• Title/Summary/Keyword: Vulnerability Identification

Search Result 66, Processing Time 0.025 seconds

Vulnerability assessment of strategic buildings based on ambient vibrations measurements

  • Mori, Federico;Spina, Daniele
    • Structural Monitoring and Maintenance
    • /
    • v.2 no.2
    • /
    • pp.115-132
    • /
    • 2015
  • This paper presents a new method for seismic vulnerability assessment of buildings with reference to their operational limit state. The importance of this kind of evaluation arises from the civil protection necessity that some buildings, considered strategic for seismic emergency management, should retain their functionality also after a destructive earthquake. The method is based on the identification of experimental modal parameters from ambient vibrations measurements. The knowledge of the experimental modes allows to perform a linear spectral analysis computing the maximum structural drifts of the building caused by an assigned earthquake. Operational condition is then evaluated by comparing the maximum building drifts with the reference value assigned by the Italian Technical Code for the operational limit state. The uncertainty about the actual building seismic frequencies, typically significantly lower than the ambient ones, is explicitly taken into account through a probabilistic approach that allows to define for the building the Operational Index together with the Operational Probability Curve. The method is validated with experimental seismic data from a permanently monitored public building: by comparing the probabilistic prediction and the building experimental drifts, resulting from three weak earthquakes, the reliability of the method is confirmed. Finally an application of the method to a strategic building in Italy is presented: all the procedure, from ambient vibrations measurement, to seismic input definition, up to the computation of the Operational Probability Curve is illustrated.

Fundamental aspects on the seismic vulnerability of ancient masonry towers and retrofitting techniques

  • Preciado, Adolfo;Bartoli, Gianni;Budelmann, Harald
    • Earthquakes and Structures
    • /
    • v.9 no.2
    • /
    • pp.339-352
    • /
    • 2015
  • Ancient masonry towers constitute a relevant part of the cultural heritage of humanity. Their earthquake protection is a topic of great concern among researchers due to the strong damage suffered by these brittle and massive structures through the history. The identification of the seismic behavior and failure of towers under seismic loading is complex. This strongly depends on many factors such as soil characteristics, geometry, mechanical properties of masonry and heavy mass, as well as the earthquake frequency content. A deep understanding of these aspects is the key for the correct seismic vulnerability evaluation of towers and to design the most suitable retrofitting measure. Recent tendencies on the seismic retrofitting of historical structures by means of prestressing are related to the use of smart materials. The most famous cases of application of prestressing in towers were discussed. Compared to horizontal prestressing, vertical post-tensioning is aimed at improving the seismic behavior of towers by reducing damage with the application of an overall distribution of compressive stresses at key locations.

Analyses of Light-weight Protocol for Tag Security in RFID System (RFID 시스템에서의 태그 보안을 위한 경량화 프로토콜의 분석)

  • Kim, Jung-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.11
    • /
    • pp.2399-2403
    • /
    • 2011
  • Radio Frequency Identification(RFID) has been considered as an key infrastructure for the ubiquitous society. However, due to the inherent drawbacks, RFID causes var- ious security threats like privacy problems, tag cloning, etc. This paper analyses the security risk analysis process from the perspective of the RFID tag life cycle, identify the tag usage process, identify the associated vulnerability and threat to the confidentiality, integrity and availability of the information assets and its implications for privacy, and the mitigate the risks.

Technique for Enhancing Security and Analyses of Vulnerability of RFID Tag security and Protocol (RFID 태그 보안과 프로토콜의 취약점 분석 및 보안성 향상을 위한 기법)

  • Kim, Jung-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.6
    • /
    • pp.1307-1312
    • /
    • 2011
  • Radio Frequency Identification(RFID) has been considered as an key infrastructure for the ubiquitous society. However, due to the inherent drawbacks, RFID causes var- ious security threats like privacy problems, tag cloning, etc. This paper proposes a novel practical approach, which are fully conformed to EPCglobal RFID Gen2 standard, for enhancing security of currently used RFID Gen2 tags against the various security threats.

Review of methodologies on network defects and vulnerability

  • Park, Won-Joo;Seo, Dong-Il;Kim, Dae-Young
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1590-1593
    • /
    • 2005
  • Security defects occurring within corporate networks and the Internet may be abused by internal or external malicious attackers. Such abuses cause a financial toll through expenditures on additional human resources, the impact of down-time as problems are fixed, as well as damage from divulging corporate informational assets. Hence, through the precise analysis of the possible defects in network security and the identification of risks, preventative policy should be established to ensure maximum security. This report reviews methodologies that calculate and analyze levels of network security in order to resolve these problems, and generates appropriate test steps, test methods, and test items.

  • PDF

Vulnerability on Step of Analysis in S/W Development (S/W 개발 분석 단계에서 취약점)

  • Shin, Seong-Yoon;Shin, Kwang-Seong;Lee, Hyun-Chang
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.01a
    • /
    • pp.81-82
    • /
    • 2015
  • 본 논문에서는 시스템의 어플리케이션 및 IT 인프라에 대한 모든 중요한 기술적 취약점 관리는 식별되어야한다는 것을 제시한다. 특히 개발 단계에서 실행 가능한 취약점 관리 방안이 도출되어야 한다. 그리고 취약점의 식별 및 분류에서 식별 및 인증, 암호화, 접근제어의 영역에서 정의되지 않은 취약점들은 기술적, 관리적, 운영적 관점에서 해당 영역(어플리케이션, IT 인프라) 별로 누락 없이 정의하도록 한다.

  • PDF

Analyses of Security, Privacy Issues and Challenges for RFID System

  • Kim, Jung-Tae
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.6
    • /
    • pp.701-705
    • /
    • 2011
  • RFID is a widely adopted in the field of identification technology these days. Radio Frequency IDentification (RFID) has wide applications in many areas including manufacturing, healthcare, and transportation. Because limited resource RFID tags are used, various risks could threaten their abilities to provide essential services to users. A number of RFID protocols have done by researcher in order to protect against some malicious attacks and threat. Existing RFID protocols are able to resolve a number of security and privacy issues, but still unable to overcome other security & privacy related issues. In this paper, we analyses security schemes and vulnerability in RFID application. Considering this RFID security issues, we survey the security threats and open problems related to issues by means of information security and privacy. Neither a symmetric nor an asymmetric cryptographic deployment is necessarily used with light weighted algorithm in the future.

RFID Mutual Autentication Protocol Using AES (AES를 이용한 RFID 상호인증 프로토콜)

  • Kim, Seok;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.9
    • /
    • pp.1963-1969
    • /
    • 2012
  • Recently use of RFID(Radio Frequency Identification) tends to be rapidly increased and will be also extended throughout the whole life. Using radio-frequency data can be recognized automatically in the RFID system is vulnerable to personal information protection or security. And passive tags have a hardware problem is the limit for applying cryptographic. This paper presents an authentication protocol using AES and Nounce. After completing mutual authentication server to access and strengthen security vulnerability to the use of the Nounce, because safety in denial of service attacks.

ID-based Sensor Node Authentication for Multi-Layer Sensor Networks

  • Sung, Soonhwa;Ryou, Jaecheol
    • Journal of Communications and Networks
    • /
    • v.16 no.4
    • /
    • pp.363-370
    • /
    • 2014
  • Despite several years of intense research, the security and cryptography in wireless sensor networks still have a number of ongoing problems. This paper describes how identification (ID)-based node authentication can be used to solve the key agreement problem in a three-layer interaction. The scheme uses a novel security mechanism that considers the characteristics, architecture, and vulnerability of the sensors, and provides an ID-based node authentication that does not require expensive certificates. The scheme describes the routing process using a simple ID suitable for low power and ID exposure, and proposes an ID-based node authentication. This method achieves low-cost communications with an efficient protocol. Results from this study demonstrates that it improves routing performance under different node densities, and reduces the computational cost of key encryption and decryption.

Identification of Vehicle Using Edge Detection (S/W 개발 보안의 필요성과 기대효과)

  • Shin, SY;Kim, DK;Lee, CW;Lee, HC;Lee, TW;Park, KH
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.741-742
    • /
    • 2016
  • Secure Coding is in the development phase, removing a potential security vulnerability that could lead to attacks such as hacking in advance, says the technique to develop secure software from external attacks. In this paper, we'll learn about the needs and expectations of the effectiveness of these security software development. Due to this, the threat to the safe software development project, and there is an effect to improve quality.

  • PDF