• Title/Summary/Keyword: secure constraints

Search Result 97, Processing Time 0.028 seconds

Electricity Market Simulation considering Energy Constraints (에너지 제약을 고려한 전력시장 시뮬레이션)

  • Hur, Jin;Kang, Dong-Joo;Lee, Jeong-Ho;Moon, Young-Hwan
    • Proceedings of the KIEE Conference
    • /
    • 2003.07a
    • /
    • pp.575-577
    • /
    • 2003
  • With the deregulation of the power industries in many countries, the trend is towards accommodating more freedom and choice to the market participants and encouraging competition as much as possible in the power market. In this regards, the necessity of market simulation is increasing in order to guarantee a secure and reliable operation of an electricity market. This paper presents the technique of market simulation considering constraints such as energy resource and transmission interface using commercial market simulator.

  • PDF

ROBUST SEMI-INFINITE INTERVAL-VALUED OPTIMIZATION PROBLEM WITH UNCERTAIN INEQUALITY CONSTRAINTS

  • Jaichander, Rekha R.;Ahmad, Izhar;Kummari, Krishna
    • Korean Journal of Mathematics
    • /
    • v.30 no.3
    • /
    • pp.475-489
    • /
    • 2022
  • This paper focuses on a robust semi-infinite interval-valued optimization problem with uncertain inequality constraints (RSIIVP). By employing the concept of LU-optimal solution and Extended Mangasarian-Fromovitz Constraint Qualification (EMFCQ), necessary optimality conditions are established for (RSIIVP) and then sufficient optimality conditions for (RSIIVP) are derived, by using the tools of convexity. Moreover, a Wolfe type dual problem for (RSIIVP) is formulated and usual duality results are discussed between the primal (RSIIVP) and its dual (RSIWD) problem. The presented results are demonstrated by non-trivial examples.

Study on the Productivity Improvement of Diagnostic Medical Blood Analyzers using Theory of Constraints and Simulation (제약이론과 시뮬레이션을 이용한 진단 의료 혈액분석기의 생산성 향상 방안 연구)

  • Maeng, Ju-Hyuck;Lee, Kang-Won
    • Journal of the Korea Society for Simulation
    • /
    • v.22 no.2
    • /
    • pp.21-31
    • /
    • 2013
  • There is a high demand for the diagnostic medical blood analyzer in the global medical device market. The domestic market is in infant stage, but expected to grow very fast. In this study, we attempt to provide several ways for production improvement in order to secure price competitiveness of domestic medical blood analyzer. For this purpose we identify the problems of current production process using ARENA simulation and suggest several alternatives for productivity improvement.. Five steps of TOC (Theory of Constraints) and ARENA simulation are employed to predict productivity of each alternative and to suggest further improvement.

A Study on Stable Grasping Control of Dual-fingers with Soft-Tips (소프트-팁이 장착된 듀얼-핑거의 안정적 파지 제어에 관한 연구)

  • 심재군;한형용;양순용;이병룡;안경관;김성수
    • Proceedings of the Korean Society of Machine Tool Engineers Conference
    • /
    • 2002.10a
    • /
    • pp.219-224
    • /
    • 2002
  • This paper aims to derive a mathematical model of the dynamics of handling tasks in robot finger which stable grasping and manipulates a rigid object with some dexterity. Firstly, a set of differential equation describing dynamics of the manipulators and object together with geometric constraint of tight area-contacts is formulated by Lagrange's equation. Secondly, problems of controlling both the internal force and the rotation angle of the grasped object under the constraints of area-contacts of tight area-contacts are discussed. The effect of geometric constraints of area-contacts on motion of the overall system is analyzed and a method of computer simulation for overall system of differential-algebraic equations is presented. Thirdly, simulation results are shown and the effects of geometric constraints of area-contact is discussed. Finally, it is shown that even in the simplest case of dual single D.O.F manipulators there exists a sensory feedback from sensing data of the rotational angle of the object to command inputs to joint actuators and this feedback connection from sensing to action eventually realizes secure grasping of the object, provided that the object is of rectangular shape and motion is confined to a horizontal plane.

  • PDF

Semi-trusted Collaborative Framework for Multi-party Computation

  • Wong, Kok-Seng;Kim, Myung-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.3
    • /
    • pp.411-427
    • /
    • 2010
  • Data sharing is an essential process for collaborative works particularly in the banking, finance and healthcare industries. These industries require many collaborative works with their internal and external parties such as branches, clients, and service providers. When data are shared among collaborators, security and privacy concerns becoming crucial issues and cannot be avoided. Privacy is an important issue that is frequently discussed during the development of collaborative systems. It is closely related with the security issues because each of them can affect the other. The tradeoff between privacy and security is an interesting topic that we are going to address in this paper. In view of the practical problems in the existing approaches, we propose a collaborative framework which can be used to facilitate concurrent operations, single point failure problem, and overcome constraints for two-party computation. Two secure computation protocols will be discussed to demonstrate our collaborative framework.

A Survey on Security Issues of M2M Communications in Cyber-Physical Systems

  • Chen, Dong;Chang, Guiran
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.24-45
    • /
    • 2012
  • In this paper, we present a survey of security and privacy preserving issues in M2M communications in Cyber-Physical Systems. First, we discuss the security challenges in M2M communications in wireless networks of Cyber-Physical Systems and outline the constraints, attack issues, and a set of challenges that need to be addressed for building secure Cyber-Physical Systems. Then, a secure architecture suitable for Cyber-Physical Systems is proposed to cope with these security issues. Eventually, the corresponding countermeasures to the security issues are discussed from four aspects: access control, intrusion detection, authentication and privacy preserving, respectively. Along the way we highlight the advantages and disadvantages of various existing security schemes and further compare and evaluate these schemes from each of these four aspects. We also point out the open research issues in each subarea and conclude with possible future research directions on security in Cyber-Physical Systems. It is believed that once these challenges are surmounted, applications with intrinsic security considerations will become immediately realizable.

The Wormhole Routing Attack in Wireless Sensor Networks (WSN)

  • Sharif, Lukman;Ahmed, Munir
    • Journal of Information Processing Systems
    • /
    • v.6 no.2
    • /
    • pp.177-184
    • /
    • 2010
  • Secure routing is vital to the acceptance and use of Wireless Sensor Networks (WSN) for many applications. However, providing secure routing in WSNs is a challenging task due to the inherently constrained capabilities of sensor nodes. Although a wide variety of routing protocols have been proposed for WSNs, most do not take security into account as a main goal. Routing attacks can have devastating effects on WSNs and present a major challenge when designing robust security mechanisms for WSNs. In this paper, we examine some of the most common routing attacks in WSNs. In particular, we focus on the wormhole routing attack in some detail. A variety of countermeasures have been proposed in the literature for such attacks. However, most of these countermeasures suffer from flaws that essentially render them ineffective for use in large scale WSN deployments. Due to the inherent constraints found in WSNs, there is a need for lightweight and robust security mechanisms. The examination of the wormhole routing attack and some of the proposed countermeasures makes it evident that it is extremely difficult to retrofit existing protocols with defenses against routing attacks. It is suggested that one of the ways to approach this rich field of research problems in WSNs could be to carefully design new routing protocols in which attacks such as wormholes can be rendered meaningless.

보안 지식 베이스 관리 시스템에서의 질의 처리

  • 조일래;김원중;심갑식
    • Review of KIISC
    • /
    • v.7 no.2
    • /
    • pp.85-94
    • /
    • 1997
  • This paper describes the notion of a Multilevel Secure Knowledge Base Management System(MLS/KBMS). It states a security policy and security constraints. A design for query operation introduced cover story in a MLS/KBMS is discussed. Query processing approach is to provide cover stories that lead to alternative explanations for readily available information. Therefore such cover stories prevent an unauthorized user from inferring high-level information from low-level data.

  • PDF

A Systematic Literature Review on Secure Software Development using Feature Driven Development (FDD) Agile Model (기능주도개발 Agile 방법을 사용할 때의 안전한 소프트웨어 개발에 관한 문헌연구)

  • Arbain, Adila Firdaus;Ghani, Imran;Jeong, Seung Ryul
    • Journal of Internet Computing and Services
    • /
    • v.15 no.1
    • /
    • pp.13-27
    • /
    • 2014
  • Agile methodologies have gained recognition as efficient development processes through their quick delivery of software, even under time constraints. However, like other agile methods such as Scrum, Extreme Programming (XP) and The Dynamic Systems Development Method (DSDM), Feature Driven Development (FDD) has been criticized due to the unavailability of security elements in its twelve practices. In order to examine this matter more closely, we conducted a systematic literature review (SLR) and studied literature for the years 2001-2012. Our findings highlight that, in its current form, the FDD model partially supports the development of secure software. However, there is little research on this topic, as detailed information about the usage of secure software is rarely published. Thus, we have been able to conclude that the existing five phases of FDD have not been enough to develop secure software until recently. For this reason, security-based phase and practices in FDD need to be proposed.

Tag-Reader Mutual Authentication Protocol for secure RFID environments (안전한 RFID 환경을 위한 태그-리더 상호 인증 프로토콜)

  • Lee, Young-Seok;Choi, Hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.2
    • /
    • pp.357-364
    • /
    • 2015
  • Tags and Readers is receiving and sending the data using the wireless communication in the RFID environment. Therefore, it could allow an attacker to participate in the network without the physical constraints, which can be easily exposed to a variety of attacks, such as taps and data forgery. Also, it is not easy to apply the security techniques to defend external attacks because the resource constraints of RFID tags is high. In this paper, new tag-reader mutual authentication protocol is proposed to protect the external cyber attacks such as spoofing attacks, replay attacks, traffic analysis attacks, location tracking attacks. The performance evaluation of the proposed mutual authentication protocol is performed and the simulation results are presented.