• 제목/요약/키워드: Security operation

검색결과 1,567건 처리시간 0.026초

Optimized Security Algorithm for IEC 61850 based Power Utility System

  • Yang, Hyo-Sik;Kim, Sang-Sig;Jang, Hyuk-Soo
    • Journal of Electrical Engineering and Technology
    • /
    • 제7권3호
    • /
    • pp.443-450
    • /
    • 2012
  • As power grids are integrated into one big umbrella (i.e., Smart Grid), communication network plays a key role in reliable and stable operation of power grids. For successful operation of smart grid, interoperability and security issues must be resolved. Security means providing network system integrity, authentication, and confidentiality service. For a cyber-attack to a power grid system, which may jeopardize the national security, vulnerability of communication infrastructure has a serious impact on the power grid network. While security aspects of power grid network have been studied much, security mechanisms are rarely adopted in power gird communication network. For security issues, strict timing requirements are defined in IEC 61850 for mission critical messages (i.e., GOOSE). In this paper, we apply security algorithms (i.e., MD-5, SHA-1, and RSA) and measure their processing time and transmission delay of secured mission critical messages. The results show the algorithms satisfying the timing requirements defined in IEC 61850 and we observer the algorithm that is optimal for secure communication of mission critical messages. Numerical analysis shows that SHA-1 is preferable for secure GOOSE message sending.

OFB 모드와 3GPP f8 암호화 모드의 안전성 (Security of OFB mode and 3GPP f8 encryption mode)

  • 신상욱;홍도원;강주성;이옥연
    • 정보보호학회논문지
    • /
    • 제11권4호
    • /
    • pp.55-66
    • /
    • 2001
  • 본 논문에서는 블록 암호의 기본적인 동작 모드 중의 하나인 OFB 암호화 모드와 비동기식 IMT-2000의 무선 구간 메시지 암호화를 위해 사용되는 3GPP f8 암호화 모드의 안전성을 분석한다. Left-or-right 안전성 개념을 적용하여 각각 랜덤 함수 모델과 랜덤 치환 모델에서의 안전성에 대한 하한과 상한을 증명하고, 또한 유사랜덤 함수 모델과 유사 랜덤 치환 모델에서의 안전성을 각각 증명한다.

전력계통 안정성확보를 위한 확률적 예약요금제 (Probabilistic Precontract Pricing for Power System Security)

  • 임성황;최준영;박종근
    • 대한전기학회논문지
    • /
    • 제43권2호
    • /
    • pp.197-205
    • /
    • 1994
  • Security of a power system refers to its robustness relative to a set of imminent disturbances (contingencies) during operation. The socially optimal solution for the actuall level of generation/consumption has been well-known spot pricing at shot-run marginal cost. The main disadvantage of this approach arises because serious contingencies occur quite infrequently. Thus by establishing contractual obligations for contingency offering before an actual operation time through decision feedback we can obtain socially optimal level of system security. Under probabilistic precontract pricing the operating point is established at equal incremental cost of the expected short-run and collapse cost of each participant. Rates for power generation/consumption and for an offer to use during a contingency, as well as information on the probability distribution of contingency need for each participant, are derived so that individual optimization will lead to the socially optimal solution in which system security is optimized and the aggregate benefit is maxmized.

  • PDF

QSS 해석 기법을 이용한 Voltage Security Assessment(VSA) 프로그램 기반설계 (Framework Design of Voltage Security Assessment(VSA) using QSS Analysis method)

  • 허진;이상호;김태현;문영환
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2005년도 제36회 하계학술대회 논문집 A
    • /
    • pp.12-14
    • /
    • 2005
  • Security problem has been a fundamental issue in the operation and planning of power system. Voltage instability is widely recognized as an important issue of power system blackout. As far as real-time operation is concerned, there is a need for appropriate tools to identify dangerous contingencies, assess security margins and suggest corrective actions. In this paper, we propose the framework design of Voltage Security Assessment(VSA) using QSS(Quasi Steady-State) analysis method in order to implement fast time domain simulation engine as a major part of VSA.

  • PDF

Shift연산과 경량 연산자를 사용한 저비용 RFID 인증프로토콜 (RFID Authentication Protocol Using Shift Operation and Light-weight Operations)

  • 안효범;이수연
    • 융합보안논문지
    • /
    • 제7권1호
    • /
    • pp.55-62
    • /
    • 2007
  • 유비쿼터스 환경에서 개인 프라이버시 보호를 위해 RFID 시스템 보안에 대한 연구가 활발히 이루어지고 있다. RFID 시스템 보안 중 XOR 기반의 기법은 다른 기법보다 단순하고 최저가로 구현될 수 있다. 그러나 사용자 프라이버시 보호를 위하여 동일한 비밀정보가 사용자 인증에 사용되기 때문에 비밀정보가 노출될 확률이 커진다. 따라서 본 논문에서는 기존의 XOR 기반 인증프로토콜을 개선한 경량화 된 연산자와 순환 시프트 연산을 사용한 인증프로토콜을 제안한다.

  • PDF

A Study on Risk Management for Export Control on Strategic Trade in Supply Chain Management

  • Roh, Tae-Hyun;Park, Jin-Hee
    • 한국항해항만학회지
    • /
    • 제37권6호
    • /
    • pp.709-718
    • /
    • 2013
  • In this study, AHP analysis was conducted through a survey that was organized by 9 job categories. The results show that sustainable operation risks have the highest priority level among all criteria with management interest having the highest priority level within sustainable operation risks related attributes. The most important risk attributes among stakeholder risks appeared to be asset security and cargo and conveyance security, with education and training being the most important among regulatory risks. Effective management and response to the risks from export controls on strategic trade require an understanding of supply chain security and compliance programs, effective training programs, investments for development of security systems that meet international standards. In addition, the government needs to focus on developing professionals and providing support for companies with compliance programs, working closely with businesses.

The Security Establishment for Cloud Computing through CASE Study

  • Choi, Myeonggil
    • Journal of Information Technology Applications and Management
    • /
    • 제27권6호
    • /
    • pp.89-99
    • /
    • 2020
  • Cloud computing is rapidly increasing for achieving comfortable computing. Cloud computing has essentially security vulnerability of software and hardware. For achieving secure cloud computing, the vulnerabilities of cloud computing could be analyzed in a various and systematic approach from perspective of the service designer, service operator, the designer of cloud security and certifiers of cloud systems. The paper investigates the vulnerabilities and security controls from the perspective of administration, and systems. For achieving the secure operation of cloud computing, this paper analyzes technological security vulnerability, operational weakness and the security issues in an enterprise. Based on analysis, the paper suggests secure establishments for cloud computing.

이승만 대통령의 전쟁지도 (President Syngman Rhee and the Conduct of the Korean War)

  • 김행복
    • 안보군사학연구
    • /
    • 통권1호
    • /
    • pp.35-70
    • /
    • 2003
  • President Lee, Syngman was ROK supreme commander at the Korean war. But, it is doubt that he executed his authority and responsibility by the ROK constitution and law. At the phase of the Korean War conduct, his role may be divided into 'military operation execution one' and 'political-diplomacy one'. He appointed unqualified person to the important position of the national defence, didn't make war execution system, and was not make to meet the war. And, after transferring the ROK force operation commanding authority to the Commander in Chief, UN Command, his role was extremely trivial at the military operation execution phase. Any way, he intended to recover the inferior national strength and military capacity with USA aid, and concentrated his effort toward diplomacy with USA. At last, he succeeded in making a mutual defence treaty and gained a big result to harden Korea national security after war. In sum, president Lee was shrewd politician and diplomat than military leader. And, it can be evaluated that he supplemented the lost part of military affairs side with diplomat one.

  • PDF

경비분야 국가직무능력표준(NCS) 개발에 관한 연구 (Research on the Development of the National Competency Standards(NCS) for Security)

  • 김민수;김종민
    • 융합보안논문지
    • /
    • 제15권1호
    • /
    • pp.115-138
    • /
    • 2015
  • 지식정보사회의 산업현장에서 필요로 하는 인재상은 지식과 실무를 겸비한 차별화된 전문직업인을 요구하지만, 교육기관을 통해 배출되는 인력들의 직무수행능력은 산업현장 요구에 미치지 못하여, 재교육을 위한 시간과 비용을 재투자하여야 하는 문제점이 있다. 이러한 기존 교육과정에 대한 한계와 문제점을 극복하고 산업현장에서 요구하는 양질의 인력을 공급하기 위한 교육과정 개발이 시급한 실정이다. 따라서 본 연구에서는 국가차원에서 추진하고 있는 국가직무능력표준(NCS) 개발 기법을 활용하여 경비분야 교육의 현장적합성을 제고하고, 산업체가 요구하는 실질적인 교육과정 개발을 제안한다.

Enhanced Knock Code Authentication with High Security and Improved Convenience

  • Jang, Yun-Hwan;Park, Yongsu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권9호
    • /
    • pp.4560-4575
    • /
    • 2018
  • Since smartphone contains various personal data, security is one of the important aspects in smartphone technologies. Up to now, various authentication techniques have been proposed to protect smartphones. The pattern lock on the Android system is one of the most widely used authentication methods for low-cost devices but it is known to be vulnerable to smudge attack or shoulder surfing attack. LG's smartphone uses its own technique, which is called "Knock Code." The knock code completes the authentication by touching the user defined area in turn on the screen. In this paper, we propose the new, enhanced version of knock code by adding the sliding operation and by using flexible area recognition. We conducted security analysis, which shows that under the same password size, the search space is overwhelmingly larger than the original algorithm. Also, by using the sliding operation, the proposed scheme shows resilience against smudge attacks. We implemented the prototype of our scheme. Experimental results show that compared with the original Knock Code and Android pattern lock, our scheme is more convenient while providing better security.