• Title/Summary/Keyword: Security solution

Search Result 1,000, Processing Time 0.04 seconds

The effects of SCOPF solution to Transient Stability on Voltage Limited Power System (전압안정도로 제약된 계통에서 최적조류계산해가 과도안정도에 미치는 영향)

  • Lee, Geun-Joon;Kim, Bal-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2001.05a
    • /
    • pp.245-247
    • /
    • 2001
  • This paper presents a series of simulation results of transient stability on SCOPF operated power system whose transmission capabilities are limited by voltage stability. Three steps of voltage security guidelines, 5[%], 7[%], 10[%] are introduced to increase power transfer from generation centers to load center and observed the effects of voltage guidelines to transient stability for three kinds of load level(peak, medium, off-peak). As a result, dynamic characteristics weren't affected by the voltage security limits in model system, but became worse for the off-peak level than peak case, and sustain oscillations are observed for the all load level. This gives us some intitutions for the development and applications of security limits to use SCOPF program in open electric market.

  • PDF

An Augmented WiMAX MMR Protocol for Establishing Secure Broadband Maritime Data Networks (안전한 광대역 해상정보통신망 구축을 위한 WiMAX MMR 확장 프로토콜)

  • Lee, Su-Hwan;Son, Joo-Young
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.34 no.8
    • /
    • pp.1145-1152
    • /
    • 2010
  • Currently economical communication technologies are needed for high speed data exchange at sea. Wireless environments at sea require some special communication security solutions as well. In this paper, an augmented WiMAX MMR protocol is proposed as a solution of the broadband data communications and security at sea environments fundamentally with no base station.

Power System Security Assessment Using The Neural Networks (신경회로망을 이용한 전력계통 안전성 평가 연구)

  • Lee, Kwang-Ho;Hwang, Seuk-Young
    • Proceedings of the KIEE Conference
    • /
    • 1997.07c
    • /
    • pp.1130-1132
    • /
    • 1997
  • This paper proposed an application of artificial neural networks to security assessment(SA) in power system. The SA is a important factor in power system operation, but conventional techniques have not achieved the desired speed and accuracy. Since the SA problem involves classification, pattern recognition, prediction, and fast solution, it is well suited for Kohonen neural network application. Self organizing feature map(SOFM) algorithm in this paper provides two dimensional multi maps. The evaluation of this map reveals the significant security features in power system. Multi maps of multi prototype states are proposed for enhancing the versatility of SOFM neural network to various operating state.

  • PDF

Blockchain-based Secure Software-Defined Networking (블록체인 기반의 안전한 소프트웨어 정의 네트워킹)

  • Woo, Seungwon;Shin, Seungwon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.148-151
    • /
    • 2018
  • Software-Defined Networking, called SDN is a next-generation network technology that allows a centralized SDN controller to manage multiple switches and easily apply any network requirements, unlike traditional network devices. However, as the research on SDN has progressed rapidly in recent years, the security of SDN is also considered to be important. Therefore, in this paper, we investigate the major security problems in SDN and introduce a methodology to apply blockchain technology to SDN as a solution to solve them.

  • PDF

Soft Systems are Ubiquitous-Defenses are Rare: A Case for Contingent Outsourcing of Patch Management

  • Arnett Kirk P.
    • The Journal of Information Systems
    • /
    • v.14 no.3
    • /
    • pp.23-30
    • /
    • 2005
  • Computer attacks on vulnerable software are ubiquitous. Today's attacks on client PCs can be used to create armies of zombie computers that are capable of wide reach attacks on high profile businesses and governments. The simple act of patching software vulnerabilities will certainly mitigate this problem, but patching has its own set of problems. Further, it is frequently the case that patches which are available to mitigate vulnerabilities are not being made on a timely basis and sometimes are not being made at all. One solution to the patch management dilemma is outsourcing. This paper notes that outsourcing is not a carte blanche decision that can be made based on dollars, but rather that a contingency decision matrix can provide guidance on outsourcing solutions for patch management and other security components as well. The matrix recognizes that IS staff expertise and employee security awareness are two important factors in the outsourcing decision.

  • PDF

The Security Constrained Economic Dispatch with Line Flow Constraints using the Hybrid PSO Algorithm (Hybrid PSO를 이용한 안전도를 고려한 경제급전)

  • Jang, Se-Hwan;Kim, Jin-Ho;Park, Jong-Bae;Park, June-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.57 no.8
    • /
    • pp.1334-1341
    • /
    • 2008
  • This paper introduces an approach of Hybrid Particle Swarm Optimization(HPSO) for a security-constrained economic dispatch(SCED) with line flow constraints. To reduce a early convergence effect of PSO algorithm, we proposed HPSO algorithm considering a mutation characteristic of Genetic Algorithm(GA). In power system, for considering N-1 line contingency, we have chosen critical line contingency through a process of Screening and Selection based on PI(performance Index). To prove the ability of the proposed HPSO in solving nonlinear optimization problems, SCED problems with nonconvex solution spaces are considered and solved with three different approach(Conventional GA, PSO, HPSO). We have applied to IEEE 118 bus system for verifying a usefulness of the proposed algorithm.

Embedded Home Network System Security using VPN (VPN을 이용한 Embedded 홈 네트워크 시스템 보안)

  • Jin, Seon-Il;Jeong, Jin-Gyu;An, Gwang-Hyeok;Yu, Yeong-Dong;Hong, Seok-Gyo
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.701-704
    • /
    • 2003
  • The home network system of ubiquitous computing concept is changing present our home life as more comfortable and safe. Also, it permits that we can connect the home network system and control the appliance which is linked to the home network system without limitation in time and place. But, as other systems that use the public network like the Internet, remote control/monitoring of the home network system that use the Internet includes problems such as user's access which is not admitted and information changing. This paper presents the efficient solution about the security problem that is recognized to important problem of the home network system. Also this paper implements the security of the home network system based on the UPnP (Universal Plug and Play), adding VPN (Virtual Private Network) router that uses the IPsec to the home network system which is consisted of the ARM9 and the Embedded Linux.

  • PDF

Enhancing Privacy Protection in Steppy Applications through Pseudonymization

  • Nugroho, Heri Arum;Prihatmanto, Ary Setijadi;Rhee, Kyung Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.763-766
    • /
    • 2015
  • Smart Healthcare System as an Open Platform (Shesop) is an integrated healthcare system and have several features, one of them is Steppy Application. Steppy does count your step and display on Shesop website. In this system security issues are not properly addressed, while Personal Health Record (PHR) patient stored in the cloud platform could be at risk. In fact, the huge electronic information available online, people needs reliable and effective technique for privacy preserving. In order to improve the security of data which are displayed on the Shesop website, so that anyone who access could not tamper without permission. Recently Xu et al. showed a pseudonym scheme using smart card as a solution in e-health systems which uses discrete logarithm problem with cyclic group. In this paper, we adopt their scheme and use it application into smartphone using Near Field Communication (NFC) to construct security in Steppy apps.

Centralized Smart Government Architecture based on Trust Manager

  • Ahamad, Shaik Shakeel
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.565-569
    • /
    • 2021
  • The rapid growth and development of ICT (Information and Communication Technology) and internet services has boosted the adoption of Mobile Government services all around the globe. There is a huge increase in the adoption of government services during COVID-19 pandemic. Existing Mobile Government (MG) solutions are not trustworthy and secure. This paper provides secure and trustworthy solution for mobile government, proposes a centralized smart governance architecture which is based on trust manager. Our proposed work has Wireless Bridge Certifying Authority (WBCA) and Wireless Public Key Infrastructure (WPKI) thereby ensuring security and privacy. Our proposed work ensures trust with WBCA as WBCA acts as a Trust Manager (TM). Proposed protocol has less computational cost and energy cost

Real-Time Transcoding and Advanced Encryption for 360 CCTV Streaming

  • Le, Tuan Thanh;Jeong, JongBeom;Lee, Soonbin;Jang, Dongmin;Ryu, Il-Woong;Ryu, Eun-Seok
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2019.06a
    • /
    • pp.144-146
    • /
    • 2019
  • Recently, according to the rapid development of surveillance information, closed-circuit television (CCTV) has become an indispensable component in security systems. A lot of advanced technologies of encryption and compression are implementing to improve the performance and security levels of the CCTV system. Especially, 360 video CCTV streaming is promising for surveillance without blind areas. However, compared to previous systems, 360 CCTV requires large bandwidth and low latency. Therefore, it requires more efficiently effort to improve the CCTV system performance. In order to meet the demands of 360 CCTV streaming, transcoding is an essential process to enhance the current CCTV system. Moreover, encryption algorithm is also an important priority in security system. In this paper, we propose a real-time transcoding solution in combination with the ARIA and AES algorithms. Experimental results prove that the proposed method has achieved around 195% speed up transcoding compared to FFMPEG libx265 method. Furthermore, the proposed system can handle multiple transcoding sessions simultaneously at high performance for both live 360 CCTV system and existing CCTV system.

  • PDF