• Title/Summary/Keyword: Private Block

Search Result 112, Processing Time 0.025 seconds

Study of Application of Block Chain for Vehicle-To-Grid System (Vehicle-To-Grid 시스템에서 블록체인 활용에 관한 연구)

  • Lee, Sunguk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.759-764
    • /
    • 2021
  • Because sensitive and private information should be exchanged between electric vehicles and a V2G service provider, reliable communication channel is essential to operate Vehicle-to-Grid (V2G) system which considers battery of electric vehicles as a factor of smart grid. The block chain is a platform for cryptocurrency transaction and fully distributed database system running by only equivalent node in the network without help of any central management or 3rd party. In this paper, the structure and operation method of the blockchain are investigated, and the application of the blockchain for the V2G system was also explained and analyzed.

Problems and Improvement Methods of Cadastral Confirmation Surveying (지적확정측량의 문제점과 개선방안)

  • Mun, Seung-Ju
    • Journal of Cadastre & Land InformatiX
    • /
    • v.46 no.2
    • /
    • pp.313-323
    • /
    • 2016
  • Recently, "Cadastral Confirmation Surveying" has been established to promote efficiently and systematically its work. To do so, it is necessary that cadastral control point should be set up and transverse grid coordinates should be determined for high accuracy and boundary restoration based on the cadastral control point. This study expects the potentially institutional problem of detail surveying and the limitation of Network-Real Time Kinematic, introduced to measure the cadastral control point first in the issued regulation, and thus presents the improvement and the management of the block boundary of larger parcel as solutions. This can be applied promptly, when the location difference of ground and border, registered in cadastral record for quake and others, occurs. Thus, the public confidence of cadastral record may become higher and relevant social costs get reduced by the advanced prevention effect of boundary dispute, which represents much to the management of cadastral institution. Provided cadastral confirmation surveying is implemented with the management of the block boundary of larger parcel, proposed in this study.

Dynamic Directory Table: On-Demand Allocation of Directory Entries for Active Shared Cache Blocks (동적 디렉터리 테이블 : 공유 캐시 블록의 디렉터리 엔트리 동적 할당)

  • Bae, Han Jun;Choi, Lynn
    • Journal of KIISE
    • /
    • v.44 no.12
    • /
    • pp.1245-1251
    • /
    • 2017
  • In this study we present a novel directory architecture that can dynamically allocate a directory entry for a cache block on demand at runtime only when the block is shared by more than one core. Thus, we do not maintain coherence for private blocks, substantially reducing the number of directory entries. Even for shared blocks, we allocate directory entry dynamically only when the block is actively shared, further reducing the number of directory entries at runtime. For this, we propose a new directory architecture called dynamic directory table (DDT), which is implemented as a cache of active directory entries. Through our detailed simulation on PARSEC benchmarks, we show that DDT can outperform the expensive full-map directory by a slight margin with only 17.84% of directory area across a variety of different workloads. This is achieved by its faster access and high hit rates in the small directory. In addition, we demonstrate that even smaller DDTs can give comparable or higher performance compared to recent directory optimization schemes such as SPACE and DGD with considerably less area.

FPGA Implementation of Riindael Algorithm according to the Three S-box Implementation Methods (Rijndael S-box의 세 가지 구현 방법에 따른 FPGA 설계)

  • 이윤경;박영수;전성익
    • Proceedings of the IEEK Conference
    • /
    • 2002.06b
    • /
    • pp.281-284
    • /
    • 2002
  • Rijndael algorithm is known to a new private key block cipher which is substitute for DES. Rijndael algorithm is adequate to both hardware and software implementation, so hardware implementation of Rijndael algorithm is applied to high speed data encryption and decryption. This paper describes three implementation methods of Rijndael S-box, which is important factor in performance of Rijndael coprocessor. It shows synthesis results of each S-box implementation in Xilinx FPGA. Tllc lilree S-box implementation methods are implementation using lookup table only, implementation using both lookup table and combinational logic, and implementation using combinational logic only.

  • PDF

Case Based Diagnosis Modeling of Dark Current Causes and Standardization of Diagnosis Process (사례기반의 암전류 원인 진단 모델링 및 표준화)

  • Jo, Haengdeug
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.25 no.2
    • /
    • pp.149-156
    • /
    • 2017
  • Various kinds of accessories(e.g., clock, radio, automatic door locks, alarm devices, etc.) or unit components (e.g., black box, navigation system, alarm, private audio, etc.) require dark current even when the vehicle power is turned off. However, accessories or unit components can be the causes of excessive dark current generation. It results in battery discharge and the vehicle's failure to start. Therefore, immediate detection of abnormal dark current and response are very important for a successful repair job. In this paper, we can increase the maintenance efficiency by presenting a standardized diagnostic process for the measurement of the dark current and the existing problem. As a result of the absence of a system to block the dark current in a vehicle, diagnosis and repair were performed immediately by using a standardized dark current diagnostic process.

Evaluation of Appointment Policy and Scheduling Rule for a Dental Clinic Based on Computer Simulation (시뮬레이션을 이용한 치과의원의 예약정책과 스케줄링 규칙 평가)

  • Lee, Jong-Ki;Kim, Myeng-Ki;Ha, Byung-Hyun
    • Korea Journal of Hospital Management
    • /
    • v.16 no.4
    • /
    • pp.161-182
    • /
    • 2011
  • In today's competitive dental markets, it is of paramount importance to improve service quality and at the same time to use scarce resource efficiently. In this study, we present appointment policies and scheduling rules for private dental clinics to reduce the waiting time of patients and to increase the revenue by utilizing resource more effectively. This study validates the proposed appointment policies and scheduling rules based on simulation models. We show that the bottleneck-based appointment policy is the most effective among appointment policies, followed by the multiple-block appointment one. The shortest processing time among scheduling rules contributes most to the performance of the appointment system.

  • PDF

A Secure Decentralized Storage Scheme of Private Information in Blockchain Environments

  • Han, Seungjin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.1
    • /
    • pp.111-116
    • /
    • 2018
  • Recently, IoT and Big Data dealing with voluminous and complex sensitive information is one of the key issues in the era of the 4th industrial revolution. There have been a lot of studies to store the collected and processed sensitive information safely in storage data. Especially biometric information, if it is leaked and becomes identity theft, is hard to be corrected and results in serious event. To fix the problem, methods such as FIDO or KFTC have been proposed. In this paper, we propose a modified method of TTAK.KO-12.0098 according to the environment of this paper and propose a method of safely storing the generated disposable template in a block chain. We show that our method is better by comparing the existing method and the security analysis.

Proposal of Kiosk Payment Security System using Public Blockchain (솔라나 블록체인을 이용한 키오스크 결제 데이터 보안 시스템 제안)

  • Kim, Seong-Heon;Kang, hyeok;Lee, Keun-ho
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.5
    • /
    • pp.55-61
    • /
    • 2022
  • Today's payment systems are becoming unmanned and changing to a way of paying with kiosks. This has the advantage of convenient payment because consumers can select a menu and specify the number of products to be purchased with just a touch of the screen. However, from the point of view of system security, the actual kiosk system has various vulnerabilities. This can hijack the administrator account, gain system privileges, and perform malicious actions. In addition, it is exposed to a number of security threats, such as the possibility of wasting unnecessary resources by abnormally increasing the number of payments, and causing the device to fail to operate normally. Therefore, in this paper, if any node of a participant in the solana blockchain approves an incorrect fork, the stake of the voting nodes is deleted. Also, since all participants can see the transaction history due to the nature of the block chain, I intend to write a thesis on a system that improves the vulnerability of kiosk payments by separating the access rights through the private blockchain.

Blockchain-based lightweight consensus algorithm (L-PBFT) for building trust networks in IoT environment (IoT 환경에서 신뢰 네트워크 구축을 위한 블록체인 기반의 경량 합의 알고리즘(L-PBFT))

  • Park, Jung-Oh
    • Journal of Industrial Convergence
    • /
    • v.20 no.6
    • /
    • pp.37-45
    • /
    • 2022
  • With the development of the Internet of Things (IoT), related network infrastructures require new technologies to protect against threats such as external hacking. This study proposes an L-PBFT consensus algorithm that can protect IoT networks based on a blockchain consensus algorithm. We designed a blockchain (private) model suitable for small networks, tested processing performance for ultra-small/low-power IoT devices, and verified stability. As a result of performance analysis, L-PBFT proved that at least the number of nodes complies with the operation of the consensus algorithm(minimum 14%, maximum 29%) and establishes a trust network(separation of secure channels) different from existing security protocols. This study is a 4th industry convergence research and will be a foundation technology that will help develop IoT device security products in the future.