• Title/Summary/Keyword: secure transmission

Search Result 429, Processing Time 0.024 seconds

A Study on Transmission Tower by Applying Polymer Insulation Arms (암절연물을 적용한 송전철탑 연구)

  • Park, Hoy-Yul;Ahn, Myeong-Sang;Lee, Tae-Joo;Lee, Dong-II;Choi, In-Hyuk;Kim, Joung-Ho
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2005.05b
    • /
    • pp.1-4
    • /
    • 2005
  • The electric power demand is steadily high. It becomes difficult to secure the land for overhead transmission lines year after year. Downsizing of overhead transmission lines can be most effectively achieved by applying polymer insulation arm. This paper describes the outline of compact overhead transmission lines and the result of mechanical evaluation of FRP for the compact transmission towers. Bending strength of FRP was evaluated according to the fiber orientation because the fiber orientation in FRP has a great effect on the strength of FRP.

  • PDF

Security-Aware Optimized Link Routing Protocol for Mobile Ad-Hoc Networks

  • Dhir, Amandeep;Sengupta, Jyotsna
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.1
    • /
    • pp.52-83
    • /
    • 2009
  • In this technical report, we have examined the basic building blocks of mobile ad-hoc networks. The paper discusses various security requirements of ad-hoc networks, attacks in ad-hoc networks, Security Implementation and Routing Protocols. The primary purpose of the paper is to address the Optimized Link State Routing (OLSR) protocol in detail, along with the various possible attacks. Finally, algorithms for securing OLSR are proposed, via the addition of digital signatures, as well as more advanced techniques such as cross checking of advertised routing control data with the node's geographical position. The main aim of this research work is the addition of security features to the existing OLSR protocol. In order to effectively design a secure routing protocol, we present a detailed literature survey of existing protocols, along with the various attacks. Based on the information gathered from the literature survey, a secure routing protocol for OLSR is proposed. The proposed secure routing protocol involves the addition of a digital signature as well as more advanced techniques such as the reuse of previous topology information to validate the actual link state. Thus, the main objective of this work is to provide secure routing and secure data transmission.

Speech Encryption Scheme Using Frequency Band Scrambling (대역 스크램블을 이용한 음성 보호방식)

  • Ji, Hyung-Kun;Lee, Dong-Wook
    • Proceedings of the KIEE Conference
    • /
    • 1999.11c
    • /
    • pp.700-702
    • /
    • 1999
  • The protection of data which we want to keep secret from invalid users has become a main topic nowadays. This paper introduces a encryption scheme for protecting speech signals from eavesdropping. The proposed encryption scheme adopts a secure voice cryptographic algorithm based on the scrambling in frequency band. In order to improve the conventional speech signal encryption scheme, we have randomly permuted DCT coefficients of speech signal. Simulation results are included to show the performance of the proposed algorithm for secure transmission of speech signals.

  • PDF

An Analysis on the Overvoltage in Gas Insulated Transmission Lines with EMTP/ATPDraw (EMTP/ATPDraw를 이용한 가스절연송전선로(GIL)의 과전압 분석)

  • Park, Hung-Sok;Han, Sang-Ok
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.60 no.5
    • /
    • pp.999-1004
    • /
    • 2011
  • Nowadays, it is becoming difficult to secure a transmission line route when a new transmission line is constructed due to social environment and resident complaints. As existing urban areas are expanded and new cities are constructed, the necessity of high-capacity underground power transmission has been increasing because of load concentration in downtown areas. In North America, Europe and Japan, the research has been carried out for 2nd generation gas insulated transmission lines(GIL) which is more environmentally friendly and economical compared to previous GILs. The new GILs have been applied to real power systems from early 2000s. In South Korea, GIL is being considered as a possible solution for replacing 345kV high-capacity overhead transmission lines with underground transmission ones, so KEPCO is planning to develop and apply a new 362kV rated GIL underground transmission lines instead of overhead transmission lines. In this paper, the overvoltage generated at the combined transmission line adapting GIL was reviewed using EMTP.

Secure Data Transmission Scheme between Network for Building Facilities Control System (빌딩시설 제어시스템용 안전한 망간 자료전송 방안)

  • Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.8
    • /
    • pp.102-108
    • /
    • 2018
  • The existing data transmission technology applied between the non-secure external internet and the secure internal business network has various problems when applied to the building facility management SCADA system control network. Traditional inter-network data transfer technologies involve high complexity and high costs because blacklist-based security techniques are applied to all data. However, whitelist-based security techniques can be applied to data distributed in Building Facility Management SCADA control systems because a small number of structured control data are repeatable and periodic. This simplifies the security technology applied to inter-network data transmission, enabling building facility management SCADA system control network deployment at low cost. In this paper, we proposed building control networks specialized in building facility management SCADA control systems by providing solutions to address and address these problems.

A Study on the Development of Critical Transmission Operating Constraint Prediction (CTOCP) System With High Wind Power Penetration (대규모 풍력발전 계통 연계시 주요 송전망 제약예측시스템 개발에 관한 연구)

  • Hur, Jin
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.29 no.1
    • /
    • pp.86-93
    • /
    • 2015
  • Globally, wind power development is experiencing dramatic growth and wind power penetration levels are increasing. Wind generation is highly variable in time and space and it doesn't guarantee the system reliability and secure system operation. As wind power capacity becomes a significant portion of total generation capacity, the reliability assessment for wind power are therefore needed. At present, this operational reliability assessment is focusing on a generation adequacy perspective and does not consider transmission reliability issues. In this paper, we propose the critical transmission operating constraint prediction(CTOCP) system with high wind power penetration to enhance transmission reliability.

Double Random Phase Encryption using Orthogonal Encoding for Multiple-Image Transmission

  • Lee, In-Ho;Cho, Myungjin
    • Journal of the Optical Society of Korea
    • /
    • v.18 no.3
    • /
    • pp.201-206
    • /
    • 2014
  • In this paper we extend double random phase encryption (DRPE) using orthogonal encoding from single-image transmission to multiple-image transmission. The orthogonal encoding for multiple images employs a larger Hadamard matrix than that for a single image, which can improve security. We provide a scheme for DRPE with an orthogonal codec, and a method for orthogonal encoding/decoding for multiple-image transmission. Finally, simulation results verify that the DRPE using orthogonal encoding for multiple images is more secure than both the conventional DRPE and the DRPE using orthogonal encoding for a single image.

Development of Daylighting System with Modified Light Pipe for Longer Transmission Distance and Higher Illuminance

  • Vu, Hoang;Kim, Youngil;Park, Chaehwan;Park, Jongbin;Bae, Hojune;Shin, Seoyong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.93-102
    • /
    • 2021
  • In this research, we present a natural lighting system with transmission distance of 30m and lighting efficiency of 35% (30m standard) for operating hours of 7h/day (based on clear sky). The system is composed of parabolic reflective mirror and modified light pipe that can secure more than 88% of light concentration efficiency. The light loss rate of newly designed light pipe transmission system is demonstrated to 0.8 %/m in the straight-line part and 2%/m in the curved part. Modified light pipe daylighting system shows better performance over fiber optic daylighting system in terms of transmission distance (1.5 times longer) and illuminance (3.05 times higher).

High-Capacity Robust Image Steganography via Adversarial Network

  • Chen, Beijing;Wang, Jiaxin;Chen, Yingyue;Jin, Zilong;Shim, Hiuk Jae;Shi, Yun-Qing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.366-381
    • /
    • 2020
  • Steganography has been successfully employed in various applications, e.g., copyright control of materials, smart identity cards, video error correction during transmission, etc. Deep learning-based steganography models can hide information adaptively through network learning, and they draw much more attention. However, the capacity, security, and robustness of the existing deep learning-based steganography models are still not fully satisfactory. In this paper, three models for different cases, i.e., a basic model, a secure model, a secure and robust model, have been proposed for different cases. In the basic model, the functions of high-capacity secret information hiding and extraction have been realized through an encoding network and a decoding network respectively. The high-capacity steganography is implemented by hiding a secret image into a carrier image having the same resolution with the help of concat operations, InceptionBlock and convolutional layers. Moreover, the secret image is hidden into the channel B of carrier image only to resolve the problem of color distortion. In the secure model, to enhance the security of the basic model, a steganalysis network has been added into the basic model to form an adversarial network. In the secure and robust model, an attack network has been inserted into the secure model to improve its robustness further. The experimental results have demonstrated that the proposed secure model and the secure and robust model have an overall better performance than some existing high-capacity deep learning-based steganography models. The secure model performs best in invisibility and security. The secure and robust model is the most robust against some attacks.

Design of Multicast Group Key Management Protocol for Information Security in PIM_SM (PIM-SM 정보 보안을 위한 멀티캐스트 그룹 키 관리 프로토콜 설계)

  • 홍종준
    • Journal of Internet Computing and Services
    • /
    • v.3 no.5
    • /
    • pp.87-94
    • /
    • 2002
  • This paper proposes a group key management protocol for a secure of all the multcast user in PIM-SM multicast group communication. Each subgroup manager gives a secure key to it's own transmitter and the transmitter compress the data with it's own secure key from the subgroup manager, Before the transmitter send the data to receiver, the transmitter prepares to encrypt a user's service by sending a encryption key to the receiver though the secure channel. after checking the user's validity through the secure channel, As the transmitter sending a data after then, the architecture is designed that the receiver will decode the received data with the transmitter's group key, Therefore, transmission time is shortened because there is no need to data translation by the group key on data sending and the data transmition is possible without new key distribution at path change to shortest path of the router characteristic.

  • PDF