlinear system including input time-delay, which adopts the time-discretization using Taylor series. Controllers are synthesized using an input/output linearization method. Finally, several cases of the computer simulations were conducted, and the results validate the proposed methods.

  • PDF

Structure-property relations for polymer melts: comparison of linear low-density polyethylene and isotactic polypropylene

  • Drozdov, A.D.;Al-Mulla, A.;Gupta, R.K.
    • Advances in materials Research
    • /
    • v.1 no.4
    • /
    • pp.245-268
    • /
    • 2012
  • Results of isothermal torsional oscillation tests are reported on melts of linear low density polyethylene and isotactic polypropylene. Prior to rheological tests, specimens were annealed at various temperatures ranging from $T_a$ = 180 to $310^{\circ}C$ for various amounts of time (from 30 to 120 min). Thermal treatment induced degradation of the melts and caused pronounced decreases in their molecular weights. With reference to the concept of transient networks, constitutive equations are developed for the viscoelastic response of polymer melts. A melt is treated as an equivalent network of strands bridged by junctions (entanglements and physical cross-links). The time-dependent response of the network is modelled as separation of active strands from and merging of dangling strands with temporary nodes. The stress-strain relations involve three adjustable parameters (the instantaneous shear modulus, the average activation energy for detachment of active strands, and the standard deviation of activation energies) that are determined by matching the dependencies of storage and loss moduli on frequency of oscillations. Good agreement is demonstrated between the experimental data and the results of numerical simulation. The study focuses on the effect of molecular weight of polymer melts on the material constants in the constitutive equations.