• Title/Summary/Keyword: Leakage management

Search Result 662, Processing Time 0.026 seconds

Verification of a Function-based Security Authentication Protocol for Implantable Medical Devices (함수 기반의 체내 삽입장치용 보안 인증프로토콜 검증)

  • Bae, WooSik;Han, KunHee
    • Journal of Digital Convergence
    • /
    • v.12 no.5
    • /
    • pp.249-254
    • /
    • 2014
  • Recent advancement of USN technology has lent itself to the evolving communication technology for implantable devices in the field of medical service. The wireless transmission section for communication between implantable medical devices and patients is a cause of concern over invasion of privacy, resulting from external attackers' hacking and thus leakage of private medical information. In addition, any attempt to manipulate patients' medical information could end up in serious medical issues. The present study proposes an authentication protocol safe against intruders' attacks when RFID/USN technology is applied to implantable medical devices. Being safe against spoofing, information exposure and eavesdropping attacks, the proposed protocol is based on hash-function operation and adopts session keys and random numbers to prevent re-encryption. This paper verifies the security of the proposed protocol using the formal verification tool, Casper/FDR.

Implementation of Domain Separation-based Security Platform for Smart Device (안전한 스마트 단말을 위한 도메인 분리 기반 보안 플랫폼 구현)

  • Kim, Jeong Nyeo
    • Journal of Digital Convergence
    • /
    • v.14 no.12
    • /
    • pp.471-476
    • /
    • 2016
  • Recently, important information related with smart work such as office and video conference are handled in smart device quite a lot compare with before. Also, execution environment of smart devices is getting developed as open software environment. It brought convenience to download and use any kind of application software. By that, security side of smart devices became vulnerable. This paper will discuss characteristics of smart device security technology based on virtualization that is a mobile device platform with isolated secure execution area based on TEE (Trusted Execution Environment). Also, this paper will suggest an implementation method about safe smart device security platform based on domain separation for application software which can be executed in smart devices. The domain separation based smart device security platform technology in this paper blocks unauthorized access and leakage of sensitive information in device. Also it will be the solution can block transmission and execution of malicious code in various area including variety of IoT devices in internet rather than just smart devices.

Determination Methods of Pressure Monitoring Location in Water Distribution System (상수관망에서 수압모니터링지점 선정방법)

  • Kwon, Hyuk Jae
    • Journal of Korea Water Resources Association
    • /
    • v.46 no.11
    • /
    • pp.1103-1113
    • /
    • 2013
  • In this study, determination methods of the pressure monitoring location in water distribution system were introduced and applied to sample pipe network. The best determination method of the pressure monitoring location was suggested and applied to the real city pipe network. Three kinds of determination methods of pressure monitoring locations are categorized such as the sensitivity analysis according to changing roughness coefficient, pressure contribution analysis, and sensitivity analysis according to changing demand. Further-more, pressure contribution analysis and sensitivity analysis from the results of unsteady analysis were conducted and compared each other. From the results, the most accurate and simplest method was selected in this study. Therefore, the best method can be applied for the pressure management or leakage detection as a determination method of pressure monitoring location in water distribution system.

Seepage Quantity Evaluation of a Fill Dam using 3D FEM Analysis (3차원 수치해석에 의한 필 댐의 누수량 평가)

  • Choi, Byoungil
    • Journal of the Korean GEO-environmental Society
    • /
    • v.16 no.8
    • /
    • pp.45-49
    • /
    • 2015
  • Using 2D numerical analysis that covers the largest section of the dam body, a process is generally performed when evaluating its stability against seepage. The quantity of seepage is first obtained by assuming that its bottom topography is in the simple form of a rectangle, it is then calculated by reflecting its sectional shape during this process of analyzing the seepage quantity. Considering that various forms of dams are being constructed on various types of ground, thanks to more recent technological advances, it is judged more appropriate to draw a conclusion by means of the results on reflecting the realistic shape and topographical conditions of the dam body through 3D numerical analysis. Therefore, this study intends to present a method designed to carry out safety management by evaluating the correct quantity of water leakage that passes only through the dam body, having excluded other factors that include the amount of rainfall through the 3D FEM analysis.

Hydraulic Analysis of Urban Water-Supply Networks in Marivan

  • Tavosi, Mohammad Ghareb;Siosemarde, Maaroof
    • Industrial Engineering and Management Systems
    • /
    • v.15 no.4
    • /
    • pp.396-402
    • /
    • 2016
  • In this study, hydraulic analysis of water-supply networks in Marivan was performed by modeling. WATERGEMS was used for modeling and it was calibrated using existing rules and regulations. The purpose of this research is modeling urban water network and its analysis based on hydraulic criteria and meeting pressure conditions at the nodes and complying the economic speed. To achieve this goal, first the pipelines of city streets was designed in AutoCAD on a map of the city. It should be mentioned that it was tried to prevent from creating additional loops in the network and the optimal network was designed by a combination of annular and branch loops. In the next step, the pipes were called in WATERGEMS and then we continue the operation by the allocation of elevation digits to the pipes. Since the topography of this city is very specific and unique, the number of pressure zones was increased. Three zones created only covers about 20% of the population in the city. In this dissertation, the design was performed on the city's main zone with the largest density in the Figures 1,320-1,340. In the next step, the network triangulation was conducted. Finally, the Debiw as allocated based on the triangulation conducted and considering the density of the city for year of horizon. Ultimately, the network of Marivan was designed and calibrated according to hydraulic criteria and pressure zoning. The output of this model can be used in water-supply projects, improvement and reform of the existing net-work in the city, and various other studies. Numerous and various graphs obtained in different parts of a network modelled can be used in the analysis of critical situation, leakage.

Operation Plan for the Management of an Information Security System to Block the Attack Routes of Advanced Persistent Threats (지능형지속위협 공격경로차단 위한 정보보호시스템 운영관리 방안)

  • Ryu, Chang-Su
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.759-761
    • /
    • 2016
  • Recent changes in the information security environment have led to persistent attacks on intelligent assets such as cyber security breaches, leakage of confidential information, and global security threats. Since existing information security systems are not adequate for Advanced Persistent Threat; APT attacks, bypassing attacks, and attacks on encryption packets, therefore, continuous monitoring is required to detect and protect against such attacks. Accordingly, this paper suggests an operation plan for managing an information security system to block the attack routes of advanced persistent threats. This is achieved with identifying the valuable assets for prevention control by establishing information control policies through analyzing the vulnerability and risks to remove potential hazard, as well as constructing detection control through controlling access to servers and conducting surveillance on encrypted communication, and enabling intelligent violation of response by having corrective control through packet tagging, platform security, system backups, and recovery.

  • PDF

Privacy Protection Scheme of Healthcare Patients using Hierarchical Multiple Property (계층적 다중 속성을 이용한 헬스케어 환자의 프라이버시 보호 기법)

  • Shin, Seung-Soo
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.275-281
    • /
    • 2015
  • The recent health care is growing rapidly want to receive offers users a variety of medical services, can be exploited easily exposed to a third party information on the role of the patient's hospital staff (doctors, nurses, pharmacists, etc.) depending on the patient clearly may have to be classified. In this paper, in order to ensure safe use by third parties in the health care environment, classify the attributes of patient information and patient privacy protection technique using hierarchical multi-property rights proposed to classify information according to the role of patient hospital officials The. Hospital patients and to prevent the proposed method is represented by a mathematical model, the information (the data consumer, time, sensor, an object, duty, and the delegation circumstances, and so on) the privacy attribute of a patient from being exploited illegally patient information from a third party the prevention of the leakage of the privacy information of the patient in synchronization with the attribute information between the parties.

Personal Information Leakage Prevention Scheme of Smartphone Users in the Mobile Office Environment (모바일 오피스 환경에서 스마트폰 사용자의 개인정보 유출 방지 기법)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.205-211
    • /
    • 2015
  • Recently, a mobile communication network and the wireless terminal is suddenly develop, mobile office service is more and more the sportlight. However, the user may receive an attack from a malicious third party if the up/download the data in the remote to perform the work in a mobile office environment. In this paper, we propose scheme to manage the information lost due to theft smartphone that contain spill prevention personal information and company information from the mobile office environment (call history, incoming messages, phonebook, calendar, location information, banking information, documents, etc.). The proposed scheme using the number of triangular fuzzy information about the state of the personal information and business intelligence to implement a pair-wise comparison matrix. In particular, the proposed scheme is to prevent the value obtained by constructing a pair-wise comparison matrix for personal information and business intelligence and pair your smartphone is lost when a third party not allow access to personal information and corporate information is leaked to the outside.

Effect of Veterinary Antibiotics on the Growth of Lettuce

  • Kim, Hye Ji;Lee, Seung Hyun;Hong, Young Kyu;Kim, Sung Chul
    • Korean Journal of Soil Science and Fertilizer
    • /
    • v.51 no.2
    • /
    • pp.119-127
    • /
    • 2018
  • Veterinary antibiotics (VAs) has been used to treat animal disease and to increase body weight. However, released VAs in the soil via spreading of compost can transport to plant and affect its growth. Main purpose of this research was i) to monitor VAs concentration in plant and ii) to evaluate inhibition effect of VAs residuals on the plant growth. Red lettuce (Lactuca sativa) was cultivated for 35 days in the pot soil spiked with 3 different concertation (0.05, 0.5, $5.0mg\;kg^{-1}$) of chlortetracycline (CTC) and sulfamethazine (SMZ). After 35 days of cultivation, concentration of CTC and SMZ in the plant was measured. Residual of CTC and SMZ was only quantified at the range of $0.007-0.008mg\;kg^{-1}$ and $0.006-0.017mg\;kg^{-1}$ in the leaf and root respectively when high concentration ($5.0mg\;kg^{-1}$) of antibiotic was spiked in the soil. Leaf length and root mass was statistically reduced when $0.05mg\;kg^{-1}$ of CTC was spiked in the soil while no statistical difference was observed for SMZ treatment. This result might indicated that high $K_{ow}$ and $K_d$ value are the main parameters for inhibiting plant growth. Antibiotics that has a high $K_{ow}$ causing hydrophobicity and easy to bioaccumulate in the lipid cell membrane. Also, antibiotics that has a high $K_d$ properties can be sorbed in the root causing growth inhibition of the plant. Overall, management of VAs should be conducted to minimize adverse effect of VAs in the ecosystem.

Application of Geophysical Exploration Methods to Seepage Bone Investigation of Dam Structures (제방누수조사에의 물리탐사기법의 활용(쌍극자배열 전기비저항탐사와 SP탐사를 중심으로))

  • Won Jong-Geun;Song Sung-Ho
    • 한국지구물리탐사학회:학술대회논문집
    • /
    • 1999.08a
    • /
    • pp.240-257
    • /
    • 1999
  • More than 16 percent of the total 18,032 reservoirs over the country were reported to have leakage problems and need to be improved. Recently, a great deal of progress was made in geophysical survey techniques, particularly in electrical resistivity, and the techniques are used for variety of Purposes in groundwater and dam management due to its economical advantages. This document describes the re-evaluation of existing resistivity data including newly surveyed data, mapping of modeled value in 2-D analysis to locate seepage pathways, This contains also discussion results of more than eighteen years of professional experiences in the field of dam efficiency improvement. In comparison of surface resistivity data with several soil analysis data in laboratory, it is evident that the surface resistivity value shows a qualitative proportionality with the sand contents of the filling materials in earth dam. The result from the study also indicates that the SP method in subsurface investigation is effective to detect seepage in earth filled dam as well as piping through rock/earthfill dike.

  • PDF