• Title/Summary/Keyword: 보안 제어

Search Result 1,534, Processing Time 0.026 seconds

A Study on Wired LogiC for Type Unit for PLC Output Driving (PLC 출력 구동을 위한 Wired Logic for Type Unit에 관한 연구)

  • 위성동;김태성
    • Journal of the Korean Institute of Telematics and Electronics T
    • /
    • v.36T no.1
    • /
    • pp.51-57
    • /
    • 1999
  • This thesis is written about the Wired Logic Type Unit in developing equipment that the load is driven, that the interface unit connect with 1 Scan time to PO30 of operated PLC output contact with that a sensing signal of Temperature Sensor RSD Pt $100\Omega$ let generate the relay output of temperature controller and input the PLC. The PLC Test Kit in country that the PLC to be programmed at the PLC education place is able to drive the load, is done to do a education of PLC on status that interface process between PLC and load are disregarded. As Developing Kit for supplement this point, when the relay output of temperature controller to use Pt 100 of temperature sensor as mentioned on the former among every kinds of sensor feed back to the input of the PLC, as the equipment to act with real time system that the output contact of PLC operated to insert the WLTIJ among PC, PLC and the load, it can understand and see very easy the main principle of PLC use. The structure of WLTU to be a interface unit of load separated as to the point of contact and noncontact, sensor, indicating lamp and A contact and B contact that is belong to driving part, and a motor is belong to loading part.

  • PDF

Design and Evaluation of a Weighted Intrusion Detection Method for VANETs (VANETs을 위한 가중치 기반 침입탐지 방법의 설계 및 평가)

  • Oh, Sun-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.3
    • /
    • pp.181-188
    • /
    • 2011
  • With the rapid proliferation of wireless networks and mobile computing applications, the landscape of the network security has greatly changed recently. Especially, Vehicular Ad Hoc Networks maintaining network topology with vehicle nodes of high mobility are self-organizing Peer-to-Peer networks that typically have short-lasting and unstable communication links. VANETs are formed with neither fixed infrastructure, centralized administration, nor dedicated routing equipment, and vehicle nodes are moving, joining and leaving the network with very high speed over time. So, VANET-security is very vulnerable for the intrusion of malicious and misbehaving nodes in the network, since VANETs are mostly open networks, allowing everyone connection without centralized control. In this paper, we propose a weighted intrusion detection method using rough set that can identify malicious behavior of vehicle node's activity and detect intrusions efficiently in VANETs. The performance of the proposed scheme is evaluated by a simulation study in terms of intrusion detection rate and false alarm rate for the threshold of deviation number ${\epsilon}$.

Grid-Based Key Pre-Distribution for Factory Equipment Monitoring (공장 설비 모니터링을 위한 그리드 기반 키 선분배 기법)

  • Cho, YangHui;Park, JaePyo;Yang, SeungMin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.147-152
    • /
    • 2016
  • Wireless sensor networks that are easy to deploy and install are ideal for building a system that monitors the condition of the equipment in a factory environment where wiring is difficult. The ZigBee has characteristics of low price and low power compared with other wireless communication protocols and is suitable for a monitoring system requiring a plurality of nodes. ZigBee communication requires encryption security between devices because all protocol layers are based on OTM trusted by each other. In the communication between nodes, node authentication must be guaranteed and exposure of confidential information managed by each node should be minimized. The facilities of the factory are regular and stationary in distribution location. In order to protect the information gathered from the sensor in the factory environment and the actuator control information connected to the sensor node, we propose a cryptosystem based on the two - dimensional grid - based key distribution method similar to the distribution environment of the facility.

Analysis of Detection Ability Impact of Clang Static Analysis Tool by Source Code Obfuscation Technique (소스 코드 난독화 기법에 의한 Clang 정적 분석 도구의 성능 영향 분석)

  • Jin, Hongjoo;Park, Moon Chan;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.605-615
    • /
    • 2018
  • Due to the rapid growth of the Internet of Things market, the use of the C/C++ language, which is the most widely used language in embedded systems, is also increasing. To improve the quality of code in the C/C++ language and reduce development costs, it is better to use static analysis, a software verification technique that can be performed in the first half of the software development life cycle. Many programs use static analysis to verify software safety and many static analysis tools are being used and studied. In this paper, we use Clang static analysis tool to check security weakness detection performance of verified test code. In addition, we compared the static analysis results of the test codes applied with the source obfuscation techniques, layout obfuscation, data obfuscation, and control flow obfuscation techniques, and the static analysis results of the original test codes, Analyze the detection ability impact of the Clang static analysis tool.

Numerical Study on Ground Vibration Reduction and Fragmentation in a Controlled Blasting Utilizing Directional U Shape Charge Holder (U형 장약홀더를 이용한 발파공법에서 지반진동 저감특성 및 파괴효율에 관한 수치해석적 연구)

  • Kim, Hyon-Soo;Baek, Beom-Hyun;Oh, Se-Wook;Han, Dong-Hun;Cho, Sang-Ho
    • Explosives and Blasting
    • /
    • v.34 no.1
    • /
    • pp.11-18
    • /
    • 2016
  • It is necessary to minimize ground vibration and noise due to blasting work in urban environment. The blast induced ground vibration and noise are generally generated by a portion of detonation energy, where most of the energy is utilized for rock breakage and movement of rock mass. Recently a blast method utilizing U-shaped steel charge holder was suggested to reduce the ground vibration without decreasing destructive power toward the free surface. In this study, single hole blasting utilizing U-shaped steel charge holder were simulated and the stress waves caused by the detonation of explosives were monitored using AUTODYN software. In order to examine the fragmentation efficiency of the U-shaped steel charge holder, one free face blasting models which adapt the blast induced stress waves were simulated by dynamic fracture process analysis (DFPA) code. In addition, the general blasting models were also simulated to investigate the fragmentation effectiveness of the U-shaped steel charge holder in rock blasting.

Design and Implementation of Efficient Mitigation against Return-oriented Programming (반환 지향 프로그래밍 공격에 대한 효율적인 방어 기법 설계 및 구현)

  • Kim, Jeehong;Kim, Inhyeok;Min, Changwoo;Eom, Young Ik
    • Journal of KIISE
    • /
    • v.41 no.12
    • /
    • pp.1018-1025
    • /
    • 2014
  • An ROP attack creates gadget sequences which consist of existing code snippets in a program, and hijacks the control flow of a program by chaining and executing gadget sequences consecutively. Existing defense schemes have limitations in that they cause high execution overhead, an increase in the binary size overhead, and a low applicability. In this paper, we solve these problems by introducing zero-sum defender, which is a fast and space-efficient mitigation scheme against ROP attacks. We find a fundamental property of gadget execution in which control flow starts in the middle of a function without a call instruction and ends with a return instruction. So, we exploit this property by monitoring whether the execution is abused by ROP attacks. We achieve a very low runtime overhead with a very small increase in the binary size. In our experimental results, we verified that our defense scheme prevents real world ROP attacks, and we showed that there is only a 2% performance overhead and a 1% binary size increase overhead in several benchmarks.

Access Control Method for Software on Virtual OS Using the Open Authentication Protocol (개방형 인증 프로토콜을 이용한 가상 운영체제에 설치된 SW 접근통제 방안)

  • Kim, Sun-Joo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.12
    • /
    • pp.568-574
    • /
    • 2013
  • In recent years, IT companies offer various cloud services using hardware-based technologies or software-based technologies. User can access these cloud services without the constraints of location or devices. The technologies are virtualization, provisioning, and big data processing. However, security incidents are constantly occurring even with these techniques. Thus, many companies build and operate private cloud service to prevent the leak of critical data. If virtual environment are different according to user permission, many system are needed, and user should login several virtual system to execute an program. In this paper, I suggest the access control method for application software on virtual operating system using the Open Authentication protocol in the Cloud system.

Real-time measurement management system UI development linked the Water treatment facilities Broadband Convergence Network (수처리시설용 광대역 통합망 연계형 실시간 계측 관리 시스템 UI개발)

  • Yang, Seungyoun;Kim, Jintae;Oh, Hwanjin;Lee, Minwoo
    • Journal of Satellite, Information and Communications
    • /
    • v.10 no.4
    • /
    • pp.83-86
    • /
    • 2015
  • In this paper, we propose a real-tim measurement management system UI development linked the Water treatment facilities broadband Convergence Network. The sensor and the image data received by the server develop a program to interact with Web through water treatment facilities broadband convergence network. So, Separately develop UI capable of independently operating. Building a web server for remote monitoring of the transmission sensor and the image data. And Monitoring and control is possible the sensor data and image data through the Web-based UI. We can grasp the current state such as measurement time, concentration and depth of interface through the proposed real-time measurement management system UI development liked the water treatment facilities broadband convergence network. So, we can check in whether the normal operation of water treatment facilities and whether the casualties such as fire and security. As well as real time to see the information at a glance due to UI development can be raal-time monitoring of real-time measurement management system.

ECbA(Elliptic Curve based Authentication) System on the wireless network environment (무선 네트워크 환경에서의 ECbA(Elliptic Curve based Authentication)시스템 설계)

  • Jeong, Eun-Hee;Yang, Seung-Hae;Kim, Hak-Chun;Lee, Byung-Kwan
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.1 no.1
    • /
    • pp.67-74
    • /
    • 2008
  • As wireless network market is increasing rapidly, the biggest issue is to transfer safe data and to authenticate users. This paper proposes ECbA(Elliptic Curve based Authentication) which consists of the mutual authentication mechanism that users can ascertain the identity of an authentication server and the user authentication mechanism that an authentication server can make sure users' identity, by using Elliptic Curve algorithms. The proposed ECbA system diminishes the message quantity and the execution time by using the small elliptic curve algorithm with the small key length in authentication. In addition, as this paper reduces the authentication steps of existing EAP_TLS into 6 authentication steps, the communication cost and mutual authentication time can be saved. As this paper distributes new keys, whenever authenticating users by using key exchange mechanism, it provides safe encryption communication and prevents DoS attack by controlling the users authentication request by authentication server.

  • PDF

A Study on the Low Sidelobe Doppler Filter Bank Design Algorithm for Coherent Radar Equipment in Complex Air-Defense System (복합 방공망 구축물에서의 Coherent 레이다 설비의 저부엽 도플러 필터 뱅크 설계 알고리즘에 관한 연구)

  • 허경무;김태형
    • The Proceedings of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.10 no.2
    • /
    • pp.63-70
    • /
    • 1996
  • In this paper, we propose the low sldelobe digital doppler filter bank design algorithm which is practically applicable to coherent radar equipment in complex air-defense system. Using the proposed algorithm, we can obtain a digital doppler filter bank of lower peak sidelobe level and higher clutter suppression capability. In this method, it is possible to achieve higher target-detectability without loss of Target SNR. The proposed algorithms are verified by simulations and experiments.

  • PDF