• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.03 seconds

Design and Implementation of Blockchain for Securing Data of National Education Information System School Life Records (교육행정정보시스템 학교생활기록부 데이터의 안정성 확보를 위한 블록체인 설계 및 구현)

  • Kim, Heekyung;Park, Namje
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.3
    • /
    • pp.27-35
    • /
    • 2020
  • The purpose of this study is to study the technical implementation methods to prevent problems such as the record of important educational activities of the student life record department or the continuous illegal leakage and manipulation. To this end, in this paper, by applying a private blockchain that can be participated only by a given organization or individual, it prevents outsiders from participating in the block network, and creates legitimate authority by creating two types of block data: student information block and access record block in the life record book. We proposed a block mechanism that can be registered, modified, and accessed only by authorized staff members. As a result, we have prepared an alternative to prevent forgery and alteration of the living records by third parties and to secure the integrity of the living records. If applied to the educational administrative information system, social consensus will be established that the operation and management of the life record book is reliable.

An enhanced signcryption protocol for providing for providing forward secrecy (전방 비밀성을 제공하는 개선된 Signcryption 프로토콜)

  • 이경현;조현호;이준석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.7C
    • /
    • pp.653-663
    • /
    • 2002
  • The signature-then-encryption based on RSA scheme provides forward secrecy, but requires 4 modulo exponentiation operations in total, and the signcryption scheme proposed by Zheng simultaneously fulfills both the functions of digital signature and symmetric key encryption in a logically single step, and with a computational cost significantly smaller than that required by the current standard signature-then-encryption, but it can not provide forward secrecy. In this paper, we propose an enhanced signcryption scheme which can provide forward secrecy with lower computational cost and lower communication overhead comparing with those of the signature-then-encryption based on RSA, and with a similar communication overhead of Zheng's scheme. The proposed scheme can be also easily modified to the direct signature verification scheme by the recipient without using the recipient's private key. Additionally, we suggest a new design protocol with server-supported signatures which solves the CRLs(Certificate Revocation Lists) burden and provides non-repudiation of origin. This protocol with server-supported signatures also can be applied to the original signcryption scheme proposed by Zheng in order to improve security.

OPF with Environmental Constraints with Multi Shunt Dynamic Controllers using Decomposed Parallel GA: Application to the Algerian Network

  • Mahdad, B.;Bouktir, T.;Srairi, K.
    • Journal of Electrical Engineering and Technology
    • /
    • v.4 no.1
    • /
    • pp.55-65
    • /
    • 2009
  • Due to the rapid increase of electricity demand, consideration of environmental constraints in optimal power flow (OPF) problems is increasingly important. In Algeria, up to 90% of electricity is produced by thermal generators (vapor, gas). In order to keep the emission of gaseous pollutants like sulfur dioxide (SO2) and Nitrogen (NO2) under the admissible ecological limits, many conventional and global optimization methods have been proposed to study the trade-off relation between fuel cost and emissions. This paper presents an efficient decomposed Parallel GA to solve the multi-objective environmental/economic dispatch problem. At the decomposed stage the length of the original chromosome is reduced successively and adapted to the topology of the new partition. Two subproblems are proposed: the first subproblem is related to the active power planning to minimize the total fuel cost, and the second subproblem is a reactive power planning design based in practical rules to make fine corrections to the voltage deviation and reactive power violation using a specified number of shunt dynamic compensators named Static Var Compensators (SVC). To validate the robustness of the proposed approach, the algorithm proposed was tested on the Algerian 59-bus network test and compared with conventional methods and with global optimization methods (GA, FGA, and ACO). The results show that the approach proposed can converge to the near solution and obtain a competitive solution at a critical situation and within a reasonable time.

Development of the High Reliable Safety PLC for the Nuclear Power Plants (고신뢰도 안전등급 제어기기 개발)

  • Son, Kwang-Seop;Kim, Dong-Hoon;Son, Choul-Woong
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.62 no.1
    • /
    • pp.109-119
    • /
    • 2013
  • This paper presents the design of the Safety Programmable Logic Controller (SPLC) used in the Nuclear Power Plants, an analysis of a reliability for the SPLC using a markov model. The architecture of the SPLC is designed to have the multiple modular redundancy composed of the Dual Modular Redundancy(DMR) and the Triple Modular Redundancy(TMR). The operating system of the SPLC is designed to have the non-preemptive state based scheduler and the supervisory task managing the sequential scheduling, timing of tasks, diagnostic and security. The data communication of the SPLC is designed to have the deterministic state based protocol, and is designed to satisfy the effective transmission capacity of 20Mbps. Using Markov model, the reliability of SPLC is analyzed, and assessed. To have the reasonable reliability such as the mean time to failure (MTTF) more than 10,000 hours, the failure rate of each SPLC module should be less than $2{\times}10^{-5}$/hour. When the fault coverage factor (FCF) is increased by 0.1, the MTTF is improved by about 4 months, thus to enhance the MTTF effectively, it is needed that the diagnostic ability of each SPLC module should be strengthened. Also as the result of comparison the SPLC and the existing safety grade PLCs, the reliability and MTTF of SPLC is up to 1.6-times and up to 22,000 hours better than the existing PLCs.

Design of robust Watermarking Algorithm against the Geometric Transformation for Medical Image Security (의료 영상보안을 위한 기하학적 변형에 견고한 워터마킹 알고리즘 설계)

  • Lee, Yun-Bae;Oh, Guan-Tack
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.12
    • /
    • pp.2586-2594
    • /
    • 2009
  • A digital watermarking technique used as a protection and certifying mechanism of copyrighted creations including music, still images, and videos in terms of finding any loss in data, reproduction and pursuit. This study suggests using a selected geometric invariant point through the whole processing procedure of an image and inserting and extracting based on the invariant point so that it will be robust in a geometric transformation attack. The introduced algorithm here is based on a watershed splitting method in order to make medical images strong against RST(Rotation Scale, Translation) transformation and other processing. It also helps to maintain the watermark in images that are compressed and stored for a period of time. This algorithm also proved that is has robustness against not only JPEG compression attack, but also RST attack and filtering attack.

A design on Light-Weight Key Exchange and Mutual Authentication Routing Protocol in Sensor Network Environments (센서네트워크 환경에서 경량화된 키 교환 및 상호인증 라우팅 프로토콜)

  • Lee, Kwang-Hyoung;Lee, Jae-Seung;Min, So-Yeon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.11
    • /
    • pp.7541-7548
    • /
    • 2015
  • Wireless Sensor Networks is the technology which is used in explore role for military purposes, as well as various fields such as industrial equipment management, process management, and leverage available technologies by distributing node into various areas. but there are some limitations about energy, processing power, and memory storage capacity in wireless sensor networks environment, because of tiny hardware, so various routing protocols are proposed to overcome it. however existing routing protocols are very vulnerable in the intercommunication, because they focus on energy efficiency, and they can't use existing encryption for it, Because of sensor's limitations such like processing power and memory. Therefore, this paper propose mutual authentication scheme that prevent various security threats by using mutual authentication techniques and, Key generation and updating system as taking into account energy efficiency.

Implementation of Remote Control System using TeleRemote System (TeleRemote를 이용한 원격 제어 시스템 구현)

  • 김상복;한성호;진현준;박노경
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.12B
    • /
    • pp.1115-1123
    • /
    • 2003
  • In this paper, a remote control system called TeleRemote system which can be applied to existing wireless mobile networks or public telephone networks for remote control is designed and implemented. The proposed design employs program technology based on the theory of signal detect control and enables the EPG(Electronic Program Guide) functions such as recording reservation of bidirectional video signals with TV reception card on PC. It can also control recording reservation using remote control program through telecommunication network The PC-EPG system is implemented in Web programs with Server/Clinet architecture and the server system that provides EPG functionalities is in charge of recording reservations and data communications by means of the scheduler program. Data storing to client PCs is performed through TCP/IP and finished by client programs implemented using Visual C++/MFC programs. As remote control system, the developed system can be used for unmanned security system using the Web camera. Building intranet and making connection to internet, the TeleRemote system is believed to create potential for commercial communication system.

Design and Fabrication of an Implantable Microphone for Reduction of Skin Damping Effect through FEA Simulation (피부에 의한 이득 감쇠를 줄이기 위한 FEA 시뮬레이션 기반의 이식형 마이크로폰 설계 및 구현)

  • Han, Ji-Hun;Kim, Min-Woo;Kim, Dong-Wook;Seong, Ki-Woong;Cho, Sung-Mok;Park, Il-Yong;Cho, Jin-Ho
    • Journal of Biomedical Engineering Research
    • /
    • v.29 no.1
    • /
    • pp.59-65
    • /
    • 2008
  • Nowadays, implantable hearing aids have been developed to solve the problems of conventional hearing aids. In case of fully implantable hearing aids, an implantable microphone is necessary to receive sound signal beneath the skin. Normally, an implantable microphone has poor frequency response characteristics in high frequency bands of acoustic signal due to the high frequency attenuation effect of skin after implantation to human body. In this paper, the implantable microphone is designed to reduce the high frequency attenuation effect of a skin by putting its resonance frequency at the attenuated range through a finite element analysis (FEA) simulation. The designed implantable microphone through the simulated results has been fabricated by manufacturing process using bio-compatible materials. By the several in-vitro experiments with pig skin, it has been verified that the designed implantable microphone has a resonance frequency around the starting part of the attenuated range and reduces the attenuation effect.

A Study on the Survival Kit Development Preparing the Civil Defense Situation (민방위 사태에 대비한 비상생활지원 키트 개발 연구)

  • Kim, Tae-Hwan;Park, Namhee;Yeo, Wookhyun
    • Journal of the Society of Disaster Information
    • /
    • v.8 no.4
    • /
    • pp.376-383
    • /
    • 2012
  • The The purpose of this study is to develop survival kit prepared at the outbreak of the civil defense situation and to explore ways to ensure the safety and well-being of the people. Consider the civil defense shelters in a short two hours, from six days to live long, emergency life support food and other items needed for the basic right to life of the facility users. Minimum survival kit per capita personal weight 4.85kg, state and local governments (the government) is 2.65kg. They consists of a total of 26 items in eight categories such as food, clothing, CBR supplies, cold winter supplies, personal hygiene supplies, medicines, tools, communication supplies.

A Design for Medical Information System of Emergency Situation Prediction using Body Signal (생체신호를 이용한 응급상황 예측 의료정보 시스템의 설계)

  • Park, Sun;Kim, Chul Won
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.3 no.4
    • /
    • pp.28-34
    • /
    • 2010
  • In this paper, we proposes a emergency medical information system for predicting emergency situation by using the body's vital signs. Main research of existing emergency system has focused on body sensor networks. The problem of these studies have a delay of the emergency first aid since occurring of an emergency situation send a message of emergency situation to user. In the serious situation, patients of these problem can lead to death. To solve this problem, it need to the prediction of emergency situation for doing quickly the First Aid with identify signs of a pre-emergency situations until an emergency occurs. In this paper, the sensor network technology, the security technology, the internet information retrieval techniques, data mining technology, and medical information are studied for the convergence of medical information systems of the prediction of emergency situations.

  • PDF