• Title/Summary/Keyword: 스마트 안전

Search Result 1,895, Processing Time 0.027 seconds

Research Trend Analysis of Risk Cost Model for UAM Flight Path Planning (UAM 비행 경로 계획을 위한 위험 비용 모델 연구 동향 분석)

  • Jae-Hyeon Kim;Dong-Min Lee;Myeong-Jin Lee;Yeong-Hoon Choi;Ji-Hun Kwon;Jong-Whoa Na
    • Journal of Advanced Navigation Technology
    • /
    • v.28 no.1
    • /
    • pp.68-76
    • /
    • 2024
  • With the recent rapid growth of the domestic and international unmanned aerial vehicle (UAV) market and the increasing importance of UAV operations in urban centers, such as UAMs, the safety management and regulatory framework for human life and property damage caused by UAV failures has been emphasized. In this study, we conducted a comparative analysis of risk-cost models that evaluate the risk of an operating area for safe UAM flight path planning, and identified the main limitations of each model to derive considerations for future model development. By providing a basic model for improving the safety of UAM operations, this study is expected to make an important contribution to technical improvements and policy decisions in the field of UAM flight path planning.

Frequency Allocation of WAVE for Smart Vehicle Services (주파수 간섭으로 본 스마트 자동차 서비스를 위한 WAVE 주파수 분배 방안)

  • Kim, Seung-Cheon;Rho, Kwang-Hyun;Hwang, Ho-Young;Hong, Jung-Wan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.5
    • /
    • pp.1-6
    • /
    • 2012
  • Recent trend of pursuing smart life began to affect the usage of vehicle in real life. The next generation of the smart vehicle services start to utilize telecommunication technology and sensing techniques for the advanced safety and efficient use of road for drivers, while there's still decency in satisfaction about vehicular safety upgrade. For this purpose, a new technology is devised as Wireless Access in Vehicular Environment(WAVE). Foreign industries now are developing technologies of key components, platform and services related to WAVE. Domestic industry just starts to develop the related technologies about WAVE, although the frequency for WAVE is not allocated. This paper introduces the status of technical standards for WAVE and the status of developing components of WAVE. And this paper also proposes the guidance of frequency allocating policy for WAVE through frequency interference experiments.

Key Management Framework based on Double Hash Chain for Secure Smart Grid Environments (안전한 스마트 그리드 환경을 위한 이중 해쉬 체인 기반 키 관리 프레임워크)

  • Lee, Young-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.9
    • /
    • pp.2063-2072
    • /
    • 2013
  • Smart Grid is the next-generation intelligent power grid that maximizes energy efficiency with the convergence of IT technologies and the existing power grid. It enables consumers to check power rates in real time for active power consumption. It also enables suppliers to measure their expected power generation load, which stabilizes the operation of the power system. However, there are high possibility that various kinds of security threats such as data exposure, data theft, and privacy invasion may occur in interactive communication with intelligent devices. Therefore, to establish a secure environment for responding to such security threat with the smart grid, the key management technique, which is the core of the development of a security mechanism, is required. Using a hash chain, this paper suggests a group key management mechanism that is efficiently applicable to the smart grid environment with its hierarchical structure, and analyzes the security and efficiency of the suggested group key management framework.

A Study of Intrusion Security Research and Smishing Hacking Attack on a Smartphone (스마트폰에서 Smishing 해킹 공격과 침해사고 보안 연구)

  • Park, In-Woo;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.11
    • /
    • pp.2588-2594
    • /
    • 2013
  • Damage is increasing by (Smishing) hacking attack Smishing you use a smart phone after entering 2013. Takeover of personal information and direct financial damage in collaboration with graphics sewing machine hacking attack has occurred. Monetary damage that leads to Internet payment service (ISP) and secure payment system in conjunction with graphics sewing machine hacking attack on a smartphone has occurred. In this paper, I will study analysis in the laboratory examples of actual infringement vinegar sewing machine hacking attack. It is a major power security measures to prevent damage to the secure payment system that a case analysis and practical principle technical nest sewing machine hacking attack, using Smishing. In this paper, I will be to research to be able to through a smart phone, to the online payment safer and more convenient.

Impact Conditions of Performance Evaluation, and Development of High-Performance Roadside Barrier for Longitudinal Barriers in Smart Highway (스마트하이웨이 종방향 베리어 성능평가 충돌조건과 고성능 노측용 베리어 개발)

  • Kim, Dong-Seong;Kim, Kee-Dong;Ko, Man-Gi;Jang, Dae-Young
    • Journal of Korean Society of Transportation
    • /
    • v.29 no.2
    • /
    • pp.59-67
    • /
    • 2011
  • To minimize the degree of damage in the SMART highway's punctuality and safety occurred from the car-barrier collisions, the impact conditions for longitudinal barriers in SMART highway was determined to be significantly larger than the existing maximum impact conditions. Results from computer simulation runs show that the existing domestic highest-performance roadside barrier did not satisfy the suggested impact conditions. The newly developed N-class barrier designed with computer simulation model and verified by full-scale crash tests has satisfied the SMART highway impact conditions in terms of occupant safety indexes and structural adequacy.

Mutual Anonymous Authentication Using Smart Cards in Multi-server Environments (다중서버 환경에서의 스마트카드를 이용한 상호 익명 인증)

  • Yoo, Hye-Joung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.12C
    • /
    • pp.1021-1028
    • /
    • 2008
  • In a network environment, when a user requests a server's service, a remote user authentication system using smart cards is a very practical solution to validate the eligibility of a user and provide secure communication. In these authentication schemes, due to fast progress of networks and information technology, most of provided services are in multi-server environments. However, there are no studies in multi-server authentication schemes using smart cards providing mutual anonymity so far. In this paper, we propose a novel user authentication scheme using smart cards providing mutual authentication and mutual anonymity for multi-server environments. Our proposed scheme achieves the low-computation requirement for smart cards and a user can use permitted various services in eligible servers by only one registration. Also, this scheme guarantees perfect mutual anonymity of participants.

A Study on Secure Remote User Authentication Scheme using Smart Card (스마트카드를 이용한 안전한 원격 사용자 인증기법에 관한 연구)

  • Go, Sung Jong;Lee, Im Yeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.11
    • /
    • pp.503-510
    • /
    • 2013
  • Recently, the rapid development of network technology has enabled people to use various services on the internet. However, the existing password-based user authentication system used in the internet environment requires a password table, which is a potential security threat as it could be leaked by an insider. To solve this issue, remote user authentication methods that do not require a user password table have been proposed. Regarding remote user authentication using a smart card in particular, various methods have been suggested to reduce expenses and to improve stability and efficiency, but the possibility of impersonation attacks and password-guessing attacks using information saved in a user's smart card still exist. Therefore, this study proposes a remote user authentication method that can safeguard against impersonation attacks and password guessing attacks, by analyzing weak points of conventional methods and creating a smart card's ID and password that are based on the user's ID and password.

Secure Storage and Management of Vaccination Records Allowing Restrictive Access upon Users' Consent (사용자 동의로 제한적 접근을 허용하는 백신 접종 기록의 안전한 보관 및 관리)

  • Park, Jun-Cheol
    • Smart Media Journal
    • /
    • v.10 no.2
    • /
    • pp.100-109
    • /
    • 2021
  • As the COVID-19 vaccination begins, it is necessary to safely store and manage the vaccination history for vaccinated people, as well as provide only the minimal information for the requested purpose, not in the form of all or nothing, to the institution requesting vaccination personal information. This paper proposes a scheme to safely store and manage the people's vaccination records in a non-forgeable blockchain, and to ensure that users provide only the minimal information necessary to the verifier from their vaccination personal information. A user authorizes the verifier to access the information he has consented with by entering the fingerprint on his smartphone, and in this process, no personal information or secrets can be exposed to an attacker. In addition, it is guaranteed that it is neither possible to impersonate the user nor to steal user personal information even in the case of theft or loss of the smartphone, or leakage of information from the vaccination history management institution. Using the scheme, users have no fear on external exposure of personal information and follow-up damage due to excessive information provision by giving out only the minimal information suited to the verifier.

스마트 항로표지를 위한 영상처리 기반 안전 기술에 관한 연구

  • 유은지;임태호
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2021.11a
    • /
    • pp.39-40
    • /
    • 2021
  • 선박과 항로표지 간 충돌에 의한 항로표지(buoy) 소실 및 사고를 줄이고자 영상을 기반으로 선박 접근 여부를 판단한다. 또한, 해양 기상환경을 파악해 운항 안전사고를 방지하기 위해 카메라로 촬영한 영상을 이용해 해무 강도를 측정하고자 한다.

  • PDF

스마트폰 어플리케이션을 활용한 실시간 VTS image 서비스 방안에 관한 연구

  • Lee, Jin-Seok;Park, Chan-Gil;Kim, A-Reum
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2012.06a
    • /
    • pp.585-587
    • /
    • 2012
  • 관제구역에서 선박들이 서로 조우할 때, 관제사 입장에서는 서로 안전하게 통과할 수 있다고 생각되는 조우관계가 불과 몇 초, 몇 분 뒤 전혀 예상치 못한 상황으로 발전하는 경우가 많이 발생한다. 이러한 상황은 관제사와 선박의 항해사들의 관점과 상황에 대한 해석이 상이하여 의사결정과정의 불일치가 발생하기 때문이다. 본 연구에서는 관제사과 모니터링하고 있는 VTS image를 실시간으로 선박과 공유할 수 있는 방법을 제시함으로써 위와 같은 문제점을 해결함은 물론 상황이해에 대한 불일치로 인해 발생하는 불필요한 교신을 줄여서 해상교통안전에 기여하고자 하였다. 최근 항공분야 및 도로교통분야에서 스마트폰을 이용하여 정보를 제공함으로써 많은 성과를 올리고 있는 점에 착안하여 VTS 어플리케이션을 개발하여 실시간 VTS image를 선장, 항해사에게 제공할 수 있는 방안을 제시하였다.

  • PDF