• Title/Summary/Keyword: Security Margin

Search Result 46, Processing Time 0.025 seconds

Performance Analysis of DPSK Optical Communication for LEO-to-Ground Relay Link Via a GEO Satellite

  • Lim, Hyung-Chul;Park, Jong Uk;Choi, Mansoo;Choi, Chul-Sung;Choi, Jae-Dong;Kim, Jongah
    • Journal of Astronomy and Space Sciences
    • /
    • v.37 no.1
    • /
    • pp.11-18
    • /
    • 2020
  • Satellite optical communication has gained significant attention owing to its many quality features (e.g., a larger bandwidth, license free spectrum, higher data rate, and better security) compared to satellite microwave communication. Various experiments have been performed during many space missions to demonstrate and characterize inter-satellite links, downlinks, and uplinks. Korea has also planned to establish an experimental communication system using a geostationary earth orbit (GEO) satellite and the Geochang station as an optical ground station for low Earth orbit (LEO)-to-ground optical relay links. In this study, the performance of inter-satellite communication links and downlinks was investigated for the new Korean experimental communication system in terms of link margin, bit error rate (BER), and channel capacity. In particular, the performance of the inter-satellite links was analyzed based on the receiving apertures and the transmitting power, while that of the downlink was analyzed in terms of atmospheric turbulence conditions and transmitting power. Finally, we discussed two system parameters of receiving aperture and transmitting power to meet the three criteria of link margin, BER, and channel capacity.

An Implementation of On-Line SCOPF Algorithm (On-Line SCOPF 알고리즘의 적용에 관한 연구)

  • Shin, Young-Kyun;Kim, Bal-Ho H.
    • Proceedings of the KIEE Conference
    • /
    • 2000.11a
    • /
    • pp.10-12
    • /
    • 2000
  • As power systems tend to be operated more closely to their ultimate ratings. the role of SCOPF is changed and the importance for real-time security inhancement will be more increased in the new and competitive electricity market. This paper deals with the application of the SCOPF which make possible the On-Line application. The security margin of power system truly is changed according to the conditions or configuration of power system, therefore, the sensitivity factor related to the security is recalculated and the application should be updated in accordance with the state of power system. The proposed mechnism has been tested on modified Woolenberg 18-bus system and the results show more secure conditions against critical contingencies.

  • PDF

Parallel Implementation of Scrypt: A Study on GPU Acceleration for Password-Based Key Derivation Function

  • SeongJun Choi;DongCheon Kim;Seog Chung Seo
    • Journal of information and communication convergence engineering
    • /
    • v.22 no.2
    • /
    • pp.98-108
    • /
    • 2024
  • Scrypt is a password-based key derivation function proposed by Colin Percival in 2009 that has a memory-hard structure. Scrypt has been intentionally designed with a memory-intensive structure to make password cracking using ASICs, GPUs, and similar hardware more difficult. However, in this study, we thoroughly analyzed the operation of Scrypt and proposed strategies to maximize computational parallelism in GPU environments. Through these optimizations, we achieved an outstanding performance improvement of 8284.4% compared with traditional CPU-based Scrypt computations. Moreover, the GPU-optimized implementation presented in this paper outperforms the simple GPU-based Scrypt processing by a significant margin, providing a performance improvement of 204.84% in the RTX3090. These results demonstrate the effectiveness of our proposed approach in harnessing the computational power of GPUs and achieving remarkable performance gains in Scrypt calculations. Our proposed implementation is the first GPU implementation of Scrypt, demonstrating the ability to efficiently crack Scrypt.

Research on Voltage Stability Boundary under Different Reactive Power Control Mode of DFIG Wind Power Plant

  • Ma, Rui;Qin, Zeyu;Yang, Wencan;Li, Mo
    • Journal of Electrical Engineering and Technology
    • /
    • v.11 no.6
    • /
    • pp.1571-1581
    • /
    • 2016
  • A novel method is proposed to construct the voltage stability boundary of power system considering different Reactive Power Control Mode (RPCM) of Doubly-Fed Induction Generator (DFIG) Wind Power Plant (WPP). It can be used for reflecting the static stability status of grid operation with wind power penetration. The analytical derivation work of boundary search method can expound the mechanism and parameters relationship of different WPP RPCMs. In order to improve the load margin and find a practical method to assess the voltage security of power system, the approximate method of constructing voltage stability boundary and the critical points search algorithms under different RPCMs of DFIG WPP are explored, which can provide direct and effective reference data for operators.

A Study on Development of Power Transfer Capability Calculation Algorithm Considering the Closest Saddle Node Bifurcation for Voltage Stability (최단붕괴 전압안정도여유를 고려한 수송능력산정 알고리즘의 개발에 관한 연구)

  • 김용하;정현성;나인규;조성린;이재걸
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.52 no.10
    • /
    • pp.557-562
    • /
    • 2003
  • This paper presents a power transfer capability calculation algorithm considering the closest saddle node bifurcation for voltage stability margin. In this method, voltage stability margin constraints considering the closest saddle node bifurcation are incorporated into a power transfer capability formulation to guarantee adequate voltage security levels in an interconnected power system. The proposed method is applied to IEEE-24 reliability test system and the results show the effectiveness of the method.

A Study on Development of Power Transfer Capability Calculation Algorithm Considering A Closest Saddle Node Bifurcation For Voltage Stability (최단전압붕괴점 전압안정도여유를 고려한 수송능력산정 알고리즘의 개발에 관한 연구)

  • Kim, Y.H.;Lee, Buhm;Choi, S.K.;Jung, H.S.;Lee, S.J.;Jo, S.R.
    • Proceedings of the KIEE Conference
    • /
    • 2002.11b
    • /
    • pp.88-90
    • /
    • 2002
  • This paper presents a power transfer capability calculation algorithm Considering A Closest Saddle Node Bifurcation For Voltage Stability Margin. In this method, voltage stability margin constraints considering a closest saddle node bifurcation are incorporated into a power transfer capability formulation to guarantee adequate voltage security levels in an interconnected Power System. The proposed method is applied to IEEE-24 Reliability Test System and the results shows the effectiveness of the method.

  • PDF

Probabilistic Security Analysis in Composite Power System Reliability (복합전력계통 신뢰도평가에 있어서 확률론적 안전도연구)

  • Kim, H.;Cha, J.;Kim, J.O.;Kwon, S.
    • Proceedings of the KIEE Conference
    • /
    • 2005.11b
    • /
    • pp.46-48
    • /
    • 2005
  • This paper discusses a probabilistic method for power system security assessment. The security analysis relates to the ability of the electric power systems to survive sudden disturbances such as electric short circuits or unanticipated loss of system elements. It consists of both steady state and dynamic security analyses, which are not two separate issues but should be considered together. In steady state security analysis including voltage security analysis, the analysis checks that the system is operated within security limits by OPF (optimal power flow) after the transition to a new operating point. Until now, many utilities have difficulty in including dynamic aspects due to computational capabilities. On the other hand. dynamic security analysis is required to ensure that the transition may lead to an acceptable operating condition. Transient stability, which is the ability of power systems to maintain synchronism when subjected to a large disturbance. is a principal component in dynamic security analysis. Usually any loss of synchronism may cause additional outages and make the present steady state analysis of the post-contingency condition inadequate for unstable cases. This is the reason for the need of dynamic studies in power systems. Probabilistic criterion can be used to recognize the probabilistic nature of system components while considering system security. In this approach. we do not have to assign any predetermined margin of safety. A comprehensive conceptual framework for probabilistic static and dynamic assessment is presented in this paper. The simulation results of the Western System Coordinating Council (WSCC) system compare an analytical method with Monte-Carlo simulation (MCS).

  • PDF

Random sequence synchronization failure detection algorithm for synchronous stream cipher system using RMVD (RMVD를 이용하는 동기식 스트림 암호 데이터 통신시 난수동기 이탈 검출 알고리듬)

  • 박종욱
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.3
    • /
    • pp.29-36
    • /
    • 2000
  • It is very import role to increase communication quality that fast detection of random sequence synchronization fail in synchronous stream cipher system using initial synchronization mode. Generally it sends additional information to detect random sequency synchronization fail. But we can't transmit additional informations to decide synchronization fail in a system using RMVD to correct channel error. In this paper we propose a method to detect synchronization fail in the receiver even though a system using RMVD has no margin to send additional information, For detecting random sequency synchronization fail we decipher receiver data analyze probability of transition rate for pre-determined period and decide synchronization fail using calculated transition rate probability. This proposed method is fast very reliable and robust in noisy channel and is easily implemented with hardware.

Development of Power System Health Algorithm (전력계통 건전성 지수 알고리즘 개발)

  • Lim, Jin-Taek;Lee, Sung-Hun;Lee, Yeon-Chan;Choi, Jae-Seok;Choi, Hong-Seok;Joo, Joon-Young
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.63 no.10
    • /
    • pp.1328-1336
    • /
    • 2014
  • This paper proposes Power System Health Index(PSHI) newly. The paper describes several kind of power system health indices based on two main categories, which are adequacy and security. In adequacy, four kinds of health indices of Frequency, Voltage, Reserve(Operating Reserve Power and Frequency Regulation Reserve Power) and Overload of lines and transformers are proposed. In security, four kinds of health indices of Voltage(154kV, 345kV and 765kV), Overload of lines and transformers, Power flow constraint among areas and SPS are proposed. All indices are mapped with three domains, which are indicated as Health, Margin and Risk, defined with expert interview. While domains of health, margin and risk is defined similar with the conventional well being analysis of power system. The criterion of the domains is proposed using an interview with expert operators and practical reliability codes in Korea. The several kinds of health index functions, which are linear ratio, piecewise linear ration and reverse ratio function etc. are developed in this paper. It will be expected that the developed health indices can help operators to control power system more successfully and also prevent power system from accident as like as black out in future because operator can make a decision immediately based on more easily visual information of system conditions from too much indices acquisition of complex power system.

Non-Profiling Analysis Attacks on PQC Standardization Algorithm CRYSTALS-KYBER and Countermeasures (PQC 표준화 알고리즘 CRYSTALS-KYBER에 대한 비프로파일링 분석 공격 및 대응 방안)

  • Jang, Sechang;Ha, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1045-1057
    • /
    • 2022
  • Recently, the National Institute of Standards and Technology (NIST) announced four cryptographic algorithms as a standard candidates of Post-Quantum Cryptography (PQC). In this paper, we show that private key can be exposed by a non-profiling-based power analysis attack such as Correlation Power Analysis (CPA) and Differential Deep Learning Analysis (DDLA) on CRYSTALS-KYBER algorithm, which is decided as a standard in the PKE/KEM field. As a result of experiments, it was successful in recovering the linear polynomial coefficient of the private key. Furthermore, the private key can be sufficiently recovered with a 13.0 Normalized Maximum Margin (NMM) value when Hamming Weight of intermediate values is used as a label in DDLA. In addition, these non-profiling attacks can be prevented by applying countermeasures that randomly divides the ciphertext during the decryption process and randomizes the starting point of the coefficient-wise multiplication operation.