• Title/Summary/Keyword: energy security

Search Result 916, Processing Time 0.027 seconds

Analysis of Photovoltaics RD & D Programs and Industry Growth in Japan (일본 태양광 산업 발전 및 기술 개발 성과의 시사점)

  • Lim, Hee-Jin;Yoon, Kyung-Shick;Jang, Hyuk-Bong;Kim, Dong-Hwan
    • 한국신재생에너지학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.269-275
    • /
    • 2007
  • 태양광 분야에서 일본은 기술 및 보급에 성공한 대표적인 사례로서 거론된다. 태양광의 에너지자원화를 목표로 30여 년간 지속적으로 국가차원의 기술개발 및 보급을 정책 사업화하여 진행시켰고 성공적인 선행 단계를 밟아 왔다. 현재까지의 성공을 기반으로 [태양광 비전 2030]을 수립하여 실현가능한 장기 목표를 구체화하는 단계에 있다. 이에 일본 태양광 산업 및 기술개발 방향에 대한 분석을 통해 오늘 우리에게 주는 시사점을 도출하여 차세대 성장 동력 산업이 될 국내 태양광분야의 발전을 위한 지표로 삼고자 한다.

  • PDF

An Overview of the Development of Botswana's Renewable Energy Policy Framework

  • Maswabi, Mareledi G.;Kim, Kyung Nam
    • Bulletin of the Korea Photovoltaic Society
    • /
    • v.4 no.1
    • /
    • pp.28-34
    • /
    • 2018
  • Botswana is a middle-income developing country in Southern Africa with an economy mainly reliant on mineral resources, particularly diamonds. Other sectors of the economy like energy are trailing behind in this country's development. For a long time, Botswana has been relying on imported energy from her neighboring countries. Due to this great dependence, the country has had little control over sufficiency of energy supply, especially during times of shortages in the neighboring countries. As a result, Botswana came up with a number of initiatives over the years to ensure security of supply and self-sufficiency in the energy sector. However, even with the efforts made, currently Botswana is still not self-sufficient and is facing challenges of energy shortages mainly in the power sector. This paper therefore, seeks to review the various policy instruments that have been adopted in Botswana from 1996 to date, identify challenges that come with them and make recommendations on the identified challenges.

  • PDF

Energy Efficiency Modelling and Analyzing Based on Multi-cell and Multi-antenna Cellular Networks

  • Ge, Xiaohu;Cao, Chengqian;Jo, Min-Ho;Chen, Min;Hu, Jinzhong;Humar, Iztok
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.4
    • /
    • pp.560-574
    • /
    • 2010
  • In this paper, the relationship between the energy efficiency and spectrum efficiency in a two-cell cellular network is obtained, and the impact of multi-antenna on the energy efficiency of cellular network is analyzed and modeled based on two-state Markovian wireless channels. Then, the energy efficiency of multi-cell cellular networks with co-channel interference is investigated. Simulation results verify the proposed model and the energy-spectrum efficiency tradeoffs in cellular networks with multi-antenna and co-channel interference.

Study on the Construction of Cyber Security for the Nuclear Power Plants (원전 통신망 사이버보안 체계 연구)

  • Choi, Young-Soo;Choi, Yu-Rak;Lee, Jai-Chul;Cho, Jai-Wan;Ku, In-Soo;Hong, Seok-Boong
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2009.11a
    • /
    • pp.537-538
    • /
    • 2009
  • 원전 계측제어 시스템의 디지털화에 따라 개방형 시스템의 사용이 늘어나고 있으며, 개방형 시스템의 사용으로 인해 보안 취약성이 늘어나 통신망을 통한 해킹의 위험이 증가되고 있다. 원전은 다른 산업에 비해 경제, 사회적 영향이 크므로 원전의 운영중단 및 파손을 방지하기 위한 대책을 철저히 마련하여야 한다. 원전 통신망 사이버 보안을 위해서는 보안 환경의 정확한 분석을 통해 대책을 세우는 것이 필요하다. 사이버 보안에 대한 전체적인 틀은 보안정책의 수립, 보안 위험을 최소화하기 위한 인력, 장비 및 기술을 포함한 사이버 보안 기술의 구현, 그리고 지속적인 보안 감시 및 관리가 필요하다. 본 논문에서는 원전 통신망 사이버 보안 체계 구축을 위한 방법을 제안한다.

  • PDF

Environmental footprint impacts of nuclear energy consumption: The role of environmental technology and globalization in ten largest ecological footprint countries

  • Sadiq, Muhammad;Wen, Fenghua;Dagestani, Abd Alwahed
    • Nuclear Engineering and Technology
    • /
    • v.54 no.10
    • /
    • pp.3672-3681
    • /
    • 2022
  • This study investigates the environmental footprint impacts of nuclear energy consumption in the presence of environmental technology and globalization of the ten largest ecological footprint countries from 1990 up to 2017. By considering a set of methods that can help solve the issue of cross-sectional dependence, we employ the Lagrange multiplier bootstrap cointegration method, Driscoll-Kraay standard errors for long-run estimation and feasible generalized least squares (FGLS) and panel-corrected standard errors (PCSE) for robustness. The finding revealed significant negative effects of nuclear energy consumption, environmental-related technology, population density and significant positive effects of globalization and economic growth on ecological footprint. These results are also robust by assessing the long-run impacts of predictors on carbon footprint and CO2 emissions as alternate ecological measures. These conclusions provide the profound significance of nuclear energy consumption for environmentally sustainable development in the top ten ecological footprint countries and serve as an important reference for ecological security for other countries globally.

Energy Efficient Distributed Intrusion Detection Architecture using mHEED on Sensor Networks (센서 네트워크에서 mHEED를 이용한 에너지 효율적인 분산 침입탐지 구조)

  • Kim, Mi-Hui;Kim, Ji-Sun;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.151-164
    • /
    • 2009
  • The importance of sensor networks as a base of ubiquitous computing realization is being highlighted, and espicially the security is recognized as an important research isuue, because of their characteristics.Several efforts are underway to provide security services in sensor networks, but most of them are preventive approaches based on cryptography. However, sensor nodes are extremely vulnerable to capture or key compromise. To ensure the security of the network, it is critical to develop security Intrusion Detection System (IDS) that can survive malicious attacks from "insiders" who have access to keying materials or the full control of some nodes, taking their charateristics into consideration. In this perper, we design a distributed and adaptive IDS architecture on sensor networks, respecting both of energy efficiency and IDS efficiency. Utilizing a modified HEED algorithm, a clustering algorithm, distributed IDS nodes (dIDS) are selected according to node's residual energy and degree. Then the monitoring results of dIDSswith detection codes are transferred to dIDSs in next round, in order to perform consecutive and integrated IDS process and urgent report are sent through high priority messages. With the simulation we show that the superiorities of our architecture in the the efficiency, overhead, and detection capability view, in comparison with a recent existent research, adaptive IDS.

Study on the design of the passenger cars bumper rail to reduce the weight (자동차 범퍼 레일의 경량화 설계에 관한 연구)

  • 김이규;조규종
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2000.11a
    • /
    • pp.563-566
    • /
    • 2000
  • Recently vehicle development trend puts emphasis on cost reduction and performance improvement through weight reduction, and safety security to protect passenger and chassis against external impact. Primary factors effected on vehicle safety are chassis structure, chassis system, and safety equipment like bumper. Research in part of weight reduction is proceeding actively about prohibition of over-design and material through optimal design method. Bumper in these factors is demanded two of all factors, safety security and weight reduction. It is the part that prohibits or reduces a physical impact in low speed crash. Bumper is composed of a few parts but this study exhibits the shape of bumper rail has a role on energy absorption of safety security and weight reduction from structure analysis of bumper rail's variable shape surface.

  • PDF

Dynamic Session Key based Pairwise Key Management Scheme for Wireless Sensor Networks

  • Premamayudu, B;Rao, Koduganti Venkata;Varma, P. Suresh
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5596-5615
    • /
    • 2016
  • Security is one of the major challenges in the Wireless Sensor Networks (WSNs). WSNs are more vulnerable to adversarial activities. All cryptographic security services indirectly depend on key management. Symmetric key management is the best key establishment process for WSNs due to the resource constraints of the sensors. In this paper, we proposed dynamic session key establishment scheme based on randomly generated nonce value and sensor node identity, in which each sensor node is equipped with session key on expire basis. The proposed scheme is compare with five popular existing key management systems. Our scheme is simulated in OMNET++ with MixiM and presented experimental results. The analytical study and experimental results show the superiority of the proposed scheme over the existing schemes in terms of energy, storage, resilience and communication overhead.

Applying Lightweight DTLS Protocol for Low-energy IoT (저전력 IoT 상에서의 경량 DTLS 프로토콜 적용 방안)

  • Song, Kyoungjin;Kim, Dongho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.04a
    • /
    • pp.972-974
    • /
    • 2016
  • 최근 전 세계적으로 IoT(Internet of Things) 기술이 활발히 연구되고 있다. IoT 환경은 임베디드나 센서 등의 시스템에 적용되는 경우가 많다. 그 특성으로 인해, 적용된 장치들은 경량화되기 때문에 통신을 위한 프로토콜로 UDP 기반 프로토콜을 많이 사용한다. UDP 기반 프로토콜은 TCP 기반 프로토콜보다 보안 기능이 미비하므로 UDP 상에서도 보안 기능을 제공해 줄 수 있는 DTLS(Datagram Transport Layer Security)가 권고된다. 하지만 DTLS는 저전력 IoT 환경을 고려하여 만들어진 프로토콜이 아니다. 그래서 저전력 IoT 환경에서 사용하기에는 힘들다. 하지만 HIGHT(HIGh security and light weigHT) 알고리즘을 사용하면 보안적인 측면을 고려하면서도 DTLS의 알고리즘인 AES(Advanced Encryption Standard)의 높은 에너지 소모량이 해결된다. 본 논문에서는 보안 측면을 고려하면서 에너지 효율까지 고려한 KISA(Korea Internet & Security Agency, 한국인터넷진흥원)의 HIGHT 암호화 알고리즘을 기반으로 DTLS를 경량화하여 저전력 기기에서 적용할 수 있는 방안을 제안한다.

An Adaptive Threshold Determining Method in Senor Networks using Fuzzy Logic (통계적 여과기법에서 퍼지 규칙을 이용한 적응적 보안 경계 값 결정 방법)

  • Sun, Chung-Il;Cho, Tae-Ho
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.177-180
    • /
    • 2008
  • There are many application areas of sensor networks, such as surveillance, hospital monitoring, and home network. These are dependent on the secure operation of networks, and will have serious outcome if the networks is injured. An adversary can inject false data into the network through the compromising node. Ye et al. proposed a statistical en-route filtering scheme (SEF) to detect such false data during forwarding process. In this scheme, it is important that the choice of the threshold value since it trades off security and overhead. This paper presents an adaptive threshold value determining method in the SEF using fuzzy logic. The fuzzy logic determines a security distance value by considering the situation of the network. The Sensor network is divided into several areas by the security distance value, it can each area to uses the different threshold value. The fuzzy based threshold value can reduce the energy consumption in transmitting.

  • PDF