• Title/Summary/Keyword: Security control design

Search Result 541, Processing Time 0.032 seconds

A Case Study on the Interior design characteristics of Integrated CCTV Control Center - Focused at Human Factor Design aspect (CCTV 통합관제센터의 실내공간특성에 대한 사례분석연구 - 인간공학디자인(HFD)의 관점에서)

  • Han, Ji Eun;Kwon, Gyu Hyun
    • Design Convergence Study
    • /
    • v.16 no.3
    • /
    • pp.103-118
    • /
    • 2017
  • It is expected that the integrated control service of the public sector will be increased for the safety of citizens in the future. Therefore, In this study, we analyzed the classification of CCTV control center and the characteristics of interior design. The survey was conducted at eight control centers in Seoul that were constructed since 2007 and analyzed according to the criteria of general matters, services, spatial basic information, spatial structure, and internal structure. The results of the survey are summarized as follows. Based on the results of the study, the Integrated Control Center is a space where the ratio of the physical environment is not high but performs important tasks for the citizens of the city, which are operated 24 hours a day, and security and security. It is characterized by the efficient space allocation for the treatment, the design of the moving line, and the connection according to the urgent work flow. The results of this study are expected to be used as basic data for other integrated control center environment.

Physical Layer Security of AF Relay Systems With Jamming.

  • Ofori-Amanfo, Kwadwo Boateng;Lee, Kyoung-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.288-289
    • /
    • 2019
  • This paper studies the secrecy capacity for a wireless cooperative network with perfect channel state information at the relays, and receiver. A similar assumption is also made for the instance where there exist a direct link between the transmitter and receiver. Physical Layer security techniques are employed in wireless networks to mitigate against the activity of eavesdroppers. It offers a viable alternative to computationally intensive encryption. In this paper the design of a protocol utilizing jamming (via jamming nodes) for better security and relaying (via relay nodes) for the amplify-and-forward (AF) operation, is investigated. A a signal-to-noise variant of secrecy known as secrecy gap is explored because of its use of lesser computational power - preferable for practical systems. Thus we maximize this signal-to-noise approach instead of the conventional secrecy capacity maximization method. With this, an iterative algorithm using geometric programming (GP) and semi-definite programming (SDP) is presented with appreciable benefits. The results show here highlight the benefits of using fractional components of the powers of the relays to offer better secrecy capacity.

  • PDF

Design the Autopilot System of using GA Algorithm

  • Lee, Sang-Min;Choo, Yeon-Gyu;Lim, Young-Do
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.699-703
    • /
    • 2004
  • The autopilot system targets decreasing labor, working environment, service safety security and elevation of service efficiency. Ultimate purpose is minimizing number of crew for guarantee economical efficiency of shipping service. Recently, being achieving research about Course Keeping Control, Track Keeping Control, Roll-Rudder Stabilization, Dynamic ship Positioning and Automatic Mooring Control etc. which compensate nonlinear characteristic using optimizing control technique. And application research is progressing using real ship on actual field. Relation of Rudder angle which adjusted by Steering Machine and ship-heading angle are non-linear. And, Load Condition of ship acts as non-linear element that influence to Parameter of ship. Also, because the speed of a current and direction of waves, velocity and quantity of wind etc. that id disturbance act in non-linear form, become factor who make service of shipping painfully. Therefore, service system of shipping requires robust control algorithm that can overcome nonlinearity. In this paper, Using GA algorithm,design autopilot system of ship that could overcome the non-linear factor of ship and disturbance and examined result through simulation.

  • PDF

A Design of PC Power-Saving System Security Using IP Address Restriction (IP 주소 제한을 이용한 PC 절전 시스템 보안 설계)

  • Kim, Hong Yoon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.3
    • /
    • pp.49-57
    • /
    • 2013
  • Power-saving PC software enables the inexpensive power control, but the installation of the power-saving software in all computers in the organization is not an easy task. Computer users in the organization are usually not cooperative as they do not think the power-saving cost is directly related to themselves. The PC power-saving system provides advantage to driving active participation in which users installs the power saving software by restricting IP address through the power management server. However, the problem with this approach is the security vulnerability to IP spoofing attacks, therefore we need to solve the problem that disrupt the entire network system rather than saving electric power. This paper proposes the security authentication system that can implement the efficiency saving power by providing high security for the members' computer system of the public institutions based on the PC power-saving system. Also, by analyzing it in comparison with other method, it is possible to check that the prospects of safety and efficiency are strengthened.

Hardware Implementation of the 3GPP KASUMI crypto algorithm

  • Kim, Ho-Won;Park, Yong-Je;Kim, Moo-Seop;Ryu, Hui-Su
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.317-320
    • /
    • 2002
  • In this paper, we will present the design and implementation of the KASUMI crypto algorithm and confidentiality algorithm (f8) to an hardware chip for 3GPP system. The f8 algorithm is based on the KASUMI which is a block cipher that produces a 64-bit output from a 64-bit input under the control of a 128-bit key. Various architectures (low hardware complexity version and high performance version) of the KASUMI are made with a Xilinx FPGA and the characteristics such as hardware complexity and thor performance are analyzed.

  • PDF

A Study on the Design of the Security Gateway for Role-based Dynamic Security Rule-Set (역할 기반 변동 보안 룰셋 적용을 위한 네트워크 보안 게이트웨이 설계에 관한 연구)

  • Lee, Chun-Jae;Cho, Ki-Ryang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.8B
    • /
    • pp.719-726
    • /
    • 2008
  • In this thesis investigate the security gateway that manage authorization for user access dynamically by recognizing automatically and comparison & distinction between database and User-information while a terminal unit(PC) trying to access to the network of subnet. Also, it present User-interfaced authorization allowance role model, so administrator can assign united access control between network level(L2) and application level(L7) in relation to system construction.

Design of Web based Acess Control System (Web 기반의 접근제어 시스템 설계)

  • Lee, Kyeong hyo;Jo, A Aeng;Park, Ik-Su;Oh, Byeong-Kyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.1194-1197
    • /
    • 2007
  • 개인정보는 정보서비스의 효율적인 운용과 새로운 비즈니스 모델에서 수익창출을 위한 자원으로 활용되고 있다. 이로 인하여 중요 정보에 대한 불법적인 사용 또는 개인정보 소유자의 허가 없는 사용으로 개인 프라이버시 침해가 발생되고 있다. 따라서 본 논문에서는 각 정보 시스템에서 사생활보호와 중요정보보호를 위한 정보 보안정책 모델을 제안한다. 제안된 모델은 정보 제공정책 모델과 정보 사용정책 모델로 구성하여 정보자기결정권을 부여하여 이중적인 접근제어 방식을 적용하고자 한다.

The Design and Implementation of SEEN Graphic User Interface Module for Access Control Policy Management (SEEN 접근통제 정책관리 GUI 모듈 설계 및 구현)

  • Shin, Sam-Shin;Lee, Jae-Seo;Kim, Jung-Sun;Kim, Min-Soo;Kim, Young-Min
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1013-1016
    • /
    • 2007
  • 본 논문에서는 SEEN 보안운영체제 시스템에서 접근통제 정책관리 도구의 설계 및 구현한 내용을 설명한다. 보안운영체제에 대한 지식이 부족한 보안 관리자가 정책을 설정하고 적용하는 데에 많은 어려움이 따른다. 따라서 본 논문에서는 이러한 정책 적용 및 정책 설정의 문제점을 해결하기 위해 접근통제 정책관리 처리에 대한 것을 사용자가 쉽게 파악 할 수 있고 친숙한 그래픽 기반의 형태로 특별한 지식이 없는 사용자와 보안 관리자들에게 시스템을 효율적이고 편리하게 사용할 수 있도록 한다.

Design of watermark trace-back system to supplement connection maintenance problem

  • Kim, Hwan-Kuk;Han, Seung-Wan;Seo, Dong-Il;Lee, Sang-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2151-2154
    • /
    • 2003
  • Internet is deeply rooted in everyday life and many things are performed using internet in real-world, therefore internet users increased because of convenience. Also internet accident is on the increase rapidly. The security vendor developed security system to protect network and system from intruder. Many hackings can be prevented and detected by using these security solutions. However, the new hacking methods and tools that can detour or defeat these solutions have been emerging and even script kids using these methods and tools can easily hack the systems. In consequence, system has gone through various difficulties. So, Necessity of intruder trace-back technology is increased gradually. Trace-back technology is tracing back a malicious hacker to his real location. trace-back technology is largely divided into TCP connection trace-back and IP packet trace-back to trace spoofed IP of form denial-of-service attacks. TCP connection trace-back technology that autonomously traces back the real location of hacker who attacks system using stepping stone at real time. In this paper, We will describe watermark trace-back system using TCP hijacking technique to supplement difficult problem of connection maintenance happened at watermark insertion. Through proposed result, we may search attacker's real location which attempt attack through multiple connection by real time.

  • PDF

Securing a Cyber Physical System in Nuclear Power Plants Using Least Square Approximation and Computational Geometric Approach

  • Gawand, Hemangi Laxman;Bhattacharjee, A.K.;Roy, Kallol
    • Nuclear Engineering and Technology
    • /
    • v.49 no.3
    • /
    • pp.484-494
    • /
    • 2017
  • In industrial plants such as nuclear power plants, system operations are performed by embedded controllers orchestrated by Supervisory Control and Data Acquisition (SCADA) software. A targeted attack (also termed a control aware attack) on the controller/SCADA software can lead a control system to operate in an unsafe mode or sometimes to complete shutdown of the plant. Such malware attacks can result in tremendous cost to the organization for recovery, cleanup, and maintenance activity. SCADA systems in operational mode generate huge log files. These files are useful in analysis of the plant behavior and diagnostics during an ongoing attack. However, they are bulky and difficult for manual inspection. Data mining techniques such as least squares approximation and computational methods can be used in the analysis of logs and to take proactive actions when required. This paper explores methodologies and algorithms so as to develop an effective monitoring scheme against control aware cyber attacks. It also explains soft computation techniques such as the computational geometric method and least squares approximation that can be effective in monitor design. This paper provides insights into diagnostic monitoring of its effectiveness by attack simulations on a four-tank model and using computation techniques to diagnose it. Cyber security of instrumentation and control systems used in nuclear power plants is of paramount importance and hence could be a possible target of such applications.