• 제목/요약/키워드: Secure area

검색결과 935건 처리시간 0.029초

차세대 USN기반의 스마트 플랜트안전 프레임워크 개발 (SPSF : Smart Plant Safety Framework based on Reliable-Secure USN)

  • 정지은;송병훈;이형수
    • 정보통신설비학회논문지
    • /
    • 제9권3호
    • /
    • pp.102-106
    • /
    • 2010
  • Recently process industries from oil and gas procedures and mining companies to manufactures of chemicals, foods, and beverages has been exploring the USN (Ubiquitous Sensor Networks) technology to improve safety of production processes. However, to apply the USN technology in the large-scale plant industry, reliability and security issues are not fully addressed yet, and the absence of the industrial sensor networking standard causes a compatibility problem with legacy equipment and systems. Although this situation, process industry such as energy plants are looking for the secure wireless plant solution to provide detailed, accurate safety monitoring from previously hard-reach, unaccordable area. In this paper, SPSF (Smart Plant Safety Framework based on Reliable-Secure USN) is suggested to fulfill the requirements of high-risk industrial environments for highly secure, reliable data collection and plant monitoring that is resistant to interference. The SPSF consists of three main layers: 1) Smart Safety Sensing Layer, 2) Smart Safety Network Layers, 3) Plant Network System Layer.

  • PDF

카오스 기반 Malasoma 시스템의 동기화 및 보안 통신 응용 (Synchronization and Secure Communication Application of Chaos Based Malasoma System)

  • 장은영
    • 한국전자통신학회논문지
    • /
    • 제12권5호
    • /
    • pp.747-754
    • /
    • 2017
  • 카오스 기반 보안 통신시스템은 표준 대역확산 시스템의 대안으로서, 이것은 정보신호의 대역을 확산시키며 단순하고 작은 비용으로 카오스회로를 사용하여 정보신호를 암호화할 수 있다. 보안 통신 분야에서는 Lorenz, Chua, Rossler, Duffing등과 같은 전통적인 시스템들이 널리 사용되고 있다. Malasoma 카오스 시스템은 위상학적으로는 단순하지만 불규칙한 신호 생성과 비선형성의 시스템으로서 동기화와 보안 통신을 적용한 시스템은 관련 논문도 거의 없다. 본 논문은 기존의 카오스 시스템의 대안으로서 보안 통신 분야에서 사용될 수 있는 새로운 카오스 시스템을 소개한다. 또한 이 새로운 모델은 시뮬레이션을 통하여 카오스 신호로 보안성을 확인하고 P-C(Pecora-Carroll)방식을 사용하는 동기화 통신시스템을 모델화 한다. Malasoma 시스템의 모델링, 동기화 및 보안 통신 응용은 각각 MATLAB - Simulink 환경에서 구현된다. 이를 통해 도출된 결과는 이 새로운 카오스 시스템이 보안 통신 분야에서 사용될 수 있음을 확인할 수 있다.

모바일 플랫폼에서 MTM을 이용한 보안영역 제공 및 인증에 관한 연구 (A Study on Providing Secure Storage and User Authentication Using MTM on Mobile Platform)

  • 이선호;이임영
    • 정보처리학회논문지C
    • /
    • 제18C권5호
    • /
    • pp.293-302
    • /
    • 2011
  • 무선 통신 기술의 발달을 통해 스마트폰을 이용한 다양한 정보 서비스를 빠르게 받을 수 있게 되었다. 스마트 폰은 기존에 사용되고 있던 피처폰에 비하여 더 강력한 컴퓨팅 능력을 제공하며, 웹서핑, 문서 편집, 비디오 시청 그리고 게임과 같은 다양한 기능을 제공한다. 스마트폰의 높은 활용성에 따라 수많은 개인정보가 단말기에 저장되고 있으며, 이의 분실 및 도난에 따른 개인정보 유출은 큰 문제가 될 것으로 예상된다. 따라서 본 연구는 기존에 제공되는 스마트폰 모바일 플랫폼의 보안영역 제공 및 인증 방법에 대하여 분석하고 요구사항을 도출하였으며, 보안 요구사항을 만족하는 보안 기술을 제안한다. 제안방식은 인증 우회가 불가능한 보안영역을 제공하며, 보안영역에 접근하기 위해 필요한 정보의 손상으로부터 가용성을 제공한다.

A Comparative Study on the Librarian and Users' Perception of the Specialized Library Operation

  • Noh, Younghee;Kwak, Woojung;Shin, Youngji
    • International Journal of Knowledge Content Development & Technology
    • /
    • 제9권4호
    • /
    • pp.69-93
    • /
    • 2019
  • The purpose of this study is to investigate the status of specialized services and the overall satisfaction of the operation of the specialized services for the librarians and users of the specialized libraries, and based on the ISA method, compare the specialized theme data, specialized service place, specialized program, specialized theme area facilities and environment, and derive issues of the specialized library operation and improvement measures. Consequently, first, when developing the program, the specialized library needs to develop programs in possession of unique characteristics specific to the areas of the differentiated themes from the cultural and educational programs run by the existing libraries. Second, it is necessary to focus on the specialized theme area information services for the users, and to this end, it is necessary to improve librarians 'professionalism. Third, it is necessary to secure the budget for the specialized services and secure space. Since the scope of the services which may be provided as per the budget intended for providing specialized services may be limited, it would be necessary to secure and operate the budget systematic to this end. Fourth, the specialized library needs to proceed with activities in connection with local residents for the purposes of facilitating specialized services.

Low area field-programmable gate array implementation of PRESENT image encryption with key rotation and substitution

  • Parikibandla, Srikanth;Alluri, Sreenivas
    • ETRI Journal
    • /
    • 제43권6호
    • /
    • pp.1113-1129
    • /
    • 2021
  • Lightweight ciphers are increasingly employed in cryptography because of the high demand for secure data transmission in wireless sensor network, embedded devices, and Internet of Things. The PRESENT algorithm as an ultralightweight block cipher provides better solution for secure hardware cryptography with low power consumption and minimum resource. This study generates the key using key rotation and substitution method, which contains key rotation, key switching, and binary-coded decimal-based key generation used in image encryption. The key rotation and substitution-based PRESENT architecture is proposed to increase security level for data stream and randomness in cipher through providing high resistance to attacks. Lookup table is used to design the key scheduling module, thus reducing the area of architecture. Field-programmable gate array (FPGA) performances are evaluated for the proposed and conventional methods. In Virtex 6 device, the proposed key rotation and substitution PRESENT architecture occupied 72 lookup tables, 65 flip flops, and 35 slices which are comparably less to the existing architecture.

경제성 확보를 위한 빗물이용시설의 규모 산정 및 민감도 분석 (Evaluation of Tank Capacity of Rainwater Harvesting System to Secure Economic Feasibility and Sensitivity Analysis)

  • 문정수;김하나;박종빈;이정훈;김이호
    • 상하수도학회지
    • /
    • 제26권2호
    • /
    • pp.191-199
    • /
    • 2012
  • Rainwater harvesting systems (RWHS), one of measures for on site rainwater management, have been promoted by laws, regulations and guidelines and have been increased. However, more evaluation of economic feasibility on RWHS is still needed due to seasonal imbalance of rainfall and little experiences and analysis on design and operation of RWHS. In this study, we investigated tank capacity of RWHS to secure economic validity considering catchment area and water demand, which is affected by building scale. Moreover, sensitivity analysis was performed to examine the effect of design factors, cost items and increase rate of water service charge on economic feasibility. The BCR (benefit cost ratio) is proportional to the increase in tank capacity. It is increased steeply in small tank capacity due to the effect of cost and, since then, gently in middle and large tank capacity. In case of 0.05 in the rate of tank volume to catchment area and 0.005 in water demand to catchment area, BCR was over one from the tank capacity of 160 $m^{3}$ taking into account of private benefits and from the tank capacity of 100 $m^{3}$ taking into account of private and public benefits. Sensitivity analysis shows that increase of water demand can improve BCR values with little cost so that it is needed to extend application of rainwater use and select a proper range of design factor. Decrease of construction and maintenance cost reduced the tank volume to secure economic validity. Finally, increase rate of water service charge had considerable impact on economic feasibility.

분산형 용수공급시스템 구축을 위한 정수처리시설 최적 위치 결정 (Determination of the Optimal Location for Water Treatment Plants in the Decentralized Water Supply System)

  • 장동일;하금률;전환돈;김정현;강기훈
    • 상하수도학회지
    • /
    • 제27권1호
    • /
    • pp.1-10
    • /
    • 2013
  • Major issues in water supply service have changed from expansion of service area to improvement of service quality, i.e., water quality and safety, and early response to emergency situation. This change in the service concept triggers the perceptions of limitation with the current centralized water supply system and of necessities of decentralized (distributed) water supply system (DWSS), which can make up the limitations. DWSS can reduce the possibility of water supply outage by establishing multiple barriers such as emergency water supply system, and secure better water quality by locating treatment facilities neighboring consumers. On the other hand, fluctuation of water demand will be increased due to the reduced supply area, which makes difficult to promptly respond the fluctuating demand. In order to supplement this, hybrid water supply system was proposed, which combined DWSS with conventional water supply system using distributing reservoir to secure the stability of water supply. The Optimal connection point of DWSS to existing water supply network in urban area was determined by simulating a supply network using EPANET. Optimal location of decentralized water treatment plant (or connection point) is a nodal point where changes in pressure at other nodal points can be minimized. At the same time, the optimal point should be selected to minimize hydraulic retention time in supply network (water age) to secure proper water quality. In order to locate the point where these two criteria are satisfied optimally, Distance measure method, one of multi-criteria decision making was employed to integrate the two results having different dimensions. This methodology can be used as an efficient decision-support criterion for the location of treatment plant in decentralized water supply system.

원격 헬스케어 모니터링 시스템에서 키 격리기법을 이용한 개선된 건강정보 전송 보안 프로토콜 (An Enhanced Secure Health Data Transmission Protocol using Key Insulation in Remote Healthcare Monitoring System)

  • 노시완;박영호;이경현
    • 한국멀티미디어학회논문지
    • /
    • 제19권12호
    • /
    • pp.1981-1991
    • /
    • 2016
  • In recent, the advancement of wearable devices and wireless body area networking technologies motivate researchers to pay attention to remote healthcare system for monitoring patients health and disease progression effectively. However, in order to implement a practical remote healthcare system, we must consider the security and privacy of patient's personal health information transmitted to healthcare servers through the network. Hence, in this paper, we propose a secure health data transmission protocol in remote healthcare monitoring system to protect patient's health information and prevent privacy from eavesdropping on the network. To achieve our security goals, we design an efficient secure protocol based on the identity-based cryptography with key evolution technique, and then confirm the superiority and the efficiency of the proposed protocol as compared with the existing protocol of Yang et al.

범용적으로 적용 가능한 네트워크제어서버 기반의 상호인증 및 그룹핑 프로토콜 설계 (Design of Mutual Authentication and Grouping Protocol Based On Network Control Server Applicable to General Purpose)

  • 박중오
    • 디지털산업정보학회논문지
    • /
    • 제13권4호
    • /
    • pp.13-23
    • /
    • 2017
  • In order to protect personal information and important information (confidential information, sales information, user information, etc.) in the internal network, companies and organizations apply encryption to the Server-To-Server or Server-To-Client communication section, And are experiencing difficulties due to the increasing number of known attacks and intelligent security attacks. In order to apply the existing S / W encryption technology, it is necessary to modify the application. In the financial sector, "Comprehensive Measures to Prevent the Recurrence of Personal Information Leakage in the Domestic Financial Sector" has been issued, and standard guidelines for financial computing security have been laid out, and it is required to expand the whole area of encryption to the internal network. In addition, even in environments such as U-Health and Smart Grid, which are based on the Internet of Things (IoT) environment, which is increasingly used, security requirements for each collection gateway and secure transmission of the transmitted and received data The requirements of the secure channel for the use of the standard are specified in the standard. Therefore, in this paper, we propose a secure encryption algorithm through mutual authentication and grouping for each node through H / W based Network Control Server (NCS) applicable to internal system and IoT environment provided by enterprises and organizations. We propose a protocol design that can set the channel.

C언어에서 포맷 스트링이 프로그램 보안에 미치는 영향 (A Study on the Effect of Format String on Secure Programming in C Language)

  • 이형봉;차홍준;최형진
    • 정보처리학회논문지C
    • /
    • 제8C권6호
    • /
    • pp.693-702
    • /
    • 2001
  • C 언어가 가지고 있는 특징 중의 하나는 포인터형 변수를 제공하여, 프로그램 작성자가 임의의 주소영역에 쉽게 접근할 수 있다는 점이다. 따라서 운영체제에 의해서 세부적으로 통제되지 못한 메모리 영역은 C 언어를 통해서 읽기·쓰기·수행이 가능해 진다. C 언어의 포맷스트링은 이러한 C 언어의 특성에 따라 임의의 메모리를 접근할 수 있는 통로 역할을 할 수 있고, 따라서 프로그램 보안침해 수단으로 악용될 수 있다. 본 논문에서는 이러한 C 언어의 포맷스트링이 프로그램 보안침해에 적용되는 과정을 심층적으로 규명한 후, 지금까지 알려진 보편적인 수법보다 더욱 위협적인 단계적 지속적 바이러스 형태의 새로운 침해수법 가능성을 실증적 시나리오와 함께 증명함으로써 포맷스트링의 위험성에 대한 경각성을 높이고 대응방안 모색에 기여하고자 한다.

  • PDF