• Title/Summary/Keyword: Security Integration

Search Result 447, Processing Time 0.036 seconds

Adaptive algorithm for optimal real-time pricing in cognitive radio enabled smart grid network

  • Das, Deepa;Rout, Deepak Kumar
    • ETRI Journal
    • /
    • v.42 no.4
    • /
    • pp.585-595
    • /
    • 2020
  • Integration of multiple communication technologies in a smart grid (SG) enables employing cognitive radio (CR) technology for improving reliability and security with low latency by adaptively and effectively allocating spectral resources. The versatile features of the CR enable the smart meter to select either the unlicensed or the licensed band for transmitting data to the utility company, thus reducing communication outage. Demand response management is regarded as the control unit of the SG that balances the load by regulating the real-time price that benefits both the utility company and consumers. In this study, joint allocation of the transmission power to the smart meter and consumer's demand is formulated as a two stage multi-armed bandit game in which the players select their optimal strategies noncooperatively without having any prior information about the media. Furthermore, based on historical rewards of the player, a real-time pricing adaptation method is proposed. The latter is validated through numerical results.

Novel Trusted Hierarchy Construction for RFID Sensor-Based MANETs Using ECCs

  • Kumar, Adarsh;Gopal, Krishna;Aggarwal, Alok
    • ETRI Journal
    • /
    • v.37 no.1
    • /
    • pp.186-196
    • /
    • 2015
  • In resource-constrained, low-cost, radio-frequency identification (RFID) sensor-based mobile ad hoc networks (MANETs), ensuring security without performance degradation is a major challenge. This paper introduces a novel combination of steps in lightweight protocol integration to provide a secure network for RFID sensor-based MANETs using error-correcting codes (ECCs). The proposed scheme chooses a quasi-cyclic ECC. Key pairs are generated using the ECC for establishing a secure message communication. Probability analysis shows that code-based identification; key generation; and authentication and trust management schemes protect the network from Sybil, eclipse, and de-synchronization attacks. A lightweight model for the proposed sequence of steps is designed and analyzed using an Alloy analyzer. Results show that selection processes with ten nodes and five subgroup controllers identify attacks in only a few milliseconds. Margrave policy analysis shows that there is no conflict among the roles of network members.

System Insecurity - Firewalls

  • Ryu, Youngtae
    • Proceedings of the Korea Association of Information Systems Conference
    • /
    • 2000.05a
    • /
    • pp.171-175
    • /
    • 2000
  • The firewall is normally an intermediate system between the secure internal networks and the less secure external networks. It is intended to keep corporate systems safe from intruders, hackers, and accidental entry into the corporate system. The primary types of firewalls are screening routers, proxy servers, and stateful inspectors. Encryption is another form of firewall protection which is being incorporated along with other firewall methods. Before choosing a firewall architecture, a company must have the right mind set about the threat. The future will see more integration of firewall technologies and the increased use of standards in the industry. It must also determine what are the possible consequences of a breach in security and then develop a system to counter the threat. Additionally, new firewall technologies will address the potential dangers associated with the use of Java applets and Active X-controls on the Internet.

  • PDF

A Study on the Authentication Mechanism for Wireless Mesh Network (무선 메쉬 네트워크를 위한 인증 메커니즘에 관한 연구)

  • Kim, Tae Kyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.3
    • /
    • pp.117-126
    • /
    • 2009
  • Wireless mesh networks (WMNs) consist of mesh routers and mesh clients, where mesh routers have minimal mobility and form the backbone of WMNs. They provide network access for both mesh and conventional clients. The integration of WMNs with other networks such as the Internet, cellular, IEEE 802.11, IEEE 802.15, IEEE 802.16, sensor networks, etc., This paper presents a secure and efficient authentication mechanism for Wireless mesh network. The validity of proposed mechanism is provided by BAN logic and the efficiency of suggested mechanism is showed through the performance evaluation.

A Study on the Development Process of User Authentication Software (사용자 인증 소프트웨어 개발 프로세스에 관한 연구)

  • 이상준;배석찬
    • The Journal of Society for e-Business Studies
    • /
    • v.9 no.1
    • /
    • pp.255-268
    • /
    • 2004
  • User authentication is indispensable in computer login and internet banking. Usability as well as security is needed in user authentication software. To develop the software systematically, development process must be defined, and it can result in the improvement of software maturity. In this paper, a process needed to develop user authentication software systematically is proposed from experience of developing visual password input software. This process is composed of 6 phases and 15 activities. It is able to improve usability with its requirement analysis, planning, integration testing, and acceptance testing activity.

  • PDF

Optimal Operation Algorithm for Wind Farms Based on Nonlinear Interior Point Method (비선형내점법 기반의 풍력발전단지 최적운용 알고리즘)

  • Lee, Seung-Min;Song, Hwa-Chang;Lee, Jang-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2011.07a
    • /
    • pp.694-695
    • /
    • 2011
  • The recent concerns over the threat of global climate change and the requirements of national reduction of $CO_2$ emission have led to the diversification of energy resources and a large scale integration of renewable resources. In these circumstances, the policy decision currently made by the government sector includes several programs to promote the equipment of large scale generating assets to use wind energy. However, the power systems and wind farms need such innovative operation scheme schemes that maintain an adequate level of system security for continuing growth of renewable resources. This paper presents a method for determining optimal operating points for wind farms by making use of a nonlinear interior point method.

  • PDF

A Study of the Remodeling Techniques for Old Apartment Blocks (아파트단지 내부의 리모델링 수법에 관한 연구)

  • 김한수;김재홍
    • Journal of the Korean housing association
    • /
    • v.13 no.6
    • /
    • pp.121-131
    • /
    • 2002
  • The rebuilding method for old apartment housing blocks has merits of providing new buildings and larger private living spaces. However, it causes many serious urban problems, such as shortage of infrastructure capacity, traffic congestion, reduction of building life, and deterioration of open space quality. Nowadays, remodeling is accepted as a way of overcoming such negative effects of the rebuilding method. This study focuses on the various techniques of remodeling. The results of this research are as follows; First, old apartment blocks provide poor level of service in general, so they have problems of bad accessibility, deterioration of facilities, and degraded landscape. In many cases, there is a hindrance from walking freely and security problem due to illegal privatization of public spaces. Second, various remodeling techniques are required to meet residents' different needs. The residents of apartment housing value private space above public space, and show low level of willingness to pay cost for remodeling. Third, based on these findings, some remodeling techniques are suggested - integration of a space to another, expansion of spaces, connection of spaces, reuses of roofs and walls, relocation and renovation of paths between buildings, and so on.

Development of Standard e-Navigation Phrases

  • Choe, Seung-Hui;Jang, Eun-Gyu
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2017.11a
    • /
    • pp.32-33
    • /
    • 2017
  • As the era of e-navigation begins, the significance of harmonized collection, exchange, and integration of marine information conventional "ship-to-ship" and "ship-to-shore"/"shore-to-ship" has become more significant in ensuring safety and security at sea. This research aims to provide an internationally applicable list of Standard e-Navigation Phrases (SENP ) for communication in the e-Navigation environment, along with practical approaches to this. For this purpose, the importance of standardized communication phrases specific to e-Navigation will first be illustrated. In order to approach the e-Navigation phrases in a practical and pragmatic manner, means of compiling and processing authentic VHF linguistic data accumulated from one of the Korean ports, Ulsan, will be detailed. In addition, major outcomes to be considered in designing SENP will be suggested. Finally, future actions and a joint effort for the standardization of e-Navigation phrases among stakeholders will be sought.

  • PDF

The Trends of Domestic SI Industry and Promotion Strategies for the CALS Model Projects (국내 SI업체의 동향 및 CALS 시범사업 추진전략)

  • 정기원;임춘성;정동길
    • The Journal of Society for e-Business Studies
    • /
    • v.2 no.1
    • /
    • pp.131-151
    • /
    • 1997
  • The CALS/EC is the world-wide accepted concept and its application domain is being expanded continuously throughout the private and public sectors. One of the essential points for realization of CALS/EC is to promote the domestic system integration(SI) industry. This paper describes the present status of the domestic SI companies and the clues to solve their facing problems. In order to evaluate the status of the current SI technology, the MBNQA(Malcom Baldridge National Quality Award) is adopted. The surveyed results show that the average levels of 14 SI companies over 7 evaluation criteria turn out to be 30% through 40% point. The major projects' activities of the SI companies on the information systems over the areas of trade, science and technology, industrial manpower, health and welfare, national security, etc are explained. Also, the competitive power of the SI companies is also discussed. As a target sample, the Korea Telecom(KT) CALS model project is described in terms of its Progresses and Problems. Furthermore, the strategic plans and detailed research items are proposed to resolve on-going issues.

  • PDF

A Design of the Cloud Aggregator on the MapReduce in the Multi Cloud

  • Hwang, Chigon;Shin, Hyoyoung;Lee, Jong-Yong;Jung, Kye-Dong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.1
    • /
    • pp.83-90
    • /
    • 2016
  • The emergence of cloud has been able to provide a variety of IT service to the user. As organizations and companies are increased that provide these cloud service, many problems arises on integration. However, with the advent of latest technologies such as big data, document-oriented database, and MapReduce, this problem can be easily solved. This paper is intended to design the Cloud Aggregator to provide them as a service to collect information of the cloud system providing each service. To do this, we use the DBaaS(DataBase as a Service) and MapReduce techniques. This makes it possible to maintain the functionality of existing system and correct the problem that may occur depending on the combination.