• Title/Summary/Keyword: 스마트 물류

Search Result 219, Processing Time 0.025 seconds

A Study on the Applicability of IoT for Container Terminal (컨테이너 터미널의 사물인터넷(IoT) 적용가능성에 관한 연구)

  • Jeon, Sang-Hyeon;Kang, Dal-Won;Min, Se-Hong;Kim, Si-Hyun
    • Journal of Korea Port Economic Association
    • /
    • v.36 no.2
    • /
    • pp.1-18
    • /
    • 2020
  • The Internet of things (IoT) has been applied to a variety of industrial uses such as public service sectors, medical industries, automotive industries, and so on. Led by smart cities, this is typical. However, from a logistics perspective, the level of application is insufficient. This study examines the applicability of IoT-related technology in a container terminal, an object of the present invention, to derive an applicable plan. Analytic network process (ANP) analysis reveals the following results for IoT applications in container terminals: operating systems (26.7%), safety/environmental/security systems (26.4%), equipment maintenance systems (25.3%), and facility maintenance systems (21.6 %). The second ANP analysis reveals the following results: Economy (40.2%), productivity (21.1%), service level (19.5%), and utilizing technology level (19.2%). The application or standard of evaluation is important when applying IoT technology to container terminals; however, it is not concentrated in a certain area. It is desirable to build each container system with linkage and efficiency from a macroscopic view.

Model Verification of a Safe Security Authentication Protocol Applicable to RFID System (RFID 시스템에 적용시 안전한 보안인증 프로토콜의 모델검증)

  • Bae, WooSik;Jung, SukYong;Han, KunHee
    • Journal of Digital Convergence
    • /
    • v.11 no.4
    • /
    • pp.221-227
    • /
    • 2013
  • RFID is an automatic identification technology that can control a range of information via IC chips and radio communication. Also known as electronic tags, smart tags or electronic labels, RFID technology enables embedding the overall process from production to sales in an ultra-small IC chip and tracking down such information using radio frequencies. Currently, RFID-based application and development is in progress in such fields as health care, national defense, logistics and security. RFID structure consists of a reader that reads tag information, a tag that provides information and the database that manages data. Yet, the wireless section between the reader and the tag is vulnerable to security issues. To sort out the vulnerability, studies on security protocols have been conducted actively. However, due to difficulties in implementation, most suggestions are concerned with theorem proving, which is prone to vulnerability found by other investigators later on, ending up in many troubles with applicability in practice. To experimentally test the security of the protocol proposed here, the formal verification tool, CasperFDR was used. To sum up, the proposed protocol was found to be secure against diverse attacks. That is, the proposed protocol meets the safety standard against new types of attacks and ensures security when applied to real tags in the future.

Evaluation Model for Lateral Flow on Soft Ground Using Commitee and Probabilistic Neural Network Theory (군집신경망과 확률신경망 이론을 이용한 연약지반의 측방유동 평가 모델)

  • Kim, Young-Sang;Joo, No-Ah;Lee, Jeong-Jae
    • Journal of the Korean Geotechnical Society
    • /
    • v.23 no.7
    • /
    • pp.65-76
    • /
    • 2007
  • Recently, there have been many construction projects on soft ground with growth of industry and various construction problems concerning soft soil behavior also have been reported. Especially, foundation piles of abutments and (or) buildings which were constructed on the soft ground have been suffering from a lot of stability problems of inordinary displacement due to lateral flow of soft ground. Although many researches for this phenomena have been carried out, it is still difficult to assess the mechanism of lateral flow on soft ground quantitatively. And reliable design method for judgement of lateral flow occurrence is not established yet. In this study, PNN (probabilistic neural network) and CNN (committee neural network) theories were applied for judgment of lateral flow occurrence based on eat data compiled from Korea and Japan. Predictions of PNN and CNN models for new data which were not used during model development are compared with those predicted by conventional empirical methods. It was found that the developed PNN and CNN models can predict more precise and reliable judgment of lateral flow occurrence than conventional empirical methods.

"An Analysis Study of Factors for Strengthening Cybersecurity at the Busan Port Container Terminal (부산항 컨테이너 터미널 사이버 보안 강화를 위한 요인 분석연구)

  • Do-Yeon Ha;Yul-Seong Kim
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.11a
    • /
    • pp.64-65
    • /
    • 2023
  • The purpose of this study was to assess the current status of cyber security at the Busan Port container terminal and derive strengthening factors through exploratory research. In recent years, the maritime industry has actively adopted Fourth Industrial Revolution technologies, resulting in changes in the form of ports, such as automated and smart terminals. While these changes have brought positive improvements in port efficiency, they have also increased the potential for cyber security incidents and threats, including information leakage through cargo handling equipment and ransomware attacks leading to terminal operations disruption. Especially in the case of ports, cyber security threats can have not only local effects within the port but also physical damage and implications for national security. However, despite the growing cyber security threats within ports, research related to domestic port cyber security remains limited. Therefore, this study aimed to identify factors for enhancing cyber security in ports and derive future enhancement strategies. The study conducted an analysis focusing on the Busan Port container terminal, which is one of the leading ports in South Korea actively adopting Fourth Industrial Revolution technologies, and conducted a survey of stakeholders in the Busan Port container terminal. Subsequently, exploratory factor analysis was used to derive strengthening factors. This study holds significance in providing directions for enhancing cyber security in domestic container ports in the future.

  • PDF

Exploratory Study on Enhancing Cyber Security for Busan Port Container Terminals (부산항 컨테이너 터미널 사이버 보안 강화를 위한 탐색적 연구)

  • Do-Yeon Ha;Yul-Seong Kim
    • Journal of Navigation and Port Research
    • /
    • v.47 no.6
    • /
    • pp.437-447
    • /
    • 2023
  • By actively adopting technologies from the Fourth Industrial Revolution, the port industry is trending toward new types of ports, such as automated and smart ports. However, behind the development of these ports, there is an increasing risk of cyber security incidents and threats within ports and container terminals, including information leakage through cargo handling equipment and ransomware attacks leading to disruptions in terminal operations. Despite the necessity of research to enhance cyber security within ports, there is a lack of such studies in the domestic context. This study focuses on Busan Port, a representative port in South Korea that actively incorporates technology from the Fourth Industrial Revolution, in order to discover variables for improving cyber security in container terminals. The research results categorized factors for enhancing cyber security in Busan Port's container terminals into network construction and policy support, standardization of education and personnel training, and legal and regulatory factors. Subsequently, multiple regression analysis was conducted based on these factors, leading to the identification of detailed factors for securing and enhancing safety, reliability, performance, and satisfaction in Busan Port's container terminals. The significance of this study lies in providing direction for enhancing cyber security in Busan Port's container terminals and addressing the increasing incidents of cyber security attacks within ports and container terminals.

Prioritization Analysis for Cyber Security Enhancement at Busan Port Container Terminal (부산항 컨테이너 터미널 사이버 보안 강화를 위한 우선순위 분석)

  • Ha, Do-Yeon;Kim, Chi-Yeol;Kim, Yul-Seong
    • Journal of Korea Port Economic Association
    • /
    • v.40 no.1
    • /
    • pp.1-14
    • /
    • 2024
  • The port industry has been actively adopting Fourth Industrial Revolution technologies, leading to transformations in port infrastructure, such as automated and smart ports. While these changes have improved port efficiency, they have also increased the potential for Cyber Security incidents, including data leaks and disruptions in terminal operations due to ransomware attacks. Recognizing the need to prioritize Cyber Security measures, a study was conducted, focusing on Busan Port's rapidly automating container terminal in South Korea. The results of the Eisenhower Matrix analysis identified legal and regulatory factors as a top priority in the first quadrant, with educational systems, workforce development, network infrastructure, and policy support in the third quadrant. Subsequently, a Borich Needs Analysis revealed that the highest priority was given to legal improvements in security management systems, while the development of Cyber Security professionals ranked lowest. This study provides foundational research for enhancing Cyber Security in domestic container terminals and offers valuable insights into their future direction.

A Study on the RFID's Application Environment and Application Measure for Security (RFID의 보안업무 적용환경과 적용방안에 관한 연구)

  • Chung, Tae-Hwang
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.155-175
    • /
    • 2009
  • RFID that provide automatic identification by reading a tag attached to material through radio frequency without direct touch has some specification, such as rapid identification, long distance identification and penetration, so it is being used for distribution, transportation and safety by using the frequency of 125KHz, 134KHz, 13.56MHz, 433.92MHz, 900MHz, and 2.45GHz. Also it is one of main part of Ubiquitous that means connecting to net-work any time and any place they want. RFID is expected to be new growth industry worldwide, so Korean government think it as prospective field and promote research project and exhibition business program to linked with industry effectively. RFID could be used for access control of person and vehicle according to section and for personal certify with password. RFID can provide more confident security than magnetic card, so it could be used to prevent forgery of register card, passport and the others. Active RFID could be used for protecting operation service using it's long distance date transmission by application with positioning system. And RFID's identification and tracking function can provide effective visitor management through visitor's register, personal identification, position check and can control visitor's movement in the secure area without their approval. Also RFID can make possible of the efficient management and prevention of loss of carrying equipments and others. RFID could be applied to copying machine to manager and control it's user, copying quantity and It could provide some function such as observation of copy content, access control of user. RFID tag adhered to small storage device prevent carrying out of item using the position tracking function and control carrying-in and carrying-out of material efficiently. magnetic card and smart card have been doing good job in identification and control of person, but RFID can do above functions. RFID is very useful device but we should consider the prevention of privacy during its application.

  • PDF

Framework of Stock Market Platform for Fine Wine Investment Using Consortium Blockchain (공유경제 체제로서 컨소시엄 블록체인을 활용한 와인투자 주식플랫폼 프레임워크)

  • Chung, Yunkyeong;Ha, Yeyoung;Lee, Hyein;Yang, Hee-Dong
    • Knowledge Management Research
    • /
    • v.21 no.3
    • /
    • pp.45-65
    • /
    • 2020
  • It is desirable to invest in wine that increases its value, but wine investment itself is unfamiliar in Korea. Also, the process itself is unreasonable, and information is often forged, because pricing in the wine market is done by a small number of people. With the right solution, however, the wine market can be a desirable investment destination in that the longer one invests, the higher one can expect. Also, it is expected that the domestic wine consumption market will expand through the steady increase in domestic wine imports. This study presents the consortium block chain framework for revitalizing the wine market and enhancing transparency as the "right solution" of the nation's wine investment market. Blockchain governance can compensate for the shortcomings of the wine market because it guarantees desirable decision-making rights and accountability. Because the data stored in the block chain can be checked by consumers, it reduces the likelihood of counterfeit wine appearing and complements the process of unreasonably priced. In addition, digitization of assets resolves low cash liquidity and saves money and time throughout the supply chain through smart contracts, lowering entry barriers to wine investment. In particular, if the governance of the block chain is composed of 'chateau-distributor-investor' through consortium blockchains, it can create a desirable wine market. The production process is stored in the block chain to secure production costs, set a reasonable launch price, and efficiently operate the distribution system by storing the distribution process in the block chain, and forecast the amount of orders for futures trading. Finally, investors make rational decisions by viewing all of these data. The study presented a new perspective on alternative investment in that ownership can be treated like a share. We also look forward to the simplification of food import procedures and the formation of trust within the wine industry by presenting a framework for wine-owned sales. In future studies, we would like to expand the framework to study the areas to be applied.

Analysis of Traffic Safety Effectiveness of Vehicle Seat-belt Wearing Detection System (주행차량 안전벨트 착용 검지시스템 교통안전 효과 분석)

  • Ji won Park;Su bin Park;Sang cheol Kang;Cheol Oh
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.22 no.5
    • /
    • pp.53-73
    • /
    • 2023
  • Although it is mandatory to wear a seat belt that can minimize human injury when traffic accident occurs, the number of traffic accident casualties not wearing seat belts still accounts for a significant proportion.The seat belt wearing detection system for all seats is a system that identifies whether all seat passengers wear a seat belt and encourages their usage, also it can be a useful technical countermeasure. Firstly, this study established the viability of system implementation by assessing the factors influencing the severity of injuries in traffic accidents through the development of an ordered probit model. Analysis results showed that the use of seat belts has statistically significant effects on the severity of traffic accidents, reducing the probability of death or serious injury by 0.054 times in the event of a traffic accident. Secondly, a meta-analysis was conducted based on prior research related to seat belts and injuries in traffic accidents to estimate the expected reduction in accident severity upon the implementation of the system.The analysis of the effect of accident severity reduction revealed that wearing seat belts would lead to a 63.3% decrease in fatal accidents, with the front seats showing a reduction of 75.7% and the rear seats showing a reduction of 58.1% in fatal accidents. Lastly, Using the results of the meta-analysis and traffic accident statistics, the expected decrease in the number of traffic accident casualties with the implementation of the system was derived to analyze the traffic safety effects of the proposed detection system. The analysis demonstrated that with an increase in the adoption rate of the system, the number of casualties in accidents where seat belts were not worn decreased. Specifically, at a system adoption rate of 60%, it is anticipated that the number of fatalities would decrease by more than three times compared to the current scenario. Based on the analysis results, operational strategies for the system were proposed to increase seat belt usage rates and reduce accident severity.