• Title/Summary/Keyword: Protection requirements

Search Result 562, Processing Time 0.024 seconds

Improved distance relay suitable for intertie protection of a wind farm considering Fault Ride-Through requirement (풍력단지의 Fault Ride-Through 기능을 위한 연계선 보호용 거리계전기의 성능향상 기법)

  • Kang, Yong-Cheol;Kang, Hae-Gweon;Zheng, Tai-Ying;Lee, Byung-Eun;Jang, Sung-Il;Kim, Yong-Gyun
    • Proceedings of the KIEE Conference
    • /
    • 2009.07a
    • /
    • pp.442_443
    • /
    • 2009
  • A large wind farm should satisfy the requirements for a grid and accomplish the optimization of the wind farm system. In that point of view, the wind farm intertie protection system, which must consider the Fault Ride-Through (FRT) requirement for more reliable protection, should be improved. This paper proposes a modified distance relay suitable for protection of a wind farm intertie considering a FRT requirement. The frequency change is used to discriminate the intertie fault from a outside zone fault. The performance of the proposed algorithm is verified using a PSCAD/EMTDC simulator.

  • PDF

An Enhanced Dynamic Multilayer Routing for Networks with Protection Requirements

  • Urra, Anna;Calle, Eusebi;Marzo, Jose L.;Vila, Pere
    • Journal of Communications and Networks
    • /
    • v.9 no.4
    • /
    • pp.377-382
    • /
    • 2007
  • This paper presents a new enhanced dynamic and multilayer protection(DMP) routing scheme that considers cooperation between packet and wavelength switching domain in order to minimize the resource consumption. The paper describes the architecture of the multilayer network scenario and compares the proposed algorithm with other routing mechanisms applying protection at the IP/multi-protocol label switching(MPLS) layer or at the optical layer. Simulation results show that DMP reduces the number of optical-electrical-optical(o-e-o) operations and makes an efficient use of the network resources compared to non-multilayer proposals.

A Study on New High-Technology Protection System Model Using The Social Engineering Techniques (사회공학 가법을 이용한 새로운 첨단기술보호시스템 모텔에 관한연구)

  • Park, Ji-Hyung
    • Convergence Security Journal
    • /
    • v.11 no.2
    • /
    • pp.3-11
    • /
    • 2011
  • Today the protection of high-tech is one of the most important requirements to survive in competition between companies or countries. In these circumstances, government's industrial security activities have been transformed into independent activities of the private center. So, Company has introduced a high-tech security system for the sake of Technology protect. But, Several Security Incident have occurred in recent years, and so New security measures became necessary. In this study, I will suggest a new high-technology protection system model Using the social engineering techniques to analyze security threats.

SEQUENTIAL ESTIMATION OF THE MEAN VECTOR WITH BETA-PROTECTION IN THE MULTIVARIATE DISTRIBUTION

  • Kim, Sung Lai;Song, Hae In;Kim, Min Soo;Jang, Yu Seon
    • Journal of the Chungcheong Mathematical Society
    • /
    • v.26 no.1
    • /
    • pp.29-36
    • /
    • 2013
  • In the treatment of the sequential beta-protection procedure, we define the reasonable stopping time and investigate that for the stopping time Wijsman's requirements, coverage probability and beta-protection conditions, are satisfied in the estimation for the mean vector ${\mu}$ by the sample from the multivariate normal distributed population with unknown mean vector ${\mu}$ and a positive definite variance-covariance matrix ${\Sigma}$.

Cybersecurity Risk Assessment of a Diverse Protection System Using Attack Trees (공격 트리를 이용한 다양성보호계통 사이버보안 위험 평가)

  • Jung Sungmin;Kim Taekyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.19 no.3
    • /
    • pp.25-38
    • /
    • 2023
  • Instrumentation and control systems measure and control various variables of nuclear facilities to operate nuclear power plants safely. A diverse protection system, a representative instrumentation and control system, generates a reactor trip and turbine trip signal by high pressure in a pressurizer and containment to satisfy the design requirements 10CFR50.62. Also, it generates an auxiliary feedwater actuation signal by low water levels in steam generators. Cybersecurity has become more critical as digital technology is gradually applied to solve problems such as performance degradation due to aging of analog equipment, increased maintenance costs, and product discontinuation. This paper analyzed possible cybersecurity threat scenarios in the diverse protection system using attack trees. Based on the analyzed cybersecurity threat scenario, we calculated the probability of attack occurrence and confirmed the cybersecurity risk in connection with the asset value.

Current Status of Internal Dosimetry Methods and Radiological Regulations in Korea, Ukraine and European Community

  • Lee, Tae-Young;Lee, Jong-Il;Berkovski, Vladimir
    • Journal of Radiation Protection and Research
    • /
    • v.28 no.1
    • /
    • pp.65-73
    • /
    • 2003
  • The paper discusses results of recent international intercomparison exercises on internal dose assessments, status of up to date internal dosimetry methods and the radiological legislation developed and implemented in Korea, European Union and Ukraine. The system of radiation protection in Korea is based on the Korean Atomic Energy Regulatory Enforcement on Safety Standards (Ministry Notice No. 2001-2). The notice is based on the recommendations in ICRP Publication 60 (1990) and IAEA Basic Safety Standards (1996). But the full implementation of the notice by the end of the year 2002 is not required because of the socio-economic situation and inexperience in internal radiation dosimetry Regulatory framework for internal radiation dosimetry is under development toward the full implementation of the notice from January 1, 2003. The system of radiation protection in Ukraine is based on the National radiation protection regulatory code NRBU-97. The code was developed and adopted in 1998 and replaced the Regulations of Former Soviet Union. The document is based on the ICRP Publication 60, Euratom Directive 96/29 and IAEA Basic Safety Standards (1996). The transitional period of 5 years (effected till January 2003) is established for implementation of all requirements of this new regulation. The system of radiation protection in the European Community is based on the Council Directive 96/29/Euratom, adopted in 1996 and enforced from 13 May 2000. Directive 96/29/Euratom has the status of the European law.

A Fast and Scalable Inter-Domain MPLS Protection Mechanism

  • Huang, Chang-Cheng;Messier, Donald
    • Journal of Communications and Networks
    • /
    • v.6 no.1
    • /
    • pp.60-67
    • /
    • 2004
  • With the fast growth of Internet and a new widespread interest in optical networks, the unparalleled potential of Multi-Protocol Label Switching (MPLS) is leading to further research and development efforts. One of those areas of research is Path Protection Mechanism. It is widely accepted that layer three protection and recovery mechanisms are too slow for today’s reliability requirements. Failure recovery latencies ranging from several seconds to minutes, for layer three routing protocols, have been widely reported. For this reason, a recovery mechanism at the MPLS layer capable of recovering from failed paths in 10’s of milliseconds has been sought. In light of this, several MPLS based protection mechanisms have been proposed, such as end-to-end path protection and local repair mechanism. Those mechanisms are designed for intra-domain recoveries and little or no attention has been given to the case of non-homogenous independent inter-domains. This paper presents a novel solution for the setup and maintenance of independent protection mechanisms within individual domains and merged at the domain boundaries. This innovative solution offers significant advantages including fast recovery across multiple nonhomogeneous domains and high scalability. Detailed setup and operation procedures are described. Finally, simulation results using OPNET are presented showing recovery times of a few milliseconds.

Protection Design and Lightning Zone Analysis for Unmanned Aerial Vehicle with Composite Wings (복합재 주익 무인항공기의 낙뢰보호 설계와 피격영역 해석)

  • Hee-chae Woo;Yong-Tae Kim
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.26 no.3
    • /
    • pp.302-312
    • /
    • 2023
  • This paper describes the analysis of lightning strike zoning, the indirect lightning data simulation and the protection design for lightning indirect effects of equipment by lightning strike for unmanned aircraft consisting of composite wings. Through the analysis of lightning strike zoning according to the external shape of unmanned aerial vehicles, the structure areas that should be protected during lightning strike is derived, and the protection requirements of lightning indirect effects for flight critical equipments and equipment that must be operated upon lightning strike was derived. Lightning protection levels according to the location of mounting equipment and surrounding structure materials for each equipment was derived, and the protection design of the unmanned aerial vehicle with composite structures was also proposed from direct effect of lightning. Later, the lightning protection technology will be verified by the ground test of lightning direct and indirect effects.

Protection Profile for Smart Meters: Vulnerability and Security Requirements Analysis (스마트미터의 취약성/보안요구사항 분석 CC v3.1 기반 보호프로파일 개발)

  • Jung, Chul-Jo;Eun, Sun-Ki;Choi, Jin-Ho;Oh, Soo-Hyun;Kim, Hwan-Koo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.111-125
    • /
    • 2010
  • There is a growing interest in "smart grid" technology, especially after the government recently announced "low-carbon green-growth industry" project. A smart grid uses "smart meters", which can be deployed in any power-consuming places like homes and factories. It has been shown that smart meters have several security weaknesses. There is, however, no protection profile available for smart meters, which means that safety with using them is not guaranteed at all. This paper analyzes vulnerabilities of smart meters and the relevant attack methods, thereby deriving the security functions and requirements for smart meters. Finally, we propose a protection profile based on Common Criterion v3.l for smart meters.

Security Evaluation Criteria for Firewalls in Kirea

  • Lee, Cheol-Won;Hong, Ki-Yoong;Kim, Hak-Beom;Oh, Kyeong-Hee;Kwon, Hyun-Jo;Sim, Joo-Geol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.8 no.3
    • /
    • pp.63-78
    • /
    • 1998
  • Recently, to use the evaluated firewall is recognized as a solution to achieve the security and reliability for government and organizarions in Korea. Results of firewall evaluation using ITSEC(Information Technology Security Evaluation Criteria) and CCPP(Common Criteria Protection Peofile)have been announced. Because there are problems to apply ITSECor CCPP for the firewall evaluation in korea environment, korea government and korea Information security Agency (KISA) decided to develop our own security dvaluation critrtia fir firewalls.As a result of the efforts, Korea firewall security evaluation criteria has been published on Feb. 1998. In this paper, we introduce Korea security evaluation criteria for firewalls. The ceiteria consists of functional and assurance requirements that are compatible with CC Evaluation Assurance Levels(EALs)