• Title/Summary/Keyword: Secure channel

Search Result 325, Processing Time 0.025 seconds

Research on Environmentally-Sound Erosion Control Works(I) -Environment-oriented erosion control works in Japan- (환경(環境)과 조화한 사방사업(砂防事業)(I) - 일본의 환경보전사방(環境保全砂防) -)

  • Chun, Kun-Woo;Ezaki, Tsugio
    • Journal of Forest and Environmental Science
    • /
    • v.12 no.1
    • /
    • pp.13-25
    • /
    • 1996
  • In recent erosion control works, securing not only the disaster prevention space but the environmental space, harmonized with surrounding environment and abundant with biological resources, are emphasized. Inspired of by the fact that efforts to secure such spaces have been being briskly promoted in Japan since the beginning of 1990s', we compile and analyze the Japanese sources about the "environmentally-sound erosion control works" to contribute to the erosion control works of our country. Specifically, in this report, we deal with the subjects of "establishment of the comfortable river environment" and "environmentally-sound erosion control works" which includes "erosion control dam", "water channel works and revetments", "fish routes" and "water quality conservation works".

  • PDF

Critical Limits of Commercial Diving on the Construction of Tidal Current Power in Jangjuk Channel (장죽수로 조류발전건설시 작업특성에 따른 산업잠수 작업한계)

  • Kim, Won-Seok
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.25 no.3
    • /
    • pp.733-742
    • /
    • 2013
  • The Korea has significant tidal current energy resources, but it is so hard to work underwater for tidal turbine installation. Therefore commercial diving work is very important for tidal current generator. Also, Jangjuk channel is vary famous as proper area to generate tidal current energy. Nevertheless, no one is studied about characteristics of commercial diving works with installation of tidal current generator. The purpose of this study is to introduce commercial diving with work types and investigate critical limits of diving working under the conditions, which are working only to minutes at slack tide during the neap tide. As the results, work types are five as like mooring installation, OMAS(Offshore Maintenance Access System), support structure installation, cable and turbine installation. Here, the original construction period is expected about 4 months, but the construction take 18 months to complete. The cause of extends construction period is insufficiency of researching tidal current conditions at the site and ignorance of slack tide which need to secure diving working time. Total diving working times are 110th during 18 months, the highest percentage of diving times is turbine installation about 43.6 %, and cable, mooring installation and support structure construction are 27.3 %, 15.5 %, 13.6 %, respectively. On the basis of this study, estimation of times of commercial diving is possible with work types of tidal current power, and has a significance as basic data to determining construction period.

Secure Multiplication Method against Side Channel Attack on ARM Cortex-M3 (ARM Cortex-M3 상에서 부채널 공격에 강인한 곱셈 연산 구현)

  • Seo, Hwajeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.943-949
    • /
    • 2017
  • Cryptography implementation over lightweight Internet of Things (IoT) device needs to provide an accurate and fast execution for high service availability. However, adversaries can extract the secret information from the lightweight device by analyzing the unique features of computation in the device. In particular, modern ARM Cortex-M3 processors perform the multiplication in different execution timings when the input values are varied. In this paper, we analyze previous multiplication methods over ARM Cortex-M3 and provide optimized techniques to accelerate the performance. The proposed method successfully accelerates the performance by up-to 28.4% than previous works.

Security Evaluation Against Collision-based Power Analysis on RSA Algorithm Adopted Exponent Splitting Method (지수 분할 기법이 적용된 RSA 알고리듬에 대한 충돌 전력 분석 공격 안전성 평가)

  • Ha, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.985-991
    • /
    • 2015
  • The user's secret key can be retrieved by various side channel leakage informations occurred during the execution of cryptographic RSA exponentiation algorithm which is embedded on a security device. The collision-based power analysis attack known as a serious side channel threat can be accomplished by finding some collision pairs on a RSA power consumption trace. Recently, an RSA exponentiation algorithm was proposed as a countermeasure which is based on the window method adopted combination of message blinding and exponent splitting. In this paper, we show that this countermeasure provides approximately $2^{53}$ attack complexity, much lower than $2^{98}$ insisted in the original article, when the window size is two.

A Design of Multimedia Streaming Transmission Model for Continuity Guarantee based on IP (IP 기반 연속성 보장을 위한 멀티미디어 스트리밍 전송 모델 설계)

  • Kim, Hyoung-Jin;Ryu, In-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.5
    • /
    • pp.2305-2310
    • /
    • 2011
  • Recently, communication industry based on data and voice and broadcasting industry centering around images have been rapidly blended. Thereupon, this article aims to suggest a multi-approach method which minimizes the use of network bandwidth allowing multimedia streaming transmission to secure IP-based continuity and let users get multimedia services of one channel or several simultaneously. Also, this study intends to design a buffering strategy that can absorb network delay and an object model to assign and maintain stable channel bandwidth.

Structural Analysis of Gasket and GDL for Enhanced Performance of PEMFC (고분자 전해질 연료전지 가스켓 및 GDL의 구조 해석)

  • Yoon, Jin-Young;Park, Jungsun
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.36 no.7
    • /
    • pp.642-650
    • /
    • 2008
  • In this paper, structural behavior of Gasket and GDL of a PEMFC stack is studied to improve the performance and to secure the safety. In the Gasket analysis Mooney-Rivlin strain energy function is used to consider hyperelasticity of load and displacement. The material properties is determined by testing specimens of the gasket at uni-axial and equi-biaxial mode and compared with finite element analysis results. By measuring a thickness change, the material property of GDL is determined. The pressure drop of a unit cell is measured along the channel for the clamping force. A cross sectional change of channel base on the experimental data is obtained experimentally and compare with FEM analysis results.

Performance Analysis of Key Exchange Protocols on ETSI Standard (ETSI 표준 키 교환 프로토콜의 성능 분석)

  • Lee, Young-Seok;Choi, Hoon
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.6
    • /
    • pp.520-527
    • /
    • 2015
  • The key exchange protocols are very crucial tools to provide the secure communication in the broadband satellite access network. They should be required to satisfy various requirements such as security, key confirmation, and key freshness. In this paper, we present the security functions in ETSI(European Telecommunications Standards Institute), and analyze the specification of the security primitives and the key exchange protocols for the authenticated key agreement between RCST(Return Channel Satellite Terminal) and NCC(Network Control Centre). ETSI key exchange protocols consists of Main Key Exchange, Quick Key Exchange, and Explicit Key Exchange. We analyse the pros and cons of key exchange protocols based on performance analysis and performance evaluation.

Mutual Information Analysis for Three-Phase Dynamic Current Mode Logic against Side-Channel Attack

  • Kim, Hyunmin;Han, Dong-Guk;Hong, Seokhie
    • ETRI Journal
    • /
    • v.37 no.3
    • /
    • pp.584-594
    • /
    • 2015
  • To date, many different kinds of logic styles for hardware countermeasures have been developed; for example, SABL, TDPL, and DyCML. Current mode-based logic styles are useful as they consume less power compared to voltage mode-based logic styles such as SABL and TDPL. Although we developed TPDyCML in 2012 and presented it at the WISA 2012 conference, we have further optimized it in this paper using a binary decision diagram algorithm and confirmed its properties through a practical implementation of the AES S-box. In this paper, we will explain the outcome of HSPICE simulations, which included correlation power attacks, on AES S-boxes configured using a compact NMOS tree constructed from either SABL, CMOS, TDPL, DyCML, or TPDyCML. In addition, to compare the performance of each logic style in greater detail, we will carry out a mutual information analysis (MIA). Our results confirm that our logic style has good properties as a hardware countermeasure and 15% less information leakage than those secure logic styles used in our MIA.

A Study on the Assessment of Environment Stress in Mokpo Approaching Channel (목포항 출입항로의 환경스트레스 평가에 관한 연구)

  • KIM Chol-Seong;JONG Jae-Yong;Park Sung-Hyun
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.12 no.3 s.26
    • /
    • pp.211-218
    • /
    • 2006
  • Recently, many ships such as fishing boats, cargo ships, high speed ferry boats are visiting Mokpo harbor. In particular, many marine accidents have been occurred at this area due to the narrow channel, a thick fog, the existing of the shallow waters etc. However there is no suitable ships' routeing system which takes account of today's traffic situations in this area. This study aims at the settling of hazardous factors to mitigate the danger to vessels in Mokpo harbor and to secure the safety of maritime environment.

  • PDF

Spatial spectrum approach for pilot spoofing attack detection in MIMO systems

  • Ning, Lina;Li, Bin;Wang, Xiang;Liu, Xiaoming;Zhao, Chenglin
    • ETRI Journal
    • /
    • v.43 no.5
    • /
    • pp.941-949
    • /
    • 2021
  • In this study, a spatial spectrum method is proposed to cope with the pilot spoofing attack (PSA) problem by exploiting the of uplink-downlink channel reciprocity in time-division-duplex multiple-input multiple-output systems. First, the spoofing attack in the uplink stage is detected by a threshold derived from the predefined false alarm based on the estimated spatial spectrum. When the PSA occurs, the transmitter (That is Alice) can detect either one or two spatial spectrum peaks. Then, the legitimate user (That is Bob) and Eve are recognized in the downlink stage via the channel reciprocity property based on the difference between the spatial spectra if PSA occurs. This way, the presence of Eve and the direction of arrival of Eve and Bob can be identified at the transmitter end. Because noise is suppressed by a spatial spectrum, the detection performance is reliable even for low signal-noise ratios and a short training length. Consequently, Bob can use beamforming to transmit secure information during the data transmission stage. Theoretical analysis and numerical simulations are performed to evaluate the performance of the proposed scheme compared with conventional methods.