• Title/Summary/Keyword: Security Frame Architecture

Search Result 11, Processing Time 0.02 seconds

Design of Integrated Security Framework for Open Wireless Networking Architecture (개방형 무선 통신망 구조를 위한 복합 보안 프레임워크 설계)

  • Kim, Jung Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.6
    • /
    • pp.1348-1353
    • /
    • 2013
  • The increasing demand of users for various wireless communication services has lead to the development with uniting co-existence of different and wireless networks. Each one of the these wireless networks has its own unique characteristics, as compared to other networks. An integrated security mechanism is one of the key issue in the open wireless network. To realize overall security mechanism in open wireless architecture, we should provide practical workable framework for the realization of the integrated security challenges. In this paper, we analysed integrated security platform and considerations based on the security concept.

A novel design method for improving collapse resistances of multi-story steel frames with unequal spans using steel braces

  • Zheng Tan;Wei-hui Zhong;Bao Meng;Shi-chao Duan;Hong-chen Wang;Xing-You Yao;Yu-hui Zheng
    • Steel and Composite Structures
    • /
    • v.47 no.2
    • /
    • pp.253-267
    • /
    • 2023
  • The bearing capacities resisted by the two-bay beams of multi-story planar frames with unequal spans under column removal scenarios differ considerably owing to the asymmetric stress on the left and right beams connected to the failed column and cause the potential for beams with larger span-to-depth ratios to be unable to exert effectively, which is disadvantageous for resisting the vertical load in unequal-span frame structures. To address this problem, the structural measure of adding braces to the weak bays of multi-story unequal-span frames was proposed, with the objective of achieving a coordinated stress state in two-bay beams with unequal spans, thereby improving the collapse resistance of unequal-span frame structures. Before conducting the numerical simulation, the modeling methods were verified by previous experimental results of two multi-story planar frames with and without steel braces. Thereafter, the effects of the tensile and compressive braces on the collapse behavior of the frame structures were elucidated. Then, based on the mechanical action laws of the braces throughout the collapse process, a detailed design method for improving the collapse resistance of unequal-span frame structures was proposed. Finally, the proposed design method was verified by using sufficient example models, and the results demonstrated that the design method has good application prospects and high practical value.

Difference analysis of the collapse behaviors of the single-story beam-column assembly and multi-story planar frame

  • Zheng Tan;Wei-Hui Zhong;Bao Meng;Xing-You Yao;Yu-Hui Zheng;Yao Gao;Shi-Chao Duan
    • Steel and Composite Structures
    • /
    • v.50 no.3
    • /
    • pp.265-280
    • /
    • 2024
  • The collapse behavior observed in single-story beam-column assembly (SSBCA) do not accurately represent the actual overall stress characteristic of multi-story frame structure (MSFS) under column loss scenario owing to ignoring the interaction action among different stories, leading to a disconnection between the anti-collapse behaviors of "components" and "overall structures", that is, the anti-collapse performance of frame structures with two different structural scales has not yet formed a combined force. This paper conducts a numerical and theoretical study to explore the difference of the collapse behaviors of the SSBCA and MSFS, and further to reveal the internal force relationships and boundary constraints at beam ends of models SSBCA and MSFS. Based on the previous experimental tests, the corresponding refined numerical simulation models were established and verified, and comparative analysis on the resistant-collapse performance was carried out, based on the validated modeling methods with considering the actual boundary constraints, and the results illustrates that the collapse behaviors of the SSBCA and MSFS is not a simple multiple relationship. Through numerical simulation and theoretical analysis, the development laws of internal force in each story beam under different boundary constraints was clarified, and the coupling relationship between the bending moment at the most unfavorable section and axial force in the composite beam of different stories of multi story frames with weld cover-plated flange connections was obtained. In addition, considering the effect of the yield performance of adjacent columns on the anti-collapse bearing capacities of the SSBCA and MSFS during the large deformation stages, the calculation formula for the equivalent axial stiffness at the beam ends of each story were provided.

A Finite field multiplying unit using Mastrovito's arhitecture

  • Moon, San-Gook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.925-927
    • /
    • 2005
  • The study is about a finite field multiplying unit, which performs a calculation t-times as fast as the Mastrovito's multiplier architecture, suggesting and using the 2-times faster multiplier architecture. Former studies on finite field multiplication architecture includes the serial multiplication architecture, the array multiplication architecture, and the hybrid finite field multiplication architecture. Mastrovito's serial multiplication architecture has been regarded as the basic architecture for the finite field multiplication, and in order to exploit parallelism, as much resources were expensed to get as much speed in the finite field array multipliers. The array multiplication architecture has weakness in terms of area/performance ratio. In 1999, Parr has proposed the hybrid multipcliation architecture adopting benefits from both architectures. In the hybrid multiplication architecture, the main hardware frame is based on the Mastrovito's serial multiplication architecture with smaller 2-dimensional array multipliers as processing elements, so that its calculation speed is fairly fast costing intermediate resources. However, as the order of the finite field, complex integers instead of prime integers should be used, which means it cannot be used in the high-security applications. In this paper, we propose a different approach to devise a finite field multiplication architecture using Mastrovito's concepts.

  • PDF

Intelligent Monitoring System for Solitary Senior Citizens with Vision-Based Security Architecture (영상보안 구조 기반의 지능형 독거노인 모니터링 시스템)

  • Kim, Soohee;Jeong, Youngwoo;Jeong, Yue Ri;Lee, Seung Eun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.639-641
    • /
    • 2022
  • With the increasing of aging population, a lot of researches on monitoring systems for solitary senior citizens are under study. In general, a monitoring system provides a monitoring service by computing the information of vision, sensors, and measurement values on a server. Design considering data security is essential because a risk of data leakage exists in the structure of the system employing the server. In this paper, we propose a intelligent monitoring system for solitary senior citizens with vision-based security architecture. The proposed system protects privacy by ensuring high security through an architecture that blocks communication between a camera module and a server by employing an edge AI module. The edge AI module was designed with Verilog HDL and verified by implementing on a Field Programmable Gate Array (FPGA). We tested our proposed system on 5,144 frame data and demonstrated that a dangerous detection signal is generated correctly when human motion is not detected for a certain period.

  • PDF

Design and Implementation of Security Frame work for Application Server with Components

  • 김행곤;강전근
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.4
    • /
    • pp.531-540
    • /
    • 2004
  • Development of Web service application requires the interoperability between various heterogeneous systems, extensibility to allow modification of business environment not of user interface, maintainability, flexibility and reusability As the properties of CBD (Component Based Development) have gradually become clear, attention has started to turn the smooth technology and methodology to solve the existing problems and issues the dynamic responds for the distributed web environments. In this paper, we identify some of the major architectural affecting CBD and describe the Design and Implementation of Security Framework for Application Server with Components. We identify the candidate components, model it using UML and layer it on the architecture. The frameworks will Provide the various security functions, such as incorporating with legacy security systems, supporting of J2EE, JAAS and Kerberos and assisting in increasing the tailorability of component.

  • PDF

A Study on the Design and the Performance Improvement of IP Access Control Protocol for External Mobile terminal (외부 이동단말의 접근제어를 위한 IP 프로토콜 설계 및 성능 개선에 관한 연구)

  • 박대우
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.2
    • /
    • pp.41-48
    • /
    • 2004
  • Access control protocol have verified security of external mobile terminal that access to inner information sever at Ubiquitous ages. In this paper, I would design for If Access Control Protocol of considering operation time when make cipher digital signature. Public key are used Individual identification number that issued from certify communication company, and cipher algorithm are used ECDSA definition factor for generation and verification of digital signature and it used Elliptic Curve with over 160 bit Key. Also, Access control operate on If level that designed IPv6 frame architecture. I would conclude that IP Access Control Protocol have verified security and improved performance in operation time more 4 times than before protocols when through the communication of use cipher digital signature for authentication and verification.

  • PDF

A Study on the Design and the Performance Improvement of TCP User Authentication ECC Algorithm Protocol for Mobile terminal (이동단말을 위한 TCP 사용자 인증 타원곡선 알고리즘 프로토콜의 설계 및 성능 개선에 관한 연구)

  • 임승린;박대우
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.2
    • /
    • pp.7-17
    • /
    • 2004
  • It requires that user have to verify and conform with user authentication Protocol on non-meet face to face internet services offered by mobile terminal which user make known user's own intention, and user be using the normal. It is more operation time authentication protocol than Access control Protocol. That is what need to be user authentication protocol have verified security. non-reputation, and improved high-performance in operation time for mobile terminal. In order to solve the above demand, in this paper, we would design for mobile terminal of TCP User Authentication ECC Algorithm Protocol with a performance test. Algorithm has 160 bit key and designed IPv4 & IPv6 frame architecture. We should conclude that the proposed protocol have more verified security, non-reputation, confidentiality, and improved high-performance in operation time of mobile terminal from 1 to 17 times than before.

  • PDF

Visible Light Communication Method for Personalized and Localized Building Energy Management

  • Jeong, Jin-Doo;Lim, Sang-Kyu;Han, Jinsoo;Park, Wan-Ki;Lee, Il-Woo;Chong, Jong-Wha
    • ETRI Journal
    • /
    • v.38 no.4
    • /
    • pp.735-745
    • /
    • 2016
  • The Paris agreement at the 21st Conference of the Parties (COP21) emphasizes the reduction of greenhouse gas emissions and increase in energy consumption in all areas. Thus, an important aspect is energy saving in buildings where the lighting is a major component of the electrical energy consumption. This paper proposes a building energy management system employing visible light communication (VLC) based on LED lighting. The proposed management system has key characteristics including personalization and localization by utilizing such VLC advantages as secure communication through light and location-information transmission. Considering the efficient implementation of an energy-consumption adjustment using LED luminaires, this paper adopts variable pulse position modulation (VPPM) as a VLC modulation scheme with simple controllability of the dimming level that is capable of providing a full dimming range. This paper analyzes the VPPM performances according to variable dimming for several schemes, and proposes a VPPM demodulation architecture based on dimming-factor acquisition, which can obtain an improved performance compared to a 2PPM-based scheme. In addition, the effect of a dimming-factor acquisition error is analyzed, and a frame format for minimizing this error effect is proposed.

Implementation of RSA modular exponentiator using Division Chain (나눗셈 체인을 이용한 RSA 모듈로 멱승기의 구현)

  • 김성두;정용진
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.21-34
    • /
    • 2002
  • In this paper we propos a new hardware architecture of modular exponentiation using a division chain method which has been proposed in (2). Modular exponentiation using the division chain is performed by receding an exponent E as a mixed form of multiplication and addition with divisors d=2 or $d=2^I +1$ and respective remainders r. This calculates the modular exponentiation in about $1.4log_2$E multiplications on average which is much less iterations than $2log_2$E of conventional Binary Method. We designed a linear systolic array multiplier with pipelining and used a horizontal projection on its data dependence graph. So, for k-bit key, two k-bit data frames can be inputted simultaneously and two modular multipliers, each consisting of k/2+3 PE(Processing Element)s, can operate in parallel to accomplish 100% throughput. We propose a new encoding scheme to represent divisors and remainders of the division chain to keep regularity of the data path. When it is synthesized to ASIC using Samsung 0.5 um CMOS standard cell library, the critical path delay is 4.24ns, and resulting performance is estimated to be abort 140 Kbps for a 1024-bit data frame at 200Mhz clock In decryption process, the speed can be enhanced to 560kbps by using CRT(Chinese Remainder Theorem). Futhermore, to satisfy real time requirements we can choose small public exponent E, such as 3,17 or $2^{16} +1$, in encryption and verification process. in which case the performance can reach 7.3Mbps.