• Title/Summary/Keyword: route security

Search Result 188, Processing Time 0.026 seconds

A study on the Highspeed Railway Route Selection -Focusing on 4 design tools- (수도권 고속철도 노선선정 연구 -설계4공구를 중심으로-)

  • Kim, Jong-Seok;Kim, Woo-Je
    • Proceedings of the KSR Conference
    • /
    • 2011.05a
    • /
    • pp.200-207
    • /
    • 2011
  • The research which sees accomplishes the capital region high-speed railway and examines investigates about process of railroad construction project and an advance service contents from to understand a progress process, change process and technical investigation of basic design and the execution plan at the time of route led and accomplishes the plan which is detailed the process which in the center researched. Also plan start method and application plan, clear the security of the plan air which is proper is necessary and dividing which design phase is, plan process construction etc. improvements sacrifice froze.

  • PDF

Clue for Secure Route Optimization in Mobile IPv6 (모바일 IPv6 바인딩 업데이트의 보안 향상 기법)

  • Song, Se-Hwa;Choi, Hyoung-Kee;Kim, Jung-Yoon
    • The KIPS Transactions:PartC
    • /
    • v.17C no.2
    • /
    • pp.153-158
    • /
    • 2010
  • Mobile IPv6 is one of method can keep Mobile node's session. To solve legacy Mobile IPv4's triangular routing problem, in Mobile IPv6, Mobile Node could directly communicate with Correspond node by Binding Update. But, attacker could interfere Return Routability Procedure that is Correspond node check Home address and Care of address reachable. At this result, Attacker is able to hijack Session to correspond node from Mobile node. In This paper, We propose new Binding Update scheme for solving that problem. Our approach is that MN gives association both home token and care of token using onewayness of keyed hash fuction. From security and performance analysis, we can see that proposed binding Update Scheme can achieve stronger security than legacy scheme and at the same time requires minimal computational overhead.

A New Cryptographic Algorithm for Safe Route Transversal of Data in Smart Cities using Rubik Cube

  • Chhabra, Arpit;Singhal, Niraj;Bansal, Manav;Rizvi, Syed Vilayat
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.113-122
    • /
    • 2022
  • At the point when it is check out ourselves, it might track down various information in each turn or part of our lives. Truth be told, information is the new main thrust of our advanced civilization and in this every day, "information-driven" world, security is the significant angle to consider to guarantee dependability and accessibility of our organization frameworks. This paper includes a new cryptographic algorithm for safe route traversal for data of smart cities which is a contemporary, non-hash, non-straight, 3D encryption execution intended for having information securely scrambled in the interim having a subsequent theoretical layer of safety over it. Encryption generally takes an information string and creates encryption keys, which is the way to unscramble as well. In the interim in another strategy, on the off chance that one can sort out the encryption key, there are opportunities to unravel the information scrambled inside the information string. Be that as it may, in this encryption framework, the work over an encryption key (which is created naturally, henceforth no pre-assurance or uncertainty) just as the calculation produces a "state" in a way where characters are directed into the Rubik block design to disregard the information organization.

Rediscovery of the Arctic: A New Arena of Competition for Natural Resources in the 21st Century? (북극의 재발견: 국제 자원경쟁의 새로운 각축장?)

  • Lee, Seo-Hang
    • Strategy21
    • /
    • s.30
    • /
    • pp.200-235
    • /
    • 2012
  • Over the past few years, due to the climate change of the earth, the Arctic's sea ice cover is undergoing a historic transformation - thinning, extent reduction in all seasons, and mitigation in the area of multi-year ice in the central Arctic Ocean. These changes allow for increases in maritime access throughout the Arctic Ocean and for potential longer seasons of navigation and possibly transarctic voyage in the summer. These changes also allow more exploration for oil, gas, and other minerals. The Arctic is now an archetype of the complex, multi-dimensional global problems of the twenty-first century. Military security, environmental security, and economic security interact. The potentially enormous economic stakes, sufficient to change the strategic balance among the states of the region, set off competitive pressures for national advantage. Korea, which is heavily dependent upon the sea lane in terms of transportation of its exports and imports, is very much interested in the Arctic sea routes. Korea believes that the Artic sea route, particularly the Northern Sea Route (NSR), could serve as a new useful sea lane, which will enable shorter times between East Asia and Europe, thus resulting in substantial cost saving for ship operators. In addition to shipping, Korea is interested in other Arctic-related maritime industries. Korea, as a leading shipbuilder in the global market, is interested in building ice breakers, drill ships, and other vessels which can contribute to safe operation in Arctic resource development and exploration. Korea, as one of the future stakeholders in Arctic maritime activities, should be ready to foster international cooperation in the region.

  • PDF

Analysis of vessel traffic patterns near Busan Port using AIS data (AIS 데이터를 활용한 부산항 인근 선박통항패턴 분석)

  • Hyeong-Tak Lee;Hey-Min Choi;Jeong-Seok Lee;Hyun Yang;Ik-Soon Cho
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2022.06a
    • /
    • pp.155-156
    • /
    • 2022
  • Efficient operation of ships can transport cargo to ports safer and faster, and reduce fuel costs. Therefore, in this study, the pattern was analyzed using AIS data of ships passing near Busan Port, a representative port in Korea. The analysis of vessel traffic patterns was approached with a grid-based node generation method, which can be used for research such as optimal route and route prediction.

  • PDF

Polymorphic Path Transferring for Secure Flow Delivery

  • Zhang, Rongbo;Li, Xin;Zhan, Yan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.2805-2826
    • /
    • 2021
  • In most cases, the routing policy of networks shows a preference for a static one-to-one mapping of communication pairs to routing paths, which offers adversaries a great advantage to conduct thorough reconnaissance and organize an effective attack in a stress-free manner. With the evolution of network intelligence, some flexible and adaptive routing policies have already proposed to intensify the network defender to turn the situation. Routing mutation is an effective strategy that can invalidate the unvarying nature of routing information that attackers have collected from exploiting the static configuration of the network. However, three constraints execute press on routing mutation deployment in practical: insufficient route mutation space, expensive control costs, and incompatibility. To enhance the availability of route mutation, we propose an OpenFlow-based route mutation technique called Polymorphic Path Transferring (PPT), which adopts a physical and virtual path segment mixed construction technique to enlarge the routing path space for elevating the security of communication. Based on the Markov Decision Process, with considering flows distribution in the network, the PPT adopts an evolution routing path scheduling algorithm with a segment path update strategy, which relieves the press on the overhead of control and incompatibility. Our analysis demonstrates that PPT can secure data delivery in the worst network environment while countering sophisticated attacks in an evasion-free manner (e.g., advanced persistent threat). Case study and experiment results show its effectiveness in proactively defending against targeted attacks and its advantage compared with previous route mutation methods.

Simulation of Evacuation Route Scenarios Through Multicriteria Analysis for Rescue Activities

  • Castillo Osorio, Ever Enrique;Yoo, Hwan Hee
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.37 no.5
    • /
    • pp.303-313
    • /
    • 2019
  • After a disaster happens in urban areas, many people need support for a quick evacuation. This work aims to develop a method for the calculation of the most feasible evacuation route inside buildings. In the methodology we simplify the geometry of the structural and non structural elements from the BIM (Building Information Modeling) to store them in a spatial database which follows standards to support vector data. Then, we apply the multicriteria analysis with the allocation of prioritization values and weight factors validated through the AHP (Analytic Hierarchy Process), in order to obtain the Importance Index S(n) of the elements. The criteria consider security conditions and distribution of the building's facilities. The S(n) is included as additional heuristic data for the calculation of the evacuation route through an algorithm developed as a variant of the $A^*$ pathfinding, The experimental results in the simulation of evacuation scenarios for vulnerable people in healthy physical conditions and for the elderly group, shown that the conditions about the wide of routes, restricted areas, vulnerable elements, floor roughness and location of facilities in the building applied in the multicriteria analysis has a high influence on the processing of the developed variant of $A^*$ algorithm. The criteria modify the evacuation route, because they considers as the most feasible route, the safest instead of the shortest, for the simulation of evacuation scenarios for people in healthy physical conditions. Likewise, they consider the route with the location of facilities for the movement of the elderly like the most feasible in the simulation of evacuation route for the transit of the elderly group. These results are important for the assessment of the decision makers to select between the shortest or safest route like the feasible for search and rescue activities.

A Formal Security Analysis on the Enhanced Route Optimization Protocol for Mobile IPv6 (이동 IPv6의 확장된 경로 최적화프로토콜에 대한 형식화된 보안 분석)

  • You, Il-Sun;Kim, Heung-Jun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.4
    • /
    • pp.691-699
    • /
    • 2009
  • Recently, the ERO protocol has been adopted as a standard to protect the routing optimization mode introduced by MIPv6. This protocol uses the public key cryptography and the early binding update method to improve the Return Routeability protocol while optimizing both security and performance. On the other hand, though various security approaches including the ERO protocol have been proposed for MIPv6, they lack formal verification. Especially, to our best knowledge, there is no formal analysis on the ERO protocol. In order to provide a good example for formal analysis on MIPv6 security protocols, this paper verifies the correctness of the ERO protocol through BAN-logic. For this goal, BAN-logic is extended to consider the address tests on the mobile nodes's CoA and HoA. It is expected that the analysis presented in this paper will be useful for the formal verifications on the security protocols related to MIPv6.

Review of technology requirements of safety, security cargo for High speed freight train (고속화물열차 화물안전보안 기술요구사항 검토)

  • Han, Seong-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2015.07a
    • /
    • pp.1595-1596
    • /
    • 2015
  • This study presents the review of technical requirements of safety and security for the developed high-speed freight train which will be serviced on the existing route of the high-speed line. There is no any experience to make a system design of high-speed freight train in Korea until now. We need to make a new regulations of commercial service.

  • PDF

Analytic Model of Energy of Router in Wireless Sensor Networks

  • Lee, Dong-Chun
    • Convergence Security Journal
    • /
    • v.7 no.4
    • /
    • pp.43-50
    • /
    • 2007
  • Electric quantity of sensor nodes is extremely limited, and the battery replacement is very difficult in wireless sensor networks. This paper proposes analytic model on energy loss in different route structure, which it is based upon the data-centric storage and the directed diffusion is energy consumption in the wireless sensor network.

  • PDF