• Title/Summary/Keyword: Secure Switch

Search Result 28, Processing Time 0.031 seconds

A Secure Switch Migration for SDN with Role-based IBC

  • Lam, JunHuy;Lee, Sang-Gon;Andrianto, Vincentius Christian
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.9
    • /
    • pp.49-55
    • /
    • 2017
  • Despite the Openflow's switch migration occurs after the channel was established in secure manner (optional), the current cryptography protocol cannot prevent the insider attack as the attacker possesses a valid public/private key pair. There are methods such as the certificate revocation list (CRL) or the online certificate status protocol (OCSP) that tries to revoke the compromised certificate. However, these methods require a management system or server that introduce additional overhead for the communication. Furthermore, these methods are not able to mitigate power abuse of an insider. In this paper, we propose a role-based identity-based cryptography (RB-IBC) that integrate the identity of the node along with its role so the nodes within the network can easily mitigate any role abuse of the nodes. Besides that, by combining with IBC, it will eliminate the need of exchanging certificates and hence improve the performance in a secure channel.

Small-Sized High-Power PIN Diode Switch with Defected Ground Structure for Wireless Broadband Internet

  • Kim, Dong-Wook
    • ETRI Journal
    • /
    • v.28 no.1
    • /
    • pp.84-86
    • /
    • 2006
  • This letter presents a small-sized, high-power single-pole double-throw (SPDT) switch with defected ground structure (DGS) for wireless broadband Internet application. To reduce the circuit size by using a slow-wave characteristic, the DGS is used for the quarter-wave (${\lambda}$/4) transmission line of the switch. To secure a high degree of isolation, the switch with DGS is composed of shunt-connected PIN diodes. It shows an insertion loss of 0.8 dB, an isolation of 50 dB or more, and power capability of at least 50 W at 2.3 GHz. The switch shows very similar performance to the conventional shunt-type switch, but the circuit size is reduced by about 50% simply with the use of DGS patterns.

  • PDF

Design of Small-Size High-Power SPDT PIN Diode Switch with Defected Ground Structure for Wireless Broadband Internet Application (결함접지구조(Defected Ground Structure)를 갖는 휴대 인터넷용 소형 고전력 SPDT PIN 다이오드 스위치 설계)

  • Kim Dong-Wook
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.16 no.10 s.101
    • /
    • pp.1003-1009
    • /
    • 2005
  • In this paper, small-size high-power single pole double throw(SPDT) switch with defected pound structure(DGS) is presented for wireless broadband internet application. To reduce the circuit size using slow-wave characteristic, the DGS is applied to ${\lambda}/4$ transmission line of the switch and the measured results are compared with them of conventional switch. To secure high degree of isolation, the switch with the DGS is composed of shunt-connected PIN diodes and shows insertion loss of 0.8 dB and isolation more than 50 dB at 2.3 GHz. The size of the switch is reduced about $50\%$ only with the DGS patterns while it has very similar performance to the conventional shunt-type switch.

The Study of SNS Users' Switching Behavior: In the Perspective of SNS Fatigue and Migration Theory (SNS 사용자 이동 영향요인 연구: SNS 피로감과 이주이론을 중심으로)

  • Chang, Eun Jin;Kim, Jeoung Kun
    • The Journal of Information Systems
    • /
    • v.30 no.4
    • /
    • pp.43-69
    • /
    • 2021
  • Purpose Although companies occupied the network market take the advantageous position first and can be successful in securing users over a certain size, it is important to satisfy the customers' demand and prevent the outflow of users toward a new alternative SNS. What is more, there are frequent changes in the flow of users toward new SNSs. Despite these dynamic market circumstances, there is a lack of research to explain the switching behaviors of SNS users. Design/methodology/approach The objective of this study is to explain and verify a specified migration theory(Push-Pull-Mooring model) focused on SNS fatigue in the psychological point of view, as well as reviewing previous studies on functional and technical characteristics of SNSs themselves. Moreover, this study tried to highlight factors affecting users actual SNS switch rather than their switching intention. Findings According to the statistical analysis, the most influenced pull factor to switch SNS was the alternative attractiveness. On the other hand, undesired relationship burden, service innovation and important mooring factors to prevent users' SNS switch. This study has a significant contribution to the theory, which analyzed users' actual SNS switch, and examined SNS users' psychological factors(SNS fatigue), reviewing the characteristics of existing services. To secure more users and to keep them, companies providing social network service need to develop differentiated strategies by analyzing psychological characteristics of various users.

The development of a ship's network monitoring system using SNMP based on standard IEC 61162-460

  • Wu, Zu-Xin;Rind, Sobia;Yu, Yung-Ho;Cho, Seok-Je
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.40 no.10
    • /
    • pp.906-915
    • /
    • 2016
  • In this study, a network monitoring system, including a secure 460-Network and a 460-Gateway, is designed and developed according with the requirements of the IEC (International Electro-Technical Commission) 61162-460 network standard for the safety and security of networks on board ships. At present, internal or external unauthorized access to or malicious attack on a ship's on board systems are possible threats to the safe operation of a ship's network. To secure the ship's network, a 460-Network was designed and implemented by using a 460-Switch, 460-Nodes, and a 460-Gateway that contains firewalls and a DMZ (Demilitarized Zone) with various application servers. In addition, a 460-firewall was used to block all traffic from unauthorized networks. 460-NMS (Network Monitoring System) is a network-monitoring software application that was developed by using an simple network management protocol (SNMP) SharpNet library with the .Net 4.5 framework and a backhand SQLite database management system, which is used to manage network information. 460-NMS receives network information from a 460-Switch by utilizing SNMP, SNMP Trap, and Syslog. 460-NMS monitors the 460-Network load, traffic flow, current network status, network failure, and unknown devices connected to the network. It notifies the network administrator via alarms, notifications, or warnings in case any network problem occurs. Once developed, 460-NMS was tested both in a laboratory environment and for a real ship network that had been installed by the manufacturer and was confirmed to comply with the IEC 61162-460 requirements. Network safety and security issues onboard ships could be solved by designing a secure 460-Network along with a 460-Gateway and by constantly monitoring the 460-Network according to the requirements of the IEC 61162-460 network standard.

A New Evaluation Methodology of Service Restoration Capability in Distribution Systems (배전계통 복구능력 평가방안 및 응용)

  • Im, Seong-Il;Jin, Bo-Geon;Lee, Seung-Jae
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.51 no.7
    • /
    • pp.333-340
    • /
    • 2002
  • To secure a service continuity is one of the most important mission in the ower distribution system operation. In this paper the necessary and sufficient condition to guarantee 100% service restoration capability for any fault on the system is reported. An evaluation methodology of the restoration capability(or restorability) is developed based on the developed restoration conditions. Applications of the developed concept to the system operation in the normal and emergency states, that would enhance the supply reliability of the system are described. They include enhancement of restoration capability adapting to load change, identification of best open switch and supervised switch positions.

Study on Optimal Design of Traverse Switch System for Maglev Train (자기부상열차용 트레버스 분기기 최적설계 연구)

  • Lee, Younghak;Kim, Chang-Hyun;Lee, Jong-Min
    • Journal of the Korean Society for Railway
    • /
    • v.19 no.6
    • /
    • pp.717-726
    • /
    • 2016
  • Emergency tracks are necessary in case a broken down train evacuates, a train needs to make way for a faster train behind it, or a train suddenly stops and following trains must avoid colliding with it. Magnetic Levitated (maglev) Trains can change track to enter an emergency track using a segmented switch or a traverse switch. On a traverse switch, a train can change its track when the part of the track that the train is on moves to the other track. Currently manufactured Maglev trains have two bodies and the total length is 25 meters. If a traverse switch is used, it will only require 30 meters of track to move the train to the other track, so, when it comes to efficiency of costs and space, the traverse switch surpasses the articulated switch. Therefore, in this paper, an optimized design to secure structural safety and weight lightening is suggested. To achieve these results, the heights of the piled concrete and girders which are both placed on the top of the traverse switch, are set as design variables. The Finite Element Method (FEM), in application of kriging and in the design of the experiments (DOE), is used. Maximum stress, deformation, and structural weight are compared with the results, and through this process structural safety and weight lightening is proven.

Development of Library and Application Software for a Fast DIO System (고속 DIO시스템을 위한 라이브러리 소프트웨어 및 응용프로그램 개발)

  • Cho, Gyu-Sang;Lee, Jong-Woon
    • Proceedings of the KIEE Conference
    • /
    • 2005.07d
    • /
    • pp.3034-3036
    • /
    • 2005
  • High speed PC-based digital I/O system, PCI-bus master and slave. set is developed, which features are distributed structure, input/output function interchangeability by switch settings, and high speed(20Mbps). Library and application software for a DIO system that have a secure and a convenient functionality are developed.

  • PDF

A Countermeasure against the Abatement Attack to the Security Server (중간자공격을 이용한 보안서버 무효화공격에 대한 대응법)

  • Cho, Seong-Min;Lee, Hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.1
    • /
    • pp.94-102
    • /
    • 2016
  • In this work we propose a new method to countermeasure against the abatement attack to the security server that is induced by man-in-the-middle attack. To that purpose, we first investigate the state of the art in the current research about the abatement attack. After that, we propose a new countermeasure method that can cope with the unresolved problems in the current method, which can cover diverse types of network.

A Study on Automatic Switch Control System for Systematic Control and History Management of Underground Utility Tunnel Work (지하공동구의 체계적인 통제 및 이력관리를 위한 자동개폐시스템에 대한 연구)

  • Oh, Am-suk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.6
    • /
    • pp.1443-1448
    • /
    • 2015
  • Most of access control systems for underground utility tunnel work through wired network between central system and the automatic switch control unit. However, there are several issues regarding the absence of network infrastructure and an outdoor reader in a relatively unique environment. To solve these issues we propose an authenticated key based smart phone control system for secure access to the underground utility tunnel and this scheme is anticipated providing us with crucial information about a systemic entrance history and effective management procedures of utility tunnel. In addition, the proposed scheme enables to access to secured control system in smart phone based bluetooth network and it provides information about systemic control and history management for the switch controls through smart phone applications.