• Title/Summary/Keyword: Key Distribution System

Search Result 667, Processing Time 0.031 seconds

Key Distribution Protocol and Call Control for Secure ISDN (안전한 종합정보통신망을 위한 키 분배 프로토콜과 호 제어)

  • Jeong, Hyeon-Cheol;Sin, Gi-Su;Lee, Seon-U;Kim, Bong-Han;Kim, Jeom-Gu;Lee, Jae-Gwang
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.1
    • /
    • pp.195-208
    • /
    • 1997
  • ISDN is network which has been developed to integrate and transfer some information(data, video, voice). In the ISDN, security problem that threat and intrusion about important information resource increase because every information is transferred in the form of digital and access of network has patiency. In this paper, for protect important information resource, studied that apply application method and encryption system to ISDN, and system structure, ITU-T Q.931 protocol were analyzed, and proposable encryption key distribution protocol, call control with hybrid encryption system for user information privacy to provide security service.

  • PDF

Magnetic Field Gradient Optimization for Electronic Anti-Fouling Effect in Heat Exchanger

  • Han, Yong;Wang, Shu-Tao
    • Journal of Electrical Engineering and Technology
    • /
    • v.9 no.6
    • /
    • pp.1921-1927
    • /
    • 2014
  • A new method for optimizing the magnetic field gradient in the exciting coil of electronic anti-fouling (EAF) system is presented based on changing exciting coil size. In the proposed method, two optimization expressions are deduced based on biot-savart law. The optimization expressions, which can describe the distribution of the magnetic field gradient in the coil, are the function of coil radius and coil length. These optimization expressions can be used to obtain an accurate coil size if the magnetic field gradient on a certain point on the coil's axis of symmetry is needed to be the maximum value. Comparing with the experimental results and the computation results using Finite Element Method simulation to the magnetic field gradient on the coil's axis of symmetry, the computation results obtained by the optimization expression in this article can fit the experimental results and the Finite Element Method results very well. This new method can optimize the EAF system's anti-fouling performance based on improving the magnetic field gradient distribution in the exciting coil.

Design of an RFID Authentication Protocol Using Token Key and Hash Function (토큰키와 해쉬함수를 이용한 RFID 인증 프로토콜 설계)

  • Na, Young-Nam;Han, Jae-Kyun
    • 전자공학회논문지 IE
    • /
    • v.48 no.2
    • /
    • pp.52-60
    • /
    • 2011
  • RFID is method used on wireless system. However, this mechanism is not used for authentication and security. Therefore, it is very vulnerable to attacks such as dropping attacks and traffic attacks. the RFID Tags are of the limited nature due to environment factors and there is greater constraints in designing authentication protocol. If we do not RFID to secure corporate information and product all the information will be exposed. The attacker will break into the RFID system and stop the distribution system. So, this paper proposes a new authentication protocol which provides not only unlimited access to Tag&Reader and connection between Tag and Reader bet also provides authentication mechanism by defining the key distribution.

Impact performance for high frequency hydraulic rock drill drifter with sleeve valve

  • Guo, Yong;Yang, Shu Yi;Liu, De Shun;Zhang, Long Yan;Chen, Jian Wen
    • International Journal of Fluid Machinery and Systems
    • /
    • v.9 no.1
    • /
    • pp.39-46
    • /
    • 2016
  • A high frequency hydraulic rock drill drifter with sleeve valve is developed to use on arm of excavator. In order to ensure optimal working parameters of impact system for the new hydraulic rock drill drifter controlled by sleeve valve, the performance test system is built using the arm and the hydraulic source of excavator. The evaluation indexes are gained through measurement of working pressure, supply oil flow and stress wave. The relations of working parameters to impact system performance are analyzed. The result demonstrates that the maximum impact energy of the drill drifter is 98.34J with impact frequency of 71HZ. Optimal pressure of YZ45 rock drill is 12.8 MPa-13.6MPa, in which the energy efficiency reaches above 58.6%, and feature moment of energy distribution is more than 0.650.

Unbalanced Power Sharing for Islanded Droop-Controlled Microgrids

  • Jia, Yaoqin;Li, Daoyang;Chen, Zhen
    • Journal of Power Electronics
    • /
    • v.19 no.1
    • /
    • pp.234-243
    • /
    • 2019
  • Studying the control strategy of a microgrid under the load unbalanced state helps to improve the stability of the system. The magnitude of the power fluctuation, which occurs between the power supply and the load, is generated in a microgrid under the load unbalanced state is called negative sequence reactive power $Q^-$. Traditional power distribution methods such as P-f, Q-E droop control can only distribute power with positive sequence current information. However, they have no effect on $Q^-$ with negative sequence current information. In this paper, a stationary-frame control method for power sharing and voltage unbalance compensation in islanded microgrids is proposed. This method is based on the proper output impedance control of distributed generation unit (DG unit) interface converters. The control system of a DG unit mainly consists of an active-power-frequency and reactive-power-voltage droop controller, an output impedance controller, and voltage and current controllers. The proposed method allows for the sharing of imbalance current among the DG unit and it can compensate voltage unbalance at the same time. The design approach of the control system is discussed in detail. Simulation and experimental results are presented. These results demonstrate that the proposed method is effective in the compensation of voltage unbalance and the power distribution.

Study on the characteristics of night flow components for leakage management in district metered area (배수구역별 누수관리를 위한 야간유량성분 특성연구)

  • Koo, Ja-Yong;Jang, Kwang-Ho;Kim, Min-Cheol
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.23 no.6
    • /
    • pp.871-879
    • /
    • 2009
  • The Korea has high population density, so the precipitation per capita is only one tenth to world average. The water resource in Korea is insufficient. But the leakage in the water distribution system is about 25%, and it is lower than other countries where water utilities are managed well. The pipelines' management also is getting worse because the leakage in the pipelines lower the ground density surrounding pipes. So, managing the leakage in the water distribution system is very important in the view of increasing the water resources and doing the efficient management of the pipeline system. Accordingly this study aimed to conduct a cause-analysis with scientific approaches considering key local factor related to water loss of distribution system and derive better performance indicators which are able to evaluate the real state of water loss management reasonably. Also this research aimed to develop a methodology capable of judging condition of infrastructure of water distribution system.

A New Fuzzy Key Generation Method Based on PHY-Layer Fingerprints in Mobile Cognitive Radio Networks

  • Gao, Ning;Jing, Xiaojun;Sun, Songlin;Mu, Junsheng;Lu, Xiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.3414-3434
    • /
    • 2016
  • Classical key generation is complicated to update and key distribution generally requires fixed infrastructures. In order to eliminate these restrictions researchers have focused much attention on physical-layer (PHY-layer) based key generation methods. In this paper, we present a PHY-layer fingerprints based fuzzy key generation scheme, which works to prevent primary user emulation (PUE) attacks and spectrum sensing data falsification (SSDF) attacks, with multi-node collaborative defense strategies. We also propose two algorithms, the EA algorithm and the TA algorithm, to defend against eavesdropping attacks and tampering attacks in mobile cognitive radio networks (CRNs). We give security analyses of these algorithms in both the spatial and temporal domains, and prove the upper bound of the entropy loss in theory. We present a simulation result based on a MIMO-OFDM communication system which shows that the channel response characteristics received by legitimates tend to be consistent and phase characteristics are much more robust for key generation in mobile CRNs. In addition, NIST statistical tests show that the generated key in our proposed approach is secure and reliable.

An Authentication Scheme against Various Attacks including DoS Attack in RFID System (RFID 시스템에서 DoS 공격을 포함한 다양한 공격에 대처하는 인증 기법)

  • Lee, Kyu-Hwan;Kim, Jae-Hyun
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.146-149
    • /
    • 2008
  • The RFID system is very useful in various fields such as the distribution industry and the management of the material, etc. However, the RFID system suffers from various attacks since it does not have a complete authentication protocol. Therefore, this paper propose the authentication protocol that used key server to resist various attacks including DoS(Denial of Service) attack. For easy implementation, the proposed protocol also uses CRC, RN16 generation function existing in EPCglobal class 1 gen2 protocol. This paper performed security analysis to prove that the proposed protocol is resistant to various attacks. The analytical results showed that the proposed protocol offered a secure RFID system.

  • PDF

Energy Management Strategy and Adaptive Control for SMES in Power System with a Photovoltaic Farm

  • Kim, Seung-Tak;Park, Jung-Wook
    • Journal of Electrical Engineering and Technology
    • /
    • v.9 no.4
    • /
    • pp.1182-1187
    • /
    • 2014
  • This paper proposes an energy management strategy and adaptive control for superconducting magnetic energy storage (SMES) in a distribution power system with a grid-connected photovoltaic (PV) farm. Application of the SMES system can decrease the output power fluctuations of PV system effectively. Also, it can control the real and reactive powers corresponding to the scheduled reference values with adequate converter capacity, which are required at a steady-state operating point. Therefore, the adaptive control strategy for SMES plays a key role in improving the system stability when the PV generation causes uncertain variations due to weather conditions. The performance of proposed energy management strategy and control method for the SMES is then evaluated with several case studies based on the PSCAD/EMTDC$^{(R)}$ simulation.

Measurement of distribution stability of binary nanofluids by zeta-potential (Zeta-potential을 이용한 이성분 나노유체의 분산안정도 측정)

  • Lee, Kang-Il;Jung, Chung-Woo;Kim, Hyun-Jun;Joeng, Jin-Hee;Kang, Yong-Tae
    • Proceedings of the SAREK Conference
    • /
    • 2006.06a
    • /
    • pp.52-57
    • /
    • 2006
  • This study investigates the distribution stability of binary nanofluids where binary mixtures such as $NH_3/H_2O$ and $H_2O/LiBr$ solution are used as a base fluid. When a little amount of certain nanosized particles is added into a basefluid, the thermal conductivity of that mixture increases greatly. Such mixtures are named 'nanofluids' where nano-particles should be distributed stably and uniformly so the distribution stability of nanoparticles in nanofluids is one of the most important factors for nanofluid application. Therefore, binary nanofluids in which binary mixtures are applied as the basefluids are considered as working fluids. The kind and the concentration of nanoparticles, and the concentration of ammonia are considered as the key parameters. The objectives of this paper are to visualize the dispersed status of particles in binary nanofluids and to find the effect of key parameters on the distribution stability in the ammonia absorption system.

  • PDF