• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.032 seconds

Analysis of Security Technology of Trusted Platform Modules (신뢰할 수 있는 플랫폼 모듈 (TPM; Trusted Platform Module) 연구의 암호기술 분석)

  • Moon, Sangook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.878-881
    • /
    • 2009
  • As for the technology developed for network security, there is little difference of design ability between the domestic and the foreign studies. Although the development of 2048 RSA processor has been undergone, the processing speed does not meet the requirement due to its long width. These days, an RSA processor architecture with higher speed comsuming less resource is necessary. As for the development of RNG (Random Number Generator), the technology trend is moving from PRNG (Pseudo Random Number Generator) to TRNG (True Random Number Generator), also requiring less area and high speed.

  • PDF

Design and Implementation of Optimal Control Algorithms for Building Energy Management (빌딩 에너지 관리 최적화 알고리즘 설계 및 구현)

  • Jin Jung-Hwa;Chung Sun-Tae
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.16 no.10
    • /
    • pp.969-976
    • /
    • 2004
  • Building energy saving is one of the most important issues in these days. Energy saving control strategies should be developed properly to achieve the saving. One of such area we could apply is the HVAC (Heating, Ventilation and Air-Conditioning) system. Through the optimal control algorithm for building energy management system (EMS), you can not only save the cost of building energy, but also protect HVAC system components against the unexpected condition. In order to verify the effectiveness of building energy saving, field test was accomplished for several months at 'A' building. And to get the measured data, remote control was used. If the remote control is used in BAS (Building Automation System), control and monitoring can be done for all of the building systems, such as HVAC, power, lighting, security and fire-alarm etc. anywhere any time. Using the remote control, Control and monitoring is possible for the testing system without going there. As the results of field test, we could reduce $5{\sim}10\%$ of the building energy cost.

Securing a Cyber Physical System in Nuclear Power Plants Using Least Square Approximation and Computational Geometric Approach

  • Gawand, Hemangi Laxman;Bhattacharjee, A.K.;Roy, Kallol
    • Nuclear Engineering and Technology
    • /
    • v.49 no.3
    • /
    • pp.484-494
    • /
    • 2017
  • In industrial plants such as nuclear power plants, system operations are performed by embedded controllers orchestrated by Supervisory Control and Data Acquisition (SCADA) software. A targeted attack (also termed a control aware attack) on the controller/SCADA software can lead a control system to operate in an unsafe mode or sometimes to complete shutdown of the plant. Such malware attacks can result in tremendous cost to the organization for recovery, cleanup, and maintenance activity. SCADA systems in operational mode generate huge log files. These files are useful in analysis of the plant behavior and diagnostics during an ongoing attack. However, they are bulky and difficult for manual inspection. Data mining techniques such as least squares approximation and computational methods can be used in the analysis of logs and to take proactive actions when required. This paper explores methodologies and algorithms so as to develop an effective monitoring scheme against control aware cyber attacks. It also explains soft computation techniques such as the computational geometric method and least squares approximation that can be effective in monitor design. This paper provides insights into diagnostic monitoring of its effectiveness by attack simulations on a four-tank model and using computation techniques to diagnose it. Cyber security of instrumentation and control systems used in nuclear power plants is of paramount importance and hence could be a possible target of such applications.

Study of Determinants of Behavior Intention in Online Banking of Bangladesh

  • AKTER, Sumaiya;JANG, Seo-Youn;KIM, Tae-Joong
    • East Asian Journal of Business Economics (EAJBE)
    • /
    • v.9 no.4
    • /
    • pp.113-129
    • /
    • 2021
  • Purpose -This study was based on the TAM and the trust of Bangladeshi in social impact, privacy and security, compatibility, perceived-ease of use, and perceived-usefulness. The purpose of this study is to investigate how these variables affect the acceptance of online banking. Research design, data, and methodology - Internet survey was conducted for individuals who had experience in using the online banking service, and those who have no experience in online banking were excluded from the analysis. The questionnaire was distributed to Bangladesh respectively, and data were collected. Result - Trust is the variable that has the greatest influence on the adaption of online banking service. Perceived-usefulness was found to have a important effect on individuals' behavioral-intention towards the adopting of online Banking services in Bangladesh. It was also found that compatibility, privacy and security were important predictors. Conclusion - The TAM model, which explains individual behavioral intentions toward adopting online banking services in Bangladesh, is sufficiently applicable. Perceived ease of use found an important predictor of trust. Evidently, the current conclusions provide empirical evidence that customers would be more willing to adopt online banking services if they find it useful and reliable. Another very important constructive correlation between trust and perceived-usefulness, suggesting that consumers who realize that online banking is safe and useful.

An Incentive Mechanism Design for Trusted Data Management on Internet of Vehicle with Decentralized Approach (분산형 접근 방식을 적용한 차량 인터넷에서 신뢰할수 있는 데이터 관리를 위한 인센티브 메커니즘 설계)

  • Firdaus, Muhammad;Rhee, Kyung-Hyune
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.889-899
    • /
    • 2021
  • This paper proposes a reliable data sharing scheme on the internet of vehicles (IoV) by utilizing blockchain technology for constructing a decentralized system approach. In our model, to maintain the credibility of the information messages sent by the vehicles to the system, we propose a reputation rating mechanism, in which neighboring vehicles validate every received information message. Furthermore, we incorporate an incentive mechanism based on smart contracts, so that vehicles will get certain rewards from the system when they share correct traffic information messages. We simulated the IoV network using a discrete event simulator to analyze network performance, whereas the incentive model is designed by leveraging the smart contract available in the Ethereum platform.

Analysis of Chaotic True Random Number Generator Using 0.18um CMOS Process (0.18um CMOS 공정을 사용한 카오스 난수 발생기 분석)

  • Jung, Ye-Chan;Jayawickra, Chamindra;Al-Shidaifat, AlaaDdin;Lee, Song-Wook;Kahrama, Nihan;Song, Han-Jung
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.24 no.5
    • /
    • pp.635-639
    • /
    • 2021
  • As times goes by, a ton of electric devices have been developing. Nowadays, there are many personal electric goods that are connected each other and have important private information such as identification, account number, passwords, and so on. As many people own at least one electric device, security of the electric devices became significant. To prevent leakage of the information, study of Chaotic TRNG, "Chaotic True Random Number Generator", protecting the information by generating random numbers that are not able to be expected, is essential. In this paper, A chaotic TRNG is introduced is simulated. The proposed Chaotic TRNG is simulated with Virtuoso &, a circuit design program of Cadence that is a software company. For simulating the mentioned Chaotic TRNG, setting values, 0V low and 3V high on Vpulse, 1.2V on V-ref, 3.3V on VDD, and 0V on VSS, are used.

An Energy Efficient Clustering Algorithm in Mobile Adhoc Network Using Ticket Id Based Clustering Manager

  • Venkatasubramanian, S.;Suhasini, A.;Vennila, C.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.341-349
    • /
    • 2021
  • Many emerging mobile ad-hoc network application communications are group-oriented. Multicast supports group-oriented applications efficiently, particularly in a mobile environment that has a limited bandwidth and limited power. Energy effectiveness along with safety are 2 key problem in MANET design. Within this paper, MANET is presented with a stable, energy-efficient clustering technique. In this proposed work advanced clustering in the networks with ticket ID cluster manager (TID-CMGR) has formed in MANET. The proposed routing scheme makes secure networking the shortest route possible. In this article, we propose a Cluster manager approach based on TICKET-ID to address energy consumption issues and reduce CH workload. TID-CMGR includes two mechanism including ticket ID controller, ticketing pool, route planning and other components. The CA (cluster agent) shall control and supervise the functions of nodes and inform to TID-CMGR. The CH conducts and transfers packets to the network nodes. As the CH energy level is depleted, CA elects the corresponding node with elevated energy values, and all new and old operations are simultaneously stored by CA at this time. A simulation trial for 20 to 100 nodes was performed to show the proposed scheme performance. The suggested approach is used to do experimental work using the NS- simulator. TIDCMGR is compared with TID BRM and PSO to calculate the utility of the work proposed. The assessment shows that the proposed TICKET-ID scheme achieves 90 percent more than other current systems.

Effects of Interactive Video on Mind Mapping Skills of Common First Year Students' at Umm Al-Qura University

  • Almalki, Mohammad Eidah Messfer
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.365-374
    • /
    • 2021
  • This study set off to explore the effect of interactive videos on developing mind mappings skills required for the common first-joint year students at Umm Al-Qura University. Towards this end, the experimental research design of a quasi-experimental of two experimental groups was adopted. The research tools consisted of an achievement test of the cognitive aspects of mind mapping skills and a product evaluation form of mind mapping skills. Results showed statistically significant differences at the significance level (α 0.05) between the mean scores of the two experimental groups who studied the educational video regardless of the type of video in the pre-post cognitive test of the mind mapping skills and the form of product evaluation. Besides, there are statistically significant differences at the significance level (0.05≥α) between the mean scores of the first experimental group who studied the conventional educational video and the mean scores of the second experimental group who studied the interactive educational video. This significant difference was in the posttest of mind mapping skills and in favor of the group who studied the interactive educational video. Nevertheless, there were no statistically significant differences at the significance level (0.05≥α) between the mean scores of the first and second experimental groups in the post-application of the product evaluation form of mind mapping skills. The researcher recommended using the interactive video in teaching courses to common first-year students. It also recommends organizing courses for the faculty members to train them on using interactive videos in their teaching.

Theoretical Problems of Designing Pedagogical Technologies in Higher Education Institutions

  • Yakymenko, Svitlana;Sukholova, Marianna;Drahunova, Vira;Konokh, Anatolii;Levchenko, Nataliia;Bozhok, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.469-472
    • /
    • 2021
  • The article discusses theoretical and methodological issues of modern pedagogical technologies: the essence, structure, functions, principles, conditions for successful functioning in educational process of the university. The article reflects the results of the analysis of publications on the following grounds: 1) levels of presentation of scientific information (theoretical, theoretical and experimental, empirical); 2) signs and properties of educational technologies; 3) approaches to the choice of grounds for classifications of educational technologies; 4) the possibilities of educational technologies in the formation of the academic, communicative and professional competence of a specialist; 5) criteria for assessing the effectiveness of their application in university educational practice; 6) the readiness of university teachers to develop and implement educational technologies.

Efficiency Management of the Enterprises Activity Based on the Principles of Innovative Development

  • Chernoivanova, Hanna;Kozlova, Inna;Kryvobok, Kateryna;Nemashkalo, Karina;Yermolenko, Oleksii
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.328-334
    • /
    • 2021
  • The article examines the economic essence and approaches to determining the efficiency of the enterprise. The author in the study considers the effectiveness and from the standpoint of qualitative analysis of the effectiveness of change and implementation of enterprise development goals. It is established that the tool for ensuring qualitative impacts on the efficiency of the enterprise is the innovative development of the economic space of the enterprise. The article considers the dominant innovations that have influenced the means and methods of production. An organizational and economic mechanism has been recommended to coordinate the costs of innovation activities in order to ensure the efficiency of enterprises. The object of management in the organizational and economic mechanism is the innovation process in the enterprise: from the design of strategic goals of innovation, search and commercialization of innovations, to building and implementing innovation potential. The efficiency of the enterprise under the condition of realization of innovative potential will be characterized by steady competitive advantages and strategically-oriented behavior in the market.