• 제목/요약/키워드: Security design

Search Result 3,411, Processing Time 0.049 seconds

A Study on Photoneutron Characteristics Generated from Target and Collimator of Electron Linear Accelerator for Container Security Inspection using MCNP6 Code (MCNP6 코드를 이용한 컨테이너 보안 검색용 전자 선형가속기 표적과 조준기에서 발생한 광중성자 특성에 관한 연구)

  • Lee, Chang-Ho;Kim, Jang-Oh;Lee, Yoon-Ji;Jeon, Chan-hee;Lee, Ji-Eun;Min, Byung-In
    • Journal of the Korean Society of Radiology
    • /
    • v.14 no.4
    • /
    • pp.455-465
    • /
    • 2020
  • The purpose of this study is to evaluate the photoneutron characteristics generated by the linear accelerator target and collimator. The computer simulation design firstly, consisted of a target, a single material target and a composite material target. Secondly, it consisted of a cone beam and a fan beam depending on the type of the collimator. Finally, the material of the fan beam collimator is composed of a single material composed of only lead (Pb) and a composite material collimator composed of tungsten (W) and lead (Pb). The research method calculated the photoneutron production rate and energy spectrum using F2 tally from the surface of a virtual sphere at a distance of 100 cm from the target. As a result, firstly the photoneutron production rate was 20% difference, depending on the target. Secondly, depending on the type of the collimator, there was a 10% difference. Finally, depending on the collimator material, there was a 40% difference. In the photoneutron energy spectrum, the average photoneutron flux tended to be similar to the photoneutron production rate. As a result, it was confirmed that the 9 MeV linear accelerator photoneutron are production increased more by the collimator than by the target, and by the material, not the type of the collimator. Selecting and operating targets and collimator with low photoneutron production will be the most active radiation protection. Therefore, it is considered that this research can be a useful data for introducing and operating and radiation protection of a linear accelerator for container security inspection.

Security Design for Efficient Detection of Misbehavior Node in MANET (MANET에서 비정상 노드를 효율적으로 탐지하기 위한 보안 설계)

  • Hwang, Yoon-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.408-420
    • /
    • 2010
  • On a Mobile Ad hoc NETwork(MANET), it is difficult to detect and prevent misbehaviors nodes existing between end nodes, as communication between remote nodes is made through multiple hop routes due to lack of a fixed networked structure. Therefore, to maintain MANET's performance and security, a technique to identify misbehaving middle nodes and nodes that are compromise by such nodes is required. However, previously proposed techniques assumed that nodes comprising MANET are in a friendly and cooperative relationship, and suggested only methods to identify misbehaving nodes. When these methods are applied to a larger-scale MANET, large overhead is induced. As such, this paper suggests a system model called Secure Cluster-based MANET(SecCBM) to provide secure communication between components aperANET and to ensure eed. As such, this pand managems suapemisbehavior nodes. SecCBM consists apetwo stages. The first is the preventis pstage, whereemisbehavior nodes are identified when rANET is comprised by using a cluster-based hierarchical control structure through dynamic authentication. The second is the post-preventis pstage, whereemisbehavior nodes created during the course apecommunication amongst nodes comprising the network are dh, thed by using FC and MN tables. Through this, MANET's communication safety and efficiency were improved and the proposed method was confirmed to be suitable for MANET through simulation performance evaluation.

Improvement of the Checklist for Residential Housing's Crime Prevention Accreditation Assessment (주거시설에 대한 CPTED 평가인증 기준 개선방안 연구)

  • Park, Hyeon-Ho;Kim, Kang-Il;Cho, Joon-Tag
    • Korean Security Journal
    • /
    • no.55
    • /
    • pp.117-141
    • /
    • 2018
  • Police crime statistics report that residential housing such as apartment, low rise, detached houses is the second most vulnerable to crime, which is closely followed by the number of street crimes. Also residential houses are often exposed to quality-of-life crime, e.g burglary. It threatens the basic human rights of house residents in terms of safety and comfort within the urban living environment. This study examines related precedent studies regarding the vulnerability of residential housing including studios, multi-family housing from the viewpoint of crime prevention through environment design(CPTED), extracted the elements and items suitable for the safety of residential facilities and the certification evaluation indicators and check items to be the basis for the checklist are derived. Based on these evaluation indicators and inspection items, we conducted on-site surveys of residential facilities in three areas of Seoul, Yongin and Asan, and the final draft of the checklist was revised based on the results of the field survey. There are 43 items on the 7 fields of evaluation in the final version of checklist, 11 items in the management and operation, 20 items in the surveillance, 7 items in the access control, 1 item in the territoriality, 2 items in the activity support, and 2 items in the security and safety facilities. In addition, various points of interest were added to allow the administrator of the residential facility to earn points for special measures taken for safety. This checklist can be appropriately modified and utilized in consideration of the characteristics of each facility. Korean national police agency has CPOs to check the residential facilities in their jurisdiction using checklists and to certify excellent facilities with high level of safety.

A Novel Transmitter and Receiver Design of CDSK-Based Chaos Communication System (CDSK 방식의 카오스 통신 시스템의 새로운 송·수신기 설계)

  • Lee, Jun-Hyun;Ryu, Heung-Gyoon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.24 no.10
    • /
    • pp.987-993
    • /
    • 2013
  • Chaos communication system has characteristics of non-periodic, non-predictability, broadband signal and easy implementation. Also, chaos communication system is sensitive to the initial value, because completely another signal is generated when initial value of chaos equation is changed subtly. By these characteristics, security of chaos communication system is generally evaluated better than other digital communication systems. However, BER(Bit Error Rate) performance is worse than other digital communication systems, because transmitter and receiver of existing chaos communication system are strongly influenced by reference signal and noise. So, studies in order to improve the BER performance of chaos communication system is continuously performed. In this paper, We will propose a new CDSK (Correlation Delay Shift Keying) receiver in order to improve the BER performance. After we compare to the performance of existing receiver and proposed receiver, BER performance of proposed receiver evaluate. A novel receiver has characteristic that BER performance is better than existing receiver. However, if existing transmitter is used, existing receiver is possible to recover information bits even though BER performance is bad. Therefore, we propose a novel CDSK transmitter in order to improve the security of proposed receiver. When information bits are transmitted by using proposed transmitter, existing receiver is impossible to recover information bits, and proposed receiver is possible to recover information bits.

The Design and Implementation of Access Control framework for Collaborative System (협력시스템에서의 접근제어 프레임워크 설계 및 구현)

  • 정연일;이승룡
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.10C
    • /
    • pp.1015-1026
    • /
    • 2002
  • As per increasing research interest in the field of collaborative computing in recent year, the importance of security issues on that area is also incrementally growing. Generally, the persistency of collaborative system is facilitated with conventional authentication and cryptography schemes. It is however, hard to meet the access control requirements of distributed collaborative computing environments by means of merely apply the existing access control mechanisms. The distributed collaborative system must consider the network openness, and various type of subjects and objects while, the existing access control schemes consider only some of the access control elements such as identity, rule, and role. However, this may cause the state of security level alteration phenomenon. In order to handle proper access control in collaborative system, various types of access control elements such as identity, role, group, degree of security, degree of integrity, and permission should be taken into account. Futhermore, if we simply define all the necessary access control elements to implement access control algorithm, then collaborative system consequently should consider too many available objects which in consequence, may lead drastic degradation of system performance. In order to improve the state problems, we propose a novel access control framework that is suitable for the distributed collaborative computing environments. The proposed scheme defines several different types of object elements for the accessed objects and subjects, and use them to implement access control which allows us to guarantee more solid access control. Futhermore, the objects are distinguished by three categories based on the characteristics of the object elements, and the proposed algorithm is implemented by the classified objects which lead to improve the systems' performance. Also, the proposed method can support scalability compared to the conventional one. Our simulation study shows that the performance results are almost similar to the two cases; one for the collaborative system has the proposed access control scheme, and the other for it has not.

A Design of Authority Management Protocol for Secure Storage Access Control in Cloud Environment (클라우드 환경에서 안전한 스토리지 접근 제어를 위한 권한 관리 프로토콜 설계)

  • Min, So-Yeon;Lee, Kwang-Hyong;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.12-20
    • /
    • 2016
  • With the enhancements in existing major industries, cloud computing-based converging services have been created, as well as value-added industries. A variety of converging services are now provided, from personalized services up to industrial services. In Korea, they have become the driving force behind existing industries throughout the whole economy, but mainly in finance, mobile systems, social computing, and home services, based on cloud services. However, not only denial of service (DOS) and distributed DOS (DDOS) attacks have occurred, but also attack techniques targeting core data in storage servers. Even security threats that are hardly detected, such as multiple attacks on a certain target, APT, and backdoor penetration have also occurred. To supplement defenses against these, in this article, a protocol for authority management is designed to provide users with safe storage services. This protocol was studied in cases of integration between a cloud environment and big data-based technology, security threats, and their requirements. Also studied were amalgamation examples and their requirements in technology-based cloud environments and big data. With the protocol suggested, based on this, security was analyzed for attack techniques that occur in the existing cloud environment, as well as big data-based techniques, in order to find improvements in session key development of approximately 55%.

An Examination of Financial Feasibility and Redistributive Effect of Universal Basic Income (기본소득의 재정적 실현가능성과 재분배효과에 대한 고찰)

  • You, Jong-sung
    • 한국사회정책
    • /
    • v.25 no.3
    • /
    • pp.3-35
    • /
    • 2018
  • This article critically reviews the arguments that deny the financial feasbility and effectiveness of universal basic income as an alternative to existing social security systems and makes some suggestions to design effective and efficient basic income schemes. Regarding the financial feasibility of universal basic income, I argue that replacement of the existing regressive tax expenditures with universal basic income without raising tax rates can effectively reduce tax burden or provide income support to a majority of people except the rich. Addition of basic income to the tax base and reduction of the number of beneficiaries of public assistance and the amount of cash payment for them can further help save money. Regarding the redistributive effect, I note that the targeting ability of the existing social security systems is not good and that "the paradox of redistribution" that universal-type programs tend to be more redistributive than selective programs applies to universal basic income as well. I demonstrate significant redistributive effect of a hypothetical revenue-neutral basic income scheme and reviews several empirical studies done in Korea and abroad to show that basic income can be more effective in redistribution than social insurances or public assistance programs. Lastly, I emphasize the need to construct a reliable tax-benefit microsimulation model to help researchers to study redistributive effects of basic income schemes and other taxes and social policies.

Effects of method and duration of restraint on stress hormones and meat quality in broiler chickens with different body weights

  • Ismail, Siti Nadirah;Awad, Elmutaz Atta;Zulkifli, Idrus;Goh, Yong Meng;Sazili, Awis Qurni
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.32 no.6
    • /
    • pp.865-873
    • /
    • 2019
  • Objective: The study was designed to investigate the effects of restraint method, restraint duration, and body weight on stress-linked hormones (corticosterone, adrenaline, and noradrenaline), blood biochemical (namely glucose and lactate), and the meat quality in broiler chickens. Methods: A total of 120 male broiler chickens (Cobb 500) were assigned to a $2{\times}3{\times}2$ factorial arrangement in a completely randomized design using two restraint methods (shackle and cone), three durations of restraint (10, 30, and 60 s), and two categories of live body weight ($1.8{\pm}0.1kg$ as lightweight and $2.8{\pm}0.1kg$ as heavyweight). Results: Irrespective of the duration of restraint and body weight, the coned chickens were found to have lower plasma corticosterone (p<0.01), lactate (p<0.001), lower meat drip loss (p<0.01), cooking loss (p<0.05), and higher blood loss (p<0.05) compared with their shackled counterparts. The duration of restraint had significant effects on the meat initial pH (p<0.05), ultimate pH (p<0.05), and yellowness (p<0.01). The lightweight broilers exhibited higher (p<0.001) blood loss and lower (p<0.05) cooking loss compared to the heavyweight broilers, regardless of the restraint method used and the duration of restraint. However, the interaction between the restraint method, duration of restraint, and body weight contributed to differences in pre-slaughter stress and meat quality. Therefore, the interaction between the restraint method and the duration of restraint affected the meat shear force, lightness ($L^*$) and redness ($a^*$). Conclusion: The duration of restraint and body weight undoubtedly affect stress responses and meat quality of broiler chickens. Regardless of the duration of restraint and body weight, the cone restraint resulted in notably lower stress, lower meat water loss, and higher blood loss compared to shackling. Overall, the findings of this study showed that restraint method, duration of restraint, and body weight may affect the stress response and meat quality parameters in broilers and should be considered independently or interactively in future studies.

Design of Device Authentication Protocol Based on C-PBFT in a Smart Home Environment (스마트 홈 환경에서 C-PBFT 기반의 디바이스 인증 프로토콜 설계)

  • Kim, Jeong-Ho;Heo, Jae-Wook;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.5
    • /
    • pp.550-558
    • /
    • 2019
  • As the scale of the Internet of Things (IoT) environment grows and develops day by day, the information collected and shared through IoT devices becomes increasingly diverse and more common. However, because IoT devices have limitations on computing power and a low power capacity due to their miniaturized size, it is difficult to apply security technologies like encryption and authentication that have been directly applied in the previous Internet environment, making the IoT vulnerable to security threats. Because of this weakness, important information that needs to be delivered safely and accurately is exposed to the threat of malicious exploitation, such as data forgery, data leakage, and infringement of personal information. In order to overcome this threat, various security studies are being actively conducted to compensate for the weaknesses in IoT environment devices. In particular, since various devices interact, and share and communicate information collected in the IoT environment, each device should be able to communicate with reliability. With regard to this, various studies have been carried out on techniques for device authentication. This study examines the limitations and problems of the authentication techniques that have been studied thus far, and proposes technologies that can certify IoT devices for safe communication between reliable devices in the Internet environment.

Design and Implementation of Anomaly Traffic Control framework based on Linux Netfilter System and CBQ Routing Mechanisms (리눅스 Netfilter시스템과 CBQ 라우팅 기능을 이용한 비정상 트래픽 제어 프레임워크 설계 및 구현)

  • 조은경;고광선;이태근;강용혁;엄영익
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.129-140
    • /
    • 2003
  • Recently viruses and various hacking tools that threat hosts on a network becomes more intelligent and cleverer, and so the various security mechanisms against them have ken developed during last decades. To detect these network attacks, many NIPSs(Network-based Intrusion Prevention Systems) that are more functional than traditional NIDSs are developed by several companies and organizations. But, many previous NIPSS are hewn to have some weakness in protecting important hosts from network attacks because of its incorrectness and post-management aspects. The aspect of incorrectness means that many NIPSs incorrectly discriminate between normal and attack network traffic in real time. The aspect of post-management means that they generally respond to attacks after the intrusions are already performed to a large extent. Therefore, to detect network attacks in realtime and to increase the capability of analyzing packets, faster and more active responding capabilities are required for NIPS frameworks. In this paper, we propose a framework for real-time intrusion prevention. This framework consists of packet filtering component that works on netfilter in Linux kernel and traffic control component that have a capability of step-by-step control over abnormal network traffic with the CBQ mechanism.