• Title/Summary/Keyword: 로봇 보안

Search Result 98, Processing Time 0.024 seconds

Implementation of Web Searching Robot for Detecting of Phishing and Pharming in Homepage (홈페이지에 삽입된 악성코드 및 피싱과 파밍 탐지를 위한 웹 로봇의 설계 및 구현)

  • Kim, Dae-Yu;Kim, Jung-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.11
    • /
    • pp.1993-1998
    • /
    • 2008
  • Web robot engine for searching web sever vulnerability and malicious code is proposed in this paper. The main web robot function is based on searching technology which is derived from analyses of private information threat. We implemented the detecting method for phishing, pharming and malicious code on homepage under vulnerable surroundings. We proposed a novel approachm which is independent of any specific phishing implementation. Our idea is to examine the anomalies in web pages.

Navigation Trajectory Control of Security Robots to Restrict Access to Potential Falling Accident Areas for the Elderly (노약자의 낙상가능지역 진입방지를 위한 보안로봇의 주행경로제어)

  • Jin, Taeseok
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.21 no.6
    • /
    • pp.497-502
    • /
    • 2015
  • One of the goals in the field of mobile robotics is the development of personal service robots for the elderly which behave in populated environments. In this paper, we describe a security robot system and ongoing research results that minimize the risk of the elderly and the infirm to access an area to enter restricted areas with high potential for falls, such as stairs, steps, and wet floors. The proposed robot system surveys a potential falling area with an equipped laser scanner sensor. When it detects walking in elderly or infirm patients who in restricted areas, the robot calculates the velocity vector, plans its own path to forestall the patient in order to prevent them from heading to the restricted area and starts to move along the estimated trajectory. The walking human is assumed to be a point-object and projected onto a scanning plane to form a geometrical constraint equation that provides position data of the human based on the kinematics of the mobile robot. While moving, the robot continues these processes in order to adapt to the changing situation. After arriving at an opposite position to the human's walking direction, the robot advises them to change course. The simulation and experimental results of estimating and tracking of the human in the wrong direction with the mobile robot are presented.

Stewart Platform-Based Master System for Tele-Operation of a Robot Arm (로봇 팔의 원격제어를 위한 스튜어트 플랫폼 기반의 조작장치)

  • Lee, Sang-Duck;Yu, Hong-Sun;Ahn, Kuk-Hyun;Song, Jae-Bok;Kim, Jong-Won;Ryu, Jae-Kwan
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.39 no.2
    • /
    • pp.137-142
    • /
    • 2015
  • Teleoperation of a robot arm working in hazardous environments has been studied in the field of defense and security. A master system is an essential part that plays an important role in the teleoperation. We developed a master system, which is an essential part in the teleoperation, so that it can operate the slave robot arm intuitively and has excellent mobility and portability compared to conventional master systems. The master system adopted a Stewart platform to minimize the size and weight, and the legs of the Stewart platform are composed of wires to improve the operation range of the system. The experimental validation of the developed master system is conducted with a commercial IMU, and the experimental results show that the proposed master system can perform reliable and dexterous teleoperation.

A Design of Mobile Robot based on Camera and Sound Source Localization for Intelligent Surveillance System (지능형 감시 시스템 구축을 위한 영상과 음원 추적 기반 임베디드 모바일로봇 개발)

  • Park, Jung-Hyun;Kim, Hyung-Bok;Oh, Jung-Suk;Sim, Kwee-Bo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.4
    • /
    • pp.532-537
    • /
    • 2009
  • The necessity of intelligent surveillance system is gradually considered seriously from the space where the security is important. In this paper, we embodied unmanned intelligent system by developing embedded mobile robot based on images and sounds tracking. For objects tracking, we used block-matching algorithm and for sound source tracking, we calculated time differences and magnitude dissimilarities of sound. And we demonstrated the superiority of intruder tracking algorithm through the embodiment of Pan-Tilt camera and sound source tracking module using system, Network camera and mobile robot using system and mobile robot using system. By linking security system, the suggested system can provide some interfacing functions for the security service of the public facilities as well as that of home.

Improved Security for Fuzzy Fingerprint Vault Using Secret Sharing over a Security Token and a Server (비밀분산 기법을 이용한 보안토큰 기반 지문 퍼지볼트의 보안성 향상 방법)

  • Choi, Han-Na;Lee, Sung-Ju;Moon, Dae-Sung;Choi, Woo-Yong;Chung, Yong-Wha;Pan, Sung-Bum
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.63-70
    • /
    • 2009
  • Recently, in the security token based authentication system, there is an increasing trend of using fingerprint for the token holder verification, instead of passwords. However, the security of the fingerprint data is particularly important as the possible compromise of the data will be permanent. In this paper, we propose an approach for secure fingerprint verification by distributing both the secret and the computation based on the fuzzy vault(a cryptographic construct which has been proposed for crypto-biometric systems). That is, a user fingerprint template which is applied to the fuzzy vault is divided into two parts, and each part is stored into a security token and a server, respectively. At distributing the fingerprint template, we consider both the security level and the verification accuracy. Then, the geometric hashing technique is applied to solve the fingerprint alignment problem, and this computation is also distributed over the combination of the security token and the server in the form of the challenge-response. Finally, the polynomial can be reconstructed from the accumulated real points from both the security token and the server. Based on the experimental results, we confirm that our proposed approach can perform the fuzzy vault-based fingerprint verification more securely on a combination of a security token and a server without significant degradation of the verification accuracy.

Proposal for Research Model of High-Function Patrol Robot using Integrated Sensor System (통합 센서 시스템을 이용한 고기능 순찰 로봇의 연구모델 제안)

  • Byeong-Cheon Yoo;Seung-Jung Shin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.3
    • /
    • pp.77-85
    • /
    • 2024
  • In this dissertation, a we designed and implemented a patrol robot that integrates a thermal imaging camera, speed dome camera, PTZ camera, radar, lidar sensor, and smartphone. This robot has the ability to monitor and respond efficiently even in complex environments, and is especially designed to demonstrate high performance even at night or in low visibility conditions. An orbital movement system was selected for the robot's mobility, and a smartphone-based control system was developed for real-time data processing and decision-making. The combination of various sensors allows the robot to comprehensively perceive the environment and quickly detect hazards. Thermal imaging cameras are used for night surveillance, speed domes and PTZ cameras are used for wide-area monitoring, and radar and LIDAR are used for obstacle detection and avoidance. The smartphone-based control system provides a user-friendly interface. The proposed robot system can be used in various fields such as security, surveillance, and disaster response. Future research should include improving the robot's autonomous patrol algorithm, developing a multi-robot collaboration system, and long-term testing in a real environment. This study is expected to contribute to the development of the field of intelligent surveillance robots.

A Disital Siver Care for the Health and Rehabilitation of the Elderly (노인 건강과 재활을 위한 디지털 실버케어)

  • Kang, Seungae
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.81-86
    • /
    • 2019
  • This study introduces trends on silver care implemented with the fourth industrial revolution technology, and discusses the use of digital technology for elderly health and rehabilitation by reviewing relevant literature to examine and present directions for future digital-based silver care commercialization. First, health smart home, which is a smart residential service available through digital technology or IT technology that supports independent living in your home, is available. Second, there are technical services using artificial intelligence(AI) and robots. Robots based on advanced intelligence can serve as an assistant for the health and rehabilitation of senior citizens by supporting services that enable the daily lives of senior, checking their health conditions, and high-quality medical care. For the commercialization of these silver care systems, information and services appropriate to the current situation, such as the physical ability and health status of the elderly, should be provided, and it would be desirable to gradually expand the use of essential technology to reflect the needs of the elderly in use so that the digital alienated.

A study on community care using AI technology (AI 기술을 활용한 커뮤니티케어에 관한 연구)

  • Seungae Kang
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.151-156
    • /
    • 2023
  • Currently, ICT is widely used in caring for the elderly living alone and preventing the disappearance of the elderly with dementia. Therefore, in this study, based on the government policy direction for the 4th industrial revolution, the use of AI technology-based care services, which are gradually increasing in community care, was sought to explore the current status and prospects for utilization and activation.AI speakers and caring robots, services that can be used for community care, help solve various problems experienced by the elderly, and are also used to relieve lack of conversation or loneliness by adding emotional functions. In order to activate community care using AI technology in the future: First, there is a need for continuous education to familiarize the elderly with AI devices and 'user experience (UX) design' for the elderly. Second, it is necessary to use human-centered technology that has a complementary relationship and enables emotional mutual relationships rather than using function-oriented technology. Third, it is necessary to solve ethical problems such as guaranteeing the user's right to self-determination and protecting privacy.

Attack Datasets for ROS Intrusion Detection Systems (ROS 침입 탐지 시스템을 위한 공격 데이터셋 구축)

  • Hyunghoon Kim;Seungmin Lee;Jaewoong Heo;Hyo Jin Jo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.681-691
    • /
    • 2024
  • In recent decades, research and development in the field of industrial robotics, such as an unmanned ground vehicle (UGV) and an unmanned aerial vehicle (UAV), has been significant progress. In these advancements, it is important to use middleware, which facilitates communication and data management between different applications, and various industrial communication middleware protocols have been released. The robot operating system (ROS) is the most widely adopted as the main platform for robot system development among the communication middleware protocols. However, the ROS is known to be vulnerable to various cyber attacks, such as eavesdropping on communications and injecting malicious messages, because it was initially designed without security considerations. In response, numerous studies have proposed countermeasures to ROS vulnerabilities. In particular, some work has been proposed on generating ROS datasets for intrusion detection systems (IDS), but there is a lack of research in this area. In this paper, in order to contribute to improving the performance of ROS IDSs, we propose a new type of attack scenario that can occur in the ROS and build ROS attack datasets collected from a real robot system and make it available as an open dataset.

A Moving Target Tracking Algorithmfor a Mobile Robot Based on a 2D Image of a Line Light (직선광선의 2D 영상을 이용한 이동로봇의 이동물체 추적 알고리즘)

  • Rim, Ho;Hahn, Hernsoo;Hong, Min-Cheol
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.37 no.4
    • /
    • pp.11-21
    • /
    • 2000
  • This paper proposes a new algorithm for a mobile robot that detects and tracks a moving target, keeping it in the view range of the robot. The sensor system consists of a camera and a line light source. The camera system is placed so that the line light projected into the ground from the light source forms its image along the horizontal center line of the CCD array of the camera. The deformation of the line image from the horizontal center line contains the information on existence of a moving object, its velocity, and position. Since the proposed algorithm reduces the region of the image to be searched, it reduces the computational complexity significantly comparing to the conventional image processing algorithms. The performance of the proposed algorithm has been tested by implementing on a mobile robot.

  • PDF