• Title/Summary/Keyword: limited resources

Search Result 2,476, Processing Time 0.052 seconds

A Research on IoT Security Technology based on Blockchain and Lightweight Cryptographic Algorithms

  • Sun-Jib Kim
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.1
    • /
    • pp.343-348
    • /
    • 2023
  • As the IoT market continues to grow, security threats to IoT devices with limited resources are also increasing. However, the application of security technology to the existing system to IoT devices with limited resources is impossible due to the inherent characteristics of IoT devices. Various methods for solving related problems have been studied in existing studies to solve this problem. Therefore, this study analyzes the characteristics of domestic IoT authentication standards and existing research to propose an algorithm that applies blockchain-based authentication and lightweight encryption algorithms to IoT equipment with limited resources. In this study, a key generation method was applied using a Lamport hash-chain and data integrity between IoT devices were provided using a Merkle Tree, and an LEA encryption algorithm was applied using confidentiality in data communication. In the experiment, it was verified that the efficiency is high when the LEA encryption algorithm, which is a lightweight encryption algorithm, is applied to IoT devices with limited resources.

Honeypot game-theoretical model for defending against APT attacks with limited resources in cyber-physical systems

  • Tian, Wen;Ji, Xiao-Peng;Liu, Weiwei;Zhai, Jiangtao;Liu, Guangjie;Dai, Yuewei;Huang, Shuhua
    • ETRI Journal
    • /
    • v.41 no.5
    • /
    • pp.585-598
    • /
    • 2019
  • A cyber-physical system (CPS) is a new mechanism controlled or monitored by computer algorithms that intertwine physical and software components. Advanced persistent threats (APTs) represent stealthy, powerful, and well-funded attacks against CPSs; they integrate physical processes and have recently become an active research area. Existing offensive and defensive processes for APTs in CPSs are usually modeled by incomplete information game theory. However, honeypots, which are effective security vulnerability defense mechanisms, have not been widely adopted or modeled for defense against APT attacks in CPSs. In this study, a honeypot game-theoretical model considering both low- and high-interaction modes is used to investigate the offensive and defensive interactions, so that defensive strategies against APTs can be optimized. In this model, human analysis and honeypot allocation costs are introduced as limited resources. We prove the existence of Bayesian Nash equilibrium strategies and obtain the optimal defensive strategy under limited resources. Finally, numerical simulations demonstrate that the proposed method is effective in obtaining the optimal defensive effect.

Sustainable Environmental Science & Recycling Technology Education for High School and Middle Schools: Global Scenario

  • Thenepalli, Thriveni;Chilakala, Ramakrsihna;Ahn, Ji Whan
    • Journal of Energy Engineering
    • /
    • v.28 no.1
    • /
    • pp.45-48
    • /
    • 2019
  • Currently, the global atmosphere around the world is altering at a very rapid pace. Among those changes, some are beneficial, but most of the changes are lead to destruction to our planet. The area of environmental science is a significant resource for learning more about these changes. Due to the urbanization, the human population is increasing, natural resources becoming very limited. To solve the limited resources issues, recycling is absolutely an alternative source for the new demands and limitations. Recycling education is very important to raise awareness among students and their communities about the need for recycling and what materials are recyclable locally. In this paper, we reported the role of sustainability science and technology and the impact of recycling research education in the middle schools, both in developing countries and Asian countries and also we included the brief data of global recycling of waste.

A WTLSW Protocol and a Proxy Model to Ensure End-to-End Security for Mobile Devices with Limited Resources (제한된 자원의 무선 단말기를 위한 종단간 보안을 제공하는 WTLSW 프로토콜 및 프록시 모델)

  • Lee, Heon-Guil
    • Journal of Industrial Technology
    • /
    • v.29 no.B
    • /
    • pp.33-39
    • /
    • 2009
  • The need for end-to-end security has been increased with the widespread use of mobile devices in wireless internet access applications such as mobile commerce. The WAP1.x has an end-to-end security problem that the message transmitted between the mobile device and the Web server is decrypted inside the gateway within a short time. To overcome this problem, several protocols including WAP2.0 has been proposed. These protocols require that the heavy modules such as TLS or data compression modules should be installed on the mobile device with limited resources. This paper proposes a new WTLSW(WTLS-TLS at Web server) protocol and a new WAP2.0 proxy model in order to ensure end-to-end security between the mobile device and the Web server and to be appropriate for mobile devices with limited resources.

  • PDF

Study on prospect of nuclear power generation in Korea (원자력발전 전망에 관한 검토)

  • 김종주;문희성
    • 전기의세계
    • /
    • v.16 no.1
    • /
    • pp.19-28
    • /
    • 1967
  • Indigenous energy resources available in Korea are limited to the three major resources such as Korean anthracite, hydraulic potential and wood and straws. As reported in various reports concerning energy problem in Korea, unfortunately these three major resources are not only poor in quality but also limited in quantity. The amount of energy to be imported, which will be increased at a considerably high rate by years due to the shortage in the supply by domertic sources against the demand, is studied in the view-pint of sound and logical energy dependence upon the external sources. What would occur, if the imported energy would be exclusively limited to an energy source only, has an enough reason to be paid a significant consideration. As a result, the feasibility is discarded in favour of nuclear power plants after an extensive prospect for electric power development plan covering more than coming thirty years, i.e., up to the year of 2,000 A.D. In briefing, this paper indicates that a measures to accomodate as large amount of nuclear power plants as possible in the electric power system is not only inevitable for a sound solution of the severe energy problem with which Korea is to be confronted but also leads to the national benefit.

  • PDF

Development of a Descriptive Cost Effectiveness Model for a Subcontractor with Limited Resources

  • Kim, Dae Young
    • Journal of KIBIM
    • /
    • v.7 no.3
    • /
    • pp.40-48
    • /
    • 2017
  • It only takes one failed project to wipe out an entire year's profit, when the projects are not managed efficiently. Additionally, escalating costs of materials and a competitive local construction market make subcontractors a challenge. Subcontractors have finite resources that should be allocated simultaneously across many projects in a dynamic manner. Significant scheduling problems are posed by concurrent multi-projects with limited resources. The objective of this thesis is to identify the effect of productivity changes on the total cost resulting from shifting crews across projects using a descriptive model. To effectively achieve the objective, this study has developed a descriptive cost model for a subcontractor with multi-resources and multi-projects. The model was designed for a subcontractor to use as a decision-making tool for resources allocation and scheduling. The model identified several factors affecting productivity. Moreover, when the model was tested using hypothetical data, it produced some effective combinations of resource allocation with associated total costs. Furthermore, a subcontractor minimizes total costs by balancing overtime costs, tardiness penalties, and incentive bonus, while satisfying available processing time constraints.

Customized Resource Collaboration System based on Ontology and User Model in Resource Sharing Environments

  • Park, Jong-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.4
    • /
    • pp.107-114
    • /
    • 2018
  • Recently, various wearable personal devices such as a smart watch have been developed and these personal devices are being miniaturized. The user desires to receive new services from personal devices as well as services that have been received from personal computers, anytime and anywhere. However, miniaturization of devices involves constraints on resources such as limited input and output and insufficient power. In order to solve these resource constraints, this paper proposes a resource collaboration system which provides a service by composing sharable resources in the resource sharing environment like IoT. the paper also propose a method to infer and recommend user-customized resources among various sharable resources. For this purpose, the paper defines an ontology for resource inference. This paper also classifies users behavior types based on a user model and then uses them for resource recommendation. The paper implements the proposed method as a prototype system on a personal device with limited resources developed for resource collaboration and shows the effectiveness of the proposed method by evaluating user satisfaction.

A Study on the Lot Sizing and Scheduling in Process Industries (장치 산업에서 로트 크기와 작업 순서 결정을 위한 연구)

  • 이호일;김만식
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.12 no.19
    • /
    • pp.79-88
    • /
    • 1989
  • This characteristics of process industries are high capital intensity, relatively long and sequence dependent setup times, and extremely limited capacity resources. The lot sizing, sequencing and limited capacity resources factors must he considered for production scheduling in these industries. This paper presents a mixed integer programming model for production scheduling. The economic trade offs between capacitated lot sizing flow shop scheduling and sequence dependent setup times also be compared with SMITH-DANIELS's model. As a results, it is shown that this paper has lower total cost, more efficient throughput than SMITH-DANIELS's model.

  • PDF