• Title/Summary/Keyword: Security mechanisms

Search Result 400, Processing Time 0.026 seconds

Microwave Radiation Effects on the Process of Escherichia coli Cultivation

  • Kuznetsov, Denis;Volkhin, Igor;Orlova, Ekaterina;Neschislyaev, Valery;Balandina, Alevtina;Shirokikh, Anna
    • Microbiology and Biotechnology Letters
    • /
    • v.47 no.3
    • /
    • pp.372-380
    • /
    • 2019
  • Modern biotechnological industries have been attempting to improve the efficiency of bacterial strain cultivation. Millimeter wave electromagnetic radiation can have a varied influence on E. coli cultivation processes. The results of the study revealed that when a microwave radiation of low intensity is applied to positively adjust the conditions for the accumulation of bacterial culture biomass, a significant role is played not only by radiation parameters, but also by concomitant biological factors, which influence the reproducibility of the cultivation process and help obtain a useful biotechnological effect. The authors suggest a model that can be used to study the molecular mechanisms underlying the changes in the buildup of E. coli biomass under the influence of electromagnetic radiation.

Three-dimensional numerical parametric study of tunneling effects on existing pipelines

  • Shi, Jiangwei;Wang, Jinpu;Ji, Xiaojia;Liu, Huaqiang;Lu, Hu
    • Geomechanics and Engineering
    • /
    • v.30 no.4
    • /
    • pp.383-392
    • /
    • 2022
  • Although pipelines are composed of segmental tubes commonly connected by rubber gasket or push-in joints, current studies mainly simplified pipelines as continuous structures. Effects of joints on three-dimensional deformation mechanisms of existing pipelines due to tunnel excavation are not fully understood. By conducting three-dimensional numerical analyses, effects of pipeline burial depth, tunnel burial depth, volume loss, pipeline stiffness and joint stiffness on bending strain and joint rotation of existing pipelines are explored. By increasing pipeline burial depth or decreasing tunnel cover depth, tunneling-induced pipeline deformations are substantially increased. As tunnel volume loss varies from 0.5% to 3%, the maximum bending strains and joint rotation angles of discontinuous pipelines increase by 1.08 and 9.20 times, respectively. By increasing flexural stiffness of pipe segment, a dramatic increase in the maximum joint rotation angles is observed in discontinuous pipelines. Thus, the safety of existing discontinuous pipelines due to tunnel excavation is controlled by joint rotation rather than bending strain. By increasing joint stiffness ratio from 0.0 (i.e., completely flexible joints) to 1.0 (i.e., continuous pipelines), tunneling-induced maximum pipeline settlements decrease by 22.8%-34.7%. If a jointed pipeline is simplified as a continuous structure, tunneling-induced settlement is thus underestimated, but bending strain is grossly overestimated. Thus, joints should be directly simulated in the analysis of tunnel-soil-pipeline interaction.

A Distributed Fog-based Access Control Architecture for IoT

  • Alnefaie, Seham;Cherif, Asma;Alshehri, Suhair
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4545-4566
    • /
    • 2021
  • The evolution of IoT technology is having a significant impact on people's lives. Almost all areas of people's lives are benefiting from increased productivity and simplification made possible by this trending technology. On the downside, however, the application of IoT technology is posing some security challenges, among them, unauthorized access to IoT devices. This paper presents an Attribute-based Access Control Fog architecture that aims to achieve effective distribution, increase availability and decrease latency. In the proposed architecture, the main functional points of the Attribute-based Access Control are distributed to provide policy decision and policy information mechanisms in fog nodes, locating these functions near end nodes. To evaluate the proposed architecture, an access control engine based on the Attribute-based Access Control was built using the Balana library and simulated using EdgeCloudSim to compare it to the traditional cloud-based architecture. The experiments show that the fog-based architecture provides robust results in terms of reducing latency in making access decisions.

Review of Karst Research in the Republic of Korea

  • Ryu, Han-Sun;Park, Sangwook;Lee, Jin-Yong;Kim, Heejung
    • Journal of the Korean earth science society
    • /
    • v.43 no.4
    • /
    • pp.481-489
    • /
    • 2022
  • Various types of karst topographies are found worldwide. Owing to their global distribution, karst areas have been extensively studied by scientists who investigate new discoveries by linking the characteristics of karst topographies with their own research fields. However, there have been only a few studies on karsts in the Republic of Korea, and little research exists on their hydrogeology. Fragmentary studies have been conducted on the hydrochemical characteristics of groundwater in limestone areas, the causes of high arsenic concentrations in groundwater, and the hydraulic conductivity of limestone areas. Research on hydrogeological characterization and flow mechanisms in these areas has only began recently. Identification and the proper management of available groundwater resources in karst (limestone) areas is essential as their unique geological characteristics render it difficult to construct reservoirs or dams at appropriate scales. We have reviewed prior work on karsts in the Republic of Korea to provide information that supports water resource security in the karst areas, to improve the understanding of the equitable use of water resources, and to identify the best management practices for groundwater resource resilience improvement.

Numerical investigation of glass windows under near-field blast

  • Chiara Bedon;Damijan Markovic;Vasilis Karlos;Martin Larcher
    • Coupled systems mechanics
    • /
    • v.12 no.2
    • /
    • pp.167-181
    • /
    • 2023
  • The determination of the blast protection level and the corresponding minimum load-bearing capacity for a laminated glass (LG) window is of crucial importance for safety and security design purposes. In this paper, the focus is given to the window response under near-field blast loading, i.e., where relatively small explosives would be activated close to the target, representative of attack scenarios using small commercial drones. In general, the assessment of the load-bearing capacity of a window is based on complex and expensive experiments, which can be conducted for a small number of configurations. On the other hand, nowadays, validated numerical simulations tools based on the Finite Element Method (FEM) are available to partially substitute the physical tests for the assessment of the performance of various LG systems, especially for the far-field blast loading. However, very little literature is available on the LG window performance under near-field blast loads, which differs from far-field situations in two points: i) the duration of the load is very short, since the blast wavelength tends to increase with the distance and ii) the load distribution is not uniform over the window surface, as opposed to the almost plane wave configuration for far-field configurations. Therefore, the current study focuses on the performance assessment and structural behaviour of LG windows under near-field blasts. Typical behavioural trends are investigated, by taking into account possible relevant damage mechanisms in the LG window components, while size effects for target LG windows are also addressed under a multitude of blast loading configurations.

Indonesia in the BIMP-EAGA: Assessing Connectivity Development in Reducing Inequality

  • Sandy Nur Ikfal Raharjo;Tri Nuke Pudjiastuti
    • SUVANNABHUMI
    • /
    • v.16 no.1
    • /
    • pp.175-203
    • /
    • 2024
  • With the enactment of international free trade and economic agreements and cooperation, BIMP-EAGA is an opportunity to accelerate development and economic growth in eastern Indonesia. This subregional cooperation could be used to reduce the development gap or inequality between the western and eastern regions, which are geographically, demographically, and economically different. This cooperation also may accelerate development in the border area. This study analyzes Indonesia's policies related to connectivity in BIMP-EAGA subregional cooperation and its implementation. The study results show that the National Secretariat of Sub-Regional Economic Cooperation has encouraged cooperation clusters ranging from natural resources, transportation, infrastructure, ICT, and tourism to MSMEs. In terms of connectivity, Indonesia is also involved in the development program of three economic corridors, namely West Borneo, East Borneo, and Sulu-Sulawesi. Indonesia's involvement in the three corridors has boosted the connectivity of Indonesia's territory, especially border areas, with neighboring countries. Connectivity has covered not only physical but also institutional and people-to-people dimensions. However, there are still several challenges, ranging from the standardization of the Customs, Immigration, and Quarantine (CIQ) mechanisms, improvement of institutional quality, and consistent strong political will among the involved parties. In addition, considering the vulnerability of the BIMP subregion to transnational crimes and acts of radical terrorism, BIMP-EAGA needs to think about solutions to overcome these cross-border security problems so that the momentum of development in the subregion may be sustained.

Analysis of the Bogus Routing Information Attacks in Sensor Networks (센서 네트워크에서 AODV 라우팅 정보 변조공격에 대한 분석)

  • Lee, Myung-Jin;Kim, Mi-Hui;Chae, Ki-Joon;Kim, Ho-Won
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.229-238
    • /
    • 2007
  • Sensor networks consist of many tiny sensor nodes that collaborate among themselves to collect, process, analyze, and disseminate data. In sensor networks, sensor nodes are typically powered by batteries, and have limited computing resources. Moreover, the redeployment of nodes by energy exhaustion or their movement makes network topology change dynamically. These features incur problems that do not appear in traditional, wired networks. Security in sensor networks is challenging problem due to the nature of wireless communication and the lack of resources. Several efforts are underway to provide security services in sensor networks, but most of them are preventive approaches based on cryptography. However, sensor nodes are extremely vulnerable to capture or key compromise. To ensure the security of the network, it is critical to develop suity mechanisms that can survive malicious attacks from "insiders" who have access to the keying materials or the full control of some nodes. In order to protect against insider attacks, it is necessary to understand how an insider can attack a sensor network. Several attacks have been discussed in the literature. However, insider attacks in general have not been thoroughly studied and verified. In this paper, we study the insider attacks against routing protocols in sensor networks using the Ad-hoc On-Demand Distance Vector (AODV) protocol. We identify the goals of attack, and then study how to achieve these goals by modifying of the routing messages. Finally, with the simulation we study how an attacker affects the sensor networks. After we understand the features of inside attacker, we propose a detect mechanism using hop count information.

Dynamic Virtual Organization Management System for Grid Based Information Retrieval Service (그리드 기반 정보검색 서비스를 위한 동적 가상 조직 관리 시스템)

  • Kim, Yang-Woo;Lee, Seung-Ha;Kim, Hyuk-Ho
    • The KIPS Transactions:PartD
    • /
    • v.13D no.7 s.110
    • /
    • pp.1009-1016
    • /
    • 2006
  • Under foundational precepts of Grid computing, two important requirements that all Grid application systems should satisfy are to accommodate the dynamic nature of Virtual Organizations (VOs), and to enforce different levels of security among different VOs. For the research described in this paper, we developed two different use-case scenarios addressing the two requirements, and then showed how the requirements can be met by implementing a Grid information retrieval (GIR) system prototype. The dynamic nature of VO applies not only to increasing and decreasing number of users, but also to the dynamically changing requirement of computing power among the different subcomponents that consist in overall system configuration. This implies that a request to increase computing power by a certain subcomponent can be satisfied by other idling subcomponents taking advantage of overall system flexibility. This paper describes how we implemented a Grid IR system using VO and security mechanisms provided by Globus toolkit 3.0, and shows how GIR system scalability and security can be improved for dynamic VOs. In order to manage different VOs, we implemented VO management service (VOMS), and registered it to Globus as an additional service.

Analysis of Blockchain Platforms from the Viewpoint of Privacy Protection (프라이버시 보호 관점에서의 블록체인 플랫폼 분석)

  • Park, Ji-Sun;Shin, Sang Uk
    • Journal of Internet Computing and Services
    • /
    • v.20 no.6
    • /
    • pp.105-117
    • /
    • 2019
  • Bitcoin, which can be classified as a cryptocurrency, has attracted attention from various industries because it is an innovative digital currency and the beginning of a Blockchain system. However, as the research on Bitcoin progressed, several security vulnerabilities and possible attacks were analyzed. Among them, the security problem caused by the transparency of the Blockchain database prevents the Blockchain system from being applied to various fields. This vulnerability is further classified as the weak anonymity of participating nodes and privacy problem due to disclosure of transaction details. In recent years, several countermeasures have been developed against these vulnerabilities. In this paper, we first describe the main features of the public and private Blockchain, and explain privacy, unlinkability and anonymity. And, three public Blockchain platforms, Dash, Zcash and Monero which are derived from Bitcoin, and Hyperledger Fabric which is a private Blockchain platform, are examined. And we analyze the operating principles of the protocols applied on each platform. In addition, we classify the applied technologies into anonymity and privacy protection in detail, analyze the advantages and disadvantages, and compare the features and relative performance of the platforms based on the computational speed of the applied cryptographic mechanisms.

Authentication Mechanism Using Three-Dimensional Optical Memory (3차원 광메모리를 이용한 인증 기법)

  • Park, CheolYong;Ryou, JaeCheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1361-1373
    • /
    • 2016
  • Recently the need for user authentication with increasing, there are a variety of mechanisms, such as password, graphic authentication, token, biometrics and multiple authentication. in particular, the data of the 2-dimensional(2D) factors such as password, graphic authentication, biometrics is used because of the convenience. The stored information is problematic in that additional data recording needs to be performed whenever authentication data is updated. Furthermore, this storage method is problematic in that the time it takes to perform authentication increases because the time it takes to compare storage data with authentication data increases in proportion to an increase in the amount of the storage data. Accordingly, authentication through the rapid comparison of storage data with authentication data is a very important factor in data recording and authentication technology using memory. Using the three-dimensional(3D) optical memory by variously changing the recoding elements during recoding of data constitutes the way that multiple recoding different data storage. This enables high-density recoding in this way, and by applying the possible parallel processing at the time of recording and restoring method, provided that it is possible to quickly record and restore the data. In addition, each time to solve problems that require additional data recorded by a combination of the stored data record in the old data using a combination of the authentication. The proposed mechanism is proposed an authentication method using scheme after the recoding data in 3D optical memory to apply the conditions corresponding to the recoding condition when restoring the recorded data and through the experiment it was confirmed possible application as an authentication mechanism.