• Title/Summary/Keyword: Information infrastructure

Search Result 4,690, Processing Time 0.034 seconds

Communication Interoperability of Electric Uehicle Charging Infrastructure and Grid Network (전기차 충전 인프라와 전력망 간의 통신 상호운용성 연구)

  • Ju, Seunghwan;Lee, Ilho;Song, Sanghoon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.1
    • /
    • pp.15-25
    • /
    • 2018
  • ISO/IEC 15118 is a standard for communications and services for electric vehicle charging infrastructure. Although this standard deals only with data communication between an electric vehicle and a charge station, communication with the outside is essential for establishing an authentication system for vehicle certification and V2G service for electric power transmission. In this study, it was designed to verify the information of electric car charging infrastructure in electric power system through communication link between ISO/IEC 15118 electric vehicle model and IEC 61850 standard MMS protocol. This is demonstrated in the field so that the electric vehicle communication data is linked with the micro grid management system. This could be used as an element technology in other distributed power sources as well as electric cars in the future.

A Coordinated Heuristic Approach for Virtual Network Embedding in Cloud Infrastructure

  • Nia, Nahid Hamzehee;Adabi, Sepideh;Nategh, Majid Nikougoftar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2346-2361
    • /
    • 2017
  • A major challenge in cloud infrastructure is the efficient allocation of virtual network elements on top of substrate network elements. Path algebra is a mathematical framework which allows the validation and convergence analysis of the mono-constraint or multi-constraint routing problems independently of the network topology or size. The present study proposes a new heuristic approach based on mathematical framework "paths algebra" to map virtual nodes and links to substrate nodes and paths in cloud. In this approach, we define a measure criterion to rank the substrate nodes, and map the virtual nodes to substrate nodes according to their ranks by using a greedy algorithm. In addition, considering multi-constraint routing in virtual link mapping stage, the used paths algebra framework allows a more flexible and extendable embedding. Obtained results of simulations show appropriate improvement in acceptance ratio of virtual networks and cost incurred by the infrastructure networks.

Cyber Security Framework for Critical Infrastructure (기반시설 사이버보안 프레임워크 도출방안)

  • Kwon, Sungmoon;Lee, Seokcheol;Jang, Jiwoong;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.241-250
    • /
    • 2017
  • Contrary to past critical infrastructure network, current critical infrastructure network is adopting IoT devices and efficient management system using the external networks. Using this system, productivity and management efficiency could be enhanced compared to past critical infrastructure network. But cybersecurity issue could be occurred at external network connection, so cybersecurity guideline is necessary. However, critical infrastructure organizations tend to use the cybersecurity guideline issued by government because it is hard to develop cybersecurity guideline on their own. But the government's cybersecurity guideline isn't suitable for the critical infrastructure network because it doesn't include critical infrastructure's specific characteristics. Therefor, we suggested the development method of cybersecurity guideline for the critical infrastructure network based on analysing cybersecurity guideline standards and critical infrastructure networks.

A Study on the Security Framework Design for Stable Operation of Critical Infrastructure Service (주요기반시설 서비스의 안정적 운영을 위한 보안 프레임워크 설계에 관한 연구)

  • Lee, Suyeon;Yoo, Jiyeon;Lim, Jongin
    • Journal of Information Technology Services
    • /
    • v.15 no.4
    • /
    • pp.63-72
    • /
    • 2016
  • Critical infrastructure has been operating in a closed environment with a completely separate information system and in the private area. However, with the current ICT environment changes due to convergence and open platforms it has increased the threats and risks to critical infrastructure. The importance of cyber security is increasing in the infrastructure control system, such as the outbreak of Ukraine blackout in 2015 by a malicious code called 'black energy'. This thesis aims to recognize the importance and necessity of protecting the critical infrastructure service, designing a security framework reflecting environmental and characteristic changes, and analyzing the management system suitable for a security framework. We also propose a theoretical basis for constructing a new security framework by comparing and analyzing seven international security management system standards, such as NIST 800-82 and IEC 62443-2-1, which are used in the control system. As a result, the environment surrounding critical infrastructure changes with the characteristics of connectivity, openness, and finality was studied, and as a response to this, many scholars and institutions present critical infrastructure security frameworks as cycle enhancement type structures, risk management structures, and management domain expansion structures. In response, the security framework encompassing these structures, CISF (Critical Infrastructure Security Framework), was designed. Additionally, through the security related international standard and criterion analysis, as a newly designed security standard suitable for CISF, IEC 62443-2-1 is reviewed and suggestions are made.

Key Recovery Technology for Enterprise Information Infrastructure(EII) (기업 정보체계의 키 복구 기술)

  • 임신영;강상승;하영국;함호상;박상봉
    • The Journal of Society for e-Business Studies
    • /
    • v.4 no.3
    • /
    • pp.159-178
    • /
    • 1999
  • As Electronic Commerce is getting larger, the volume of Internet-based commerce by enterprise is also getting larger. This phenomenon applies to Internet EDI, Global Internet Business, and CALS information services. In this paper, a new type of cryptographic key recovery mechanism satisfying requirements of business environment is proposed. It is also applied to enterprise information infrastructure for managing employees' task related to handling official properties of electronic enterprise documents exchange. This technology needs to be complied to information management policy of a certain enterprise environment because behavior of cryptographic key recovery can cause interruption of the employees' privacy. However, the cryptographic key recovery mechanism is able to applied to any kind of information service, the application areas of key recovery technology must be seriously considered as not disturbing user's privacy It will depend on the policy of enterprise information management of a specific company.

  • PDF

Service Infrastructure of Wearable Computing (웨어러블 컴퓨팅을 위한 서비스 인프라 구조)

  • Han, Dong-Won;Park, Jun-Seok;Cho, Il-Yeon
    • Journal of the Ergonomics Society of Korea
    • /
    • v.24 no.1
    • /
    • pp.43-46
    • /
    • 2005
  • The future information technologies and service paradigm will move from PC, the general purpose desktop computing environment, to the next-generation PC that provides information any where, any time, and any device. The next-generation PC such as wearable computers are specialized to the human-centric functionalities and always-on connected services. In this study, service infrastructure of wearable computing with WBAN(Wearable Body Area Network) was suggested for the ubiquitous computing environment.

A Study of Grid Computing Based on Privilege Management Infrastructure (Privilege Management Infrastructure를 이용한 Grid Computing 연구)

  • 최현석;이재인;김지호;박세현;송오영
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.356-359
    • /
    • 2003
  • 본 논문에서는 제안하는 Grid Computing은 PMI(Privilege Management Infrastructure)를 이용하여 효율적으로 컴퓨팅 파워의 분산 관리하고 네트?의 트래픽을 분산시키는 모델을 제시한다. 또한 Agent 간 통신 및 Agent와 Server 간 통신에서 Soap Protocol과 SSL Protocol을 접목하여 보안 RPC통신을 기반으로 데이터의 무결성과 기밀성을 보장한다. 본 논문에서 제안한 모델은 Agent를 효과적으로 관리하고 네트워크의 트래픽을 감소시킴과 더불어 Grid Computing의 성능이 개선될 것으로 기대된다.

  • PDF

Experiments on IEEE 802.11b Wireless LAN Infrastructure Performance with Transmission Power Management (IEEE 802.11b Infrastructure 환경에서 전송 전력 관리를 통한 성능 실험)

  • 정희록;김성훈;박창윤
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04d
    • /
    • pp.481-483
    • /
    • 2003
  • 이동 장비들은 베터리를 전원으로 하고 있으며 이들이 사용하는 무선 통신에 소모되는 전력을 줄이는 것은 베터리의 적은 전력량을 고려해 볼 때 매우 중요하다. 본 논문은 802.11b infrastructure환경에서 저전력 통신 기법을 개발하기 위해 전송 전력이 통신 성능에 미치는 영향을 실험하였다. 실험 결과 사무실 수준의 공간에서는 성능에 영향을 미치지 않으면서 전력을 낮출 수 있고, 이 경우 전송으로 인한 전력 소비에서 18%정도의 전력 절감이 가능하리라는 것을 확인 할 수 있었다.

  • PDF

A Study on the IT Infrastructure of Korean Apparel Industry (국내 의류업계의 IT 인프라 구조에 관한 연구)

  • Choi, In-Ryu
    • The Research Journal of the Costume Culture
    • /
    • v.17 no.3
    • /
    • pp.512-522
    • /
    • 2009
  • The purpose of this study is to analyze IT infrastructure of Korean apparel industry in order to enhance business effectiveness and customer's satisfaction in information society with global networks. For this study, the questionnaires were distributed to 57 apparel industries in Korea. The data were analyzed by factor analysis, descriptive statistics, Cronbach's alpha coefficient, multi regression analysis. The results of this study are as follow: First, Considering the apparel industry, construction of information system is essential for assistance of information policy and utilization of information. Understanding of e-business policy affects profits of suppliers. Second, Apparel industry with higher information policy has higher productivity with flexibility. Third, Apparel industry which has close relationship with suppliers has better customer support. Flexible scheduling and production line are important factors for quick response of customer's order and need.

  • PDF