• Title/Summary/Keyword: Effectiveness secure

Search Result 287, Processing Time 0.028 seconds

An Efficiency Authentication Security Mechanism of VANET in Highway (고속도로에서 차량네트워크(VANET)의 효율적인 인증 보안 매커니즘)

  • Kim, Gab-In;Kim, Yong-Cahn;Lee, Jong-Kun
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.3
    • /
    • pp.57-64
    • /
    • 2016
  • Since the information transmitted in VANET is distributed in an open access environment, the security problem is one of the most critical issue in VANET. For the communicate efficiently in VANET, each RSU(Roadside Unit) or OBU(On-Board Units) need certain features that will help them to gather information, to inform their neighbors and to make decisions by considering all of the collected information. In this paper, we propose a novel authentication scheme guaranteeing secure RSUs to OBUs of VANET in highway used the ID-based authentication scheme. We show a usefulness and effectiveness of proposed authentication scheme after compared with previous works.

Study on Fatigue Analysis for the Cutout Panel Structure using the Relation of Max-Min Principal Stress (최대 최소 주응력 관계를 활용한 Cutout Panel 구조물의 피로해석연구)

  • Shin, Insoo;Park, Gyucheul;Moon, Jungwon;Hong, Seunghyun
    • Journal of Aerospace System Engineering
    • /
    • v.9 no.4
    • /
    • pp.31-36
    • /
    • 2015
  • The fatigue analysis for cutout panel used for the weight reduction of aircraft has been conventionally performed through the open hole concept using the reference stress and stress concentration factor (Kt). However, in the actual structure cases, the goal of weight reduction might be less meaningful due to the conservative approach induced by the difficulties of extracting the confident reference stress from FE-Analysis in the complicated loading behavior. Therefore a new approach is proposed in order to secure the effectiveness of weight reduction and validate the confidence of the analysis results using the interaction of max-min principal stress at the critical location of open hole edge line.

A Study on an Improving Contingency Constrained Pre-Dispatch Algorithm in a Competitive Electricity Market (경쟁적 전력시장에서 송전선로 상정사고를 고려한 선행급전 알고리즘 개선에 관한 연구)

  • Kim, Kwang-Mo;Shin, Hye-Kyeong;Kang, Dong-Ju;Han, Seok-Man;Chung, Koo-Hyung;H.Kim, Bal-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2007.07a
    • /
    • pp.806-807
    • /
    • 2007
  • Systematic studies on the dispatch scheduling algorithm and related constraints can enhance the effectiveness of electricity market operation. When System Operator (SO) establishes a dispatch schedule, the bid information should be preserved in the schedule as much as possible. In this paper, we introduce a new type of sensitivity factor called Line Outage Impact Factor (LOIF) to screen a transmission line causing the most severe outage when scheduling the dispatch. This screening can assure the stable system operation and make an efficient feedback between the SO and market participants. We propose a transmission line contingency constrained Pre-dispatch algorithm using sensitivity indices in a suitable Pre-dispatch scheduling. The proposed algorithm has been tested on sample system and the results show more secure operation against critical contingencies.

  • PDF

A Study on the Ways of Securing the Effectiveness of Field Flame Retardant Coating Process (현장방염처리제도의 실효성 확보 방안에 관한 연구)

  • Park, Sung-Hyun;Baek, Eun-Sun
    • Fire Science and Engineering
    • /
    • v.25 no.2
    • /
    • pp.95-100
    • /
    • 2011
  • The ultimate purpose of this study is to improve the irrational system related to flame retardant coating performance test of field flame retardant coating articles and to secure the reliability of flame retardant coating through rational flame retardant coating test. To achieve this, the analysis was conducted on the interior finishing materials used in the interior fields and the trends of recent field flame retardant coating, based on the results of flame retardant coating performance test of field flame retardant coating articles which the first-line fire stations have recently conducted. And I attempted to present the methods of field flame retardant coating performance test suitable to current realities and the ways of improvement for securing reliability by analyzing the problems with the methods and procedures of field flame retardant coating articles and the registration system of flame retardant coating business.

An Improved Secure Semi-fragile Watermarking Based on LBP and Arnold Transform

  • Zhang, Heng;Wang, Chengyou;Zhou, Xiao
    • Journal of Information Processing Systems
    • /
    • v.13 no.5
    • /
    • pp.1382-1396
    • /
    • 2017
  • In this paper, we analyze a recently proposed semi-fragile watermarking scheme based on local binary pattern (LBP) operators, and note that it has a fundamental flaw in the design. In this work, a binary watermark is embedded into image blocks by modifying the neighborhood pixels according to the LBP pattern. However, different image blocks might have the same LBP pattern, which can lead to false detection in watermark extraction process. In other words, one can modify the host image intentionally without affecting its watermark message. In addition, there is no encryption process before watermark embedding, which brings another potential security problem. To illustrate its weakness, two special copy-paste attacks are proposed in this paper, and several experiments are conducted to prove the effectiveness of these attacks. To solve these problems, an improved semi-fragile watermarking based on LBP operators is presented. In watermark embedding process, the central pixel value of each block is taken into account and Arnold transform is adopted to guarantee the security of watermark. Experimental results show that the improved watermarking scheme can overcome the above defects and locate the tampered region effectively.

A Study of Effectiveness of the Improved Security Operation Model Based on Vulnerability Database (취약점 데이터베이스 기반 개선된 보안관제 모델의 효과성 연구)

  • Hyun, Suk-woo;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1167-1177
    • /
    • 2019
  • In this paper, the improved security operation model based on the vulnerability database is studied. The proposed model consists of information protection equipment, vulnerability database, and a dashboard that visualizes and provides the results of interworking with detected logs. The evaluation of the model is analyzed by setting up a simulated attack scenario in a virtual infrastructure. In contrast to the traditional method, it is possible to respond quickly to threats of attacks specific to the security vulnerabilities that the asset has, and to find redundancy between detection rules with a secure agent, thereby creating an optimal detection rule.

A study on the Critical speed of Korean Tilting Train Hanbit200 (한국형 틸팅열차 한빛200의 임계속도에 관한 연구)

  • Kim, Nam-Po;Kim, Jung-Seok;Park, Tae-Won
    • Journal of the Korean Society for Railway
    • /
    • v.10 no.3 s.40
    • /
    • pp.257-263
    • /
    • 2007
  • The critical speed above which the vehicle become unstable is one of the items that should be verified in the development of a new train. In the case of a high speed tilting train, which requires both higher critical speed and higher curving speed, the critical speed should be more carefully treated because the both requirements are in conflict with each other in the conventional train design. The main purpose of the present work is to estimate the linear and non-linear critical speeds of 200km/h Korean Tilting Train 'Hanbit200' under development. The newly developed self-steering mechanism was attached to the tilting train to ensure that the critical speed falls under the lower yaw stiffness which is needed to secure higher curving performance. The simulation for predicting the critical speed was done by a commercially available vehicle dynamics software. A full scale roller rig test was carried out to validate the numerical results and to verify the effectiveness of the self-steering mechanism.

An Energy Efficient Clustering Algorithm in Mobile Adhoc Network Using Ticket Id Based Clustering Manager

  • Venkatasubramanian, S.;Suhasini, A.;Vennila, C.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.341-349
    • /
    • 2021
  • Many emerging mobile ad-hoc network application communications are group-oriented. Multicast supports group-oriented applications efficiently, particularly in a mobile environment that has a limited bandwidth and limited power. Energy effectiveness along with safety are 2 key problem in MANET design. Within this paper, MANET is presented with a stable, energy-efficient clustering technique. In this proposed work advanced clustering in the networks with ticket ID cluster manager (TID-CMGR) has formed in MANET. The proposed routing scheme makes secure networking the shortest route possible. In this article, we propose a Cluster manager approach based on TICKET-ID to address energy consumption issues and reduce CH workload. TID-CMGR includes two mechanism including ticket ID controller, ticketing pool, route planning and other components. The CA (cluster agent) shall control and supervise the functions of nodes and inform to TID-CMGR. The CH conducts and transfers packets to the network nodes. As the CH energy level is depleted, CA elects the corresponding node with elevated energy values, and all new and old operations are simultaneously stored by CA at this time. A simulation trial for 20 to 100 nodes was performed to show the proposed scheme performance. The suggested approach is used to do experimental work using the NS- simulator. TIDCMGR is compared with TID BRM and PSO to calculate the utility of the work proposed. The assessment shows that the proposed TICKET-ID scheme achieves 90 percent more than other current systems.

Validation Data Augmentation for Improving the Grading Accuracy of Diabetic Macular Edema using Deep Learning (딥러닝을 이용한 당뇨성황반부종 등급 분류의 정확도 개선을 위한 검증 데이터 증강 기법)

  • Lee, Tae Soo
    • Journal of Biomedical Engineering Research
    • /
    • v.40 no.2
    • /
    • pp.48-54
    • /
    • 2019
  • This paper proposed a method of validation data augmentation for improving the grading accuracy of diabetic macular edema (DME) using deep learning. The data augmentation technique is basically applied in order to secure diversity of data by transforming one image to several images through random translation, rotation, scaling and reflection in preparation of input data of the deep neural network (DNN). In this paper, we apply this technique in the validation process of the trained DNN, and improve the grading accuracy by combining the classification results of the augmented images. To verify the effectiveness, 1,200 retinal images of Messidor dataset was divided into training and validation data at the ratio 7:3. By applying random augmentation to 359 validation data, $1.61{\pm}0.55%$ accuracy improvement was achieved in the case of six times augmentation (N=6). This simple method has shown that the accuracy can be improved in the N range from 2 to 6 with the correlation coefficient of 0.5667. Therefore, it is expected to help improve the diagnostic accuracy of DME with the grading information provided by the proposed DNN.

On Physical Security Threat Breakdown Structure for Data Center Physical Security Level Up (데이터센터 물리 보안 수준 향상을 위한 물리보안 위협 분할도(PS-TBS)개발 연구)

  • Bae, Chun-sock;Goh, Sung-cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.439-449
    • /
    • 2019
  • The development of information technology represented by ICBMA (IoT, Cloud, Big Data, Mobile, AI), is leading to a surge in data and a numerical and quantitative increase in data centers to accommodate it. As the data center is recognized as a social infrastructure, It is very important to identify physical security threats in advance in order to secure safety, such as responding to a terrorist attack. In this paper, we develop physical security threat breakdown structure (PS-TBS) for easy identification and classification of threats, and verify the feasibility and effectiveness of the PS-TBS through expert questionnaires. In addition, we intend to contribute to the improvement of physical security level by practical use in detailed definition on items of PS-TBS.