• 제목/요약/키워드: Security Constraint

검색결과 86건 처리시간 0.025초

디바이스 센싱 단계의 IoT 네트워크 보안 기술 프레임워크 구성 (A Study of Phase Sensing Device IoT Network Security Technology Framework Configuration)

  • 노시춘;김점구
    • 융합보안논문지
    • /
    • 제15권4호
    • /
    • pp.35-41
    • /
    • 2015
  • 사물인터넷은 정보보안 위협에 노출되는 취약성을 광범위하게 가지고 있다. 그러나 이에 대처할 기본적 보안솔루션인 백신이 없고 데이터 전송에 암호화를 하지 않는다. 안전한 무선 센서 네트워크 환경의 구축을 위하여 노드 간에 전송되는 메시지를 암호화 및 인증이 요구된다. 센서 네트워크의 제약 조건 및 보안 요구사항을 만족시키기 위하여, 센서 환경에 적합한 경량 암호 및 인증기술, 경량 키 관리 기술이 요구된다. 센서 네트워크 보안기술의 필수항목은 프라이버시 보호 기술 부 채널 공격 방지, 기술이다. 안전한 무선 센서 네트워크 환경의 구축을 위하여 노드 간에 전송되는 메시지를 암호화하고 인증하는 것이 중요하다. 네트워크상에 존재하는 노드들을 안전하게 탐지할 수 있도록 lightweight 침입 탐지 메커니즘 기능을 적용해야 한다. 사람이 관여하지 않는 센서 노드는 단말의 진위파악 인증 기술, 체계가 필요하다. 사물인터넷환경에서 네트워크 보안 기술은 단말기와 센서 간 커뮤니케이션 채널의 안전성을 강화하는 기술이 중심이 되어야 한다.

Fully secure non-monotonic access structure CP-ABE scheme

  • Yang, Dan;Wang, Baocang;Ban, Xuehua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권3호
    • /
    • pp.1315-1329
    • /
    • 2018
  • Ciphertext-policy attribute-based encryption (CP-ABE) associates ciphertext with access policies. Only when the user's attributes satisfy the ciphertext's policy, they can be capable to decrypt the ciphertext. Expressivity and security are the two directions for the research of CP-ABE. Most of the existing schemes only consider monotonic access structures are selectively secure, resulting in lower expressivity and lower security. Therefore, fully secure CP-ABE schemes with non-monotonic access structure are desired. In the existing fully secure non-monotonic access structure CP-ABE schemes, the attributes that are set is bounded and a one-use constraint is required by these projects on attributes, and efficiency will be lost. In this paper, to overcome the flaw referred to above, we propose a new fully secure non-monotonic access structure CP-ABE. Our proposition enforces no constraints on the scale of the attributes that are set and permits attributes' unrestricted utilization. Furthermore, the scheme's public parameters are composed of a constant number of group elements. We further compare the performance of our scheme with former non-monotonic access structure ABE schemes. It is shown that our scheme has relatively lower computation cost and stronger security.

Optimum Allocation of Reactive Power in Real-Time Operation under Deregulated Electricity Market

  • Rajabzadeh, Mahdi;Golkar, Masoud A.
    • Journal of Electrical Engineering and Technology
    • /
    • 제4권3호
    • /
    • pp.337-345
    • /
    • 2009
  • Deregulation in power industry has made the reactive power ancillary service management a critical task to power system operators from both technical and economic perspectives. Reactive power management in power systems is a complex combinatorial optimization problem involving nonlinear functions with multiple local minima and nonlinear constraints. This paper proposes a practical market-based reactive power ancillary service management scheme to tackle the challenge. In this paper a new model for voltage security and reactive power management is presented. The proposed model minimizes reactive support cost as an economic aspect and insures the voltage security as a technical constraint. For modeling validation study, two optimization algorithm, a genetic algorithm (GA) and particle swarm optimization (PSO) method are used to solve the problem of optimum allocation of reactive power in power systems under open market environment and the results are compared. As a case study, the IEEE-30 bus power system is used. Results show that the algorithm is well competent for optimal allocation of reactive power under practical constraints and price based conditions.

적시적정공급을 위한 물자확보수준결정에 관한 연구 (A Study on the Determination of Material Security Level for Just in Time Supply)

  • 최정상
    • 산업경영시스템학회지
    • /
    • 제16권27호
    • /
    • pp.35-42
    • /
    • 1993
  • Just in time backup of the essential materials at industry and military is very important. Especially in case of military essential materials at wartime is so important as it controls victory and/or defeat. This paper presents the new approach for just in time suppling the essential materials at the beginning wartime - security step of materials, reservation priority and quantity requirement degree. In order to build the new approach, we introduced the concepts of cost and effect analysis for each essential item. First of all, the developed model will be useful to maximize combat sustaning power under constraint of budget.

  • PDF

민감도 분석을 이용한 소프트웨어 최적방출시기에 관한 연구 (The Study of Software Optimal Release Using Sensitivity Analysis)

  • 신현철
    • 융합보안논문지
    • /
    • 제8권4호
    • /
    • pp.121-126
    • /
    • 2008
  • 소프트웨어 제품을 개발하여 테스팅을 거친 후 사용자에게 인도하는 시기를 결정하는 일은 아주 실제적이고 흥미 있는 일이 된다. 이러한 문제를 소프트웨어 최적 방출시기라고 한다. 본 연구에서는 이러한 방출문제에 대하여 연구되었다. 수명분포는 감마족 분포에서 대표적인 어랑 문포 모형을 이용한 최적 방출시기에 관한 문제를 다루었다. 소프트웨어 요구 신뢰도를 만족시키고 소프트웨어 개발 및 유지 총비용을 최소화 시키는 최적 소프트웨어 방출 정책에 대하여 논의 되었고 민감도 분석을 이용하여 효율적 최적 방출시기가 논의되었다.

  • PDF

Survey on Sustainable Smart Cities Development: Challenges and Solutions

  • Alotaibi, Youseef
    • International Journal of Computer Science & Network Security
    • /
    • 제21권7호
    • /
    • pp.108-118
    • /
    • 2021
  • This paper aims to presents the overview of research in the sustainable smart cities development domain. It investigates the key challenges of the sustainable smart cities development that faced by the developers from different countries. The qualitative research method via the interview is conducted to collect the data. 10 experts on the sustainable smart cities development project were interviewed in this study. The results indicate that there are 12 sustainable smart cities development challenges named: (1) budgetary constraint; (2) lack of resources; (3) lack of institutional capacity to deliver technology; (4) lack of systems integration; (5) social acceptability; (6) lack of awareness level in the smart city development among residents; (7) the need to drive towards content development; (8) lack of strategically approach in the smart city transformation; (9) disagreement on standardizing the smart city model; (10) lack of overarching institution to create the governance structure; (11) lack of sustainable focused strategies; and (12) lack of the smart city operational framework. Furthermore, the solutions framework for these challenges was proposed as the guidelines to overcome or minimize them.

Power Consumption Analysis for Security attack in TPM

  • Kennedy, Grace;Cho, Dong-Sub
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2011년도 춘계학술발표대회
    • /
    • pp.917-919
    • /
    • 2011
  • Recently, most network communication chips are powered; which causes power consumption a heavily constraint. Since, there are a lot of expectations on TPM to have a high performance in terms of authentication of its device. During the design process there is a need to estimate the security of the design but it always when the chip has already been manufactured. This paper designed a power consumption control monitor in TPM device which evaluate the voltage drop during processing of use. Therefore we will analyze the power consumption profile. The result shows that the voltage drop leads to vulnerability of the system to attackers during communication process.

Security-reliability Analysis for a Cognitive Multi-hop Protocol in Cluster Networks with Hardware Imperfections

  • Tin, Phu Tran;Nam, Pham Minh;Duy, Tran Trung;Voznak, Miroslav
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제6권3호
    • /
    • pp.200-209
    • /
    • 2017
  • In this paper, we investigate the tradeoff between security and reliability for a multi-hop protocol in cluster-based underlay cognitive radio networks. In the proposed protocol, a secondary source communicates with a secondary destination via the multi-hop relay method in the presence of a secondary eavesdropper. To enhance system performance under the joint impact of interference constraint required by multiple primary users and hardware impairments, the best relay node is selected at each hop to relay the source data to the destination. Moreover, the destination is equipped with multiple antennas and employs a selection combining (SC) technique to combine the received data. We derive closed-form expressions of the intercept probability (IP) for the eavesdropping links and the outage probability (OP) for the data links over a Rayleigh fading channel. Finally, the correction of our derivations is verified by Monte-Carlo simulations.

Security Cost Analysis with Linear Ramp Model using Contingency Constrained Optimal Power Flow

  • Lyu, Jae-kun;Kim, Mun-Kyeom;Park, Jong-Keun
    • Journal of Electrical Engineering and Technology
    • /
    • 제4권3호
    • /
    • pp.353-359
    • /
    • 2009
  • This paper proposes a novel technique for calculating the security costs that properly includes ramping constraints in the operation of a deregulated power system. The ramping process is modeled by a piecewise linear function with certain assumptions. During this process, a ramping cost is incurred if the permissible limits are exceeded. The optimal production costs of the power producers are calculated with the ramping cost included, considering a time horizon with N-1 contingency cases using contingency constrained optimal power flow (CCOPF), which is solved by the primal-dual interior point method (PDIPM). A contingency analysis is also performed taking into account the severity index of transmission line outages and its sensitivity analysis. The results from an illustrative case study based on the IEEE 30-bus system are analyzed. One attractive feature of the proposed approach is that an optimal solution is more realistic than the conventional approach because it satisfies physical constraints, such as the ramping constraint.

최적전력조류 해석을 위한 원도우프로그램 팩키지 개발 (Windows Program Package Development for Optimal Pourer Flour Analysis)

  • 김규호;이상봉;이재규;유석구
    • 대한전기학회논문지:전력기술부문A
    • /
    • 제50권12호
    • /
    • pp.584-590
    • /
    • 2001
  • This paper presents a windows program package for solving security constrained OPF in interconnected Power systems, which is based on the combined application of evolutionary programming(EP) and sequential quadratic programming(SQP). The objective functions are the minimization of generation fuel costs and system power losses. The control variables are the active power of the generating units, the voltage magnitude of the generator, transformer tap settings and SYC setting. The state variables are the bus voltage magnitude, the reactive power of the generating unit, line flows and the tie line flow In OPF considering security, the outages are selected by contingency ranking method. The resulting optimal operating point has to be feasible after outages such as any single line outage(respect of voltage magnitude, reactive power generation and power flow limits). The OPF package proposed is applied to IEEE 14 buses and 10 machines 39 buses model system.

  • PDF