• Title/Summary/Keyword: 메커니즘 생성

Search Result 615, Processing Time 0.027 seconds

Authenticated Route Optimization Protocol for Network Mobility Support (네트워크 이동성 지원을 위한 인증된 경로 최적화 프로토콜)

  • Koo, Jung-Doo;Lee, Gi-Sung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.4
    • /
    • pp.781-787
    • /
    • 2007
  • Network Mobility (NEMO) basic support protocol doesn't execute the process of route optimization and has not presented the particular security mechanism in other blocks except hi-directional tunnel between Mobile Router (MR) and its Home Agent (HA). Therefore in this paper we process secure route optimization courses through authenticated binding update protocol between MR and its Correspondent Node (CN) and the protocol of the competency of mandate between MR and its Mobile Network Node (MNN); its block also uses an bi-directional tunnel as the block between MR and its HA. The address of each node are generated by the way of Cryptographically Generated Address (CGA) for proving the ownership of address. Finally we analyze the robustness of proposed protocol using security requirements of MIPv6 and existing attacks and the efficiency of this protocol using the connectivity recovery and end-to-end packet transmission delay time.

  • PDF

A Study on the Correlation of MESG and Explosion Pressure (최대실험안전틈새(MESG)와 폭발압력의 상관관계에 대한 연구)

  • Hwang, Kyungyong;Shin, Woonchul;Lee, Taeck-Kie
    • Journal of the Korean Institute of Gas
    • /
    • v.20 no.1
    • /
    • pp.29-39
    • /
    • 2016
  • Electrical apparatuses for use in the presence of explosive gas atmospheres have to be special designed to prevent them from igniting the explosive gas. Flameproof design implies that electrical components producing electrical sparks are contained in enclosures and withstand the maximum pressure of internal gas or vapours. In addition, any gaps in the enclosure wall have to designed in such a way that they will not transmit a gas explosion inside the enclosure to an explosive gas or vapours atmosphere outside it. In this study, we explained some of the most important physical mechanism of Maximum Experimental Safe Gap(MESG) that the jet of combustion products ejected through the flame gap to the external surroundings do not have an energy and temperature large enough to initiate an ignition of external gas or vapours. We measured the MESG and maximum explosion pressure of propane and acetylene by the test method and procedure of IEC 60079-20-1:2010.When the minimum MESG is measured, the concentration of propane, acetylene in the air is higher than the stoichiometric point and their explosion pressure is the highest value.

Implementation of Middleware Security System for Home Networking (홈 네트워킹을 위한 미들웨어 보안시스템 구현)

  • Seol, Jeong-Hwan;Lee, Ki-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.5
    • /
    • pp.863-869
    • /
    • 2008
  • In this paper, a system with sensor network security mechanism which can be applied to home network structure is designed and it is implemented on a virtual network of a home network middleware. The basic structure of home networking middleware supports one-to-one (unicast) or broadcast communication mode between the lookup server and service nodes on the network. Confidentiality and authentication are key security factors of the one-to-one communication and user authentication is crucial for broadcasting mode. One of the sensor network's security techniques SPINS consists of SNEP and ${\mu}TESLA$. The SNEP ensures confidentiality and authentication, and ${\mu}TESLA$ provides broadcast authentication. We propose a SPIN based home network middleware and it is implemented by using the CBC-MAC for MAC generation, the counter mode (CTR) for message freshness, the pseudo random function (PRF) and RC5 as encryption algorithm. The implementation result shows that an attacker cannot decrypt the message though he gets the secure key because of CTR mode. In addition, we confirmed that a received message of the server is authenticated using MAC.

A Study on Analytical Approach for Performance Evaluation of Pyrotechnically Actuated Device (파이로작동기구 성능평가를 위한 해석모델 연구)

  • Choi, Joo-Ho;Sung, Hong-Gye;Kim, Jun-Sik
    • Proceedings of the Korean Society of Propulsion Engineers Conference
    • /
    • 2012.05a
    • /
    • pp.63-64
    • /
    • 2012
  • A pyrotechnic actuated device (PAD) is a component that delivers high power in remote environments by combustion of a self-contained energy source. Historically, the design of these devices has been largely empirical and considered to be an art. In this study, an overview for developing an analytical model is introduced that efficiently evaluates performance of PAD. The model is integrated by three parts of different disciplines that are coupled in sequence with each other. First is the solid explosive burning to form product gas within an actuator and transport to an expansion chamber. Second is the insertion of initially tapered piston into a small hole by gas pressure in the chamber. Third is the shear cutting of the diaphragm from the piston to enable gas flow into the conduit. Some results of preliminary study for each of three parts are introduced in the presentation.

  • PDF

Adhesion Study of SBR-Nylon by Direct Blending Technique (직접블렌딩 방법을 이용한 SBR-나일론 접착 연구)

  • Chung, Kyung Ho;Kang, Do Kyun;Yoon, Tae Ho;Kang, Shin Young
    • Journal of Adhesion and Interface
    • /
    • v.1 no.1
    • /
    • pp.30-37
    • /
    • 2000
  • This study focused on the direct blending of bonding agents (resorcinol, hexamethylenetetramine, NaOH) into rubber compound to simplify the composite manufacturing process. The mechanism of direct blending system was studied by comparing the following two cases. The one is direct blending of bonding agents into rubber compound and then allows the reaction (Case I). The other is mixing of reactant obtained by reaction of bonding agents (Case II). According to the morphology analysis, the Case II showed the clean interfacial area between bonding agents and matrix rubber, while the Case I created the new interphase under proper processing condition. Also, the optimum adhesion strength between SBR and nylon cord could be obtained with bonding agents whose molar ratios of resprcinol/hexamethylenetetramine was 1.2/1 in the recipes.

  • PDF

Electrochemical Nitrogen Reduction Reaction to Ammonia Production at Ambient Condition (상온 상압 조건에서 전기화학적 질소환원반응을 통한 암모니아 생산 연구 동향)

  • Lee, Dong-Kyu;Sim, Uk
    • Journal of the Korean Electrochemical Society
    • /
    • v.22 no.1
    • /
    • pp.1-12
    • /
    • 2019
  • The reduction of nitrogen to produce ammonia has been attracting much attention as a renewable energy technology. Ammonia is the basis for many fertilizers and is also considered an energy carrier that can power internal combustion engines, diesel engines, gas turbines, and fuel cells. Traditionally, ammonia has been produced through the Haber-Bosch process, in which atmospheric nitrogen combines with hydrogen at high temperature ($350-550^{\circ}C$) and high pressure (150-300 bar). This process consumes 1-2% of current global energy production and relies on fossil fuels as an energy source. Reducing the energy input required for this process will reduce $CO_2$ emissions and the corresponding environmental impact. For this reason, developing electrochemical ammonia-production methods under ambient temperature and pressure conditions should significantly reduce the energy input required to produce ammonia. In this review, we introduce the electrochemical nitrogen reduction reaction at ambient condition. Numerical studies on the electrochemical nitrogen reduction mechanism have been carried out through the computation of density function theory. Electrodes such as nanowires and porous electrodes have been also actively studied for further participation in electrochemical reactions.

Performance Test of a Single Pulse Gun for Transverse Pressure Wave Generation (횡단압력파 발생을 위한 단일 펄스건의 압력파 성능시험)

  • Lee, Jongkwon;Song, Wooseok;Koo, Jaye
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.47 no.8
    • /
    • pp.599-606
    • /
    • 2019
  • The pulse gun device is designed to identify the transverse pressure wave propagation/damping mechanism into the combustion flow field and in the combustion chamber according to the arrangement of multiple injectors. The manufactured pulse gun was tested to verify operability at the target combustion pressure and control of the pressure wave intensity. Gas nitrogen was used to pressurize the high-pressure tube and an OHP film of $100{\mu}m$ thickness was used for the diaphragm. To check the speed and intensity of the pressure waves, the dynamic and static pressure were measured using the pressure transducer. The performance test confirmed that the manufactured pulse gun can generate pressure waves with transverse characteristics that can be controled for strength depending on the supply pressure.

A study on Memory Analysis Bypass Technique and Kernel Tampering Detection (메모리 분석 우회 기법과 커널 변조 탐지 연구)

  • Lee, Haneol;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.661-674
    • /
    • 2021
  • Malware, such as a rootkit that modifies the kernel, can adversely affect the analyst's judgment, making the analysis difficult or impossible if a mechanism to evade memory analysis is added. Therefore, we plan to preemptively respond to malware such as rootkits that bypass detection through advanced kernel modulation in the future. To this end, the main structure used in the Windows kernel was analyzed from the attacker's point of view, and a method capable of modulating the kernel object was applied to modulate the memory dump file. The result of tampering is confirmed through experimentation that it cannot be detected by memory analysis tool widely used worldwide. Then, from the analyst's point of view, using the concept of tamper resistance, it is made in the form of software that can detect tampering and shows that it is possible to detect areas that are not detected by existing memory analysis tools. Through this study, it is judged that it is meaningful in that it preemptively attempted to modulate the kernel area and derived insights to enable precise analysis. However, there is a limitation in that the necessary detection rules need to be manually created in software implementation for precise analysis.

A study of extended processor trace decoder structure for malicious code detection (악성코드 검출을 위한 확장된 프로세서 트레이스 디코더 구조 연구)

  • Kang, Seungae;Kim, Youngsoo;Kim, Jonghyun;Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.19-24
    • /
    • 2018
  • For a long time now, general-purpose processors have provided dedicated hardware / software tracing modules to provide developers with tools to fix bugs. A hardware tracer generates its enormous data into a log that is used for both performance analysis and debugging. Processor Trace (PT) is a new hardware-based tracing feature for Intel CPUs that traces branches executing on the CPU, which allows the reconstruction of the control flow of all executed code with minimal labor. Hardware tracer has been integrated into the operating system, which allows tight integration with its profiling and debugging mechanisms. However, in the Windows environment, existing studies related to PT focused on decoding only one flow in sequence. In this paper, we propose an extended PT decoder structure that provides basic data for real-time trace and malicious code detection using the functions provided by PT in Windows environment.

  • PDF

A Packet encryption scheme and extension of Cryptoki for connectionless packet network (고속 패킷 통신을 위한 패킷 암호 스킴과 Cryptoki 확장 방안)

  • Ko, Haeng-Seok;Park, Sang-Hyun;Kwon, Oh-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.83-92
    • /
    • 2007
  • In connectionless packet network, if a sender encrypts packets by block chaining mode and send it to receiver, the receiver should decrypt packets in encrypted order that is not received order. Therefore, the performance and efficiency are lowered for crypto communication system. To solve this problem, we propose packet encryption scheme for connectionless packet network that can decrypt the packets independently, even if the received order of packets are changed or packets are missed. The scheme makes new IV(Initial Vector) using IV that created by key exchange process and salt that made by random number. We propose extended Cryptoki API that added packet encryption/decryption functions and mechanism for improving convenience and performance. We implement the scheme and get result that the performance increased about $1.5{\sim}l5.6$ times compare with in case of implementing using Cryptoki API in the test environment.