• Title/Summary/Keyword: M2M Security System

Search Result 163, Processing Time 0.04 seconds

A genetic algorithms optimization framework of a parametric shipshape FPSO hull design

  • Xie, Zhitian;Falzarano, Jeffrey
    • Ocean Systems Engineering
    • /
    • v.11 no.4
    • /
    • pp.301-312
    • /
    • 2021
  • An optimization framework has been established and applied to a shipshape parametric FPSO hull design. A single point moored (SPM) shipshape floating system suffers a significant level of the roll motion in both the wave frequencies and low wave frequencies, which presents a coupling effect with the horizontal weathervane motion. To guarantee the security of the operating instruments installed onboard, a parametric hull design of an FPSO has been optimized with improved hydrodynamics performance. With the optimized parameters of the various hull stations' longitudinal locations, the optimization through Genetic Algorithms (GAs) has been proven to provide a significantly reduced level of the 1st-order and 2nd-order roll motion. This work presents a meaningful framework as a reference in the process of an SPM shipshape floating system's design.

Rotation-Invariant Fingerprint Identification System for Security Verification (안전 검증을 위한 회전 불변 지문인식 시스템)

  • Lee, S.H.;Ryu, D.H.;Park, M.S.;Ryu, C.S.
    • Journal of the Korean Society of Safety
    • /
    • v.14 no.2
    • /
    • pp.192-199
    • /
    • 1999
  • We propose a rotation invariant fingerprint identification system based on the circular harmonic filter(CHF) and binary phase extraction joint transform correlator(BPEJTC) for validation and security verification. It is shown that this system has the shift and rotation robust properties and can recognize the fingerprint in real-time. The complex circular harmonic filter, which is used to obtain the rotation invariance, is converted into the real-valued filter for real-time implementation. Experimental results show that this system has a good performance in the rotated fingerprints.

  • PDF

Modified SMPO for Type-II Optimal Normal Basis (Type-II 최적 정규기저에서 변형된 SMPO)

  • Yang Dong-Jin;Chang Nam-Su;Ji Sung-Yeon;Kim Chang-Han
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.105-111
    • /
    • 2006
  • Cryptographic application and coding theory require operations in finite field $GF(2^m)$. In such a field, the area and time complexity of implementation estimate by memory and time delay. Therefore, the effort for constructing an efficient multiplier in finite field have been proceeded. Massey-Omura proposed a multiplier that uses normal bases to represent elements $CH(2^m)$ [11] and Agnew at al. suggested a sequential multiplier that is a modification of Massey-Omura's structure for reducing the path delay. Recently, Rayhani-Masoleh and Hasan and S.Kwon at al. suggested a area efficient multipliers for modifying Agnew's structure respectively[2,3]. In [2] Rayhani-Masoleh and Hasan proposed a modified multiplier that has slightly increased a critical path delay from Agnew at al's structure. But, In [3] S.Kwon at al. proposed a modified multiplier that has no loss of a time efficiency from Agnew's structure. In this paper we will propose a multiplier by modifying Rayhani-Masoleh and Hassan's structure and the area-time complexity of the proposed multiplier is exactly same as that of S.Kwon at al's structure for type-II optimal normal basis.

A Study on the Security Enhancement of the Industrial Control System through the Application of IEC 62443 Standards (IEC 62443 표준 적용을 통한 산업제어시스템 보안성 강화 연구)

  • Jin, Jungha;Kim, Juntae;Park, SangSeon;Han, Keunhee
    • Annual Conference of KIPS
    • /
    • 2021.11a
    • /
    • pp.280-283
    • /
    • 2021
  • SME(small and medium sized enterprise) 환경의 스마트공장 환경에서는 실제 제조라인에서 동작하는 센서(Sensor) 및 액추에이터(Actuator)와 이를 관리하는 PLC(Programmable Logic Controller), 더불어 그러한 PLC를 제어 및 관리하는 HMI(Human-Machine Interface), 그리고 다시 PLC와 HMI를 관리하는 OT(Operational Technology)서버로 구성되어 있으며, 제어자동화를 담당하는 PLC 및 HMI는 공장운영을 위한 응용시스템인 OT서버 및 현장 자동화를 위한 로봇, 생산설비와의 직접적인 연결을 수행하고 있어서 스마트공장 환경에서 보안 기술의 개발이 중점적으로 필요한 영역이다. 이러한 SME 환경의 스마트공장 보안 내재화를 이루기 위해서는, 스마트공장 SW 및 HW 개발 단계에서 IEC 62443-4-1 Secure Product Development Lifecycle에 따른 프로세스 정립 및 IEC 62443-4-2 Component 보안 요구사항과 IEC 62443-3-3 System 보안 요구사항에 적합한 개발 방법론의 도입이 필요하다.

A Case Study on the Implementation of a River Water Level Monitoring System using PLC(Programmable Logic Controller) and Public Telecommunication Network (PLC(Programmable Logic Controller)와 공중통신망을 이용한 하천수위감시시스템 구축 사례 연구)

  • Kim, Seokju;Kim, Minsoo
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.4
    • /
    • pp.1-17
    • /
    • 2015
  • A river water level monitoring system which prevents salt water damages and effectively excludes floods has been developed to contribute efficient operation of Nakdong river estuary barrage. The system can be used for monitoring upstream conditions more quickly and do appropriate responses over changes. Telemetry and telecontrols using PLCs have been built at the three sites that directly influence on the operation of barrage gates, and are linked to Nakdong river estuary barrage's IOS (Integrated Operation System) through public communication networks. By using PLC, the system can achieve even higher reliability and versatility than before as well as easy management. By power control devices, we can remotely control the power of PLCs to treat the minor troubles instantly without going on-sites. The power control devices also save data in preparation for the cases of communication failures. The system uses ADSL (FTTH) as a main network between SCADA server and PLCs, and CDMA (M2M) as a secondary network. In order to compensate security vulnerabilities of public communication network, we have installed the VPNs for secure communication between center and the observation stations, just like a dedicated network. Generally, river water level observations have been used custom-manufactured remote terminals to suit their special goals. However, in this case, we have established a system with open architecture considering the interface between different systems, the ease of use and maintenance, security, price, etc.

R2NET: Storage and Analysis of Attack Behavior Patterns

  • M.R., Amal;P., Venkadesh
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.295-311
    • /
    • 2023
  • Cloud computing has evolved significantly, intending to provide users with fast, dependable, and low-cost services. With its development, malicious users have become increasingly capable of attacking both its internal and external security. To ensure the security of cloud services, encryption, authorization, firewalls, and intrusion detection systems have been employed. However, these single monitoring agents, are complex, time-consuming, and they do not detect ransomware and zero-day vulnerabilities on their own. An innovative Record and Replay-based hybrid Honeynet (R2NET) system has been developed to address this issue. Combining honeynet with Record and Replay (RR) technology, the system allows fine-grained analysis by delaying time-consuming analysis to the replay step. In addition, a machine learning algorithm is utilized to cluster the logs of attackers and store them in a database. So, the accessing time for analyzing the attack may be reduced which in turn increases the efficiency of the proposed framework. The R2NET framework is compared with existing methods such as EEHH net, HoneyDoc, Honeynet system, and AHDS. The proposed system achieves 7.60%, 9.78%%, 18.47%, and 31.52% more accuracy than EEHH net, HoneyDoc, Honeynet system, and AHDS methods.

Design of a Bit-Serial Divider in GF(2$^{m}$ ) for Elliptic Curve Cryptosystem (타원곡선 암호시스템을 위한 GF(2$^{m}$ )상의 비트-시리얼 나눗셈기 설계)

  • 김창훈;홍춘표;김남식;권순학
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.12C
    • /
    • pp.1288-1298
    • /
    • 2002
  • To implement elliptic curve cryptosystem in GF(2$\^$m/) at high speed, a fast divider is required. Although bit-parallel architecture is well suited for high speed division operations, elliptic curve cryptosystem requires large m(at least 163) to support a sufficient security. In other words, since the bit-parallel architecture has an area complexity of 0(m$\^$m/), it is not suited for this application. In this paper, we propose a new serial-in serial-out systolic array for computing division operations in GF(2$\^$m/) using the standard basis representation. Based on a modified version of tile binary extended greatest common divisor algorithm, we obtain a new data dependence graph and design an efficient bit-serial systolic divider. The proposed divider has 0(m) time complexity and 0(m) area complexity. If input data come in continuously, the proposed divider can produce division results at a rate of one per m clock cycles, after an initial delay of 5m-2 cycles. Analysis shows that the proposed divider provides a significant reduction in both chip area and computational delay time compared to previously proposed systolic dividers with the same I/O format. Since the proposed divider can perform division operations at high speed with the reduced chip area, it is well suited for division circuit of elliptic curve cryptosystem. Furthermore, since the proposed architecture does not restrict the choice of irreducible polynomial, and has a unidirectional data flow and regularity, it provides a high flexibility and scalability with respect to the field size m.

Real-time Web Location System for the elderly active surveillance based on Google Map 3D (노약자 활동 감시를 위한 구글 맵 3D 기반의 실시간 웹 위치 추적 시스템)

  • Lee, Young-Min;choi, Okkyung;Kim, Gi-hyung
    • Annual Conference of KIPS
    • /
    • 2011.11a
    • /
    • pp.120-122
    • /
    • 2011
  • 과학 기술과 의학 기술의 발달로 전 세계적인 고령화 인구 비율도 해마다 증가하고 있다. 본 연구에서는 이러한 고령화 인구 증가 현상에 대한 대책 방안의 하나로 U-HealthCare 시스템에 구글맵(Google Map) 3D 기반의 실시간 위치 추적기법을 적용 시켜 노약자들이 이동하는 중간에 실시간 위치 추적을 실시하여 추후 발생 할 수 있는 위험 사태에 대비하고자 한다. 제안 방식은 구글 맵 3D 서비스 방식이기에 2D 서비스나 문자 서비스 방식보다 시각적으로 건물의 생김새나 주변의 건물에 대한 정확한 파악이 가능하여 노약자들의 위치 정보에 대한 신속한 대체가 가능하다.

A Method for Deriving a Security Threat Response System in Smart Factory Area and Layer (스마트팩토리 영역 및 계층별 보안위협 대응체계 도출 기법)

  • In-Su Jung;Deuk-Hun Kim;Jin Kwak
    • Annual Conference of KIPS
    • /
    • 2023.05a
    • /
    • pp.187-189
    • /
    • 2023
  • IoT(Internet of Things), 빅데이터, AI(Artificial Intelligence), 클라우드와 같은 ICT(Information and Communications Technology) 기술이 발전함에 따라 ICT와 제조기술이 융합된 스마트팩토리가 발전하고 있다. 이는 2개의 영역과 5개의 계층으로 구성되어 기타 환경들과 상이한 구조를 가지고 있으며, 각 영역·계층별 발생 가능한 보안위협도 상이하다. 또한, 각 영역과 계층이 연결됨에 따라 발생 가능한 보안위협이 증가하고 있으며, 이에 대한 효율적인 대응을 위하여 스마트팩토리 영역·계층별 환경을 고려한 대응체계 마련이 필요한 실정이다. 따라서, 본 논문에서는 스마트팩토리 영역·계층별 발생 가능한 보안위협을 분석하고, 이에 대응하기 위한 대응체계 도출 기법을 제안한다.

A Study on Smart-Banking Authentication System using Mobile Cloud Computing (모바일 클라우드 컴퓨팅에서의 스마트 뱅킹 인증 시스템에 관한 연구)

  • Kim, Min-Seon;Song, Yang-Eui
    • Annual Conference of KIPS
    • /
    • 2012.11a
    • /
    • pp.1045-1048
    • /
    • 2012
  • 스마트 뱅킹을 사용하는 인구가 늘어나고 있으며 보안상의 위협이 대두되고 있다. 스마트 뱅킹의 경우 작은 보안상의 위험이 큰 금전적인 피해를 줄 수 있기 때문에 강력한 보안이 요구된다. 본 논문에서는 2-Factor 인증과 클라우드에 저장된 인증서를 통해서 스마트 뱅킹 서비스를 안전하게 사용하는 방법을 제안하였다. 인증서 중복저장에 의한 문제점을 해결하고자 인증서를 클라우드 서비스를 통해 제공하고, 저장된 인증서의 제3자에 의한 접근을 막기 위해 2-Factor 인증 기법으로 사용자를 인증한다.