• Title/Summary/Keyword: Secure System

Search Result 3,559, Processing Time 0.043 seconds

Global Recovery Management Protocol for Heterogeneous System in Security Environments (보안환경에서 이질형 시스템의 전역 복구 관리 프로토콜)

  • Jeong, Hyun Cheol
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.4
    • /
    • pp.51-59
    • /
    • 2009
  • Many failures are due to incorrectly programmed transactions and data entry errors. System failure causes the loss or corruption of the contents of volatile storage. Although global processing protects data values to detect direct or indirect information effluence, security environments are very important in the recovery management of heterogeneous systems. Although transaction can't control system fault, the restart for the system can cause information effluence by low bandwith. From various faults, it is not easy to maintain the consistency and security of data. This paper proposes recovery management protocols to assure global multilevel secure one-copy quasi-serializability in security environments of heterogeneous systems with replicated data and proves its correctness. The proposed secure protocols guarantee the reliability and security of system when the system fault is happened.

Security Verification of a Communication Authentication Protocol in Vehicular Security System (자동차 보안시스템에서 통신 인증프로토콜의 보안성 검증)

  • Han, Myoungseok;Bae, WooSik
    • Journal of Digital Convergence
    • /
    • v.12 no.8
    • /
    • pp.229-234
    • /
    • 2014
  • Vehicular electronic communication system has continued to develop in favor of high performance and user convenience with the evolution of auto industry. Yet, due to the nature of communication system, concerns over intruder attacks in transmission sections have been raised with a need for safe and secure communication being valued. Any successful intruder attacks on vehicular operation and control systems as well as on visual equipment could result in serious safety and privacy problems. Thus, research has focused on hardware-based security and secure communication protocols. This paper proposed a safe and secure vehicular communication protocol, used the formal verification tool, Casper/FDR to test the security of the proposed protocol against different types of intruder attacks, and verified that the proposed protocol was secure and ended without problems.

Microcontroller based Chaotic Lorenz System for Secure Communication Applications (암호통신 응용을 위한 마이크로 컨트롤러 기반 로렌츠 카오스 시스템)

  • Jayawickrama, Chamindra;Song, Hanjung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.12
    • /
    • pp.1698-1704
    • /
    • 2018
  • This paper presents a implementation of a chaotic Lorenz system for data secure communication applications. Here we have used PIC18F family-based microcontroller to generate the chaotic signal, and simulated waveform patterns confirm that the chaotic behavior of the microcontroller based discrete time chaotic Lorenz system. There are three R-2R ladder type A/D converters have been implemented for conversion of direct microcontroller digital output into analog waveform, utilizing this specific microcontroller relevant to this experiment work, microcontroller ports B, C and D have been utilized for its time waveform outputs X, Y and Z respectively. XC8 compiler used for the compilation of the program. MATLAB and PROTEUS software platforms are used for simulation. Finally, chaotic time wave forms, 2D chaotic attractors were obtained and secure communication analog waveforms were also verified by experimental measurement.

The Parametric Study on the Performance Characteristics of Elastic Rail Fastening System on the Sharp Curved Track (급곡선 탄성레일체결장치의 거동특성에 미치는 매개변수 연구)

  • Baik, Chan-Ho;Joo, Bong-Gyu;Choi, Jung-Youl;Choi, Il-Yoon;Park, Yong-Gul
    • Proceedings of the KSR Conference
    • /
    • 2011.10a
    • /
    • pp.2163-2173
    • /
    • 2011
  • In this study, the deformations and stresses occurred in the elastic rail fastening system were evaluated according to applied extreme track forces based on various field conditions, track curvature and poor properties. The purpose of this study is to establish a method for efficient management and suggest guide line for track construction in order to secure the performance quality of the elastic rail fastening system on the sharp curved track.. Therefore, initial construction qualities of rail and concrete bed, initial clamping force and applied extreme track forces were used into experiment as several parameters. Using these test results, the performance characteristics of the elastic rail fastening system were also evaluated. As a result, it suggested the method to secure long-term durability of fastening system and comparing sharp curved track to results on field test.

  • PDF

A Study on the Improvement for EMU Maintenance System of Urban Transit (도시철도 전동차 유지보수체계의 개선에 관한 연구)

  • Kim, Kyu-Joong;Lee, Keun-Oh
    • Journal of the Korean Society of Safety
    • /
    • v.25 no.1
    • /
    • pp.87-92
    • /
    • 2010
  • Urban transit system must secure fast, safe and reliable transportation capacity as a metropolitan mass transit. For this purpose, it is important to make all the sub-systems (which consist of EMU, power feeding, signaling & telecommunication, railway, platform facility, and control system and so on) work well. To operate all the systems effectively and reliably, a maintenance measure optimal to each system's characteristics is needed to be established and executed. So, highly reliable maintenance should be performed. But, EMU maintenance methods suitable to its own model and EMU lines are not yet introduced. This study examined few examples mainly to secure reliability on a maintenance quality in operating method and the features of train maintenance system based on travel distance.

A Research on Dynamic Behavior of Clamshell Hood to Secure the Safety and Durability Performance

  • Kyoungtaek Kwak;Seunghoon Kang;Jaedong Yoo;Kyungdug Seo;Youngchul Shin;Kyungsup Chun;Jaekyu Lee
    • Journal of Auto-vehicle Safety Association
    • /
    • v.15 no.1
    • /
    • pp.7-15
    • /
    • 2023
  • The purpose of this study is to predict the dynamic behavior of clamshell hood system on the harsh road driving condition, and secure the safety and durability performance of the system. The equation of motion of hood system is derived and the numerical analysis is implemented to obtain the lateral movement of the hood system. Also, the actual Belgian road test results are correlated to the predicted ones, and confirm the reliability of the system. Then, the parameter study is conducted to figure out the sensitive factors to affect the dynamic behavior, and the engineering design guide to make the system robust to confine the minimum friction force generated from hood latch and maximum hood weight is suggested from this research.

Implementation of Security Kernel based on Linux OS (리눅스 운영체제 기반의 보안 커널 구현)

  • Shon, Hyung-Gil;Park, Tae-Kyou;Lee, Kuem-Suk
    • The KIPS Transactions:PartC
    • /
    • v.10C no.2
    • /
    • pp.145-154
    • /
    • 2003
  • Current security efforts provided in such as firewall or IDS (intrusion detection system) of the network level suffer from many vulnerabilities in internal computing servers. Thus the necessity of secure OS is especially crucial in today's computing environment. This paper identifies secure OS requirements, analyzes tile research trends for secure Linux in terms of security kernel, and provides the descriptions of the multi-level security(MLS) Linux kernel which we have implemented. This security kernel-based Linux meets the minimum requirements for TCSEC Bl class as well providing anti-hacking, real-time audit trailing, restricting of root privileges, and enterprise suity management functions.

The System of DHCPv6 for Secure Packet Transition in IPv6 Environment (IPv6 환경에서의 Secure Packet 전송을 위한 DHCPv6 시스템 개발)

  • Yoon, Yoon Sang;Chung, Jin Wook
    • Convergence Security Journal
    • /
    • v.3 no.3
    • /
    • pp.1-6
    • /
    • 2003
  • The IPv6 was suggested as an ultimate solution of problems that IPv4 protocol maintains limitations to apply to new technology of data service and the lack of IPv4 address space. So it is expected to transfer IPv4 to IPv6 gradually. In the Ipv6 environment, it is easier to apply security policies and transmits a secure packet applied the security policies, with the content in the Header itself. By this reason, this paper describes about the implementation of DHCPv6 server to perform a connection of IPv6 network and IPv4 network, and the application of secure packet with the security policies for clients. Further, it performs the process of the massages inside the DHCPv6 server to be used in the IPv6 environment in the future.

  • PDF

The proposal of improved secure cookies system based on public-key certificate (인증서 기반의 개선된 보안 쿠키의 설계와 구현)

  • 양종필;이경현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.11C
    • /
    • pp.1090-1096
    • /
    • 2002
  • The HTTP does not support continuity for browser-server interaction between successive visits or a user due to a stateless feature. Cookies were invented to maintain continuity and state on the Web. Because cookies are transmitted in plain and contain text-character strings encoding relevant information about the user, the attacker can easily copy and modify them for his undue profit. In this paper, we design a secure cookies scheme based on X.509 public key certificate for solving these security weakness of typical web cookies. Our secure cookies scheme provides not only mutual authentication between client and server but also confidentiality and integrity of user information. Additionally, we implement our secure cookies scheme and compare it to the performance with SSL(Secure Socket Layer) protocol that is widely used for security of HTTP environment.

An Efficient Anonymous Authentication Scheme with Secure Communication in Intelligent Vehicular Ad-hoc Networks

  • Zhang, Xiaojun;Mu, Liming;Zhao, Jie;Xu, Chunxiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3280-3298
    • /
    • 2019
  • Vehicular ad-hoc networks (VANETs) have become increasingly significant in intelligent transportation systems, they play a great role in improving traffic safety and efficiency. In the deployment of intelligent VANETs, intelligent vehicles can efficiently exchange important or urgent traffic information and make driving decisions. Meanwhile, secure data communication and vehicle's identity privacy have been highlighted. To cope with these security issues, in this paper, we construct an efficient anonymous authentication scheme with secure communication in intelligent VANETs. Combing the ElGamal encryption technique with a modified Schnorr signature technique, the proposed scheme provides secure anonymous authentication process for encrypted message in the vehicle-to-infrastructure communication model, and achieves identity privacy, forward security, and reply attack resistance simultaneously. Moreover, except the trusted authority (TA), any outside entity cannot trace the real identity of an intelligent vehicle. The proposed scheme is designed on an identity-based system, which can remove the costs of establishing public key infrastructure (PKI) and certificates management. Compared with existing authentication schemes, the proposed scheme is much more practical in intelligent VANETs.