• Title/Summary/Keyword: Secure area

Search Result 946, Processing Time 0.027 seconds

SPSF : Smart Plant Safety Framework based on Reliable-Secure USN (차세대 USN기반의 스마트 플랜트안전 프레임워크 개발)

  • Jung, Ji-Eun;Song, Byung-Hun;Lee, Hyung-Su
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.9 no.3
    • /
    • pp.102-106
    • /
    • 2010
  • Recently process industries from oil and gas procedures and mining companies to manufactures of chemicals, foods, and beverages has been exploring the USN (Ubiquitous Sensor Networks) technology to improve safety of production processes. However, to apply the USN technology in the large-scale plant industry, reliability and security issues are not fully addressed yet, and the absence of the industrial sensor networking standard causes a compatibility problem with legacy equipment and systems. Although this situation, process industry such as energy plants are looking for the secure wireless plant solution to provide detailed, accurate safety monitoring from previously hard-reach, unaccordable area. In this paper, SPSF (Smart Plant Safety Framework based on Reliable-Secure USN) is suggested to fulfill the requirements of high-risk industrial environments for highly secure, reliable data collection and plant monitoring that is resistant to interference. The SPSF consists of three main layers: 1) Smart Safety Sensing Layer, 2) Smart Safety Network Layers, 3) Plant Network System Layer.

  • PDF

Synchronization and Secure Communication Application of Chaos Based Malasoma System (카오스 기반 Malasoma 시스템의 동기화 및 보안 통신 응용)

  • Jang, Eun-Young
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.5
    • /
    • pp.747-754
    • /
    • 2017
  • Chaos-based secure communication systems are alternative of standard spread-spectrum systems that enable spreading the spectrum of the information signals and encrypting information signals with simple and inexpensive chaotic circuitry. In secure communication area, like Lorenz, Chua, Rossler, Duffing etc, classical systems are widely used. Malasoma chaotic system is topologically simple but their dynamical behaviors are non-linear synchronization and secure communication applications has not seen in paper. This paper aims for introducing a new chaotic system which is able to use as alternative to classical chaotic systems into secure communication fields. In addition, this new model simulates a synchronous communication system using P-C (Pecora-Carroll) method by verifying security with chaos signal through simulation. Modelling, synchronization and secure communication applications of Malasoma are realized respectively in MATLAB-Simulink environment. Retrieved results show that this novel chaotic system is able to use in secure communication fields.

A Study on Providing Secure Storage and User Authentication Using MTM on Mobile Platform (모바일 플랫폼에서 MTM을 이용한 보안영역 제공 및 인증에 관한 연구)

  • Lee, Sun-Ho;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.18C no.5
    • /
    • pp.293-302
    • /
    • 2011
  • The various information services can be delivered by smartphone through advanced high-speed mobile communication. A smartphone is a mobile device that offers more powerful computing capacity than feature phone. Therefore this device can provide such as web surfing, editing documents, playing video, and playing games. A lot of personal information stored on smartphone. Because it has High usability. Personal information Leaks if the smart phone is lost or stolen may become a big problem. In this paper we have analyzed existing method for providing secure storage and user authentication on mobile platform and derived security requirement. Therefore we propose the following scheme that satisfy security requirement. Proposed scheme providing secure storage with preventing authentication bypass, and availability from damaged data to access secure area.

A Comparative Study on the Librarian and Users' Perception of the Specialized Library Operation

  • Noh, Younghee;Kwak, Woojung;Shin, Youngji
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.9 no.4
    • /
    • pp.69-93
    • /
    • 2019
  • The purpose of this study is to investigate the status of specialized services and the overall satisfaction of the operation of the specialized services for the librarians and users of the specialized libraries, and based on the ISA method, compare the specialized theme data, specialized service place, specialized program, specialized theme area facilities and environment, and derive issues of the specialized library operation and improvement measures. Consequently, first, when developing the program, the specialized library needs to develop programs in possession of unique characteristics specific to the areas of the differentiated themes from the cultural and educational programs run by the existing libraries. Second, it is necessary to focus on the specialized theme area information services for the users, and to this end, it is necessary to improve librarians 'professionalism. Third, it is necessary to secure the budget for the specialized services and secure space. Since the scope of the services which may be provided as per the budget intended for providing specialized services may be limited, it would be necessary to secure and operate the budget systematic to this end. Fourth, the specialized library needs to proceed with activities in connection with local residents for the purposes of facilitating specialized services.

Low area field-programmable gate array implementation of PRESENT image encryption with key rotation and substitution

  • Parikibandla, Srikanth;Alluri, Sreenivas
    • ETRI Journal
    • /
    • v.43 no.6
    • /
    • pp.1113-1129
    • /
    • 2021
  • Lightweight ciphers are increasingly employed in cryptography because of the high demand for secure data transmission in wireless sensor network, embedded devices, and Internet of Things. The PRESENT algorithm as an ultralightweight block cipher provides better solution for secure hardware cryptography with low power consumption and minimum resource. This study generates the key using key rotation and substitution method, which contains key rotation, key switching, and binary-coded decimal-based key generation used in image encryption. The key rotation and substitution-based PRESENT architecture is proposed to increase security level for data stream and randomness in cipher through providing high resistance to attacks. Lookup table is used to design the key scheduling module, thus reducing the area of architecture. Field-programmable gate array (FPGA) performances are evaluated for the proposed and conventional methods. In Virtex 6 device, the proposed key rotation and substitution PRESENT architecture occupied 72 lookup tables, 65 flip flops, and 35 slices which are comparably less to the existing architecture.

Evaluation of Tank Capacity of Rainwater Harvesting System to Secure Economic Feasibility and Sensitivity Analysis (경제성 확보를 위한 빗물이용시설의 규모 산정 및 민감도 분석)

  • Mun, Jung-Soo;Kim, Ha-Na;Park, Jong-Bin;Lee, Jung-Hun;Kim, Ree-Ho
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.26 no.2
    • /
    • pp.191-199
    • /
    • 2012
  • Rainwater harvesting systems (RWHS), one of measures for on site rainwater management, have been promoted by laws, regulations and guidelines and have been increased. However, more evaluation of economic feasibility on RWHS is still needed due to seasonal imbalance of rainfall and little experiences and analysis on design and operation of RWHS. In this study, we investigated tank capacity of RWHS to secure economic validity considering catchment area and water demand, which is affected by building scale. Moreover, sensitivity analysis was performed to examine the effect of design factors, cost items and increase rate of water service charge on economic feasibility. The BCR (benefit cost ratio) is proportional to the increase in tank capacity. It is increased steeply in small tank capacity due to the effect of cost and, since then, gently in middle and large tank capacity. In case of 0.05 in the rate of tank volume to catchment area and 0.005 in water demand to catchment area, BCR was over one from the tank capacity of 160 $m^{3}$ taking into account of private benefits and from the tank capacity of 100 $m^{3}$ taking into account of private and public benefits. Sensitivity analysis shows that increase of water demand can improve BCR values with little cost so that it is needed to extend application of rainwater use and select a proper range of design factor. Decrease of construction and maintenance cost reduced the tank volume to secure economic validity. Finally, increase rate of water service charge had considerable impact on economic feasibility.

Determination of the Optimal Location for Water Treatment Plants in the Decentralized Water Supply System (분산형 용수공급시스템 구축을 위한 정수처리시설 최적 위치 결정)

  • Chang, Dong-Eil;Ha, Keum-Ryul;Jun, Hwan-Don;Kim, Jeong-Hyun;Kang, Ki-Hoon
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.27 no.1
    • /
    • pp.1-10
    • /
    • 2013
  • Major issues in water supply service have changed from expansion of service area to improvement of service quality, i.e., water quality and safety, and early response to emergency situation. This change in the service concept triggers the perceptions of limitation with the current centralized water supply system and of necessities of decentralized (distributed) water supply system (DWSS), which can make up the limitations. DWSS can reduce the possibility of water supply outage by establishing multiple barriers such as emergency water supply system, and secure better water quality by locating treatment facilities neighboring consumers. On the other hand, fluctuation of water demand will be increased due to the reduced supply area, which makes difficult to promptly respond the fluctuating demand. In order to supplement this, hybrid water supply system was proposed, which combined DWSS with conventional water supply system using distributing reservoir to secure the stability of water supply. The Optimal connection point of DWSS to existing water supply network in urban area was determined by simulating a supply network using EPANET. Optimal location of decentralized water treatment plant (or connection point) is a nodal point where changes in pressure at other nodal points can be minimized. At the same time, the optimal point should be selected to minimize hydraulic retention time in supply network (water age) to secure proper water quality. In order to locate the point where these two criteria are satisfied optimally, Distance measure method, one of multi-criteria decision making was employed to integrate the two results having different dimensions. This methodology can be used as an efficient decision-support criterion for the location of treatment plant in decentralized water supply system.

An Enhanced Secure Health Data Transmission Protocol using Key Insulation in Remote Healthcare Monitoring System (원격 헬스케어 모니터링 시스템에서 키 격리기법을 이용한 개선된 건강정보 전송 보안 프로토콜)

  • Noh, Si-Wan;Park, Youngho;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.12
    • /
    • pp.1981-1991
    • /
    • 2016
  • In recent, the advancement of wearable devices and wireless body area networking technologies motivate researchers to pay attention to remote healthcare system for monitoring patients health and disease progression effectively. However, in order to implement a practical remote healthcare system, we must consider the security and privacy of patient's personal health information transmitted to healthcare servers through the network. Hence, in this paper, we propose a secure health data transmission protocol in remote healthcare monitoring system to protect patient's health information and prevent privacy from eavesdropping on the network. To achieve our security goals, we design an efficient secure protocol based on the identity-based cryptography with key evolution technique, and then confirm the superiority and the efficiency of the proposed protocol as compared with the existing protocol of Yang et al.

Design of Mutual Authentication and Grouping Protocol Based On Network Control Server Applicable to General Purpose (범용적으로 적용 가능한 네트워크제어서버 기반의 상호인증 및 그룹핑 프로토콜 설계)

  • Park, Jungoh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.4
    • /
    • pp.13-23
    • /
    • 2017
  • In order to protect personal information and important information (confidential information, sales information, user information, etc.) in the internal network, companies and organizations apply encryption to the Server-To-Server or Server-To-Client communication section, And are experiencing difficulties due to the increasing number of known attacks and intelligent security attacks. In order to apply the existing S / W encryption technology, it is necessary to modify the application. In the financial sector, "Comprehensive Measures to Prevent the Recurrence of Personal Information Leakage in the Domestic Financial Sector" has been issued, and standard guidelines for financial computing security have been laid out, and it is required to expand the whole area of encryption to the internal network. In addition, even in environments such as U-Health and Smart Grid, which are based on the Internet of Things (IoT) environment, which is increasingly used, security requirements for each collection gateway and secure transmission of the transmitted and received data The requirements of the secure channel for the use of the standard are specified in the standard. Therefore, in this paper, we propose a secure encryption algorithm through mutual authentication and grouping for each node through H / W based Network Control Server (NCS) applicable to internal system and IoT environment provided by enterprises and organizations. We propose a protocol design that can set the channel.

A Study on the Effect of Format String on Secure Programming in C Language (C언어에서 포맷 스트링이 프로그램 보안에 미치는 영향)

  • Lee, Hyung-Bong;Cha, Hong-Jun;Choi, Hyung-Jin
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.693-702
    • /
    • 2001
  • One of the major characteristics of C language is that it allows us to use pointer type variables to access any area of virtual address space. So, we can read/write/execute from/to virtual memory area not controlled delicately by operating system. We can access such memory area by using format string and it can be a vulnerability of C language from the point of secure programming. In this paper, we analyze in detail the process of security attack based on format string and then exploit a new virus style attack which is stepwise and durable with some actual scenarios to warn the severity of it, and grope for some preliminary responding actions.

  • PDF