• 제목/요약/키워드: energy security

검색결과 916건 처리시간 0.028초

저탄소 에너지 학술 정보 분석 (Scientometric Analysis for Low Carbon Energy)

  • 오민수;길상철;조진동
    • 자원환경지질
    • /
    • 제49권1호
    • /
    • pp.53-61
    • /
    • 2016
  • 현대 사회에서 우리 삶의 생활 방식은 엄청난 에너지를 필요로 하고 있다. 따라서 오늘날 국제사회는 자원 고갈과 에너지 안보 및 지구 온난화 등에 대처하기 위한 에너지 기술 혁명을 진행하고 있다. 즉, 에너지 기술혁명은 저탄소 에너지기술의 개발과 보급으로 나타나고 있다. 국제사회는 미래의 새로운 에너지 패러다임을 위해 진행하고 있는 저탄소 에너지 기술 혁명, 기술개발 현황, 국제사회의 추진 전략, 저탄소 에너지 기술의 부문별 현황과 과제 해결 등을 추진하고 있다. 따라서 국제 사회의 저탄소 에너지 기술 개발현황과 'Web of Science'에 등록된 학술 문헌지에 발표된 저탄소 에너지 자료 (2001~2015년) 검색을 통하여 총 1441편이 확인되었으나 정밀 분석을 통해서 저탄소 에너지에 관련성이 적은 논문을 제외한 결과 총 869편을 분석 대상으로 선정하였다. 저탄소 에너지 기술에 대한 국제적인 공동연구는 영국, 중국, 미국, 네덜란드 및 일본을 중심으로 연구가 이루어졌다.

자원제약적 임베디드 환경에서 종단간 보안을 지원하는 수정된 MQTT-SN (Modified MQTT-SN Protocol for End-to-End Security in a Constrained Embedded Environment)

  • 남혜민;박창섭
    • 정보보호학회논문지
    • /
    • 제30권5호
    • /
    • pp.859-870
    • /
    • 2020
  • MQTT-SN(Message Queuing Telemetry Transport - Sensor Network) 프로토콜은 센서 기반의 IoT(Internet of Things)환경에서 사용되는 메시지 전송 프로토콜이다. 이 MQTT-SN 프로토콜은 메시지 전송 중간에 중개자(Broker)를 둔 발행-구독 모델(Publish-Subscribe Model)로 각 IoT 장치들이 메시지를 전달 할 때 반드시 중개자를 통해 메시지를 주고 받는 모델이다. 하지만 MQTT-SN 프로토콜은 메시지 보안, 상호 인증, 접근 제어, 중개자 보안등을 만족하는 보안 관련된 기능을 제공하고 있지 않다. 이에 따라 최근 다양한 보안 문제가 발생하고 있으며, 보안이 필요한 상황이 대두되고 있다. 본 논문에서는 MQTT-SN의 보안 요구사항을 다시 한번 살펴보고, 이 프로토콜이 적용되는 IoT의 자원이 제한된 환경에서의 제약 조건을 만족하면서 보안을 향상시키는 수정된 프로토콜을 제안한다. 제안 프로토콜은 기존과 다르게, 보안 필드와 인증 서버가 추가되었으며 이를 통해 보안 요구사항을 만족시키도록 한다. 더불어 제안된 프로토콜을 실제 구현 및 테스트하고 에너지 소모 관점에서 제안된 프로토콜이 실제 사용이 가능한지 평가하도록 한다.

주요기반시설 서비스의 안정적 운영을 위한 보안 프레임워크 설계에 관한 연구 (A Study on the Security Framework Design for Stable Operation of Critical Infrastructure Service)

  • 이수연;유지연;임종인
    • 한국IT서비스학회지
    • /
    • 제15권4호
    • /
    • pp.63-72
    • /
    • 2016
  • Critical infrastructure has been operating in a closed environment with a completely separate information system and in the private area. However, with the current ICT environment changes due to convergence and open platforms it has increased the threats and risks to critical infrastructure. The importance of cyber security is increasing in the infrastructure control system, such as the outbreak of Ukraine blackout in 2015 by a malicious code called 'black energy'. This thesis aims to recognize the importance and necessity of protecting the critical infrastructure service, designing a security framework reflecting environmental and characteristic changes, and analyzing the management system suitable for a security framework. We also propose a theoretical basis for constructing a new security framework by comparing and analyzing seven international security management system standards, such as NIST 800-82 and IEC 62443-2-1, which are used in the control system. As a result, the environment surrounding critical infrastructure changes with the characteristics of connectivity, openness, and finality was studied, and as a response to this, many scholars and institutions present critical infrastructure security frameworks as cycle enhancement type structures, risk management structures, and management domain expansion structures. In response, the security framework encompassing these structures, CISF (Critical Infrastructure Security Framework), was designed. Additionally, through the security related international standard and criterion analysis, as a newly designed security standard suitable for CISF, IEC 62443-2-1 is reviewed and suggestions are made.

Application of peak based-Bayesian statistical method for isotope identification and categorization of depleted, natural and low enriched uranium measured by LaBr3:Ce scintillation detector

  • Haluk Yucel;Selin Saatci Tuzuner;Charles Massey
    • Nuclear Engineering and Technology
    • /
    • 제55권10호
    • /
    • pp.3913-3923
    • /
    • 2023
  • Todays, medium energy resolution detectors are preferably used in radioisotope identification devices(RID) in nuclear and radioactive material categorization. However, there is still a need to develop or enhance « automated identifiers » for the useful RID algorithms. To decide whether any material is SNM or NORM, a key parameter is the better energy resolution of the detector. Although masking, shielding and gain shift/stabilization and other affecting parameters on site are also important for successful operations, the suitability of the RID algorithm is also a critical point to enhance the identification reliability while extracting the features from the spectral analysis. In this study, a RID algorithm based on Bayesian statistical method has been modified for medium energy resolution detectors and applied to the uranium gamma-ray spectra taken by a LaBr3:Ce detector. The present Bayesian RID algorithm covers up to 2000 keV energy range. It uses the peak centroids, the peak areas from the measured gamma-ray spectra. The extraction features are derived from the peak-based Bayesian classifiers to estimate a posterior probability for each isotope in the ANSI library. The program operations were tested under a MATLAB platform. The present peak based Bayesian RID algorithm was validated by using single isotopes(241Am, 57Co, 137Cs, 54Mn, 60Co), and then applied to five standard nuclear materials(0.32-4.51% at.235U), as well as natural U- and Th-ores. The ID performance of the RID algorithm was quantified in terms of F-score for each isotope. The posterior probability is calculated to be 54.5-74.4% for 238U and 4.7-10.5% for 235U in EC-NRM171 uranium materials. For the case of the more complex gamma-ray spectra from CRMs, the total scoring (ST) method was preferred for its ID performance evaluation. It was shown that the present peak based Bayesian RID algorithm can be applied to identify 235U and 238U isotopes in LEU or natural U-Th samples if a medium energy resolution detector is was in the measurements.

Novel Method for DNA-Based Elliptic Curve Cryptography for IoT Devices

  • Tiwari, Harsh Durga;Kim, Jae Hyung
    • ETRI Journal
    • /
    • 제40권3호
    • /
    • pp.396-409
    • /
    • 2018
  • Elliptic curve cryptography (ECC) can achieve relatively good security with a smaller key length, making it suitable for Internet of Things (IoT) devices. DNA-based encryption has also been proven to have good security. To develop a more secure and stable cryptography technique, we propose a new hybrid DNA-encoded ECC scheme that provides multilevel security. The DNA sequence is selected, and using a sorting algorithm, a unique set of nucleotide groups is assigned. These are directly converted to binary sequence and then encrypted using the ECC; thus giving double-fold security. Using several examples, this paper shows how this complete method can be realized on IoT devices. To verify the performance, we implement the complete system on the embedded platform of a Raspberry Pi 3 board, and utilize an active sensor data input to calculate the time and energy required for different data vector sizes. Connectivity and resilience analysis prove that DNA-mapped ECC can provide better security compared to ECC alone. The proposed method shows good potential for upcoming IoT technologies that require a smaller but effective security system.

Security Clustering Algorithm Based on Integrated Trust Value for Unmanned Aerial Vehicles Network

  • Zhou, Jingxian;Wang, Zengqi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권4호
    • /
    • pp.1773-1795
    • /
    • 2020
  • Unmanned aerial vehicles (UAVs) network are a very vibrant research area nowadays. They have many military and civil applications. Limited bandwidth, the high mobility and secure communication of micro UAVs represent their three main problems. In this paper, we try to address these problems by means of secure clustering, and a security clustering algorithm based on integrated trust value for UAVs network is proposed. First, an improved the k-means++ algorithm is presented to determine the optimal number of clusters by the network bandwidth parameter, which ensures the optimal use of network bandwidth. Second, we considered variables representing the link expiration time to improve node clustering, and used the integrated trust value to rapidly detect malicious nodes and establish a head list. Node clustering reduce impact of high mobility and head list enhance the security of clustering algorithm. Finally, combined the remaining energy ratio, relative mobility, and the relative degrees of the nodes to select the best cluster head. The results of a simulation showed that the proposed clustering algorithm incurred a smaller computational load and higher network security.