• Title/Summary/Keyword: Security Architecture

Search Result 1,092, Processing Time 0.023 seconds

Steep Slope Management System integrated with Realtime Monitoring Information into 3D Web GIS (상시계측센서정보와 3차원 Web GIS를 융합한 급경사지관리시스템)

  • Chung, Dong Ki;Sung, Jae Ryeol;Lee, Dong Wook;Chang, Ki Tae;Lee, Jin Duk
    • Journal of Korean Society of Disaster and Security
    • /
    • v.6 no.3
    • /
    • pp.9-17
    • /
    • 2013
  • Geospatial information data came recently in use to build the location-based service in various fields. These data were shown via a 2-D map in the past but now can be viewed as a 3-D map due to the dramatic evolution of IT technology, thus improving efficiency and raising practicality to a greater extent by providing a more realistic visualization of the field. In addition, many previous GIS applications have been provided under desktop environment, limiting access from remote sites and reducing its approachability for less experienced users. The latest trend offers service with web-based environment, providing efficient sharing of data to all users, both unknown and specific internal users. Therefore, real-time information sensors that have been installed on steep slopes are to be integrated with 3-D geospatial information in this study. It is also to be developed with web-based environment to improve usage and access. There are three steps taken to establish this system: firstly, a 3-D GIS database and 3-D terrain with higher resolution aerial photos and DEM (Digital Elevation Model) have been built; secondly, a system architecture was proposed to integrate real-time sensor information data with 3D Web-based GIS; thirdly, the system has been constructed for Gangwon Province as a test bed to verify the applicability.

The Actual Condition investigation of Residental Environment of Urban Life-Type Housing Regarding Crime Prevention Through Environmental Design -Focused on Five Single Households in studio-type housings in Gwanak-gu, Seoul Urban Life-Type Housing- (도시형생활주택의 범죄예방환경설계 측면에서 본 주거환경 실태조사에 관한 연구 - 서울시 관악구 원룸형 주택 1인가구 5개를 중심으로-)

  • Jung, Yoon-Hye;Lee, You-Mi;Lee, Youn-Jae
    • KIEAE Journal
    • /
    • v.16 no.6
    • /
    • pp.39-50
    • /
    • 2016
  • Purpose: The purpose of this study is to be performed with studio-type housings among urban life-type housings to investigate the physical characteristic and crime-related factors of studios from the viewpoint of the basic principles of crime prevention through environmental design (CPTED). Method: Eight CPTED guidelines available in Korea were reviewed to select 20 planing factors for actual condition investigation. Five single households in studio-type housings in Gwanak-gu, Seoul, were chosen according to the subject screening criteria to perform the actual condition investigation. Results: First, a lighting plan around a building for natural surveillance should consider the building location, relation with the front road, and surrounding facilities. In a building of a piloti structure, the parking lot and the building gate should be arranged in a manner that enables natural surveillance. Second, the shape of the corridors in studio-type housings should be considered to plan the installation of a lighting at the door of each household, the installation of a viewer window at the door of each household, and the arrangement of the elevator. Third, to support access control, an access control system having the function of video and voice communication is recommended to be installed at the building gate. Criteria for the type of security windows and the floors on which security windows should be installed, and the regulations about the CCTV installation inside and outside the building should be prepared. Fourth, to enhance territoriality in parking lots, ground patterns, parking lot gate, and signs may be installed. Fifth, in view of effective utilization and maintenance, lighting facilities should be installed to increase the usability of ground parking lots, and relevant installation criteria should be prepared regarding the type, number, and brightness of the lightings.

Hybrid Authentication Scheme for Mobile Multi-hop Relay in IEEE 802.16j (IEEE 802.16j기반의 모바일 멀티 홉 릴레이에서의 혼합형 인증 기법에 대한 연구)

  • Lee, Yong;Lee, Goo-Yeon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.10
    • /
    • pp.127-136
    • /
    • 2007
  • It is easy to install and maintain a mobile multi-hop wireless network due to its self-organizing characteristics. However it has security weakness of the authentication of mobile multi-hop relay stations. Specially, the mobile multi-hop relay network in the IEEE 802.16j has the additional security weakness caused by the requirement of backward compatibility for mobile stations of the conventional IEEE 802.16 system. In this paper, we propose a novel mutual authentication scheme applicable to IEEE 802.16j-based mobile multi-hop relay network architecture. The scheme is able to resolve the initial trust gain problem of a multi-hop node at its entry to the network, the problem of rogue mobile multi-hop node and the problem of hop-by-hop authentication between multi-hop nodes. Effectively, the scheme is a hybrid scheme of the distributed authentication method and the centralized authentication method which have been considered to be deployed in the wireless ad-hoc network and the wireless network connected to wired authentication servers, respectively. Also, we analyze the effectiveness of the proposed hybrid authentication method.

IAM Architecture and Access Token Transmission Protocol in Inter-Cloud Environment (Inter-Cloud 환경에서의 IAM 구조 및 액세스 토큰 전송 프로토콜)

  • Kim, Jinouk;Park, Jungsoo;Yoon, Kwonjin;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.573-586
    • /
    • 2016
  • With the adoption of cloud computing, the number of companies that take advantage of cloud computing has increased. Additionally, various of existing service providers have moved their service onto the cloud and provided user with various cloud-based service. The management of user authentication and authorization in cloud-based service technology has become an important issue. This paper introduce a new technique for providing authentication and authorization with other inter-cloud IAM (Identity and Access Management). It is an essential and easy method for data sharing and communication between other cloud users. The proposed system uses the credentials of a user that has already joined an organization who would like to use other cloud services. When users of a cloud provider try to obtain access to the data of another cloud provider, part of credentials from IAM server will be forwarded to the cloud provider. Before the transaction, Access Agreement must be set for granting access to the resource of other Organization. a user can access the resource of other organization based on the control access configuration of the system. Using the above method, we could provide an effective and secure authentication system on the cloud.

Optimization of Agri-Food Supply Chain in a Sustainable Way Using Simulation Modeling

  • Vostriakova, Viktorija;Kononova, Oleksandra;Kravchenko, Sergey;Ruzhytskyi, Andriy;Sereda, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.245-256
    • /
    • 2021
  • Poor logistical infrastructure and agri-food supply chain management leads to significant food waste in logistic system. The concept of the sustainable value added agri-food chains requires defined approach to the analysis of the existing situation, possible improving strategies and also assessment of these changes impact on further development. The purpose of research is to provide scientific substantiation of theoretical and methodological principles and develop practical recommendations for the improvement of the agri-food logistics distribution system. A case study methodology is used in this article. The research framework is based on 4 steps: Value Stream Mapping (VSM), Gap and Process Analysis, Validation and Improvement Areas Definition and Imitation Modelling. This paper presents the appropriateness of LEAN logistics tools using, in particular, Value Stream Mapping (VSM) for minimizing logistic losses and Simulation Modeling of possible logistics distribution system improvement results. The algorithm of VSM analysis of the agri-food supply chain, which involves its optimization by implementing the principles of sustainable development at each stage, is proposed. The methodical approach to the analysis of possible ways for optimizing the operation of the logistics system of the agri-food distribution is developed. It involves the application of Value Stream Mapping, i.e. designing of stream maps of the creation of the added value in the agri-food supply chain for the current and future state based on the minimization of logistic losses. Simulation modeling of the investment project on time optimization in the agri-food supply chain and economic effect of proposed improvements in logistics product distribution system functioning at the level of the investigated agricultural enterprise has been determined. Improvement of logistics planning and coordination of operations in the supply chain and the innovative pre-cooling system proposed to be introduced have a 3-year payback period and almost 75-80% probability. Based on the conducted VSM analysis of losses in the agri-food supply chain, there have been determined the main points, where it is advisable to conduct optimization changes for the achievement of positive results and the significant economic effect from the proposed measures has been confirmed. In further studies, it is recommended to focus on identifying the synergistic effect of the agri-food supply chain optimization on the basis of sustainable development.

A Study on Reduction Effect of White Smoke Fog in Urban Detention Basin using a Fog Removal System (안개제거장치를 이용한 도심 저류지 시설에서의 안개 저감 효과 연구)

  • Lee, Kyu Hong;Lee, Sang Woo;Choi, Jun Sung;Lee, Sung Kyun;Park, Jihwan;Park, Seunghee
    • Journal of Korean Society of Disaster and Security
    • /
    • v.11 no.2
    • /
    • pp.69-74
    • /
    • 2018
  • Fog to which environmental impacts are sensitive has a danger to the safety of citizens due to the difficulty in predicting the specific area/time zone. Therefore, we propose a white smoke fog reduction technique using a fog removal device that can remove fog particles directly through dry air and anionic condensation nucleus instead of conventional passive countermeasures. In this study, to verify the effect of reducing fog and the effect of temperature on the white smoke fog which is frequently occurred in the detention basin. As a result, the visible distance of 100m or more was secured within 30 seconds, and it was confirmed that the fog reduction effect is more effective. Also, the lower the temperature, the larger the amount of white smoke fog was. However, the effect of reducing the white smoke fog by temperature was insignificant. Through this experiment, it was possible to verify the reduction effect of the white smoke fog generated in the detention basin through fog removal device.

Seismic Risk Assessment on Buried Electric Power Tunnels with the Use of Liquefaction Hazard Map in Metropolitan Areas (액상화 재해지도를 이용한 수도권 전력구 매설지반의 지진시 위험도 평가)

  • Baek, Woohyun;Choi, Jaesoon
    • Journal of Korean Society of Disaster and Security
    • /
    • v.12 no.1
    • /
    • pp.45-56
    • /
    • 2019
  • In this study, the seismic risk has been evaluated by setting the bedrock acceleration to 0.154g which, was taking into consideration that the earthquake return period for the buried electric power tunnels in the metropolitan area to be 1,000 years. In this case, the risk assessment during the earthquake was carried out in three stages. In the first stage, the site classification was performed based on the site investigation data of the target area. Then, the LPI(Liquefaction Potential Index) was applied using the site amplification factor. After, candidates were selected using a hazard map. In the second stage, risk assessment analysis of seismic response are evaluated thoroughly after the recalculation of the LPI based on the site characteristics from the boring logs around the electric power area that are highly probable to be liquefied in the first stage. The third Stage visited the electric power tunnels that are highly probable of liquefaction in the second stage to compensate for the limitations based on the borehole data. At this time, the risk of liquefaction was finally evaluated based off of the reinforcement method used at the time of construction, the application of seismic design, and the condition of the site.

High Performance Hardware Implementation of the 128-bit SEED Cryptography Algorithm (128비트 SEED 암호 알고리즘의 고속처리를 위한 하드웨어 구현)

  • 전신우;정용진
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.1
    • /
    • pp.13-23
    • /
    • 2001
  • This paper implemented into hardware SEED which is the KOREA standard 128-bit block cipher. First, at the respect of hardware implementation, we compared and analyzed SEED with AES finalist algorithms - MARS, RC6, RIJNDAEL, SERPENT, TWOFISH, which are secret key block encryption algorithms. The encryption of SEED is faster than MARS, RC6, TWOFISH, but is as five times slow as RIJNDAEL which is the fastest. We propose a SEED hardware architecture which improves the encryption speed. We divided one round into three parts, J1 function block, J2 function block J3 function block including key mixing block, because SEED repeatedly executes the same operation 16 times, then we pipelined one round into three parts, J1 function block, J2 function block, J3 function block including key mixing block, because SEED repeatedly executes the same operation 16 times, then we pipelined it to make it more faster. G-function is implemented more easily by xoring four extended 4 byte SS-boxes. We tested it using ALTERA FPGA with Verilog HDL. If the design is synthesized with 0.5 um Samsung standard cell library, encryption of ECB and decryption of ECB, CBC, CFB, which can be pipelined would take 50 clock cycles to encrypt 384-bit plaintext, and hence we have 745.6 Mbps assuming 97.1 MHz clock frequency. Encryption of CBC, OFB, CFB and decryption of OFB, which cannot be pipelined have 258.9 Mbps under same condition.

Fast RSA Montgomery Multiplier and Its Hardware Architecture (고속 RSA 하드웨어 곱셈 연산과 하드웨어 구조)

  • Chang, Nam-Su;Lim, Dae-Sung;Ji, Sung-Yeon;Yoon, Suk-Bong;Kim, Chang-Han
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.11-20
    • /
    • 2007
  • A fast Montgomery multiplication occupies important to the design of RSA cryptosystem. Montgomery multiplication consists of two addition, which calculates using CSA or RBA. In terms of CSA, the multiplier is implemented using 4-2 CSA o. 5-2 CSA. In terms of RBA, the multiplier is designed based on redundant binary system. In [1], A new redundant binary adder that performs the addition between two binary signed-digit numbers and apply to Montgomery multiplier was proposed. In this paper, we reconstruct the logic structure of the RBA in [1] for reducing time and space complexity. Especially, the proposed RB multiplier has no coupler like the RBA in [1]. And the proposed RB multiplier is suited to binary exponentiation as modified input and output forms. We simulate to the proposed NRBA using gates provided from SAMSUNG STD130 $0.18{\mu}m$ 1.8V CMOS Standard Cell Library. The result is smaller by 18.5%, 6.3% and faster by 25.24%, 14% than 4-2 CSA, existing RBA, respectively. And Especially, the result is smaller by 44.3% and faster by 2.8% than the RBA in [1].

Implementation of High-radix Modular Exponentiator for RSA using CRT (CRT를 이용한 하이래딕스 RSA 모듈로 멱승 처리기의 구현)

  • 이석용;김성두;정용진
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.4
    • /
    • pp.81-93
    • /
    • 2000
  • In a methodological approach to improve the processing performance of modulo exponentiation which is the primary arithmetic in RSA crypto algorithm, we present a new RSA hardware architecture based on high-radix modulo multiplication and CRT(Chinese Remainder Theorem). By implementing the modulo multiplier using radix-16 arithmetic, we reduced the number of PE(Processing Element)s by quarter comparing to the binary arithmetic scheme. This leads to having the number of clock cycles and the delay of pipelining flip-flops be reduced by quarter respectively. Because the receiver knows p and q, factors of N, it is possible to apply the CRT to the decryption process. To use CRT, we made two s/2-bit multipliers operating in parallel at decryption, which accomplished 4 times faster performance than when not using the CRT. In encryption phase, the two s/2-bit multipliers can be connected to make a s-bit linear multiplier for the s-bit arithmetic operation. We limited the encryption exponent size up to 17-bit to maintain high speed, We implemented a linear array modulo multiplier by projecting horizontally the DG of Montgomery algorithm. The H/W proposed here performs encryption with 15Mbps bit-rate and decryption with 1.22Mbps, when estimated with reference to Samsung 0.5um CMOS Standard Cell Library, which is the fastest among the publications at present.