• Title/Summary/Keyword: conference key distribution system

Search Result 67, Processing Time 0.031 seconds

A Study on an Transmission Right Issuance Quantity Assessment Method by using Power Transfer Distribution Factor(PTDF) under FlowGate Right(FGR) (FlowGate Right(FGR) 도입 시 Power Transfer Distribution Factor(PTDF)를 이용한 송전권 계약용량 산정 방법 연구)

  • Baeck, Woong-Ki;Bang, Young-Sun;Chun, Yeong-Han;Kim, Jung-Hoon;Kwak, No-Hong;Lee, Baek-Seok
    • Proceedings of the KIEE Conference
    • /
    • 2005.07a
    • /
    • pp.861-863
    • /
    • 2005
  • LMP based congestion management method is suggested as an effective tool, because network congestion can be handled by energy price. It is now being widely used in the North American Electricity Markets. Among them, FGR(Flow-gate rights) is considered to be appropriate for our system, as power flow through the congested line is unidirectional and congestion occurs in the known place. In the CBP market, hedging through transmission right is not necessary even though location pricing system is adopted, because there are no risks in the energy price. Rut, transmission rights should be adopted in the advanced market. Key issue when implementing FGR is how to decide transmission right issuance quantify. This paper deals with a method to decide transmission right issuance quantity by using power. Transfer Distribution Factor(PTDF).

  • PDF

Symmetric Encryption Application to Cyber Security of KEPCO SCADA Network (SCADA 시스템 정보보안들 위한 대칭키 암호 적용)

  • Kang, Dong-Joo;Kim, Hak-Man
    • Proceedings of the KIEE Conference
    • /
    • 2007.11b
    • /
    • pp.291-293
    • /
    • 2007
  • SCADA (Supervisory Control and Data Acquisition) SCADA refers to the combination of telemetry and data acquisition [1]. SCADA system has been used for remote measurement and control on the critical infrastructures as well as modem industrial facilities. Electric Power system is a representative system using SCADA network for its communication. Integration between many networks and increasing threatens of terrorism have made the potential risk by cyber attacks real and bigger in power system. Recently, many researching efforts have been made on SCADA network for improving its security. In general aspect, there are already several ways to secure the system like encryption, firewall, authentication, etc. In this paper, we focus on symmetric encryption method and propose the proper key distribution method to reflect the unique characteristics of SCADA network communication.

  • PDF

A Study on the Fabricated Concrete Deck Bridges (상판 조립식 교량 구조 개발에 관한 연구)

  • Goo, Min-Se;Chung, Ran;Kim, Gung-Hwan;Shin, Dong-Gi
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 1992.04a
    • /
    • pp.137-142
    • /
    • 1992
  • The purpose of this study is to develop a new structural system for precast deck plate bridge. In order to investigate load distribution and composite effects by connecting diaphragms and precast deck plate to main girder with shear keys, computer analysis with F.E.M S/W package program ADINA was carried out. As results of analysis, the following could be concluded : -The distance between diaphragms with6m is suficient for crossing load distribution effects. -The composite effects by connection deck plate to main girder with shear key is reasonable. -The gap between deck plate and main girder under given load is negligible.

  • PDF

Development of Self-Checking characteristics Serial Data Distribution Module (자기검사특성을 갖는 시리얼데이터 분배모듈의 개발)

  • Shin, Duck-Ho;Lee, Jong-Woo;Kim, Jong-Ki;Lee, Key-Soe
    • Proceedings of the KIEE Conference
    • /
    • 2002.07d
    • /
    • pp.2240-2242
    • /
    • 2002
  • This paper show serial communication method in order to design how to interface between fault tolerant systems with redundancy. Problem has been in the method that fault tolerant system had switched of serial data with common switching device. This problem degrade reliability in itself and total system which is interfaced with that serial communication system. So Arbitration module of serial communication which is suggested in this paper can improve the reliability using voter algorithm which fault is detected passively.

  • PDF

A Study of Implementation for Home Networking Security System (홈 네트워크를 위한 보안 시스템 구현에 관한 연구)

  • Seol, Jeong-Hwan;Kim, In-Kyum;Lee, Ki-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.616-619
    • /
    • 2008
  • In this paper, we design and implement the authentication system for home network service and applied it to actual sensor nodes. We achieved authentication key, encryption and decryption applied RC5 encryption algorithm of SNEP. In addition, we used pair-wise key pre-distribution for prevention of authentication sniffing in wireless sensor network. The experiment environment consists of a base station receiving data and sensor nodes sending data. Each sensor nodes sends both the data and encrypted authentication key to the base station. As a simulation environment, we assumed some what-if scenarios of security menaces in home network service. And we slightly altered the TOS_Msg construction of TinyOS. The experiences had shown that the malfunction doesn't happen in communication among other groups. And we confirmed in tests that the system is secure when a sensor having malicious propose is added.

  • PDF

A Study of Trials on Material Integration Pool System for Logistics Rationalization - Basing on the Improvement a precedent about Logistics System of 'A' Enterprise - (물류혁신을 위한 자재통합공동물류 시행에 관한 연구(A사 물류시스템 개선사례를 중심으로))

  • Won, You-Jon;Kang, Kyung-Sik
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2006.11a
    • /
    • pp.373-383
    • /
    • 2006
  • Logistics is one of the most important factors to manage a stream of materials in economic environment. Establishing effective logistics system needs to consider some constraints which are fluctuation of materials volume, a long distance between makers and consumers, one way logistics and small quantity batch production. It is estimated that Unit Load System should be a powerful method to cope with those problems. It helps to realize the key issues which are Standardization and Logistics Pool System The Material Unification of Logistics System is able to participate in all kinds of industries including manufacturing, distribution and logistics. This system has some merits which are a long distance transportation cost down, product recovery, and treatment in the unbalance of demand and supply caused by unstable materials volume. Four strategies of Material Logistics Model are Packing Rationalization, Logistics Pool System, JIT System application and establishing effective infrastructure. The Material Unification Of Logistics System based on Unit Load System achieves efficiency of logistics and largely decreases moving cost.

  • PDF

User Authentication System using RSA Algorithm

  • Yang, Sung-Ki;Lee, Kwang-Ok;Lee, Dae-Young;Jeong, Yu-Jeong;Bae, Sang-Hyun
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.156-159
    • /
    • 2002
  • For the effective use of information in the information society, information should be protected and outflow of information by illegal users should be prevented. This study sets up user authentication policy, user authentication regulations and procedures for information protection and builds information protection key distribution center and encryption user Authentication system which can protect information from illegal users.

  • PDF

Recommended Practice on the Precautinary System and Installation to prevent electrical fire from reoccurring in underground tunnel (지하구조물내 전기재해 방지를 위한 설치지침 및 예방시스템 구축)

  • Kim, Se-Dong;Kim, Young-Jin;Kang, Jae-Mo
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2005.05a
    • /
    • pp.337-341
    • /
    • 2005
  • Most utiltity systems are subject to frequent changes, often due to increased loads and demand to up-grade quality of service provided. Urban renewal, expressway construction and suburban growth have also caused significant changes in urban utility distribution systems. Recently, it is required that a guideline for planning of a complete system, the reasonable design and construction methods for the efficient installation common utility tunnels must be estabilished. It prompts drastic measures to guard cities and their inhabitants against the horror of massive fires in the future. Preparedness holds the key to safety.

  • PDF

Contents Transmission System applied by Encryption Module (암호화 모듈을 적용한 콘텐츠 전송 시스템)

  • 박순홍;최승권;신승수;조용환
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.05a
    • /
    • pp.165-170
    • /
    • 2003
  • In this thesis, we suggest the contents transmission system applied by Encryption Module. It prevents illegal distribution and reproduction of contents and supplements the limitation of the exiting transmission systems during the transmission by providing the contents encoded by RSA encryption algorithm and XOR computation method through user-oriented browser. And at same time, it protects the copyright with typing the contents and user-oriented browser in one-to-one manner by way of using the browser to renew a encoding key as soon replay is completed.

  • PDF

Design Secure Key of Decryption Distribution System for DRM System (DRM 시스템을 위한 안전한 복호화 키 분배 시스템 설계)

  • Choo Yeoun-Soo;Lee Young-Gu;Jun Moon-Seog
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.157-159
    • /
    • 2005
  • PC 사용의 증가로 많은 아이템들이 디지털화 되어 사용되고 있다. 복제되어도 그 질이 떨어지지 않는다는 특성을 디지털 콘텐츠는 불법적으로 복제되어 사용 유포되고 있다. 이로 인해 많은 콘텐츠 제공자들은 지적 재산권의 피해를 보고 있어서 DRM 기술이 연구, 개발되고 있다. DRM 기술은 콘텐츠를 암호화하여 허가된 사용자들에게만 사용권을 주는 기술인데 이 기술을 적용하기 위해서 암호화 키의 분배가 필수적이다. 기존의 DRM 시스템은 PKI를 적용하여 키 분배를 하고 있는데 PKI를 적용하면 키 분배를 위해서 복잡한 사전 작업이 필요하고 처리시간도 만만치 않다. 본 논문에서는 모바일 폰을 이용한 복호화 키 분배 시스템을 설계한다.

  • PDF