• Title/Summary/Keyword: secure constraints

Search Result 95, Processing Time 0.025 seconds

Energy Detection Based Sensing for Secure Cognitive Spectrum Sharing in the Presence of Primary User Emulation Attack

  • Salem, Fatty M.;Ibrahim, Maged H.;Ibrahim, I.I.
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.2 no.6
    • /
    • pp.357-366
    • /
    • 2013
  • Spectrum sensing, as a fundamental functionality of Cognitive Radio (CR), enables Secondary Users (SUs) to monitor the spectrum and detect spectrum holes that could be used. Recently, the security issues of Cognitive Radio Networks (CRNs) have attracted increasing research attention. As one of the attacks against CRNs, a Primary User Emulation (PUE) attack compromises the spectrum sensing of CR, where an attacker monopolizes the spectrum holes by impersonating the Primary User (PU) to prevent SUs from accessing the idle frequency bands. Energy detection is often used to sense the spectrum in CRNs, but the presence of PUE attack has not been considered. This study examined the effect of PUE attack on the performance of energy detection-based spectrum sensing technique. In the proposed protocol, the stationary helper nodes (HNs) are deployed in multiple stages and distributed over the coverage area of the PUs to deliver spectrum status information to the next stage of HNs and to SUs. On the other hand, the first stage of HNs is also responsible for inferring the existence of the PU based on the energy detection technique. In addition, this system provides the detection threshold under the constraints imposed on the probabilities of a miss detection and false alarm.

  • PDF

Two-Stage Model for Security Network-Constrained Market Auction in Pool-Based Electricity Market

  • Kim, Mun-Kyeom
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.6
    • /
    • pp.2196-2207
    • /
    • 2017
  • This paper presents a two-stage market auction model in a pool-based electricity market, which explicitly takes into account the system network security. The security network-constrained market auction model considers the use of corrective control to yield economically efficient actions in the post-contingency state, while ensuring a certain security level. Under this framework, the proposed model shows not only for quantifying the correlation between secure system operation and efficient market operation, but also for providing transparent information on the pricing system security for market participants. The two-stage market auction procedure is formulated using Benders decomposition (BD). In the first stage, the market participants bid in the market for maximizing their profit, and the independent system operator (ISO) clears the market based on social welfare maximization. System network constraints incorporating post-contingency control actions are described in the second stage of the market auction procedure. The market solutions, along with the BD, yield nodal spot prices (NSPs) and nodal congestion prices (NCPs) as byproducts of the proposed two-stage market auction model. Two benchmark systems are used to test and demonstrate the effectiveness of the proposed model.

On the Factors that Affect Customers' Satisfaction in Social Commerce (소셜 커머스 고객 만족에 영향을 미치는 요인에 관한 연구)

  • Choi, Sungho;Lee, Sang-Yong Tom
    • Knowledge Management Research
    • /
    • v.15 no.2
    • /
    • pp.165-182
    • /
    • 2014
  • Social commerce is regarded as a kind of e-commerce that utilizes social media. Considering increasing complaints around social commerce market, it is important to see customers' satisfaction level and intentions to repurchase. In this study, we examine antecedents that affect customers' satisfaction and relationship between satisfaction and intention to repurchase in social commerce market. We also use social media characteristics as moderators between antecedents and customers' satisfaction. The main results are as follows. First, except site design, most of the intrinsic factors of service quality, such as information, transaction, communication and perceived security had positive effects on customers' satisfaction. Second, all the extrinsic factors of service quality, such as discount rate, constraints, and discrimination had significant impacts on customers' satisfaction. Third, the social media characteristics could not moderate the relationship between service qualities and customers' satisfaction. Fourth, customers' satisfaction had positive effect on the intention to spread through social media. Fifth, customers' satisfaction had positive effect on the intention to repurchase. Social commerce companies need to set up strategies considering the antecedents of customers' satisfaction using these research results. They also need to secure customers that have sustainable purchasing intentions.

  • PDF

Design of Key Tree-based Management Scheme for Healthcare Information Exchange in Convergent u-Healthcare Service (융합형 u-헬스케어 서비스에서 헬스 정보 교환을 위한 키 트리 기반 관리 체계 설계)

  • Kim, Donghyun;Kim, Seoksoo
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.6
    • /
    • pp.81-86
    • /
    • 2015
  • The threats to privacy and security have received increasing attention as ubiquitous healthcare applications over the Internet become more prevalent, mobile and universal. In particular, we address the communication security issues of access sharing of health information resources in the ubiquitous healthcare environment. The proposed scheme resolves the sender and data authentication problem in information systems and group communications. We propose a novel key management scheme for generating and distributing cryptographic keys to constituent users to provide form of data encryption method for certain types of data concerning resource constraints for secure communications in the ubiquitous healthcare domains.

An Authentication Protocol Design in RFID System for Mobility (유동성을 지닌 RFID 시스템을 위한 인증 프로토콜 설계)

  • Kim, Young-Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.1
    • /
    • pp.122-128
    • /
    • 2010
  • RFID is method used on wireless system. However, this mechanism is not used for authentication and security. Therefore, it is very vulnerable to attacks such as dropping attacks and traffic attacks. the RFID Tags are of the limited nature due to environment factors and there is greater constraints in designing authentication protocol. If we do not RFID to secure corporate information and product all the information will be exposed. The attacker will break into the RFID system and stop the distribution system. So, this paper proposes a new authentication protocol which provides not only unlimited access to Tag and Reader of mobile and connection between Tag and Reader bet also provides authentication mechanism by defining the key distribution.

A Study on Concurrency Control Scheme for Scalability of Blockchain (블록체인 기법의 확장가능성을 위한 병행 수행 제어 기법에 대한 연구)

  • Kang, Yong-Hyeog;Park, Wonhyung
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.71-78
    • /
    • 2020
  • Bitcoin-based blockchain technology provides an infrastructure that enables anonymous smart contracts, low-cost remittances, and online payments. However, the block-chain technology that implements the bitcoin has scalability constraints in tradeoffs between throughput and latency. To solve these problems, the Byzantine fault tolerant block-chain technique has been proposed. This technique improves throughput without increasing latency by selecting a leader and constructing many microblocks that do not contain proofs of work within the existing block by the leader. However, this technique may be less secure than existing techniques in selecting the reader.

Design of an RFID Authentication Protocol Using Token Key and Hash Function (토큰키와 해쉬함수를 이용한 RFID 인증 프로토콜 설계)

  • Na, Young-Nam;Han, Jae-Kyun
    • 전자공학회논문지 IE
    • /
    • v.48 no.2
    • /
    • pp.52-60
    • /
    • 2011
  • RFID is method used on wireless system. However, this mechanism is not used for authentication and security. Therefore, it is very vulnerable to attacks such as dropping attacks and traffic attacks. the RFID Tags are of the limited nature due to environment factors and there is greater constraints in designing authentication protocol. If we do not RFID to secure corporate information and product all the information will be exposed. The attacker will break into the RFID system and stop the distribution system. So, this paper proposes a new authentication protocol which provides not only unlimited access to Tag&Reader and connection between Tag and Reader bet also provides authentication mechanism by defining the key distribution.

An Optimal Path Generation Method considering the Safe Maneuvering of UGV (무인지상차량의 안전주행을 고려한 최적경로 생성 방법)

  • Kwak, Kyung-Woon;Jeong, Hae-Kwan;Choe, Tok-Son;Park, Yong-Woon;Kwak, Yoon-Keun;Kim, Soo-Hyun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.6
    • /
    • pp.951-957
    • /
    • 2010
  • An optimal path generation method considering the safety of UGV(Unmanned Ground Vehicle) is proposed and demonstrated through examples. Among various functions of UGV, real-time obstacle avoidance is a key issue to realize realistic scenario in FCS(Future Combat Systems). A two-dimensional narrow corridor environment is considered as a test field. For each step of UGV movement, two objectives are considered: One is to minimize the distance to the target and the other to maximize the distance to the nearest point of an obstacle. A weighted objective function is used in the optimization problem. Equality and inequality constraints are taken to secure the UGV's dynamics and safety. The weighting factors are controlled by a fuzzy controller which is constructed by a fuzzy rule set and membership functions. Simulations are performed for two cases. First the weighting factors are considered as constant values to understand the characteristics of the corresponding solutions and then as variables that are adjusted by the fuzzy controller. The results are satisfactory for realistic situations considered. The proposed optimal path generation with the fuzzy control is expected to be well applicable to real environment.

A Study on Introduction Method of Passenger Ship Public Operating System (여객선 공영제 도입 방안에 대한 연구)

  • Shin, Hae Mi;Noh, Chang Kyun
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2014.10a
    • /
    • pp.167-168
    • /
    • 2014
  • It is difficult to expect the service improvements such as increased number of sailing and making new ship due to financial difficulty this is caused by deterioration of island dwellers. In addition, the safety of ship operation is also a problem with the supply of good sailors difficult problem of low wages and lack of safety working environment. T It is necessary to ensure the introduction of public operating system in coastal passenger shipping business to secure the public and safety. There are many practical constraints but if we obtain public sea ways, it will be possible to improve the operating system through the implementation from a subsidized line and taking off business licenses of an insolvent enterprise by enhancing safety control.

  • PDF

Applying the TOC Thinking Process: A Study for Stabilization of Integrated Railway Safety Audit System (TOC Thinking Process를 활용한 철도종합안전심사 안정화방안 연구)

  • Oh, In-Tack;Jang, Seong-Yong
    • Proceedings of the KSR Conference
    • /
    • 2006.11b
    • /
    • pp.990-1003
    • /
    • 2006
  • To cope with the change of railway safety environment and to prevent the catastrophic accident, the railway safety management system was established through the legislation of railway safety rules. And to audit and evaluate the accomplishment of railway safety rules by the railway operators, the Integrated Railway Safety Audit System(IRSAS) has been conducting. This study find out the strategy to stabilize the IRSAS by applying Theory of Constraints(TOC) Thinking Process. For meeting the IRSAS's goal of effective levelling up of railway safety, the two necessary conditions, 1)the secure of substantial safety through the IRSAS and 2)the execution of efficient IRSAS, should be fulfilled. Estimated undesirable effects(UDEs) from the IRSAS were identified, and 3 of them were selected for creating the requisite conflict clouds. Entities from these conflict clouds were synthesized into a core conflict cloud that foamed the base of Current Reality Tree. The strategic direction for change extracted from the conflict cloud is the reinforcement of IRSAS preparation system including the level up of operator's self audit, the deepening of preliminary survey, the establishment of complementing system of audit check list and the build up of auditor's specialization. These injection were logically validated via a Future Reality Tree and expected to be confirmed by further progressing of IRSAS.

  • PDF