• 제목/요약/키워드: key protection

검색결과 956건 처리시간 0.027초

An Improved Shared-Path Protection Algorithm for Double-Link Failures in Meshed WDM Optical Networks

  • Wang, Xingwei;Guo, Lei;Li, Lemin;Wei, Xuetao
    • Journal of Communications and Networks
    • /
    • 제10권3호
    • /
    • pp.331-337
    • /
    • 2008
  • In this paper, we investigate survivability in wavelength division multiplexing (WDM) mesh networks and propose a new algorithm called improved shared-path protection (ISPP) to completely tolerate the double-link failures. Compared with previous algorithms for protecting double-link failures, i.e., shared-path protection (SPP) and shared-link protection (SLP), the advantage of ISPP is to allow primary paths and backup paths to share the mixed wavelength-links based on the proposed new rules in which some primary wavelength-links can be changed to mixed wavelength-links, which can be shared by primary paths and backup paths. In addition, some mixed wavelength-links also can be shared by different backup paths for saving resources. Simulation results show that ISPP algorithm performs better in resource utilization ratio and blocking probability than conventional SPP and SLP algorithms.

DNP3.0 프로토콜을 이용한 배전계통 멀티 에이전트 보호시스템의 통신 모듈 개발에 관한 연구 (A Study on the Development of an Agent Communication Module for a Multi-Agent Based Power Distribution Network Protection System Using DNP 3.0 Protocols)

  • 최면송;이한웅;민병운;정광호;이승재;현승호
    • 대한전기학회논문지:전력기술부문A
    • /
    • 제52권9호
    • /
    • pp.506-512
    • /
    • 2003
  • In this paper, a communication module between Relay agents in a multi-agent system based power distribution network protection system is realized using DNP3.0(Distributed Network Protocol), which is the standard communication protocol of distribution automation system in KEPCO. The key words for agent communication in the multi-agent based protection system are defined and represented by use of DNP application function code. The communication module developed based on the proposed communication scheme is tested by use of the Communication Test Harness, a test tool for DNP protocol, then used to the multi-agent system based power distribution net work protection system.

철근콘크리트 기둥 발파해체를 위한 방호재 특성에 대한 실험적 연구 (Experimental Study on the Characteristics of Protection Materials for Explosive Demolition of Reinforced Concrete Column)

  • 류창하;박용원;김양균
    • 터널과지하공간
    • /
    • 제6권3호
    • /
    • pp.260-266
    • /
    • 1996
  • Safety concern is one of the most important parameters in the design of explosive building demolition. Laboratory experiments were performed to investigate the failure behaviour of concrete columns and the effects of protection materials. Fourteen reinforced columns with two sizes were constructed and the effects of protection materials were tested for two kinds of materials: non woven fabrics and wire net. The results showed that control of gas effects is a key to the control of flying chips. It was recommended to use both wire net and non woven fabrics as primary and secondary protection materials. Such protection method was successfully applied to the explosive demolition of 16 and 17-strory apartment buildings.and the results of a simulation on a model tunneling workings using diesel equipments are introduced. In case of typical model of tunneling face, the gas concentration of human height is about one third of roof concentration and right side half of the tunnel shows better environment than left half. NOx concentration of workings can be estimated about 0.45ppm which is much lower than permissible level(5 ppm).

  • PDF

Diaporthe taoicola and D. siamensis, Two New Records on Citrus sinensis in China

  • Cui, Meng Jiao;Wei, Xin;Xia, Peng Liang;Yi, Ji Ping;Yu, Zhi He;Deng, Jian Xin;Li, Qi Li
    • Mycobiology
    • /
    • 제49권3호
    • /
    • pp.267-274
    • /
    • 2021
  • Two Diaporthe species isolated from fruit of Citrus sinensis in China were characterized based on morphology and multilocus phylogeny of ITS, tef1, and tub2 gene sequences. The phylogeny indicated that the two species match Diaporthe taoicola and D. siamensis. A critical examination of phenotypic characteristics confirmed the phylogenetic results. Diaporthe taoicola was morphologically characterized by producing Alpha conidia with tapering toward both ends. Meanwhile, D. siamensis produced cylindrical or ellipsoidal Alpha conidia with two oil drops. Pathogenicity tests revealed that both species were pathogenic to fruit of C. sinensis. To our knowledge, the two species were firstly reported on Citrus sinensis in China.

유비쿼터스 환경에 적합한 경량 블록암호 mCrypton에 대한 안전성 분석 (Security Analysis of Light-weight Block Cipher mCrypton Suitable for Ubiquitous Computing Environment)

  • 이창훈;이유섭;성재철
    • 한국멀티미디어학회논문지
    • /
    • 제12권5호
    • /
    • pp.644-652
    • /
    • 2009
  • 유비쿼터스 센서 네트워크(USN), 휴대 인터넷(WiBro), 무선식별 시스템(RFID) 등의 새로운 통신 환경이 현실화 되고 있다. 이에, 이러한 제약된 자원을 사용하는 통신 환경에서 보안과 프라이버시 보호를 보장하기 위해 mCrypton, HIGHT, SEA, PRESENT와 같은 경량 블록 암호들이 제안되었다. mCrypton은 Crypton의 경량화 버전으로 64-비트, 96-비트, 128-비트 키를 지원하는 64-비트 블록 암호이다. 본 논문에서는 mCrypton에 대한 첫 번째 분석 결과로서, 128-비트 키를 사용하는 8-라운드 mCrypton에 대한 연관키 렉탱글 공격을 제안한다. 이를 위해 7-라운드 연관키 렉탱글 구별자를 구성하기 위해 사용하는 두 개의 연관키 부정 차분 특성을 설명하고 이를 기반으로 8-라운드 mCypton에 대한 연관키 렉탱글 공격을 제안한다. 본 공격은 $2^{45.5}$의 데이터와 $2^{45.5}$의 시간 복잡도를 필요로 한다.

  • PDF

대형 발전기 주보호를 위한 디지털 비율차동 계전기법 (Digital Ratio Differential Relaying for Main Protection of Large Generator)

  • 박철원;반우현
    • 전기학회논문지P
    • /
    • 제61권1호
    • /
    • pp.35-40
    • /
    • 2012
  • An AC generator is an important component in producing an electric power and so it requires highly reliable protection relays to minimize the possibility of demage occurring under fault conditions. It is a need for research of digital generator protection system(DGPS) for the next-generation ECMS and an efficient operation of protection control system in power station. However, most of protection and control system used in power plants have been still imported as turn-key and operated in domestic. This may cause the lack of the correct understanding on the protection systems and methods, and thus have difficulties in optimal operation. In this paper, presented ratio differential relaying(RDR) is main protective element in generator protection IED. The fault detection technique, operation zone and setting value of the RDR were studied and, compared with two of the fault detection algorithm. For evaluation performance of the RDR, the data obtained from ATPDraw5.7p4 modeling was used. The proposed methods are shown to be able to rapidly identify internal fault and did not operate a miss-operation for all the external fault.

One-round Secure Key Exchange Protocol With Strong Forward Secrecy

  • Li, Xiaowei;Yang, Dengqi;Chen, Benhui;Zhang, Yuqing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권11호
    • /
    • pp.5639-5653
    • /
    • 2016
  • Security models for key exchange protocols have been researched for years, however, lots of them only focus on what secret can be compromised but they do not differentiate the timing of secrets compromise, such as the extended Canetti-Krawczyk (eCK) model. In this paper, we propose a new security model for key exchange protocols which can not only consider what keys can be compromised as well as when they are compromised. The proposed security model is important to the security proof of the key exchange protocols with forward secrecy (either weak forward secrecy (wFS) or strong forward secrecy (sFS)). In addition, a new kind of key compromise impersonation (KCI) attacks which is called strong key compromise impersonation (sKCI) attack is proposed. Finally, we provide a new one-round key exchange protocol called mOT+ based on mOT protocol. The security of the mOT+ is given in the new model. It can provide the properties of sKCI-resilience and sFS and it is secure even if the ephemeral key reveal query is considered.

Provably secure attribute based signcryption with delegated computation and efficient key updating

  • Hong, Hanshu;Xia, Yunhao;Sun, Zhixin;Liu, Ximeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권5호
    • /
    • pp.2646-2659
    • /
    • 2017
  • Equipped with the advantages of flexible access control and fine-grained authentication, attribute based signcryption is diffusely designed for security preservation in many scenarios. However, realizing efficient key evolution and reducing the calculation costs are two challenges which should be given full consideration in attribute based cryptosystem. In this paper, we present a key-policy attribute based signcryption scheme (KP-ABSC) with delegated computation and efficient key updating. In our scheme, an access structure is embedded into user's private key, while ciphertexts corresponds a target attribute set. Only the two are matched can a user decrypt and verify the ciphertexts. When the access privileges have to be altered or key exposure happens, the system will evolve into the next time slice to preserve the forward security. What's more, data receivers can delegate most of the de-signcryption task to data server, which can reduce the calculation on client's side. By performance analysis, our scheme is shown to be secure and more efficient, which makes it a promising method for data protection in data outsourcing systems.

인터넷을 통한 소프트웨어 불법사용 방지시스템 설계 (A Design of illegal Usage Protection System of Software through Internet)

  • 이상렬
    • 한국컴퓨터정보학회논문지
    • /
    • 제6권4호
    • /
    • pp.110-118
    • /
    • 2001
  • 본 논문에서는 인터넷에서 암호화 방법을 이용하여 소프트웨어의 불법사용을 방지할 수 있는 시스템을 설계하였다. 현재의 대부분 소프트웨어들은 저작권 보호를 위하여 Lock Key등과 같은 물리적인 장치를 사용하지 않고 사용상의 편의성 때문에 설치 암호를 입력하는 방식을 이용하고 있다. 따라서 암호만 알면 누구나 소프트웨어를 자유로이 이용할 수 있기 때문에 정품 소프트웨어를 구입한 사용자가 의도적으로 암호를 노출시킬 경우 라이센스 수량 이상으로 불법사용 될 수 있다. 본 논문에서 제안한 시스템을 이용할 경우 소프트웨어 사용자는 라이센스 수량만큼만 동시에 사용할 수 있음으로 소프트웨어의 불법사용을 원천적으로 봉쇄할 수 있다. 또한 소프트웨어 개발자는 판매 수량을 정확히 파악할 수 있음으로 경영에 도움을 받을 수 있고 소프트웨어 사용자는 개발자로부터 소프트웨어의 유지보수를 신속히 받을 수 있다.

  • PDF

Privacy Protection Method for Sensitive Weighted Edges in Social Networks

  • Gong, Weihua;Jin, Rong;Li, Yanjun;Yang, Lianghuai;Mei, Jianping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권2호
    • /
    • pp.540-557
    • /
    • 2021
  • Privacy vulnerability of social networks is one of the major concerns for social science research and business analysis. Most existing studies which mainly focus on un-weighted network graph, have designed various privacy models similar to k-anonymity to prevent data disclosure of vertex attributes or relationships, but they may be suffered from serious problems of huge information loss and significant modification of key properties of the network structure. Furthermore, there still lacks further considerations of privacy protection for important sensitive edges in weighted social networks. To address this problem, this paper proposes a privacy preserving method to protect sensitive weighted edges. Firstly, the sensitive edges are differentiated from weighted edges according to the edge betweenness centrality, which evaluates the importance of entities in social network. Then, the perturbation operations are used to preserve the privacy of weighted social network by adding some pseudo-edges or modifying specific edge weights, so that the bottleneck problem of information flow can be well resolved in key area of the social network. Experimental results show that the proposed method can not only effectively preserve the sensitive edges with lower computation cost, but also maintain the stability of the network structures. Further, the capability of defending against malicious attacks to important sensitive edges has been greatly improved.