• Title/Summary/Keyword: 관제방안

Search Result 385, Processing Time 0.021 seconds

The proposal of a cryptographic method for the communication message security of GCS to support safe UAV operations (안정적인 UAV 운영을 위한 GCS의 통신메시지의 암호화 제안)

  • Kim, Byoung-Kug;Hong, Sung-Hwa;Kang, Jiheon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1353-1358
    • /
    • 2021
  • IoT (Internet of Things) emerges from various technologies such as communications, micro processors and embedded system and so on. The IoT has also been used to UAV (Unmanned Aerial Vehicle) system. In manned aircraft, a pilot and co-pilot should control FCS (Flight Control System) with FBW(Fly By Wire) system for flight operation. In contrast, the flight operation in UAV system is remotely and fully managed by GCS (Ground Control System) almost in real time. To make it possible the communication channel should be necessary between the UAV and the GCS. There are many protocols between two systems. Amongst them, MAVLink (Macro Air Vehicle Link) protocol is representatively used due to its open architecture. MAVLink does not define any securities itself, which results in high vulnerability from external attacks. This paper proposes the method to enhance data security in GCS network by applying cryptographic methods to the MAVLink messages in order to support safe UAV operations.

A Study on the Analysis and Detection Method for Protecting Malware Spreading via E-mail (전자우편을 이용한 악성코드 유포방법 분석 및 탐지에 관한 연구)

  • Yang, Kyeong-Cheol;Lee, Su-Yeon;Park, Won-Hyung;Park, Kwang-Cheol;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.93-101
    • /
    • 2009
  • This paper proposes the detection method of spreading mails which hacker injects malicious codes to steal the information. And I developed the 'Analysis model' which is decoding traffics when hacker's encoding them to steal the information. I researched 'Methodology of intrusion detection techniques' in the computer network monitoring. As a result of this simulation, I developed more efficient rules to detect the PCs which are infected malicious codes in the hacking mail. By proposing this security policy which can be applicable in the computer network environment including every government or company, I want to be helpful to minimize the damage by hacking mail with malicious codes.

A Study on the Overload Prevention Effect of Construction Waste Collection and Transportation Vehicles Using On-Board Truck Scale (자중계를 활용한 건설폐기물 수집·운반 차량의 과적 예방효과 연구)

  • Kim, Jong-Woo;Jung, Young-Woo
    • Journal of the Korean Recycled Construction Resources Institute
    • /
    • v.8 no.4
    • /
    • pp.444-449
    • /
    • 2020
  • In this study, On-Board Truck Scale was installed on the construction waste collection / transportation vehicles to monitor the weight of the waste at all stages from generation to final treatment. It was performed as a case study of a construction waste control technology that can efficiently manage the total generating and recycling amount using real-time weight/location information obtained by the On-Board Truck Scale device. As a result of the study, it was confirmed that the total amount of construction waste can be monitored in real time, and a plan for efficient logistics transportation can be derived through the analysis of operation patterns by managing the real-time transport volume, transport distance, and transport time of the construction waste collection / transportation vehicles. It was confirmed that overloading can be prevented in advance by controlling the loading also.

Design of Hybrid V2X Communication Platform for Evaluation of Commercial Vehicle Autonomous Driving and Platooning (상용차 자율 군집 주행 평가를 위한 하이브리드 V2X 통신 플랫폼 설계)

  • Jin, Seong-keun;Jung, Han-gyun;Kwak, Jae-min
    • Journal of Advanced Navigation Technology
    • /
    • v.24 no.6
    • /
    • pp.521-526
    • /
    • 2020
  • In this paper, we propose a design method and process for hybrid V2X communication platform that combines WAVE communication and LTE-V2X communication which are C-ITS communication protocols for vehicle environments and Legacy LTE communication which is a commercial mobile communication for evaluating the autonomous platooning platform of commercial vehicles. For a safe and efficient autonomous platooning platform, an low-latency communication function based on C-ITS communication is required, and to control it, commercial communication functions such as Legacy LTE, which can be connected at all times, are required. In order to evaluate such a system, the evaluation equipment must have the same level of communication performance or higher. The main design contents presented in this paper will be applied to the implementation of hybrid V2X terminals for functional evaluation.

A Study on Operational Improvements for Reducing Carbon Emissions from Aviation (항공 탄소 배출 감소를 위한 운영 개선 방안 연구)

  • Sung-Mi Kim;Eun-Mi Kim;Sang-Hoon Lim;Ho-Won Hwang
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.1
    • /
    • pp.119-125
    • /
    • 2023
  • It is necessary to reduce aviation GHG(CO2) emission to ensure aviation sustainable development. Operational improvements may not contribute significantly to carbon reduction but it can sustatially reduce emission in a short term. ICAO has developed GANP and ASBU to optimize operations and countries are making efforts to expand infrastructure and develop technology. The legal barriers to operational improvement are based on the notion of state sovereignty under the Chicago Convention which allows countries to control inefficiencies based on borders or limit or prohibit the passage of aircraft. Chicago Convention does not grant unlimited freedom of air sovereignty and if the concept of state sovereignty is interpreted according to the times it is possible to achieve smooth operational improvement.

The Efficient Extraction Strategy for ship displays in AIS Monitoring System (AIS 모니터링 시스템의 효율적 선박표시를 위한 데이터 추출 전략)

  • Kim, Byoung-Kug;Hong, Sung-Hwa;Lee, Jaeho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.588-590
    • /
    • 2022
  • Sharing both locations and positions of ships makes it possible to utilize critical item for their safe and efficient navigation in such diversifying meantime environments. AIS is the representative technology for the sharing solutions. The AIS is even used in airspace and ground stations, so that AIS could facilitate the ships' safety navigation and their prevention/rescue from endangers. Due to AIS's many advantages, IMO(International Maritime Organization) made adapting the AIS mandatory for international passenger ships and the ships that are over than 300 tons. AIS uses VHF band areas for transmitting information and the information can be propagated to several hundreds km in range. Due to the large range, AIS monitoring system can acquire huge number of ships, which makes system performance lower and busier. In this paper, we propose the strategy of AIS information extraction for efficient monitoring system. Thus, the monitoring system has higher processing performance and lower network usage. As well as, the proposal affects the monitoring system has more capacity to include other systems' targets, in result.

  • PDF

Modification of the V-PASS Storage Structure for Precise Analysis of Maritime Vessel Accident (해양사고 정밀분석을 위한 V-PASS 저장구조 개선 연구)

  • Byung-Gil Lee;Dong-Hol Kang;Ki-Hyun Jyung
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.05a
    • /
    • pp.98-99
    • /
    • 2023
  • In the maritime digital forensic part, it is very important and difficult process that analysis of data and information with vessel navigation system's binary log data for situation awareness of maritime accident. In recent years, analysis of vessel's navigation system's trajectory information is an essential element of maritime accident investigation. So, we made an experiment about corruption with various memory device in navigation system. The analysis of corruption test in seawater give us important information about the valid pulling time of sunken ship for acquirement useful trajectory information.

  • PDF

The Analysis of Efficient Disk Buffer Management Policies to Develop Undesignated Cultural Heritage Management and Real-time Theft Chase (실시간 비지정 문화재 관리 및 도난 추적 시스템 개발을 위한 효율적인 디스크 버퍼 관리 정책 분석)

  • Jun-Hyeong Choi;Sang-Ho Hwang;SeungMan Chun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.6
    • /
    • pp.1299-1306
    • /
    • 2023
  • In this paper, we present a system for undesignated cultural heritage management and real-time theft chase, which uses flash-based large-capacity storage. The proposed system is composed of 3 parts, such as a cultural management device, a flash-based server, and a monitoring service for managing cultural heritages and chasing thefts using IoT technologies. However flash-based storage needs methods to overcome the limited lifespan. Therefore, in this paper, we present a system, which uses the disk buffer in flash-based storage to overcome the disadvantage, and evaluate the system performance in various environments. In our experiments, LRU policy shows the number of direct writes in the flash-based storage by 10.7% on average compared with CLOCK and FCFS.

Development of Message Broker-Based Real-Time Control Method for Road Traffic Safety Facilities Equipment and Devices Integrated Management System

  • JeongHo Kho;Eum Han
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.1
    • /
    • pp.195-209
    • /
    • 2024
  • The current road traffic signal controller developed in the 1990s has limitations in flexibility and scalability due to power supply problems, various communication methods, and hierarchical black box structures for various equipment and devices installed to improve traffic safety for road users and autonomous cooperative driving. In this paper, we designed a road traffic safety facilities equipment and devices integrated management system that can cope with the rapidly changing future traffic environment by solving the using direct current(DC) and power supply problem through the power over ethernet(PoE) technology and centralized data-driven control through message broker technology. In addition, a data-driven real-time control method for road traffic safety facilities equipment and devices operating based on time series data was implemented and verified.

Restrictions and Solutions on the Operation of Coast Guard Aircraft in the Provisional Measures Zone between Republic of Korea and China (국제민간항공협약 및 항공안전법 적용 기준 차이에 따른 해양경찰 항공기의 한·중 잠정조치수역 비행시 제한사항 및 해결방안)

  • Ki Yeon Kim;Jang Ryong Lee
    • Journal of Advanced Navigation Technology
    • /
    • v.28 no.1
    • /
    • pp.37-43
    • /
    • 2024
  • National aircraft are subject to exceptions under the International Civil Aviation Convention. Each country must ensure the safety of civil aircraft through reasonable consideration (due regard). Accordingly, the Aviation Safety Act of Korea also includes an exception for national aircraft. However, Korea Coast Guard aircraft are legislated to be subject to the law on five provisions. As Korea Coast Guard aircraft operate under the application of these provisions of international and domestic laws, they will be required to control flight procedures from China's civil air traffic control when flying over provisional action zone, which is international waters in the West Sea. China's demand is a major limiting factor in protecting the safety of the people of Korea, which is the original mission of Korea Coast Guard aircraft, and through this study, countermeasures to solving these problems at the national level were suggested.