• Title/Summary/Keyword: 공급망 보안

Search Result 87, Processing Time 0.031 seconds

A Study on Performance Evaluation and Security Methods of u-IT Electrical Safety Integrated Management System's Module (u-IT 전기안전통합관리시스템의 모듈별 성능평가와 보안방법 연구)

  • Park, Dae-Woo;Kim, Eung-Sik;Choi, Choung-Moon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.6
    • /
    • pp.1447-1452
    • /
    • 2010
  • Ubiquitous society to build basic infrastructure in the power supply and power equipment safety is important. u-City in order to prevent the disaster of u-IT Power Equipment Performance Module and the security for the safety of the u-City is necessary. In this paper, the power unit of u-IT module, temperature sensor, humidity sensor, equipped with sensors arranged throughout the fire, and home distribution boards, Home Network Wall-Pad, Blocker, MPNP black boxes, arc detection, arc safety equipment, outlet of the modular performance evaluation methods and security methods will be studied. u-IT power devices and sensors to analyze the information conveyed by proactive risk and ensure safety, access control, authentication, security safeguards, such as u-IT integrated management system for electrical safety and strengthen the security, safety and security with a u-City will contribute to the construction and operation.

A Study on Performance Evaluation and Security Measures of U-IT Electrical Safety Integrated Management System's Module (U-IT 전기안전통합관리시스템의 모듈별 성능평가와 보안방법 연구)

  • Park, Dea-Woo;Choi, Choung-Moon;Kim, Eung-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.307-310
    • /
    • 2010
  • Ubiquitous society to build basic infrastructure in the power supply and power equipment safety is important. U-City in order to prevent the disaster of U-IT Power Equipment Performance Module and the security for the safety of the U-City is necessary. In this paper, the power unit of U-IT module, temperature sensor, humidity sensor, equipped with sensors arranged throughout the fire, and home distribution boards, Home Network Wall-Pad, Blocker, MPNP black boxes, arc detection, arc safety equipment, outlet of the modular performance evaluation and security measures will be studied. U-IT power devices and sensors to analyze the information conveyed by proactive risk and ensure safety, access control, authentication, security safeguards, such as U-IT integrated management system for electrical safety and strengthen the security, safety and security with a U-City will contribute to the construction and operation.

  • PDF

Maritime Security Training: Evaluation of the Impact on Seafarers' Security Awareness and Security Performance (선박보안교육: 선원의 보안인식과 보안성과에 미치는 영향 평가)

  • D'agostini, Enrico;Jo, Sohyun
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.25 no.2
    • /
    • pp.201-211
    • /
    • 2019
  • Safety and security measures in the shipping industry play a pivotal role in ensuring efficient and reliable cargo and passengers operations at each stage of the supply chain. The ISPS Code was adopted into SOLAS convention to protect seafarers and vessels from security threats. Furthermore, according to the Manila amendments to STCW Convention in 2010, personnel employed on board are required to participate in security training. Effective seafarers' education and training programs are of major importance to guarantee satisfactory performance levels onboard to minimize security-related risks. The study's contribution focuses on empirically evaluating the relationship between personal level of awareness and security performance when seafarers undertake security training courses. Findings of this study suggest that (1) seafarers who undertake maritime security training have a higher awareness of ship security, (2) security training and security awareness have a positive influence on security performance, and (3) security awareness mediates the impact of security training and security performance. In conclusion, education and training programs are key tools in enhancing seafarers' security awareness and security performance which, from an industry viewpoint, can translate into major economic, operational and reputational benefits.

The Implementation of BPLC based AMR security Module (BPLC기반 전력산업용 보안H/W모듈 구현)

  • Baek, Jongmock;Kim, Chunghyo;Choi, Moonsuk
    • Proceedings of the KIPE Conference
    • /
    • 2011.07a
    • /
    • pp.390-391
    • /
    • 2011
  • 스마트 그리드환경에서 전기를 소비자에게 공급하는 스마트 Place영역에서 통신망은 국내에서 기술적인 여건상 전력선 통신기반의 인프라가 가장 빠르게 원격검침서비스에 활용되고 있다. 원격검침 시스템[1]은 댁내의 계량기와 전주상의 데이터 집속구간은 전력선 통신방식으로 구성되고 상위 서버와는 인터넷망으로 구성되어 있으며 통신 토폴로지 구성측면에서 전력선통신 모뎀, 데이터집속장치 그리고 중앙의 서버로 3Tier구성 체계를 가지고 있으므로 여기에 적합한 보안 아키텍처의 구성이 필요하다. 본 논문에서는 전력선 통신망 기반의 원격검침 시스템에 적합한 보안기술을 설계하고 구현 하였다.

  • PDF

Improved AMI Network Authentication Protocol to Secure on Replay Attack (재전송 공격에 안전한 개선된 AMI 네트워크 인증 프로토콜)

  • Hwang, Moon-Young;Kwak, Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.826-828
    • /
    • 2011
  • 스마트그리드는 에너지 고갈과 지구온난화 등의 환경문제를 해결하기 위한 방안으로 IT와 통신기술을 접목하여 에너지 활용의 효율성을 높이는 기술이다. 스마트그리드는 기존의 전력망에 비하여 소비자와 전력 공급자간 양방향 통신으로 이동하는 정보가 많은데 그 중에서도 스마트미터와 사업자의 정보수집 디바이스인 AMI Headend의 통신영역의 보안이 중요하다. 위와 같은 이유로 스마트미터와 AMI Headend의 통신영역의 보안에 대한 연구들이 많이 이루어지고 있지만 아직 미흡한 실정이다. 따라서 본 논문에서는 스마트그리드의 스마트미터와 AMI Headend 통신영역의 보안을 위한 인증 프로토콜을 제안한다.

Study on the Implementation of SBOM(Software Bill Of Materials) in Operational Nuclear Facilities (가동 중 원자력시설의 SBOM(Software Bill Of Materials)구현방안 연구)

  • Do-yeon Kim;Seong-su Yoon;Ieck-chae Euom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.229-244
    • /
    • 2024
  • Recently, supply chain attacks against nuclear facilities such as "Evil PLC" are increasing due to the application of digital technology in nuclear power plants such as the APR1400 reactor. Nuclear supply chain security requires a asset management system that can systematically manage a large number of providers due to the nature of the industry. However, due to the nature of the control system, there is a problem of inconsistent management of attribute information due to the long lifecycle of software assets. In addition, due to the availability of the operational technology, the introduction of automated configuration management is insufficient, and limitations such as input errors exist. This study proposes a systematic asset management system using SBOM(Software Bill Of Materials) and an improvement for input errors using natural language processing techniques.

A Study on SCM Improvement Plan using the Internet of Things (사물인터넷을 활용한 SCM 고도화 방안에 대한 연구)

  • Kim, MinJune;KIM, YoungKil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.553-554
    • /
    • 2018
  • Supply Chain Management (SCM) is the overall process (component procurement, production planning, delivery, inventory control, etc.). It is the process from the supplier to the consumer until the raw material becomes the finished product. Basically, traditional supply chain management is primarily aimed at cost reduction and efficiency. However, considering only cost reduction and efficiency, it is not easy apply the center of 4th industry to Smart Factory. In this study, I propose a form of supply chain management network. It can be satisfy the security by using block chain and automatic control of each element by adding the internet of things.

  • PDF

Key Management Framework based on Double Hash Chain for Secure Smart Grid Environments (안전한 스마트 그리드 환경을 위한 이중 해쉬 체인 기반 키 관리 프레임워크)

  • Lee, Young-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.9
    • /
    • pp.2063-2072
    • /
    • 2013
  • Smart Grid is the next-generation intelligent power grid that maximizes energy efficiency with the convergence of IT technologies and the existing power grid. It enables consumers to check power rates in real time for active power consumption. It also enables suppliers to measure their expected power generation load, which stabilizes the operation of the power system. However, there are high possibility that various kinds of security threats such as data exposure, data theft, and privacy invasion may occur in interactive communication with intelligent devices. Therefore, to establish a secure environment for responding to such security threat with the smart grid, the key management technique, which is the core of the development of a security mechanism, is required. Using a hash chain, this paper suggests a group key management mechanism that is efficiently applicable to the smart grid environment with its hierarchical structure, and analyzes the security and efficiency of the suggested group key management framework.

A Methodology for Integrating Security into the Automotive Development Process (자동차 개발 프로세스에서의 보안 내재화 방법론)

  • Jeong, Seungyeon;Kang, Sooyoung;Kim, Seungjoo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.9 no.12
    • /
    • pp.387-402
    • /
    • 2020
  • Conventional automotive development has mainly focused on ensuring correctness and safety and security has been relatively neglected. However, as the number of automotive hacking cases has increased due to the increased Internet connectivity of automobiles, international organizations such as the United Nations Economic Commission for Europe(UNECE) are preparing cybersecurity regulations to ensure security for automotive development. As with other IT products, automotive cybersecurity regulation also emphasize the concept of "Security by Design", which considers security from the beginning of development. In particular, since automotive development has a long lifecycle and complex supply chain, it is very difficult to change the architecture after development, and thus Security by Design is much more important than existing IT products. The problem, however, is that no specific methodology for Security by Design has been proposed on automotive development process. This paper, therefore, proposes a specific methodology for Security by Design on Automotive development. Through this methodology, automotive manufacturers can simultaneously consider aspects of functional safety, and security in automotive development process, and will also be able to respond to the upcoming certification of UNECE automotive cybersecurity regulations.

A Study on OTP-based AMI Authentication Scheme in SmartGrid Environment (스마트그리드환경에서 OTP기반의 AMI인증방식에 관한 연구)

  • Kim, Hong-Gi;Hong, Min;Lee, Im-Yeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.770-773
    • /
    • 2011
  • 스마트그리드는 기존의 전력망 환경에 정보통신 기술을 접목하여 발전소와 사용자가 실시간으로 정보를 교환하며, 사용 과금 및 전력공급의 효율성을 증대시키는 기술이다. 스마트그리드는 전력관리소인 MDMS(Meter Data Management System)와 각 가정에 연결되어있는 스마트미터와의 통신을 통해 전력데이터를 수집하게 되는데, 각 가정의 디바이스들은 전력사용량을 사용한 만큼 스마트미터에게 정보를 전송하여 스마트미터에서는 그 정보를 MDMS에게 전송하는 방식을 사용하고 있다. 이는 네트워크를 활용하여 전송하고 있기 때문에 기존의 보안위협 및 스마트그리드환경에서의 추가적인 보안위협이 예상된다. 따라서 본 논문에서는 각 가정에서 측정한 전력데이터 값을 안전하게 전송하기 위해 디바이스를 OTP를 기반으로 안전하게 인증하는 기술에 대하여 제안하였다.