• Title/Summary/Keyword: 안전인증

Search Result 2,790, Processing Time 0.024 seconds

A Study on Durability Test of Check Valve for CNG Vehicles (천연가스 차량용 체크밸브의 내구성능에 관한 연구)

  • Kim, Chang-Gi;Lee, Sun-Youp;Cho, Gyu-Baek
    • Journal of the Korean Institute of Gas
    • /
    • v.13 no.6
    • /
    • pp.15-20
    • /
    • 2009
  • The number of compressed natural gas (CNG) vehicles have increased gradually by virtue of korea government's urban air quality improvement policy since 1998. Although the use of CNG as transportation fuel gives environmental benefits, there is a possibility of huge accidents from unexpected fire. Therefore, needs for the guarantee of safety are indispensible for the reliable operation of CNG vehicles. A check valve is a safety device which prevents leakage of the pressurized fuel charged in a fuel tank. Durability of this component should be guaranteed in spite of repeated operation. This research has performed durability tests of a CNG check valve regarding the repeated usage, extreme chattering, and the effect of compressor oil.Although a check valve used for CNG vehicle satisfies validation requirements in the test results, it has been found that problem in the function of leakage prevention in a check valve could take place in the case of prolonged exposure to compressor oil.

  • PDF

Analysis and Improvement of Animal Farm HACCP Evaluation (축산 농가 HACCP 심사 분석과 개선)

  • Nam, In-Sik
    • Korean Journal of Organic Agriculture
    • /
    • v.25 no.1
    • /
    • pp.101-112
    • /
    • 2017
  • HACCP is the one of best tool to prevent biological, chemical and physical hazards of livestock products. In Korea, HACCP is implementing all livestock industry including animal farm. According to the result of HACCP assessment in animal farm for three years, we have found a high non-compliance rate in some evaluation items of HACCP. To improve this problem, revision of HACCP evaluation items, difficult HACCP terms change to easy understand and development of intensive HACCP training program are needed.

A key management scheme for the cluster-based sensor network using polar coordinated (극 좌표를 이용한 클러스터 기반 센서 네트워크의 키 관리 기법)

  • Hong, Seong-Sik;Ryou, Hwang-Bin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.5
    • /
    • pp.870-878
    • /
    • 2008
  • The level of security of most sensor nodes that comprise the sensor networks is low, but because of the low computing power and small storage capacity, it is even very difficult to apply a security algorithm efficiently to the sensor nodes. Therefore, preventing the join of an illegal node to a sensor network is impossible, and the transmitting information is easily exposed and overheard when the transmitting algorithm of the sensor node is hewn. In this paper, we propose a group key management scheme for the sensor network using polar coordinates, so that the sensor nodes can deliver information securely inside a cluster and any illegal node is prevented from joining to the cluster where a sensor network is composed of many clusters. In the proposed scheme, all of the sensor nodes in a cluster set up the authentication keys based on the pivot value provided by the CH. The intensive simulations show that the proposed scheme outperforms the pair-wise scheme in terms of the secure key management and the prevention of the illegal nodes joining to the network.

Computational Fluid Dynamics of the aerodynamic characteristics for Flying Wing configuration with Flaperon (플래퍼론이 전개된 플라잉윙 형상의 공력 특성에 대한 전산유동해석)

  • Ko, Arim;Chang, Kyoungsik;Park, Changhwan;Sheen, Dongjin
    • Journal of Aerospace System Engineering
    • /
    • v.13 no.5
    • /
    • pp.32-38
    • /
    • 2019
  • The flying wing configuration with high sweep angles and rounded leading edge represent a complex flow of structures by the leading edge vortex. For control of the tailless flying wing configuration with unstable directional stability, flaperon is used. In this study, we conducted numerical simulations for a non-slender flying wing configuration with a rounded leading edge and analyzed the effect of the sideslip angle and flaperon. Through aerodynamic coefficient analysis, it was found that the effect of AoS on lift and drag coefficient was minimal and the side force and moment coefficient were markedly influenced by AoS. As the sideslip angle increased, the pitch break, which is related to the pitching moment coefficient, was delayed. Through stability analysis, the directional and lateral static stability of the flying wing configuration were increased by flaperon. Also, the structure and behavior of the leading edge vortex were analyzed by observing the contour of the pressure coefficient and the skin friction line.

An IoT Information Security Model for Securing Bigdata Information for IoT Users (IoT 사용자의 빅데이터 정보를 안전하게 보호하기 위한 IoT 정보 보안 모델)

  • Jeong, Yoon-Su;Yoon, Deok-Byeong;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.11
    • /
    • pp.8-14
    • /
    • 2019
  • Due to the development of computer technology, IoT technology is being used in various fields of industry, economy, medical service and education. However, multimedia information processed through IoT equipment is still one of the major issues in the application sector. In this paper, a big data protection model for users of IoT based IoT is proposed to ensure integrity of users' multimedia information processed through IoT equipment. The proposed model aims to prevent users' illegal exploitation of big data information collected through IoT equipment without users' consent. The proposed model uses signatures and authentication information for IoT users in a hybrid cryptographic method. The proposed model feature ensuring integrity and confidentiality of users' big data collected through IoT equipment. In addition, the user's big data is not abused without the user's consent because the user's signature information is encrypted using a steganography-based cryptography-based encryption technique.

EA Study on Practical Engineering Education through the Design and Configure of Safe Running Type Drones (안전 주행형 무인기의 설계 및 제작을 통한 실천 공학 교육에 관한 연구)

  • Jo, Yeong-Myeong;Lee, Sang-Gwon;Chang, Eun-Young
    • Journal of Practical Engineering Education
    • /
    • v.9 no.1
    • /
    • pp.7-13
    • /
    • 2017
  • This study will provide a practical plan of engineering education through the study of major activities connected with the production of works to accomplish the graduation conditions by completing the comprehensive design subject and the result of the performance. The designed subject is to measure the minimum safety distance during driving using the obstacle detection function of the ultrasonic sensor and to perform the avoidance algorithm based on the measurement value of the acceleration gyro sensor. It is proposed an access surveillance system that minimizes the damage of drones, surrounding objects, and people, and improves air mobility. Experimental results show that the obstacles around the drone are detected by five ultrasonic sensors and the difference of output value is applied to each motor of the drone and obstacle avoidance is confirmed. In addition, the content and level of the data for measuring the achievement of learning achievement in the engineering education certification program were used and the results were confirmed to be consistent with the description of the engineering problem level required for the graduates of 4-year engineering college.

The design and Implementation of Web Security System using the Cookies (쿠키를 이용한 웹 보안시스템 설계 및 구현)

  • 송기평;박기식;한승희;조인준
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.4
    • /
    • pp.3-14
    • /
    • 2001
  • A Web server makes use of the HTTP(Hyper Text Transfer Protocol) to communicate with a client. The HTTP is a stateless protocol; the server does not maintain any state information for ongoing interactions with the client. Therefore, the HTTP inevitably requires additional overhead as repeating data key-in to user for continuing communications. This overhead in Web environment can be resolved by the cookie technologies. However, the cookie is usually unsecured due to the clear-text to transfer on the network and to store in the file. That is, information in the cookie is easy to exposure, copy, and even change. In this paper, we propose a secure cookie mechanism appropriate to Web environment, and then present a design and implement of secure Web system based on the scheme. The Web system can be used to any web environment. It also provides some security services, such as confidentiality, authentication, integrity.

Design of a Secure and Fast Handoff Method for Mobile If with AAA Infrastructure (AAA 기반 Mobile IP 환경에서 안전하고 빠른 핸드오프 기법 설계)

  • 김현곤
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.1
    • /
    • pp.79-89
    • /
    • 2004
  • Mobile IP Low Latency Handoffs allow greater support for real-time services on a Mobile W network by minimizing the period of time when a mobile node is unable to send or receive IP packets due to the delay in the Mobile IP Registration process. However, on Mobile IP network with AAA servers that are capable of performing Authentication, Authorization, and Accounting(AAA) services, every Registration has to be traversed to the home network to achieve new session keys, that are distributed by home AAA server, for a new Mobile IP session. This communication delay is the time taken to re-authenticate the mobile node and to traverse between foreign and home network even if the mobile node has been previously authorized to old foreign agent. In order to reduce these extra time overheads, we present a method that performs Low Latency Handoffs without requiring funker involvement by home AAA server. The method re-uses the previously assigned session keys. To provide confidentiality and integrity of session keys in the phase of key exchange between agents, it uses a key sharing method by gateway foreign agent that Performs a ousted thirty party. The Proposed method allows the mobile node to perform Low Latency Handoffs with fast as well as secure operation

The Design and Implementation of Module supporting Trusted Channel in Secure Operating System Environment (보안운영체제 환경에서의 신뢰채널 지원을 위한 모듈의 설계 및 구현)

  • 유준석;임재덕;나재훈;손승원
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.3-12
    • /
    • 2004
  • Secure operating system is a special operating system that integrates some security functions(i.e. access control, user authentication, audit-trail and etc.) with normal operating system in order to protect system from various attacks. But it doesn't consider my security of network traffic. To guarantee the security of the whole system, network traffic must be protected by a certain way and IPsec is a representative technology for network security. However, it requires administrator's carefulness in managing security policies and the key management mechanism is very heavy as well as complicated. Moreover, it doesn't have a suitable framework for delivery of security information for access control mechanism. So we propose a simple trusted channel mechanism for secure communication between secure operating systems. It provides confidentiality md authentication for network traffic and ability to deliver security information. It is implemented at the kernellevel of IP layer and the simplicity of the mechanism can minimize the overhead of trusted channel processing.

Designing Reliable P2P Transmission Mechanism Against MITM Attack (MITM 공격에 안전한 P2P 신뢰전송 메커니즘의 설계)

  • Kim, Sang-Choon;Kwon, Hyeonk-Chan;Nah, Jae-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.103-109
    • /
    • 2008
  • Many Internet application provide the PKI(public key infrastructure)-based service to provide authentication and message integrity. Several researchers proposed PKI-based p2p network framework. However, in the real world, the use of PKI is not suitable for peer to peer network, because the peer-to-peer network is an open and dynamic network. Moreover, currently there is no nation-to-nation interoperable certificate. In this paper, we designed reliable p2p file sharing application without public key infrastructure. To do this we propose reliable public key distribution mechanism to distribute public key safely without PKI infrastructure for two-tier super-peer architecture. In our system, each peer generates and distributes its public/private key pairs, and the public key is securely distributed without PKI. The proposed mechanism is safe against MITM attack. This mechanism can be applied various P2P applications such as file sharing, IPTV, distributed resource sharing and so on