• Title/Summary/Keyword: energy security

Search Result 912, Processing Time 0.025 seconds

Security Characteristics of D-MAC in Convergence Network Environment (융합망 환경에서 D-MAC의 보안 특성)

  • Hong, Jinkeun
    • Journal of Digital Convergence
    • /
    • v.12 no.12
    • /
    • pp.323-328
    • /
    • 2014
  • D-MAC protocol is used convergence network, which is designed to connect wireless link between things. This protocol is supported to local data exchange and aggregation among neighbor nodes, and distributed control packet from sink to sensor node. In this paper, we analysis about efficiency of power consumption according to whether or not security authentication of D-MAC in convergence network. If authentication scheme is applied to MAC communication, it is related to power consumption of preamble whether or not with and without authentication process. It is reduced to energy consumption against denial attack of service, when it is applied to authentication. Future work will take the effort to deal with security authentication scheme.

GEOP : A Security Aware Multipath Routing Protocol (GEOP : 보안 인식 다중경로 라우팅 프로토콜)

  • Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.2
    • /
    • pp.151-157
    • /
    • 2010
  • Rapid technological advances in the area of micro electro-mechanical systems (MEMS) have spurred the development of small inexpensive sensors capable of intelligent sensing. A significant amount of research has been done in the area of connecting large numbers of these sensors to create robust and scalable Wireless Sensor Networks (WSNs). The resource scarcity, ad-hoc deployment, and immense scale of WSNs make secure communication a particularly challenging problem. Since the primary consideration for sensor networks is energy efficiency, security schemes must balance their security features against the communication and computational overhead required to implement them. In this paper, we combine location information and probability to create a new security aware multipath geographic routing protocol. The implemented result in network simulator (ns-2) showed that our protocol has a better performance under attacks.

A Study of Aspheric Mirror Optical Design to Improve Luminous Intensity Uniformity of LED Security Lights (LED 보안등의 광균일도 향상을 위한 비구면 Mirror형 광학 설계에 관한 연구)

  • Jung, In-Ho;Yoon, Cheol-Yong;Ye, In-Soo;Hyun, Dong-Hoon
    • Journal of the Korean Society of Manufacturing Technology Engineers
    • /
    • v.20 no.1
    • /
    • pp.114-119
    • /
    • 2011
  • There is a limit to technology of improving luminous intensity uniformity and glare, known as a weakness of existing LED lamp. Because of Using many LED, LED lamp not only waste energy but have bad effect on efficiency. Our goal is to develop security lights solution which is contented with suitable area in KS(Korean Industrial Standards) and to remove glare by combining asphere in optical system with different concept. To improve luminous intensity uniformity, a reflect mirror system was used after an aspheric optical system design for this study. We made a mirror and measured it after analysing luminance changes depend on aspheric shapes with simulation program to see if aspheric shapes effect luminance distribution. We made progress to find problems and improve them by comparing measured data and analysed data. This result of the study will contribute to industry of LED lighting through developing solution of emotional illumination of LED security lights by knowing the importance of reflectivity with this study and improving luminous intensity uniformity with solving the problem.

Implementation of Remote Physical Security Systems Using Smart Phone (스마트폰을 이용한 원격 물리적 보안 시스템의 구현)

  • Lee, Moon-Goo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.2
    • /
    • pp.217-224
    • /
    • 2011
  • Existing wire based physical security system solutions show limitations in time and space. In order to solve these deficiencies, a remote physical security system has been implemented using smart phone based on mobile cloud computing technique. The security functions of mobile cloud computing technique include mobile device user authentication, confidentiality of communication, integrity of information, availability of system, and target system access control, authority management and secure hand off etc. Proposed system has been constructed as remote building management system using smart phone, and also has been efficient to reduce energy cost (5~30%), result of system average access and response time 7.082 second. This systems are evaluated to have high efficiency compared to performance.

Design and Implementation of Low-power CSD Considering Beacon Period and Channel Scan Time (비컨 주기와 채널 탐색기간을 고려한 저전력 CSD의 설계 및 구현)

  • Kim, Taek-Hyun;Park, Se-Young;Choi, Hoon;Baek, Yun-Ju
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.1
    • /
    • pp.50-54
    • /
    • 2010
  • A Container Security Device (CSD) which is different existing RFID Tag strengthens the physical security as mounted inside the container and the information security as encrypts doubly a data. CSD must use the resources efficiently in order to operate with the battery. Therefore, it needs low-power mechanism which repeats the sleep period and channel scan period. However, by adjusting these periods, the trade-off occurs between energy efficiency and network connectivity. In this paper, we implement low-power CSD and resolve this problem by adjusting beacon period and channel scan time. As a result, We guarantee the network connectivity 95% or more and maximum life up to 16 days using common AA batteries.

Stackelberg Game between Multi-Leader and Multi-Follower for Detecting Black Hole and Warm Hole Attacks In WSN

  • S.Suganthi;D.Usha
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.159-167
    • /
    • 2023
  • Objective: • To detect black hole and warm hole attacks in wireless sensor networks. • To give a solution for energy depletion and security breach in wireless sensor networks. • To address the security problem using strategic decision support system. Methods: The proposed stackelberg game is used to make the spirited relations between multi leaders and multi followers. In this game, all cluster heads are acts as leaders, whereas agent nodes are acts as followers. The game is initially modeled as Quadratic Programming and also use backtracking search optimization algorithm for getting threshold value to determine the optimal strategies of both defender and attacker. Findings: To find optimal payoffs of multi leaders and multi followers are based on their utility functions. The attacks are easily detected based on some defined rules and optimum results of the game. Finally, the simulations are executed in matlab and the impacts of detection of black hole and warm hole attacks are also presented in this paper. Novelty: The novelty of this study is to considering the stackelberg game with backtracking search optimization algorithm (BSOA). BSOA is based on iterative process which tries to minimize the objective function. Thus we obtain the better optimization results than the earlier approaches.

Active VM Consolidation for Cloud Data Centers under Energy Saving Approach

  • Saxena, Shailesh;Khan, Mohammad Zubair;Singh, Ravendra;Noorwali, Abdulfattah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.345-353
    • /
    • 2021
  • Cloud computing represent a new era of computing that's forms through the combination of service-oriented architecture (SOA), Internet and grid computing with virtualization technology. Virtualization is a concept through which every cloud is enable to provide on-demand services to the users. Most IT service provider adopt cloud based services for their users to meet the high demand of computation, as it is most flexible, reliable and scalable technology. Energy based performance tradeoff become the main challenge in cloud computing, as its acceptance and popularity increases day by day. Cloud data centers required a huge amount of power supply to the virtualization of servers for maintain on- demand high computing. High power demand increase the energy cost of service providers as well as it also harm the environment through the emission of CO2. An optimization of cloud computing based on energy-performance tradeoff is required to obtain the balance between energy saving and QoS (quality of services) policies of cloud. A study about power usage of resources in cloud data centers based on workload assign to them, says that an idle server consume near about 50% of its peak utilization power [1]. Therefore, more number of underutilized servers in any cloud data center is responsible to reduce the energy performance tradeoff. To handle this issue, a lots of research proposed as energy efficient algorithms for minimize the consumption of energy and also maintain the SLA (service level agreement) at a satisfactory level. VM (virtual machine) consolidation is one such technique that ensured about the balance of energy based SLA. In the scope of this paper, we explore reinforcement with fuzzy logic (RFL) for VM consolidation to achieve energy based SLA. In this proposed RFL based active VM consolidation, the primary objective is to manage physical server (PS) nodes in order to avoid over-utilized and under-utilized, and to optimize the placement of VMs. A dynamic threshold (based on RFL) is proposed for over-utilized PS detection. For over-utilized PS, a VM selection policy based on fuzzy logic is proposed, which selects VM for migration to maintain the balance of SLA. Additionally, it incorporate VM placement policy through categorization of non-overutilized servers as- balanced, under-utilized and critical. CloudSim toolkit is used to simulate the proposed work on real-world work load traces of CoMon Project define by PlanetLab. Simulation results shows that the proposed policies is most energy efficient compared to others in terms of reduction in both electricity usage and SLA violation.

GIS Vector Map Compression using Spatial Energy Compaction based on Bin Classification (빈 분류기반 공간에너지집중기법을 이용한 GIS 벡터맵 압축)

  • Jang, Bong-Joo;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.3
    • /
    • pp.15-26
    • /
    • 2012
  • Recently, due to applicability increase of vector data based digital map for geographic information and evolution of geographic measurement techniques, large volumed GIS(geographic information service) services having high resolution and large volumed data are flowing actively. This paper proposed an efficient vector map compression technique using the SEC(spatial energy compaction) based on classified bins for the vector map having 1cm detail and hugh range. We encoded polygon and polyline that are the main objects to express geographic information in the vector map. First, we classified 3 types of bins and allocated the number of bits for each bin using adjacencies among the objects. and then about each classified bin, energy compaction and or pre-defined VLC(variable length coding) were performed according to characteristics of classified bins. Finally, for same target map, while a vector simplification algorithm had about 13%, compression ratio in 1m resolution we confirmed our method having more than 80% encoding efficiencies about original vector map in the 1cm resolution. Also it has not only higher compression ratio but also faster computing speed than present SEC based compression algorithm through experimental results. Moreover, our algorithm presented much more high performances about accuracy and computing power than vector approximation algorithm on same data volume sizes.

Review of the Current Policy Related to Exploration and Development of Mineral Resources in China (중국의 광물자원 탐사개발 관련 최신 정책 고찰)

  • Kim, Seong-Yong;Bae, Jun-Hee;Lee, Jae-Wook;Heo, Chul-Ho
    • Economic and Environmental Geology
    • /
    • v.49 no.3
    • /
    • pp.201-212
    • /
    • 2016
  • Due to growing problems securing stable mineral and energy resources with international political and economic changes, China has dedicated itself to strategies and policies to enhance its stable mineral and energy resources security. China has established a rare earth elements(REE) industry policy after the abolition of the REE exports quota system. China's six large REE companies have also been integrated into REE mining, smelting and refining companies. Efforts have been increased to enhance China's energy security through unconventional oil and gas exploration and development investment, as well as effort in R&D. The country will focus on technology development and exploration to promote commercial production of unconventional oil and gas based on countries with shale gas. China is making long-term contracts and joint ventures to ensure the acquisition of reliable mineral and energy resources from abroad. Government of China has proposed a range of initiatives, such as the integration of resources development strategies and environmental development strategies, internationalization of resource management, supply diversification and advancement, strengthening industry linking strategy, grouping and diversification strategy.

Optimal Dispatch of Energy and Frequency Regulation Reserve Considering Contingency in a Competitive Electricity Market (경쟁적 전력시장에서 상정사고를 고려한 에너지와 주파수 제어예비력의 최적배분 기법)

  • Lee, Ki-Song;Jeong, Yun-Won;Shin, Joong-Rin;Chun, Yeong-Han;Park, Jong-Bae
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.55 no.5
    • /
    • pp.202-213
    • /
    • 2006
  • This paper presents a new approach for optimal dispatch of energy and frequency regulation reserve considering contingency in a competitive electricity market. It is necessary to introduce the reserve market with the spot energy market for operating efficiently and obtaining the security of the electricity market. However, the reserve market is closely connected with the energy market since the energy and reserve are produced from the same resources. Thus, it is inevitable to co-optimize the energy and ancillary service for efficient operation of energy and ancillary service market. Therefore, this paper proposes a new method for optimal dispatch of energy and frequency regulation reserve considering n-1 contingency of generator and transmission line using constraints and sensitivity based on AC power flow To verify the effectiveness of the proposed method, the numerical studies have been performed for 5-bus sample system and modified IEEE 14-bus system.