• Title/Summary/Keyword: Secure channel

Search Result 325, Processing Time 0.027 seconds

Internal Components Arrangement of MR Damper Landing Gear for Cavitation Prevention (캐비테이션 방지를 위한 MR 댐퍼형 착륙장치의 내부 형상 배치에 대한 연구)

  • Joe, Bang-Hyun;Jang, Dae-Sung;Hwang, Jai-Hyuk
    • Journal of Aerospace System Engineering
    • /
    • v.14 no.5
    • /
    • pp.33-41
    • /
    • 2020
  • The landing gear of an aircraft is a device that absorbs and dissipates shock energy transmitted from the ground to the fuselage. Among the landing gears, the semi-active MR damper landing gear is supposed to show high-shock absorption efficiency under various landing conditions and secure the stability when out of control. In the case of the MR damper landing gear using an annular channel rather than orifice, Amesim, a commercial multi-physics program, is considered as more useful than the conventional two-degree-of-freedom model because the damping force generated by the pressure drop through the flow annular path can cause cavitation in the low-pressure chamber of the MR damper with a specific internal structure. In this paper, the main dynamic characteristics of the MR damper landing gear with an annular type flow path structure has been analyzed under the condition of cavitation. Based on the analysis results using Amesim, a design guideline for the MR damper flow path that prevents cavitation has been proposed based on the modification of the arrangement of internal components of the damper. The guideline was verified through a drop simulation.

A Study on Qualitative Evaluation Indicators of the LINC Program: Focused on the Indicators of SYSTEM Sector (산학협력선도대학(LINC)사업의 정성적 평가지표에 대한 시론적 고찰: SYSTEM분야 지표를 중심으로)

  • Kim, Tae-woon;Kim, Tae-young
    • Journal of Korea Technology Innovation Society
    • /
    • v.19 no.1
    • /
    • pp.105-136
    • /
    • 2016
  • This paper analyzed the qualitative evaluation indicators of the SYSTEM sector of the LINC program, which aimed at strengthening ability of regional universities through the activities of industry-academia cooperation (IAC). By using interview data and the program reports of universities, this research explored the problems of the indicators and suggested improvement measures which could lead to performance creativity. According to research results, in university system reform for activating IAC, some improvements are required as follows: limiting excessive expansion of IAC-friendly faculty evaluation; and evaluating soft aspects in the reform of academic affairs. In relation to strengthening of ability of the IAC organization, the indicators need to be amended as follows: enhancing the role of channel of IAC Foundation; strengthening the function of planning team of the IAC Foundation; and inducing development of own model of universities for IAC. As regards expansion of IAC infrastructure, it is necessary to enlarge the manpower who can develop programs of the support center in the foundation and to secure of operators for effective operation of joint-using equipments. Therefore, the indicators are required to be upgraded, considering these improvement direction.

A Study on Non-Facing Services of National Pension in the era of the 4th industrial revolution (4차 산업혁명 시대의 비대면 국민연금서비스에 관한 연구)

  • Min, Ki-chae;Lee, Kyu-sung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.4 no.3
    • /
    • pp.139-147
    • /
    • 2018
  • This study starts with the consciousness of what should be the public pension service that meets the 4th Industrial Revolution era. To do this, we review the current status of non-facing services of domestic and foreign public institutions, and draw out implications for revitalizing non-facing services of the National Pension over the medium to long term. First, we reviewed the status of non-face-to-face service and the authentication method of the National Pension Service. Next, we reviewed the status of non-facing services in public pension and private agencies in the United States, the United Kingdom, Canada, and Australia. Based on the results of the analysis, we needs to analyze the impact of the 4th Industrial Revolution on the National Pension Service and extract future strategies, to expand channels of non-facing by business, to introduce PinTech as a non-facing authentication method, and to propose a unified service channel through the construction of an internet integrated portal. In the 4th industrial revolution era, it is possible to secure the connectivity of government portal for civil affairs and intelligence and automation introducing artificial intelligence robots.

Effective Parent-Child Key Establishment Algorithm used ZigBee Sensor Network (ZigBee 센서네트워크에서 효율적인 Parent - Child 키 연결 알고리즘)

  • Seo, Dae-Youl;Kim, Jin-Chul;Kim, Kyoung-Mok;Oh, Young-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.10 s.352
    • /
    • pp.35-45
    • /
    • 2006
  • Coordinator is defining so that function as most trust center that is point in security in ZigBee Alliance. Because must do height connection with coordinator in device signing to PAN newly, coordinator has shortcoming that subordinate is revealed to danger directly to Centered and cattish device. When do height connection some device, do not become problem, but if network is huge, coordinator's subordinate shall increase as traffic quantity which happen in coordinator increases. Also, in ZigBee security to link network kina of transmission and mutually certification in ZigBee Alliance standard include, but I do not provide method to deliver master key in each node safely. Because process that transmit master key passes through channel that do not secure, master key has shortcoming that is revealed directly. In this paper, I suggested Parent-Child key establishment algorithm to solve these problem. Proposed algorithm consists of two structures. Master key establishment algorithm and device that sign to PAN newly that can use one-way Hash chain and transmit master key safety are consisted of Parent-Child network key establishment algorithm that do child node and parent node key establishment as can do key establishment efficiently. Method that device proposes in case method that propose in case have master key establishment time was shown better performance $200{\sim}1300ms$ than existing method, and device does not have master key than existing method height connect time about $400{\sim}500ms$ better performance see.

An Efficient Broadcast Encryption System with Delegation of Decryption (복호화 위임을 제공하는 효율적인 브로드캐스트 암호시스템)

  • Han, Su Min;Park, Seung Hwan;Park, Jong Hwan;Lee, Dong Hoon
    • Journal of Broadcast Engineering
    • /
    • v.18 no.5
    • /
    • pp.758-770
    • /
    • 2013
  • In a Broadcast Encryption System, a sender sends an encrypted message to a large set of receivers at once over an insecure channel and it enables only users in a target set to decrypt the message with their private keys. In 2005, Boneh et al. proposed a fully collusion-resistant public key broadcast encryption in which the ciphertext and the privatekey sizes are constant. In general, pairing-based broadcast encryption system is efficient in bandwidth and storing aspects than non-pairing based broadcast encryption system, however, it requires many computational costs that resource-constrained devices is not suit to be applied. In this paper, we propose a Broadcast Encryption scheme(called BEWD) that user can decrypt a ciphertext more efficiently. The scheme is based on Boneh et al.scheme. More precisely, it reduces receiver's computational costs by delegating pairing computation to a proxy server which computation is required to receiver in Boneh et al.scheme. Furthermore, the scheme enables a user to check if the proxy server compute correctly. We show that our scheme is secure against selective IND-RCCA adversaries under l-BDHE assumption.

Evaluating Policy Priorities in Small Agricultural Cooperatives for Distribution Systems (농업분야 소규모 협동조합 유통체계 구축을 위한 우선순위 평가)

  • Kim, Chang-Hwan;Hwnag, Dae-Yong
    • Journal of Distribution Science
    • /
    • v.13 no.12
    • /
    • pp.65-71
    • /
    • 2015
  • Purpose - Domestic cooperatives tend to increase during the establishment of cooperatives and gradually through the basic law of social needs. However, only cooperatives' qualitative grow this secured without blessings, and their quantitative growth through government support is questionable. The purpose of this study is to analyze the agricultural cooperatives established through the Distribution System Cooperatives Basic Law, which was enacted in January 2012. Subsequently, establishing agricultural cooperatives was done briskly. However, cooperatives established rapidly after the founding of the Basic Law encountered problems. Research design, data, and methodology - To assess the performance of selected agricultural cooperatives, data were analyzed using the methodological Analytic Hierarchy Process (AHP) approach. The AHP is a set of systematic procedures to hierarchically analyze the elements of any problem. Using a survey on expertise, a series of comparative determinations of each pair is performed to evaluate the relative strengths and the strengths of the impact between elements within the hierarchy. A survey was conducted on 10 small agricultural cooperatives using AHP analysis for the examination. The purpose of such research and analysis is to recommend a direction for future policies aimed at small agricultural cooperatives. Result - This study applied three types of policy evaluation criterion, including market expansions, organizations, and cooperative projects, and 12 types of small agricultural cooperative policy measures. Market expansion policies for agricultural cooperatives are classified into four categories: school meals, direct transactions, shopping malls, and wholesale markets. Organizational policies for agricultural cooperatives are classified into four types: existing sales channel management, education, preventing free riding, and enlarging members. Cooperative project policies in agricultural cooperatives are classified into four policy areas: cooperation between cooperatives, community contribution, joint businesses, and government links. In this paper, the growth priority in agricultural cooperative policies is analyzed by applying policy evaluation criteria on the basis of a survey on expertise. The priorities of the policy program are also analyzed using a decision analytic hierarchy process. The results indicate that market expansion is the most important policy evaluation criterion therefore, improving direct transactions, school meals, management of existing sales channels, and shopping malls are crucial policy measures. In contrast, the cooperation of cooperatives, expansion of union members, and cooperation with the government were found to have low priority. Conclusions - Agricultural cooperatives should develop plans as follows. Small agricultural cooperatives need to secure school meals and direct transactions for market expansion, restructure marketing strategies to manage existing sales channels, and, finally, increase education and training for sustainable organizational development. This study has the following limitations. Because the subject of the investigation is a new cooperative, determining its sustainable growth is difficult. Therefore, through analysis and a continuous study of cooperatives, future research is expected to show that modifying the direction of agriculture cooperatives is necessary.

Evaluation of Characteristics of G-class Cement for Geothermal Well Cementing (지열 발전정 시멘팅을 위한 G-class 시멘트 특성 평가에 관한 연구)

  • Won, Jongmuk;Jeon, Jongug;Park, Sangwoo;Choi, Hangseok
    • Journal of the Korean Geotechnical Society
    • /
    • v.29 no.5
    • /
    • pp.29-38
    • /
    • 2013
  • The G-class cement is commonly used in practice for geothermal well cementing in order to protect a steel casing that is designed to transport hot water/steam from deep subsurface to ground surface during operating a geothermal power plant. In order to maintain optimal performance of geothermal wells, physical properties of the cementing material should be satisfactory. In this paper, relevant factors (i.e., groutability, uniaxial compression strength, thermal conductivity and free fluid content) of the G-class cement were experimentally examined with consideration of various water-cement (w/c) ratios. Important findings through the experiments herein are as follows. (1) Groutability of the G-class cement increases by adding a small dose of retarder. (2) There would be a structural defect caused when the w/c ratio is kept higher in order to secure groutability. (3) Thermal conductivity of the G-class cement is small enough to prevent heat loss from hot steam or water to the outer ground formation during generating electricity. (4) The G-class cement does not form free water channel in cementing a geothermal well. (5) The Phenolphthalein indicator is applicable to the distinction of the G-class cement from the drilling mud.

A Method for Detection of Private Key Compromise (서명용 개인키 노출 탐지 기법)

  • Park, Moon-Chan;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.781-793
    • /
    • 2014
  • A Public Key Infrastructure (PKI) is security standards to manage and use public key cryptosystem. A PKI is used to provide digital signature, authentication, public key encryption functionality on insecure channel, such as E-banking and E-commerce on Internet. A soft-token private key in PKI is leaked easily because it is stored in a file at standardized location. Also it is vulnerable to a brute-force password attack as is protected by password-based encryption. In this paper, we proposed a new method that detects private key compromise and is probabilistically secure against a brute-force password attack though soft-token private key is leaked. The main idea of the proposed method is to use a genuine signature key pair and (n-1) fake signature key pairs to make an attacker difficult to generate a valid signature with probability 1/n even if the attacker found the correct password. The proposed method provides detection and notification functionality when an attacker make an attempt at authentication, and enhances the security of soft-token private key without the additional cost of construction of infrastructure thereby extending the function of the existing PKI and SSL/TLS.

IP Camera Authentication and Key Exchange Protocol Using ID-Based Signature Scheme (ID 기반 서명 기법을 이용한 IP 카메라 인증 및 키 교환 프로토콜)

  • Park, Jin Young;Song, Chi-ho;Kim, Suk-young;Park, Ju-hyun;Park, Jong Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.789-801
    • /
    • 2018
  • Currently widely used IP cameras provide the ability to control IP cameras remotely via mobile devices. To do so, the IP camera software is installed on the website specified by the camera manufacturer, and authentication is performed through the password between the IP camera and the mobile device. However, many products currently used do not provide a secure channel between the IP camera and the mobile device, so that all IDs and passwords transmitted between the two parties are exposed. To solve these problems, we propose an authentication and key exchange protocol using ID-based signature scheme. The proposed protocol is characterized in that (1) mutual authentication is performed using ID and password built in IP camera together with ID-based signature, (2) ID and password capable of specifying IP camera are not exposed, (3) provide forward-secrecy using Diffie-Hellman key exchange, and (4) provide security against external attacks as well as an honest-but-curious manufacturer with the master secret key of the ID-based signature.

SPA-Resistant Unsigned Left-to-Right Receding Method (SPA에 안전한 Unsigned Left-to-Right 리코딩 방법)

  • Kim, Sung-Kyoung;Kim, Ho-Won;Chung, Kyo-Il;Lim, Jong-In;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.21-32
    • /
    • 2007
  • Vuillaume-Okeya presented unsigned receding methods for protecting modular exponentiations against side channel attacks, which are suitable for tamper-resistant implementations of RSA or DSA which does not benefit from cheap inversions. The proposed method was using a signed representation with digits set ${1,2,{\cdots},2^{\omega}-1}$, where 0 is absent. This receding method was designed to be computed only from the right-to-left, i.e., it is necessary to finish the receding and to store the receded string before starting the left-to-right evaluation stage. This paper describes new receding methods for producing SPA-resistant unsigned representations which are scanned from left to right contrary to the previous ones. Our contributions are as follows; (1) SPA-resistant unsigned left-to-right receding with general width-${\omega}$, (2) special case when ${\omega}=1$, i.e., unsigned binary representation using the digit set {1,2}, (3) SPA-resistant unsigned left-to-right Comb receding, (4) extension to unsigned radix-${\gamma}$ left-to-right receding secure against SPA. Hence, these left-to-right methods are suitable for implementing on memory limited devices such as smartcards and sensor nodes