• Title/Summary/Keyword: protection cost

Search Result 700, Processing Time 0.03 seconds

Analysis of DDoS Prevention Algorithm in Mobile Ad-hoc Network (MANET 환경에서의 DDoS 공격방지 알고리즘 분석)

  • Kim, Dong-Chul
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.11-17
    • /
    • 2013
  • In this paper, the information security requirements in the mobile ad-hoc network(MANET) are presented, and the algorithm to establish the protection node(gateway) is proposed to prevent the distributed denial of service(DDoS). The information security technology and security threats in the MANET are presented, and protection node is decided to minimize the total cost through the sending nodes and receiving nodes by way of protection node. To set up the protection node, the minimization algorithms of maximum cost and the average cost between the protection node and receiving nodes are compared with the optimal solutions, in which optimal solution is found out by all enumeration method. From the results, the total cost between the sending and receiving nodes is minimized under the average cost minimization algorithm rather than the using of the maximum cost.

Environmental Protection Experience, Cost and Performance

  • Gu, Meizhen;Jin, Shanyue
    • International Journal of Advanced Culture Technology
    • /
    • v.8 no.4
    • /
    • pp.101-109
    • /
    • 2020
  • Along with rapid global economic development, people are slowly becoming environmentally aware and green development is increasingly a vital topic of social concern. Academic circles are currently focusing on environmental protection and economic growth to explore the coordinated development of both and to achieve a win-win solution between them. To study the relationship between environmental protection experience and both cost and performance, this study empirically analyzes companies listing on the Shenzhen A-share market from 2014 to 2018. The results show that senior executives' environmental protection experience is negatively correlated with corporate costs, whereas it is positively correlated with business performance. These results provide empirical evidence of the importance of enterprises introducing and cultivating environmental personnel and insisting on sustainable development.

The Improvement of Information Protection Service Cost Model in Public Institution (공공기관 정보보호서비스 대가 모델의 개선 방안)

  • Oh, Sangik;Park, Namje
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.7
    • /
    • pp.123-131
    • /
    • 2019
  • In this paper, related studies were investigated by dividing them into cost-benefit analysis, security continuity services, and SW-centric calculations. The case analysis was conducted on A institutions in the United States, Japan and South Korea. Based on this, an improvement model was prepared through comparison with the current system. The SCS(Security Continuity Service) performance evaluation system-based information protection service cost calculation model is proposed. This method applies a service level agreement(SLA) and NIST Cybersecurity framework that are highly effective through cost-effectiveness analysis and calculates consideration based on characteristics, performance criteria, and weights by information protection service. This model can be used as a tool to objectively calculate the cost of information protection services at public institutions. It is also expected that this system can be established by strengthening the current recommended statutory level to the enforceability level, improving the evaluation system of state agencies and public institutions, introducing a verification system of information protection services by national certification bodies, and expanding its scope to all systems.

Energy-efficient Multicast Algorithm for Survivable WDM Networks

  • Pu, Xiaojuan;Kim, Young-Chon
    • Current Optics and Photonics
    • /
    • v.1 no.4
    • /
    • pp.315-324
    • /
    • 2017
  • In recent years, multicast services such as high-definition television (HDTV), video conferencing, interactive distance learning, and distributed games have increased exponentially, and wavelength-division multiplexing (WDM) networks are considered to be a promising technology due to their support for multicast applications. Multicast survivability in WDM networks has been the focus of extensive attention since a single-link failure in an optical network may result in a massive loss of data. But the improvement of network survivability increases energy consumption due to more resource allocation for protection. In this paper, an energy-efficient multicast algorithm (EEMA) is proposed to reduce energy consumption in WDM networks. Two cost functions are defined based on the link state to determine both working and protection paths for a multicast request in WDM networks. To increase the number of sleeping links, the link cost function of the working path aims to integrate new working path into the links with more working paths. Sleeping links indicate the links in sleep mode, which do not have any working path. To increase bandwidth utilization by sharing spare capacity, the cost function of the protection path is defined to use sleeping fibers for establishing new protection paths. Finally, the performance of the proposed algorithm is evaluated in terms of energy consumption, and also the blocking probability is evaluated under various traffic environments through OPNET. Simulation results show that our algorithm reduces energy consumption while maintaining the quality of service.

Practical Silicon-Surface-Protection Method using Metal Layer

  • Yi, Kyungsuk;Park, Minsu;Kim, Seungjoo
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.16 no.4
    • /
    • pp.470-480
    • /
    • 2016
  • The reversal of a silicon chip to find out its security structure is common and possible at the present time. Thanks to reversing, it is possible to use a probing attack to obtain useful information such as personal information or a cryptographic key. For this reason, security-related blocks such as DES (Data Encryption Standard), AES (Advanced Encryption Standard), and RSA (Rivest Shamir Adleman) engines should be located in the lower layer of the chip to guard against a probing attack; in this regard, the addition of a silicon-surface-protection layer onto the chip surface is a crucial protective measure. But, for manufacturers, the implementation of an additional silicon layer is burdensome, because the addition of just one layer to a chip significantly increases the overall production cost; furthermore, the chip size is increased due to the bulk of the secure logic part and routing area of the silicon protection layer. To resolve this issue, this paper proposes a practical silicon-surface-protection method using a metal layer that increases the security level of the chip while minimizing its size and cost. The proposed method uses a shift register for the alternation and variation of the metal-layer data, and the inter-connection area is removed to minimize the size and cost of the chip in a more extensive manner than related methods.

A Case Study on the Cost-Effectiveness Analysis for the Feasibility Study of Public Project Related to Personal Information Protection (개인정보보호 관련 공공사업의 타당성 조사를 위한 비용효과분석 사례 연구)

  • Jo, Illhyung;Kim, Jin;Yoo, Jinho
    • Knowledge Management Research
    • /
    • v.20 no.3
    • /
    • pp.91-106
    • /
    • 2019
  • In the era of the 4th Industrial Revolution, the importance of information protection is increasing day by day with the advent of the 'hyper-connection society', and related government financial investment is also increasing. The source of the government's fiscal investment projects is taxpayers' money. Therefore, the government needs to evaluate the effectiveness and feasibility of the project by comparing the public benefits created by the financial investment projects with the costs required for it. At present, preliminary feasibility study system which evaluates the feasibility of government financial investment projects in Korea has been implemented since 1994, but most of them have been actively carried out only in some fields such as large SOC projects. In this study, we discuss the feasibility evaluation of public projects for the purpose of information security. we introduce the case study of the personal information protection program of Korean public institutions and propose a cost-effectiveness analysis method that can be applied to the feasibility study of the information protection field. Finally, we presented the feasibility study and criteria applicable in the field of information security.

Shared Protection of Lightpath with Guaranteed Switching Time over DWDM Networks

  • Chen Yen-Wen;Peng I-Hsuan
    • Journal of Communications and Networks
    • /
    • v.8 no.2
    • /
    • pp.228-233
    • /
    • 2006
  • Survivability is a very important requirement for the deployment of broadband networks because out of service links can affect volumes of traffic even if it is a very short time. And the data paths of broadband networks, which are critical for traffic engineering, are always necessary to be well protected. The procedure of protection or restoration for a path is initiated when failure is detected within the working path. In order to minimize the influence on transmission quality caused by the failure of links and to provide a definite time for the recovery from the failure, the protection switching time (PST) should be carefully considered in the path arrangement. Several researches have been devoted to construct the protection and restoration schemes of data paths over dense wavelength division multiplexing (DWDM) networks, however, there was rare research on the design of data paths with guaranteed protection switching time. In this paper, the PST-guaranteed scheme, which is based on the concept of short leap shared protection (SLSP), for the arrangement of data paths in DWDM networks is proposed. The proposed scheme provides an efficient procedure to determine a just-enough PST-guaranteed backup paths for a working path. In addition to selecting the PST-guaranteed path, the network cost is also considered in a heuristic manner. The experimental results demonstrate that the paths arranged by the proposed scheme can fully meet the desired PST and the required cost of the selected path is competitive with which of the shared path scheme.

Evaluating the Willingness to Pay of Public ESS Facilities: Focusing on the Environmental Benefits (환경적 이점을 중심으로 한 공공 에너지저장시스템의 경제적 가치 추정)

  • Yoo, Joon Woo;Park, Junsung;Park, HeeJun
    • Journal of Korean Society for Quality Management
    • /
    • v.49 no.2
    • /
    • pp.161-170
    • /
    • 2021
  • Purpose: The purpose of this study was to evaluate the economic value of installing public Energy storage system (ESS) facilities using a logit regression analysis and Contingent Valuation Method (CVM). We focused mainly on the environmental benefits of ESS and analyzed how the users' attitude toward environmental protection and knowledge of renewable energy affect their Willingness to pay (WTP) Methods: A single-bounded dichotomous choice (SBDC) survey was used to collect the data. We asked participants whether they are willing to pay a randomly presented cost (KRW 100, 500, 1000, 1500, 2000, 2500, 5000, 10000) along with their attitude to toward environmental protection, knowledge of renewable energy, and perceived cost of electric bill. 417 valid samples were collected and used for the analysis. Results: The results of the logit regression show that the initial bid, attitude toward environmental protection, knowledge of renewable energy, and perceived cost of electric bill significantly affect the user's WTP of public ESS facilities. The CVM results show that users are willing to pay KRW 5,049.1/month to install ESS facilities. Conclusion: : According to results, we conclude that the users agree with the need to install ESSs and that environmental benefits of ESSs are important factors for ESS adoption. Therefore, policy makers need to emphasize environmental aspects to install the ESS facilities.

A Study on Cost Problem in Adult Guardianship System (성년후견제도에서의 비용문제에 관한 소고)

  • Jeon, Byeong-Joo;Cho, Do-Yeon
    • Journal of Digital Convergence
    • /
    • v.11 no.9
    • /
    • pp.1-11
    • /
    • 2013
  • The adult guardianship system took effect from July 2013, to protect adults who need protection due to insufficient ability to judge. Even though many problems are founded in countries like France and Japan which perform Adult guardianship system, they are promoting practical settlement of system and protection of the adults requiring protection through continuous supplementation of system. It is essential to solve cost problem for successful establishment of adult guardianship system because reasonable control of social security expenditure, in an aging society, is a common task for all countries. Therefore, in this study, cost problem occurred in the enforcement of adult guardianship system is to be examined and through these findings, several strategies were suggested to solve it in Korea.

A Study on the Cathodic Protection Design Optimization of Steel Piles for LNG Storage Tanks by Numerical Analysis (수치해석에 의한 LNG 저장탱크용 강관파일 전기방식 설계 최적화 연구)

  • Kim, Young Keun;Song, Hong Seok
    • Corrosion Science and Technology
    • /
    • v.16 no.6
    • /
    • pp.294-297
    • /
    • 2017
  • For the longer service life of steel pile, cathodic protection is selected sometimes at corrosive environment. The cathodic protection design improvement was investigated in this study. The current demand for cathodic protection was calculated from the potentiostatic current monitoring of the steel specimen in the deaerated soil samples. In this study, the current distribution was studied using the Boundary Element Method (BEM) and the Finite Element Method (FEM) numerical analysis methods. The optimum layout of the anode was developed and confirmed by numerical analysis. Under the conventional design of the anode, the length of the anode hole is same as the pile length. We found that, at the bottom end of the pile, the current density is too high. When the anode hole length was 80% of the pile length, the current consumption at the end was reduced. The construction cost of anode hole drilling was decreased about 20%, as compared to the conventional design. Furthermore, the life of the anode materials could be extended by reducing the current consumption at the end section. Using this approach, the construction cost was reduced significantly without any under-protection area on the steel piles.