• Title/Summary/Keyword: Security Case

Search Result 1,791, Processing Time 0.029 seconds

A Study on Damage Effect from Major Accident of LPG Charging Facility - A case study of an LPG Charging and Automotive Outlet - (LPG 충전소 중대사고의 피해효과에 관한 연구 - 부천 LPG충전소 사고 사례를 중심으로 -)

  • Roh, Sam-Kew;Kim, Tae-Hwan;Ham, Eun-Gu;Hong, Chang-Moon
    • Korean Security Journal
    • /
    • no.2
    • /
    • pp.83-98
    • /
    • 1999
  • The LPG station's explosion at Bucheon city was a major accident which with rare frequency of occurrence but large damage effect. Therefore, to prevent similar accident in the future from LPG chargings stations which located at inner urban area, it needs to identify the damage effects of such facilities by comparing theoretically quantities risks-PHAST. The BLEVE effects from the accident showed similar level in case of heat flux, however, the over pressure level reflected at reduced distance. The structure damage to the nearby area showed comparatively large reduction of concrete strength and shape changes through by heat effect while the overpressure effect was small.

  • PDF

Study of Influence Factors for Prediction of Ground Subsidence Risk

  • Park, Jin Young;Jang, Eugene;Ihm, Myeong Hyeok
    • Journal of Korean Society of Disaster and Security
    • /
    • v.10 no.1
    • /
    • pp.29-34
    • /
    • 2017
  • This Analyzed case study of measuring displacement, implemented laboratory investigation, and in-situ testing in order to interpret ground subsidence risk rating by excavation work. Since geological features of each country are different, it is necessary to objectify or classify quantitatively ground subsidence risk evaluation in accordance with Korean ground character. Induced main factor that could be evaluated and used to predicted ground subsidence risk through literature investigation and analysis study on research trend related to the ground subsidence. Major factors of ground subsidence might be classified by geological features as overburden, boundary surface of ground, soil, rock and water. These factors affect each other differently in accordance with type of ground that's classified soil, rock, or complex. Then rock could be classified including limestone element or not, also in case of the latter it might be classified whether brittle shear zone or not.

A Method Enabling Exploitation of Spatial Diversity and Physical Layer Security in an Extreme Case of Source-Wiretapping without a Jamming Beamformer

  • Tran, Truc Thanh;Kong, Hyung Yun
    • Journal of Communications and Networks
    • /
    • v.17 no.5
    • /
    • pp.482-490
    • /
    • 2015
  • This article exploits spatial diversity for jamming to prevent wiretapping in the extreme case in which an eavesdropper is located near the source and a common jamming signal is unavailable. To address this challenge, the jamming signal is allowed to carry a random binary message. Then, it is proposed that the active intermediate node transmits this jamming signal and the decoding of this signal at both source and destination is physically secured as result of using the physical-layer security method. If the source and the destination securely and correctly decode this jamming message, the source transmits another message which is created from combining its information message and the decoded message using the network-coding method. Therefore, this method prevents the transmissions from being eavesdropped upon by the source-wiretapping.

A generating method of CM parameters of pairing-friendly abelian surfaces using Brezing-Weng family (Brezing-Weng 다항식족을 이용한 페어링 친화 아벨 곡면의 CM 파라미터 생성법)

  • Yoon, Kisoon;Park, Young-Ho;Chang, Nam Su
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.567-571
    • /
    • 2015
  • Brezing and Weng proposed a method to generate CM parameters of pairing-friendly elliptic curves using polynomial representations of a number field, and Freeman generalized the method for the case of abelian varieties. In this paper we derive explicit formulae to find a family of polynomials used in Brezing-Weng method especially in the case of abelian surfaces, and present some examples generated by the proposed method.

Known-Key Attacks on 4-Branch GFN-2 Structures with SP F-Functions (SP F-함수를 갖는 4-브랜치 GFN-2 구조에 대한 기지키 공격)

  • Hong, Deukjo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.795-803
    • /
    • 2020
  • In this paper, we study known-key distinguishing and partial-collision attacks on GFN-2 structures with SP F-functions and various block lengths. Firstly, we show the known-key distinguishing attack is possible up to 15 rounds. Secondly, for the case that the last round function has the shuffle operation, we show that the partial-collision attack is possible up to 14 rounds. Finally, for the case that the last round function has no shuffle operation, we show that the partial-collision attacks are possible up to 11 rounds.

A Study on the Improvement of Flat-based Routing Protocol in Sensor Network

  • Lee, Seok-Cheol;Kim, Chang-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.12
    • /
    • pp.1722-1729
    • /
    • 2008
  • This paper describes the contents about the efficient routing technique for improvement of transmission in Wireless Sensor Networks. Existing flat-based routing protocols have several problems like data overlap and implosion. Gossiping Algorithm in WSN is able to reduce the overhead and transmit packets through already set up the path but it takes place the data delivery and problem of worst-case. In this paper, we try to solve two problems that are data delivery and worst-case by selecting neighbor nodes using RSSI and number of linkage. The proposed model is available to real-mote and we confirmed the improvement of the performance against existing models.

  • PDF

Database of Navigational Environment Parameters (Water Depth, Sediment Type and Marine Managed Areas) to Support Ships in an Emergency

  • Kim, Tae-Ho;Yang, Chan-Su
    • Journal of Navigation and Port Research
    • /
    • v.43 no.5
    • /
    • pp.302-309
    • /
    • 2019
  • This study introduces the navigational environment database(DB) compiling water depth, sediment type and marine managed areas (MMAs) in coastal waters of South Korea. The water depth and sediment data were constructed by combining their sparse points of electronic navigation chart and survey data with high spatial resolution using the inverse distance weighting and natural neighbor interpolation method included in ArcGIS. The MMAs were integrated based on all shapefiles provided by several government agencies using ArcGIS because the areas should be used in an emergency case of ship. To test the validity of the constructed DB, we conducted a test application for grounding and anchoring zones using a ship accident case. The result revealed each area of possible grounding candidates and anchorages is calculated and displayed properly, excluding obstacle places.

Introduction of development case of Korea navy welfare portal system and proposal of development strategy that consider security issues (해군복지포탈체계 개발 사례 소개 및 보안성을 고려한 발전방안 제안)

  • Kim, Ildo;Kim, Junsang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.1097-1100
    • /
    • 2009
  • Korean navy is developing an information system-based a computer - network for efficient business process and information exchange and management efficiency expansions. Naval welfare portal was developed to the part, and newly development at present to solve a problem. But inconvenient point in the army, most people do not has personal Internet PC. At this paper, we explain case study of naval welfare portal, and propose development strategy that consider of security issue.

  • PDF

Vulnerability Analysis and Security Measures according to Smart Grid Attack Case (Smart Grid 공격 사례와 취약점 분석 및 보안대책)

  • Chun, Woo-Sung;Park, Dea-Woo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2011.06a
    • /
    • pp.75-77
    • /
    • 2011
  • Smart Grid는 전기망과 정보통신망이 융합된 형태로 발전 송전 배전의 전 과정에 대한 통제가 가능하고, 결과적으로 에너지 사용의 효율성을 높이고자 하는 것이 지능형 전기망이다. 정보통신망을 이용하기 때문에 기존의 다양한 사이버 보안위협으로부터 그대로 노출되어 있으며, 전기망에서의 취약점도 함께 가지고 있다. 본 논문에서는 우리나라보다 먼저 Smart Grid를 도입한 나라의 Smart Grid 공격 사례와 예상 공격에 대한 취약점을 분석하고, 분석된 취약점에 대한 Smart Grid 보안 대책을 마련한다. 본 연구를 통해 Smart Grid에 대한 보안성 강화와 사회안정성 향상에 기여하게 될 것이다.

  • PDF

On Location Security Solutions in Vehicular Ad Hoc Networks

  • Hussain, Rasheed;Son, Junggab;Oh, Heekuck
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.1053-1056
    • /
    • 2012
  • Location information is considered to be of prime importance in Vehicular Ad Hoc NETworks (VANETs) because important decisions are made based on accurate and sound location information. Vehicles exchange their whereabouts in the form of scheduled beacon messages with their neighbors. These messages contain location, speed, time, and lane information etc. In this paper we aim at the location security in VANET and emphasize on the confidentiality and integrity of location information in case of Nonline-of-Sight (NLoS). For location confidentiality we propose a geolock-based mechanism whereas for location integrity we leverage cooperation among neighbors. In case of NLoS, the verifier vehicle asks its one-hop neighbors in an efficient way to verify the claimed location of the node on his behalf. On the basis of trust values and weightage assigned to neighbors, it is decided whether the verification is sound.