• Title/Summary/Keyword: industrial control networks

Search Result 218, Processing Time 0.022 seconds

Smart Vehicle Security Vulnerability Analysis and Solution Support (스마트 자동차 네트워크의 보안취약점 분석 및 해결방안 마련)

  • Kim, Jin-Mook;Moon, Jeong-Kyung;Hwang, Deuk-Young
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.69-76
    • /
    • 2018
  • One of the most remarkable technologies in the era of the 4th industrial revolution is the interest in the field of smart cars. In the near future, it will not only be possible to move to a place where you want to ride a smart car, but smart cars, including artificial intelligence elements, can avoid sudden car accidents. However, as the field of smart automobiles develops, the risks are expected to increase. Therefore, based on the understanding of security vulnerabilities that may occur in smart car networks, we can apply safe information security technology using FIDO and attribute-based authorization delegation technique to provide smart car control technology that is safe and secure. I want to. In this paper, we show that the proposed method can solve security vulnerabilities by using secure smart car control technology. We will further study various proposals to solve security vulnerabilities in the field of smart car networks through future research.

  • PDF

Sensitivity Analysis of Expected Project Completion Time in a PERT Network with Discrete Distributions (이산형 활동시간 분포를 갖는 PERT 네트워크에서 평균사업완성시간과의 민감도 분석)

  • Cho, Jae-Gyeun;Park, Chul-Jae
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.12 no.1
    • /
    • pp.108-117
    • /
    • 2007
  • For a PERT network the sensitivity analyses are valuable tools for effective management and control of a project. In a previous article, a method was developed for the sensitivity analysis of the expected project completion time (${\mu}_{T}$) with respect to the expected duration of an activity (${\mu}_{i}$) under the assumption that the durations of activities are independent and normally distributed. In the present article, a method is presented for the sensitivity analysis of ${\mu}_{T}$ with respect to ${\mu}_{i}$ when the durations of activities are independent and follow discrete distributions, which utilizes the previous sensitivity analysis method with modifications. The accuracy of the proposed method is assessed using various example PERT networks, and the computational results indicate that the accuracy is comparable to that of direct Monte Carlo simulation.

  • PDF

Applications of Metabolic Modeling to Drive Bioprocess Development for the Production of Value-added Chemicals

  • Mahadevan, Radhakrishnan;Burgard, Anthony P.;Famili, Iman;Dien, Steve Van;Schilling, Christophe H.
    • Biotechnology and Bioprocess Engineering:BBE
    • /
    • v.10 no.5
    • /
    • pp.408-417
    • /
    • 2005
  • Increasing numbers of value added chemicals are being produced using microbial fermentation strategies. Computational modeling and simulation of microbial metabolism is rapidly becoming an enabling technology that is driving a new paradigm to accelerate the bioprocess development cycle. In particular, constraint-based modeling and the development of genome-scale models of industrial microbes are finding increasing utility across many phases of the bioprocess development workflow. Herein, we review and discuss the requirements and trends in the industrial application of this technology as we build toward integrated computational/experimental platforms for bioprocess engineering. Specifically we cover the following topics: (1) genome-scale models as genetically and biochemically consistent representations of metabolic networks; (2) the ability of these models to predict, assess, and interpret metabolic physiology and flux states of metabolism; (3) the model-guided integrative analysis of high throughput 'omics' data; (4) the reconciliation and analysis of on- and off-line fermentation data as well as flux tracing data; (5) model-aided strain design strategies and the integration of calculated biotransformation routes; and (6) control and optimization of the fermentation processes. Collectively, constraint-based modeling strategies are impacting the iterative characterization of metabolic flux states throughout the bioprocess development cycle, while also driving metabolic engineering strategies and fermentation optimization.

Security Issue in T-MAC Communication Protocol (T-MAC 통신 프로토콜에서 보안 이슈)

  • Hong, Jin-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.12
    • /
    • pp.4760-4765
    • /
    • 2010
  • Time out-medium access control (T-MAC) protocol is one of the well-known MAC protocols designed for wireless sensor networks (WSN), and is proposed to enhance the poor performance of the S-MAC protocol. In this paper, we are reviewed about security vulnerability in T-MAC, and analyzed the power which is consumed at each stage of T-MAC protocol according to vulnerability of denial of service (DoS) and replay problem. From our analytical results, it can be considered the need of power efficient authentication scheme which provides the reliability, efficiency, and security for a general T-MAC communication. This is the case study of possible DoS vulnerability and its power consumption in T-MAC.

A Study on Library Development of the Power Electronics Circuits Analysis using a PSPICE and MATLAB (PSPICE와 MATLAB을 이용한 전력전자회로 해석의 라이브러리 개발에 관한 연구)

  • Na, Seung-Kwon;Ku, Gi-Jun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.12
    • /
    • pp.4975-4983
    • /
    • 2010
  • In this paper, the ordinariest and strongest simulator that many used to power electronics circuits and many different control technology can apply to more easily understand modeling the element, PSPICE and MATLAB are adapted a micro IGBT, a macro IGBT, PWM generator and to library moeling of validity of the Induction motor is interpreted. Micro IGBT model of demagnetization quality proved for modeling accuracy to through experiment, macromodel IGBT were simulated which the applied to voltage type PWM inverter to the cyclo-converter and induction motor of demagnetization.

Implementation of Multiple Connectivity using CANopen in IEEE 1451.0-based Smart Sensor (IEEE 1451.0 기반 스마트 센서에서 CANopen을 이용한 다중 접속 기능의 구현)

  • Park, Jee-Hun;Lee, Suk;Song, Young-Hun;Lee, Kyung-Chang
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.28 no.4
    • /
    • pp.436-445
    • /
    • 2011
  • As automation systems become intelligent and autonomous for productibility, industrial networks (fieldbuses) and network-based devices are essential components of intelligent manufacturing systems. However, there are obstacles for the wide acceptance of the network-based devices such as smart sensor and network-based actuator. First, there exist numerous fieldbus protocols that a network-based device should be able to support. Second, the whole network-based device has to be replaced when only the sensor of the module fails. In order to overcome these obstacles, a smart sensor/actuator is implemented as two units; one responsible for network communication and the other for sensor/actuator operations using IEEE 1451.0 standard. This paper presents a structure of the 1451.0-based smart sensor with multiple connectivity function designed by CANopen.

Enhanced OLSR Routing Protocol Using Link-Break Prediction Mechanism for WSN

  • Jaggi, Sukhleen;Wasson, Er. Vikas
    • Industrial Engineering and Management Systems
    • /
    • v.15 no.3
    • /
    • pp.259-267
    • /
    • 2016
  • In Wireless Sensor Network, various routing protocols were employed by our Research and Development community to improve the energy efficiency of a network as well as to control the traffic by considering the terms, i.e. Packet delivery rate, the average end-to-end delay, network routing load, average throughput, and total energy consumption. While maintaining network connectivity for a long-term duration, it's necessary that routing protocol must perform in an efficient way. As we discussed Optimized Link State Routing protocol between all of them, we find out that this protocol performs well in the large and dense networks, but with the decrease in network size then scalability of the network decreases. Whenever a link breakage is encountered, OLSR is not able to periodically update its routing table which may create a redundancy problem. To resolve this issue in the OLSR problem of redundancy and predict link breakage, an enhanced protocol, i.e. S-OLSR (More Scalable OLSR) protocol has been proposed. At the end, a comparison among different existing protocols, i.e. DSR, AODV, OLSR with the proposed protocol, i.e. S-OLSR is drawn by using the NS-2 simulator.

An Optimal Routing for Point to Multipoint Connection Traffics in ATM Networks (일대다 연결 고려한 ATM 망에서의 최적 루팅)

  • Chung, Sung-Jin;Hong, Sung-Pil;Chung, Hoo-Sang;Kim, Ji-Ho
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.25 no.4
    • /
    • pp.500-509
    • /
    • 1999
  • In this paper, we consider an optimal routing problem when point-to-point and point-to-multipoint connection traffics are offered in an ATM network. We propose a mathematical model for cost-minimizing configuration of a logical network for a given ATM-based BISDN. Our model is essentially identical to the previous one proposed by Kim(Kim, 1996) which finds a virtual-path configuration where the relevant gains obtainable from the ATM technology such as the statistical multiplexing gain and the switching/control cost-saving gain are optimally traded-off. Unlike the Kim's model, however, ours explicitly considers the VP's QoS(Quality of Service) for more efficient utilization of bandwidth. The problem is a large-scale, nonlinear, and mixed-integer problem. The proposed algorithm is based on the local linearization of equivalent-capacity functions and the relaxation of link capacity constraints. As a result, the problem can be decomposed into moderate-sized shortest path problems, Steiner arborescence problems, and LPs. This fact renders our algorithm a lot faster than the previous nonlinear programming algorithm while the solution quality is maintained, hence application to large-scale network problems.

  • PDF

Method for Industrial Distributed Network Management using SDN Controller Deployment (SDN Controller 배포를 이용한 산업 분산형 네트워크 관리 기법)

  • Park, Do Gun;Jeong, Jongpil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.4
    • /
    • pp.13-19
    • /
    • 2019
  • SDN is one of the most actively researched topics to solve traffic problems in communication. SDN implements multiple networks in a single physical network by virtualizing network resources through an advanced API. Network Function Virtualized (NFV) distributes network functions from hardware using software instant, virtualization technology to VNF. These features make network management easier and improve performance by virtualizing IP, routers, and so on. In this paper, we propose a method to control the traffic and provide the distributed controller effect of SDN through SDN distribution in the virtualized industrial network. It is expected that SDN distribution will be able to manage traffic more efficiently when using the proposed scheme.

Quality of Service and Network Performance for the IMT-2000 Services (IMT-2000 에서의 서비스품질 및 네트워크 성능 체계)

  • Cho, Kee-Sung;Jang, Hee-Seon;Lim, Seog-Ku;Kim, Yeoung-Sun
    • IE interfaces
    • /
    • v.15 no.3
    • /
    • pp.256-262
    • /
    • 2002
  • In this paper, we develop a framework for identifying the quality of service(QoS) and network performance (NP) in the IMT-2000 services, and analyze the QoS/NP system in the 3GPP IMT-2000 services. Based on the ITU-T E.800, the QoS is classified into customer, technical, contents, telecommunications quality, and internet communication quality, and the NP consists of the service access/transmission, reliability/operating & maintenance, charging performance, and mobility management performance. Under the basic framework, the major parameters in the IMT-2000 services are identified for each QoS/NP criterion. The QoS framework in the IMT-2000 user aspects is also introduced to determine the major QoS parameters. Finally, to define the performance factors of the network elements in the NP system, the various control parameters for the wireless and core networks are presented.