• Title/Summary/Keyword: Security and Resilience

Search Result 103, Processing Time 0.028 seconds

New Security Layer for OverLay Networks

  • Imai, Hideki;Shin, Seong-Han;Kobara, Kazukuni
    • Journal of Communications and Networks
    • /
    • v.11 no.3
    • /
    • pp.211-228
    • /
    • 2009
  • After clarifying the underlying problems in a secure network storage, we introduce two important requirements, leakageresilience and availability in higher levels respectively, for data keys that are used to protect remotely-stored data. As a main contribution of this paper, we give a new security layer for overlay networks by proposing a leakage-resilient authentication and data management system. In this system, we specifically propose a single mode and a cluster mode where the latter provides a higher level of both leakage-resilience and availability for the data key.

SDN을 통한 스마트그리드 복원력(Resilience) 향상 이슈

  • Shin, Incheol
    • Review of KIISC
    • /
    • v.25 no.5
    • /
    • pp.60-66
    • /
    • 2015
  • SDN (Software Defined Networking)은 동적 재설정(Dynamic Reconfiguration)기능을 통해 지금껏 존재하지 않았던 유연성(Flexibility)을 IP(Internet Protocol)에 제공한다. 또한, 네트워크 관리, QoS (Quality of Service) 최적화, 시스템 복원력(Resilience) 강화를 위한 다양한 응용프로그램을 지원한다. 스마트그리드(Smart Grid)시스템에 SDN을 적용하기 위한 다양한 연구가 진행 중이며, 본 문서에서는 다양한 사고(Failures) 혹은 불법적인 공격으로부터 해당 시스템 복원력향상을 위한 이슈에 대해 언급한다. 이와 같은 문제점들에 대한 논의 없이 전력회사는 SDN의 장점을 충분히 활용하지 못할 가능성이 높다. 본 문서를 통해, SDN을 통한 스마트그리드 복원력향상, SDN으로 인한 추가적인 보안위협 등에 대해 논의 할 것이다.

Introduction to Leakage-Resilient Authenticated Key Exchange Protocols and Their Applications

  • Imai, Hideki;Shin, Seong-Han;Kobara, Kazukuni
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6B
    • /
    • pp.207-217
    • /
    • 2008
  • Secure channels, indispensable to many applications, can be established by using an authenticated key exchange (AKE) protocol where the involving parties authenticate one another and then share authenticated session keys over insecure networks. In this paper, we introduce a new type of AKE protocols that are especially designed to minimize the damages caused by leakages of stored secrets. Such protocols are called Leakage-Resilient AKE (LR-AKE) protocols, whose motivation, design principles, several constructions, security analysis and applications are explained in detail.

Climate change and resilience of biocontrol agents for mycotoxin control

  • Magan, Naresh;Medina, Angel
    • 한국균학회소식:학술대회논문집
    • /
    • 2018.05a
    • /
    • pp.41-41
    • /
    • 2018
  • There has been an impetus in the development of biocontrol agents (BCAs) with the removal of a number of chemical compounds in the market, especially in the European Union. This has been a major driver in the development of Integrated Pest Management systems (IPM) for both pest and disease control. For control of mycotoxigenic fungi, there is interest in both control of colonization and more importantly toxin contamination of staple food commodities. Thus the relative inoculum potential of biocontrol agent vs the toxigenic specie sis important. The major bottlenecks in the production and development of formulations of biocontrol agents are the resilience of the strains, inoculum quality and formulation with effective field efficacy. It was recently been shown for mycotoxigenic fungi such as Aspergillus flavus, under extreme climate change conditions, growth is not affected although there may be a stimulation of aflatoxin production. Thus, the development of resilient biocontrol strains which can may have conserved control efficacy but have the necessary resilience becomes critical form a food security point of view. Indeed, under predicted climate change scenarios the diversity of pests and fungal diseases are expected to have profound impacts on food security. Thus, when examining the identification of potential biocontrol strains, production and formulation it is critical that the resilience to CC environmental factors are included and quantified. The problems in relation to the physiological competence and the relative humidity range over which efficacy can occur, especially pre-harvest may be increase under climate change conditions. We have examined the efficacy of atoxigenic strains of A. flavus and Clanostachys rosea and other candidates for control of A. flavus and aflatoxin contamination of maize, and for Fusarium verticillioides and fumonisin toxin control. We have also examined the potential use of fluidized-bed drying, nanoparticles/nanospheres and encapsulation approaches to enhance the potential for the production of resilient biocontrol formulations. The objective being the delivery of biocontrol efficacy under extreme interacting climatic conditions. The potential impact of climate change factors on the efficacy of biocontrol of fungal diseases and mycotoxins are discussed.

  • PDF

The Effect of Road Networks on Urban Resilience in Flooding (도시침수 시 도로네트워크가 도시회복도에 미치는 영향 분석)

  • Hyung Jun Park;Dong Hyun Kim;Hyun Jung Lee;Seung Oh Lee
    • Journal of Korean Society of Disaster and Security
    • /
    • v.16 no.2
    • /
    • pp.85-98
    • /
    • 2023
  • Flood is one of the most frequent natural disasters worldwide. In Korea, the probability of urban flooding is greatly increasing due to complex factors such as global warming, an increase in impervious areas, and limitations in expanding water supply facilities in existing urban areas. However, large-scale civil engineering works to prevent urban inundation are socially and economically difficult to obtain national consent. Recently the importance of resilience, which is the ability to return to the original state after a disaster through rapid recovery while preparing for natural disasters to a level that the local community can afford socially and economically, is increasing. Accordingly, various studies on urban resilience have been conducted, but the resilience measurement method related to the lifeline that provides essential services of the city is insufficient. However, among lifelines, road networks are important facilities for the transportation of recovery resources and rapid recovery in the event of a natural disaster, so road networks are a major factor that must be considered when measuring the degree of recovery of a city in the field of natural disasters. Therefore, this study proposes a recovery evaluation method considering the characteristics of resilience and road networks in the urban flooding field and analyzes the effect of road networks on urban resilience.

A Study on the Comparison of the United Requirement for Cyber Resilience of Ships (IACS UR E26) with Existing Cybersecurity and Cyber Resilience Frameworks (선박의 사이버 복원력 통합 요구사항(IACS UR E26)과 기존 사이버보안 및 사이버 복원력 프레임워크의 비교)

  • Jin Kim;Sam Youl Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.5
    • /
    • pp.1149-1159
    • /
    • 2024
  • With the rapid increase in the construction of smart ships and the growing proportion of IT equipment on vessels, the frequency and severity of maritime cyber incidents have significantly escalated. Recognizing this situation, the International Association of Classification Societies recently enacted the UR E26 regulation. This study investigates the definition of cyber resilience and reviews existing research, using the Analytic Hierarchy Process to determine the priority of factors across the ship lifecycle as presented in the E26 regulation. Additionally, the E26 regulation is compared and analyzed against Cybersecurity Framework and Cyber Resiliency System of the NIST. Through this analysis, the study aims to assist companies that are unfamiliar with maritime cybersecurity in effectively responding to the IACS UR E26 regulation and proposes recommendations for the improvement of the UR E26 regulation.

A Study on the Supply Chain Security and Risk Management Strategies of Global Companies (글로벌 기업의 공급사슬보안 및 위험관리전략에 관한 연구)

  • Yang, Jung-Ho
    • Management & Information Systems Review
    • /
    • v.27
    • /
    • pp.149-172
    • /
    • 2008
  • Since the 9/11 terror attack, the event which caused supply chain disruption, supply chain security has becomes more important than ever before. Furthermore, such company's logistics strategies conflicting supply chain security as increased global sourcing, JIT manufacturing are increasing supply chain vulnerability. It could burden for global companies to strengthen supply chain security because not only it requires additional investment cost but also changes of companiy's global logistics strategy. However, on the other hand, supply chain visibility and resilience can be improved through supply chain security. In addition, it allows companies to stabilize supply chain structure as well as rapid and flexible response to market demand. The key issue is balancing between efficiency and supply chain security. To do this, identifying risk elements under the supply chain and assessing vulnerability of each supply chain components should be performed before developing efficient supply chain security management system without obstructing supply chain efficiency.

  • PDF

An Escrow-Free Two-party Identity-based Key Agreement Protocol without Using Pairings for Distinct PKGs

  • Vallent, Thokozani Felix;Yoon, Eun-Jun;Kim, Hyunsung
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.2 no.3
    • /
    • pp.168-175
    • /
    • 2013
  • Key escrow is a default property that is inherent in identity-based cryptography, where a curious private key generator (PKG) can derive a secret value shared by communicating entities in its domain. Therefore, a dishonest PKG can encrypt and decrypt ciphers or can carry out any attack on the communicating parties. Of course, the escrow property is not completely unwanted but is acceptable in other particular applications. On the other hand, in more civil applications, this key escrow property is undesirable and needs to be removed to provide maximum communication privacy. Therefore, this paper presents an escrow-free identity-based key agreement protocol that is also applicable even in a distinct PKG condition that does not use pairings. The proposed protocol has comparable computational and communicational performance to many other protocols with similar security attributes, of which their security is based on costly bilinear pairings. The protocol's notion was inspired by McCullagh et al. and Chen-Kudla, in regard to escrow-free and multi-PKG key agreement ideas. In particular, the scheme captures perfect forward secrecy and key compromise impersonation resilience, which were lacking in McCullagh et al.'s study, as well as all other desirable security attributes, such as known key secrecy, unknown key-share resilience and no-key control. The merit in the proposed protocol is the achievement of all required security requirements with a relatively lower computational overhead than many other protocols because it precludes pairings.

  • PDF

Analyzing the level of resilience by gender in computational thinking classes (컴퓨팅 사고 강좌에서 성별에 따른 회복탄력성 수준 분석)

  • Kim, Semin;Choi, Sookyoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.2
    • /
    • pp.252-258
    • /
    • 2021
  • Software subjects such as programming practice and physical computing may have differences between men and women, and there may be individual differences in resilience due to errors and debugging. Therefore, in this study, we analyze gender differences in computational thinking classes by using a resilience testing tool. The results of this study showed that the two groups were homogeneous, and the male group did not show significant changes in resilience, but the female group showed significant increases in resilience. This study confirmed the possibility of reducing the gender gap of learners by allowing a group of female students who did not show strength in traditional software education to become more motivated and interested in the information and communication field through appropriate learning content and learning strategies in computational thinking classes.

Evaluation Methods of Soil Resilience Related to Agricultural Environment (농업환경 분야에서 토양 리질리언스 분야별 평가 방법)

  • Kim, Min-Suk;Min, Hyun-Gi;Hyun, Seung-Hun;Kim, Jeong-Gyu
    • Ecology and Resilient Infrastructure
    • /
    • v.7 no.2
    • /
    • pp.97-113
    • /
    • 2020
  • Soil is the foundation of human life and the basis for food security. Considering this it is prioritized in the UN's Sustainable Development Goals (SDG). Therefore, research on soil resilience in the agricultural environment is crucial for sound and sustainable soil management, especially in highly uncertain and unpredictable conditions. Soil resilience is defined in different ways by several researchers; however, its definition typically includes the concepts of recovery and resistance to stress. The physical, chemical, and biological characteristics of soils that are used to assess the soil resilience, i.e., the response of soil to various types of stress are summarized in this study. In addition, various statistical processing techniques and quantification methods are summarized considering the wide spatial and temporal scope of soil resilience research. Several soil resilience studies typically conduct the following five steps: (1) soil and site selection (2) stress (independent variable) setting (3) soil characteristics and indicator (dependent variable) setting (4) performing various spatiotemporal scale experiments (5) statistical analysis. The previous and present studies present a general introduction of soil resilience, based on which, further practical research considering domestic agricultural environment should be conducted. The extensive range of soil resilience measurements will require collaboration between researchers in various fields.