• Title/Summary/Keyword: security design

Search Result 3,396, Processing Time 0.031 seconds

Study on the design of the passenger cars bumper rail to reduce the weight (자동차 범퍼 레일의 경량화 설계에 관한 연구)

  • 김이규;조규종
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2000.11a
    • /
    • pp.563-566
    • /
    • 2000
  • Recently vehicle development trend puts emphasis on cost reduction and performance improvement through weight reduction, and safety security to protect passenger and chassis against external impact. Primary factors effected on vehicle safety are chassis structure, chassis system, and safety equipment like bumper. Research in part of weight reduction is proceeding actively about prohibition of over-design and material through optimal design method. Bumper in these factors is demanded two of all factors, safety security and weight reduction. It is the part that prohibits or reduces a physical impact in low speed crash. Bumper is composed of a few parts but this study exhibits the shape of bumper rail has a role on energy absorption of safety security and weight reduction from structure analysis of bumper rail's variable shape surface.

  • PDF

Two-level Key Pool Design-based Random Key Pre-distribution in Wireless Sensor Networks

  • Mohaisen, Abedelaziz;Nyang, Dae-Hun;AbuHmed, Tamer
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.2 no.5
    • /
    • pp.222-238
    • /
    • 2008
  • In this paper, the random key pre-distribution scheme introduced in ACM CCS'02 by Eschenauer and Gligor is reexamined, and a generalized form of key establishment is introduced. As the communication overhead is one of the most critical constraints of any successful protocol design, we introduce an alternative scheme in which the connectivity is maintained at the same level as in the original work, while the communication overhead is reduced by about 40% of the original overhead, for various carefully chosen parameters. The main modification relies on the use of a two-level key pool design and two round assignment/key establishment phases. Further analysis demonstrates the efficiency of our modification.

Area-Optimized Multi-Standard AES-CCM Security Engine for IEEE 802.15.4 / 802.15.6

  • Choi, Injun;Kim, Ji-Hoon
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.16 no.3
    • /
    • pp.293-299
    • /
    • 2016
  • Recently, as IoT (Internet of Things) becomes more important, low cost implementation of sensor nodes also becomes critical issues for two well-known standards, IEEE 802.15.4 and IEEE 802.15.6 which stands for WPAN (Wireless Personal Area Network) and WBAN (Wireless Body Area Network), respectively. This paper presents the area-optimized AES-CCM (Advanced Encryption Standard - Counter with CBC-MAC) hardware security engine which can support both IEEE 802.15.4 and IEEE 802.15.6 standards. First, for the low cost design, we propose the 8-bit AES encryption core with the S-box that consists of fully combinational logic based on composite field arithmetic. We also exploit the toggle method to reduce the complexity of design further by reusing the AES core for performing two operation mode of AES-CCM. The implementation results show that the total gate count of proposed AES-CCM security engine can be reduced by up to 42.5% compared to the conventional design.

DESIGN OF A MODERN COMPUTER BRAND AS THE MAIN COMMUNICATION FACTOR IN THE WORLD CULTURAL SPACE

  • Zaitseva, Veronika;Bratus, Ivan;Sverdlyk, Zoriana;Gunka, Anna;Liezhniev, Olexandr
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.292-296
    • /
    • 2021
  • The purpose of this article is to explore the modern branding - its nature, history, originality, spirit and value to consumers. In particular, graphic design of the brand is an important component in terms of the modern European culture. The scientific novelty of the work implies the study of the contemporary design, which widely embraces the sphere of cultural and social life and can contribute to the development of progressive phenomena in society, as the design can literally be defined as a rethinking, a search for new meanings. The design itself is a versatile means of communication at the level of feelings and meanings. One of its main goals is the harmonization, and even formation of perception of the world, creation of new images or rethinking the essence of ordinary things. Hence, the research in the field of the design development is topical in the worldwide cultural space..

Analyses of Design for Software Security and Web Component (웹 컴포넌트 및 소프트웨어 보안 설계에 대한 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.591-594
    • /
    • 2008
  • This paper explores how to characterise security properties of software components, and how to reason about their suitability for a trustworthy compositional contract. Our framework provides an explicit opportunity for software composers as well as software components to test a priori security properties of software components in a system composition. The proposed framework uses logic programming as a tool to represent security properties of atomic components and reason about their compositional matching with other components.

  • PDF

Design of Management System for Secure EDI Subsystem (SEDI의 정보보호 서비스 모듈 관리 시스템 설계)

  • 강지원;권태경;송주석;강창구
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1996.11a
    • /
    • pp.238-247
    • /
    • 1996
  • 본 논문에서는 ITU-T X.800 권고안의 요구 기능을 중심으로 SEDI(Secure EDI) 시스템의 정보보호 서비스 모듈들을 관리하기 위한 시스템 구조를 설계하였다. 관리자인 ESM(EDI Security Management) 모듈과 관리 대행자인 SMA(Security Management Agent) 모듈을 새롭게 설계하였다. 특히, ESM과 SMA 간의 관리 정보의 교환때문에 전체적인 성능 저하가 발생하지 않도록 SMA에 필터링 기능을 제안하였다.

  • PDF

Design and Implementation of an End-To-End Security System On WAP (WAP에서의 종단간 보안 시스템 설계 및 구현)

  • 조영수;김명균
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2001.11a
    • /
    • pp.232-236
    • /
    • 2001
  • 본 논문에서는 WAP 포럼에서 제시하고 있는 무선 인터넷 솔루션인 WAP에서의 보안 메커니즘인 WTLS(Wireless Transport Layer Security), WIM (WAP Identity Module), WMLScript Crypto Library, WPKI(WAP Public Key Infrastructure)에 대해 살펴보고, WAP 게이트웨이를 사용하는 네트워크의 구조적 형태에서 발생되는 종단간 보안 서비스의 문제점에 대해 논의한 후 WAP 환경에서 종단간 보안 서비스를 제공할 수 있는 보안 시스템을 설계 및 구현하고자 한다.

  • PDF

Design of Security Primitive based on Hardware Architecture For RFID Tag (RFID 태그를 위한 하드웨어 구조에 기반한 보안 프리미티브 설계)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.817-819
    • /
    • 2011
  • Most of the sources of security and privacy issues in RFID technology arise from the violation of the air interface between a tag and its read. Most of the sources of security and privacy issues in RFID technology arise from the violation of the air interface between a tag and its reader. This paper will approach consideration of security analysis with cryptographic primitive based on hardware basis.

  • PDF

ANALYSIS OF THE SECURITY OF GENERIC HOMOMORPHIC AUTHENTICATED ENCRYPTION

  • Jinsu Kim
    • East Asian mathematical journal
    • /
    • v.39 no.3
    • /
    • pp.291-298
    • /
    • 2023
  • Recently, a new type of encryption called Homomorphic Authenticated Encryption (HAE) has been proposed. This combines the functionality of homomorphic encryption with authentication. Several concrete HAE schemes have been developed and security results for homomorphic authenticated encryption, designed by combining a homomorphic message authentication scheme with a homomorphic secret-key encryption, have been partially reported. In this paper, we analyze the security of a design method that combines homomorphic message authentication and homomorphic encryption, with a focus on the encryption after authentication (EAA) type. The results of our analysis show that while non-forgeability and indistinguishability are maintained, strong non-forgeability is not.

Design of Information Security in Ubiquitous City (u-City에서의 정보보안 설계 방안)

  • Yoon, Seuk-Kyu;Jang, Hee-Seon
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.37-42
    • /
    • 2011
  • In this paper, the design methodology of information security is analyzed to implement the ubiquitous city (u-City). The definition, concept, and main u-services of u-City are presented. The main components, functio ns and offering services of u-City management center are presented, and the laws and network security requirements related to protect the personal information in collecting, processing, and exchanging are also analyzed. Three step security levels of Router/Switch, Firewall/VPN, and IPS are applied where main functions of in terception of abnormal packets($1^{st}$ level), access control for each service($2^{nd}$ level), and real-time network monitoring($3^{rd}$ level) are performed. Finally, application cases are presented to validate the security of personal information in providing the u-City services.