• Title/Summary/Keyword: Delay attack

Search Result 105, Processing Time 0.031 seconds

Development of Ultrasonic Magnetostrictive Sensors System to Measure in Very High Temperatures (초고온 온도 측정을 위한 초음파 자왜 센서 시스템 개발)

  • 구길모;김상백;박치승;최종호;고덕영
    • The Journal of the Acoustical Society of Korea
    • /
    • v.20 no.6
    • /
    • pp.66-74
    • /
    • 2001
  • The temperature measurement of yen high temperature core melt is of importance in LAVA (Lower-plenum Arrested Vessel Attack) experiment in which gap formation between core melt and the reactor lower head, and the effect of the gap on thermal behavior are to be measured. The delay time of ultrasonic wavelets due to high temperature is suggested. As a first stage, a molten material temperature was measured up to 2300℃. Also, the optimization design of the ultrasonic temperature sensor with persistence at the high temperature was suggested in this paper. And the utilization of the theory suggested in the reference〔1〕and the efficiency of the developed system are certified by performing experiments. This sensor welded magnetostrictive element and tungsten element will be able to measure a temperature range of 3000℃ hereafter.

  • PDF

Enhancing VANET Security: Efficient Communication and Wormhole Attack Detection using VDTN Protocol and TD3 Algorithm

  • Vamshi Krishna. K;Ganesh Reddy K
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.1
    • /
    • pp.233-262
    • /
    • 2024
  • Due to the rapid evolution of vehicular ad hoc networks (VANETs), effective communication and security are now essential components in providing secure and reliable vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication. However, due to their dynamic nature and potential threats, VANETs need to have strong security mechanisms. This paper presents a novel approach to improve VANET security by combining the Vehicular Delay-Tolerant Network (VDTN) protocol with the Deep Reinforcement Learning (DRL) technique known as the Twin Delayed Deep Deterministic Policy Gradient (TD3) algorithm. A store-carry-forward method is used by the VDTN protocol to resolve the problems caused by inconsistent connectivity and disturbances in VANETs. The TD3 algorithm is employed for capturing and detecting Worm Hole Attack (WHA) behaviors in VANETs, thereby enhancing security measures. By combining these components, it is possible to create trustworthy and effective communication channels as well as successfully detect and stop rushing attacks inside the VANET. Extensive evaluations and simulations demonstrate the effectiveness of the proposed approach, enhancing both security and communication efficiency.

An Experimental Study on the Salt Resistance Properties with Concrete Materials under Marine Exposure Environment (I) (해양환경에 폭로한 콘크리트의 내염특성에 대한 실험적 연구 (I))

  • 신도철;김영웅;김용철;김동철
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2002.10a
    • /
    • pp.51-56
    • /
    • 2002
  • Protection against salt attack in seawater is obtained by using a dense, quality concrete with a low water-cement ratio, and a components appropriate for producing concrete having the needed salt resistance. The objective of this study is to evaluate the feature of corrosion with using the various concrete materials under marine exposure environment. According to the test results, slag powder and anti -corrosion inhibitor showed high chloride resistance effect. Also concre crack have an influence on corrosion of steel in spite of mixed design for salt resistance concrete. The requirement for low permeability is essential not only to delay the effect of salt attack, but also to afford adquate protection to reinforcement with admixtures.

  • PDF

NUMERICAL STUDY ON THE WAKE OF A SINGLE MICRO VORTEX GENERATOR (Single micro Vortex Generator의 후류에 대한 수치적 연구)

  • Kim, G.H.;Park, S.O.
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2011.05a
    • /
    • pp.494-499
    • /
    • 2011
  • One of the devices to prevent separated flow over a wing or a flap at high angle of attack is a vortex generator. In the present work, we numerically study the flow around a low-profile or micro vortex generator whose height is less than local boundary layer thickness which can delay separation with a minimum drag penalty owing to its very small wetted surface area. As a first step toward a parametric study to efficiently design this MVG flow control system, we simulate the flow around a single MVG on a flat plate. For the simulation, we employ OpenFOAM with Launder-Sharma ${\kappa}$-epsilon model. The analysis results are validated by comparing with experimental results of a rectangular MVG at an angle of attack of 10 degrees whose height is 20% of local boundary layer. Important results and aspects of this numerical study are discussed. We also simulate the flow around rectangular, triangular and trapezoidal MVGs and the results are compared

  • PDF

Aircraft CAS Design with Input Saturation Using Dynamic Model Inversion

  • Sangsoo Lim;Kim, Byoung-Soo
    • International Journal of Control, Automation, and Systems
    • /
    • v.1 no.3
    • /
    • pp.315-320
    • /
    • 2003
  • This paper presents a control augmentation system (CAS) based on the dynamic model inversion (DMI) architecture for a highly maneuverable aircraft. In the application of DMI not treating actuator dynamics, significant instabilities arise due to limitations on the aircraft inputs, such as actuator time delay based on dynamics and actuator displacement limit. Actuator input saturation usually occurs during high angles of attack maneuvering in low dynamic pressure conditions. The pseudo-control hedging (PCH) algorithm is applied to prevent or delay the instability of the CAS due to a slow actuator or occurrence of actuator saturation. The performance of the proposed CAS with PCH architecture is demonstrated through a nonlinear flight simulation.

Flexible Real Time Embedded System Using RTOS and SOPC (RTOS와 SOPC를 이용한 유연한 실시간 처리 임베디드시스템)

  • Ahn, Sang-Min;Choi, Woo-Chang;Kong, Jung-Shik;Lee, Bo-Hee;Kim, Jin-Geol;Huh, Uk-Youl
    • Proceedings of the KIEE Conference
    • /
    • 2005.07d
    • /
    • pp.2843-2845
    • /
    • 2005
  • This paper deals with the design of real-time embedded system using RTOS (real-time operating system) and SOPC (system on a programmable chip). It is, in general, known that RTOS has the problem of time delay caused by the multiple tasks and task management approach. Since the increase in time delay in real-time embedded system makes the overall system have the poor performance or the critical behavior of instability and unreliability, the method employed RTOS and SOPC is proposed to attack the above problems. The proposed system is implemented on the RC-motor controller and is verified by real experiment.

  • PDF

Whale Optimization Algorithm and Blockchain Technology for Intelligent Networks

  • Sulthana, Shazia;Reddy, BN Manjunatha
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.157-164
    • /
    • 2022
  • The proposed privacy preserving scheme has identified the drawbacks of existing schemes in Vehicular Networks. This prototype enhances the number of nodes by decreasing the cluster size. This algorithm is integrated with the whale optimization algorithm and Block Chain Technology. A set of results are done through the NS-2 simulator in the direction to check the effectiveness of proposed algorithm. The proposed method shows better results than with the existing techniques in terms of Delay, Drop, Delivery ratio, Overhead, throughout under the denial of attack.

Device Authentication Protocol for LR-WPAN using Pre-Authentication Mechanism (LR-WPAN에서 사전인증기법을 이용한 기기 인증 프로토콜)

  • Lee, Sung-Hyung;Kim, Jae-Hyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.4
    • /
    • pp.63-72
    • /
    • 2010
  • This paper proposes a new authentication protocol for the LR-WPAN. In order to guarantee the reliability and safety of a protocol, this protocol uses the hierarchical authentication approach. In addition, in order to reduce the impact of the denial of service attack, the proposed protocol performs the authentication between a parent router and a joiner device prior to the authentication between a trust center and the joiner device. Moreover, this protocol reduces the authentication delay by decreasing the number of message exchanges during authentication procedure. This paper evaluates the safety of the proposed protocol by the security analysis and reliability of the proposed protocol by the GNY analysis. This paper also compares the number of message exchanges of the ZigBee authentication protocol and the proposed protocol when denial of service attack occurs to evaluate the resistance of the proposed protocol against the denial of service attack. We also analyze the delay for authentication of the joiner device through the implementation of both protocols. Those results show that the proposed protocol effectively protects networks from the denial of service attack and reduces the time for authenticating the joiner device up to maximum 30% as the number of hops increases.

Effect of stall delay characteristics of symmetrical aerofoil using lateral circular ridges

  • Raatan, V.S.;Ramaswami, S.;Mano, S.;Pillai, S. Nadaraja
    • Wind and Structures
    • /
    • v.34 no.4
    • /
    • pp.385-394
    • /
    • 2022
  • Global Warming has been driven majorly by the consumption of fossil fuels. Harnessing energy from wind is viable solution towards reducing carbon footprint created due to burning such fuels, However, wind turbines have their problems of flow separation and aerodynamic stall to tackle with. In an attempt to delay the stall angle and improve the aerodynamic characteristics of the NACA 0015 symmetrical aerofoil, lateral cylindrical ridges were attached to its suction surface, at chord positions ranging from 0.1c to 0.5c. The characteristics of the original and ridged aerofoils were obtained using simultaneous pressure readings taken in a wind tunnel, at a free stream Reynolds number of Re = 2.81 × 105 for a wide range of free stream angles of attack ranging from -45° to 45°. Depending on the ridge size, a delay in stall angle varying from 5° to 20° was achieved together with the maximum increase in lift in the post-stall phases. Additionally, efforts were made to identify the optimum position for each ridge.

Realistic Multiple Fault Injection System Based on Heterogeneous Fault Sources (이종(異種) 오류원 기반의 현실적인 다중 오류 주입 시스템)

  • Lee, JongHyeok;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1247-1254
    • /
    • 2020
  • With the advent of the smart home era, equipment that provides confidentiality or performs authentication exists in various places in real life. Accordingly security against physical attacks is required for encryption equipment and authentication equipment. In particular, fault injection attack that artificially inject a fault from the outside to recover a secret key or bypass an authentication process is one of the very threatening attack methods. Fault sources used in fault injection attacks include lasers, electromagnetic, voltage glitches, and clock glitches. Fault injection attacks are classified into single fault injection attacks and multiple fault injection attacks according to the number of faults injected. Existing multiple fault injection systems generally use a single fault source. The system configured to inject a single source of fault multiple times has disadvantages that there is a physical delay time and additional equipment is required. In this paper, we propose a multiple fault injection system using heterogeneous fault sources. In addition, to show the effectiveness of the proposed system, the results of a multiple fault injection attack against Riscure's Piñata board are shown.