• 제목/요약/키워드: 신뢰성 제어

검색결과 1,552건 처리시간 0.034초

The Realiztion Methods of IEC 61850 Based 154[kV] Substation Automation System in KEPCO System (IEC 61850 기반 154[kV] 변전자동화 시스템의 실계통 구축)

  • Kim, Yong-Hak;Han, Jeong-Yeol;Lee, Nam-Ho;Kim, Byeong-Heon;Park, Nae-Ho;Hong, Jung-Woo
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • 제24권5호
    • /
    • pp.86-93
    • /
    • 2010
  • This paper presents the guideline for enhancing the reliability and availability of SAS with IEC 61850 based IEDs in real power system. The IEC 61850 standard communication networks and systems allow utilities to consider new designs for substations applicable both new substation and refurbishments. The existing solutions are based on hardwired interface between the primary substation equipment and the secondary protection, monitoring, control and recording devices. All over the world, lots of projects at different stages of realization have been reported during the last year leading to a rapid maturation of the associated technologies. At present, IEC 61850 is becoming a popular communication standard for the substation automation system.

Identification Technition of Malicious Behavior node Based on Collaboration in MANET (MANET에서 협업기반의 악의적인 노드 행위 식별기법)

  • Jeon, Seo-In;Ryu, Keun-Ho
    • The KIPS Transactions:PartC
    • /
    • 제19C권2호
    • /
    • pp.83-90
    • /
    • 2012
  • MANET(Mobile Ad-Hoc Network) has a weakness from a security aspect because it operates where no wired network is built, which causes the exposed media, dynamic topology, and the lack of both central monitoring and management. It is especially difficult to detect and mitigate a malicious node because there is not a mediator which controls the network. This kind of malicious node is closely connected to the routing in the field of study of Ad-Hoc security. Accordingly this paper proposes the method on how to enhance the security for the safe and effective routing by detecting the malicious node. We propose MBC(Identification technition of Malicious Behavior node based on Collaboration in MANET) that can effectively cope with malicious behavior though double detecting the node executing the malicious behavior by the collaboration between individual node and the neighbor, and also managing the individual nodes in accordance with the trust level obtained. The simulation test results show that MBC can find the malicious nodes more accurately and promptly that leads to the more effectively secure routing than the existing method.

Design of Stack Monitoring System with Improved Performance (성능이 향상된 Stack Monitoring System의 설계)

  • Jang, Kyeong-Uk;Lee, Joo-Hyun;Lee, Seong-Won;Lee, Seung-Ho
    • Journal of IKEEE
    • /
    • 제20권3호
    • /
    • pp.299-302
    • /
    • 2016
  • In this paper, we designed the stack monitoring system with improved performance. To block the incoming pulse noise to the amplifier, shield and the power supply impedance are reduced and the power circuit is isolated. The control unit is developed with variable high voltage, adaptive gain, offset and threshold in order to match the scintillation detector characteristic to the apparatus. 300-1500V variable high voltage power circuit is configured applicable to various scintillation detector. Stack monitoring system with improved performance guarantee the efficiency and the reliability by considering the characteristic of various scintillation detector. Developed stack monitoring system is evaluated with certified testing equipment and shows excellent performance with respect to the uncertainty of the sensor test results.

The Study of MAC protocol for efficient Wireless Sensor Network (Wireless 센서 네트워크를 위한 MAC 프로토콜에 관한 연구)

  • Lee, Woo-Chul;Kim, Dong-Il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 한국해양정보통신학회 2005년도 추계종합학술대회
    • /
    • pp.517-520
    • /
    • 2005
  • Wireless sensor network combines sensing and computing technology which can sense light, temperature, vibration, magnetic field and wind etc, as each purpose of using those. Wireless nodes operate signal processing skill which has proceeded sensed information from the sensor, transmission which makes information reached to observer and limited energy managing skill which is needed on account of using battery to operate wireless. To make responsible measuring and sensing out of them, efficient energy management is so important to maintain life time of network. In this paper, after explaining CSMA/CA(Carrier Sense Multiple Access/Collision Avoidance) traditional wireless MAC protocol, and ER-MAC(Energy Rate Medium Access Control) which are not managing resource of hardware but MAN(Medium Access Control), data-link layer out of OSI 7 layer. We would like to analyze those efficiency of power saving comparing with each protocol.

  • PDF

A Study on the Construction of CIS(Cooperative Information System) based on CBD (CBD 기반의 CIS 구성에 관한 연구)

  • Kim, Haeng-Gon;Sin, Ho-Jun
    • The KIPS Transactions:PartD
    • /
    • 제8D권6호
    • /
    • pp.715-722
    • /
    • 2001
  • In recent years, we recognize a new paradigm in the development process:From object oriented development, to the development process which has focused on the use of standard components. In recent years a lot of research related to the component-based development has been done, especially in business domain. but still there are many open and unresolved problems in this area. such as established development process for a distributed environment, formal process, infrastructure for COTS, development and management tool considering maintenance to guarantee a proper treatment of components. It also required a service and an application integration for component. In this paper, we propose cooperative information systems (CIS) that supports component based development. It must address for component based systems to achieve their full potential. We identify a set of CIS organized 3-tier which is a presentation layer, business logic layer and data control layer. We also discuss the specific roles and activities for the layers. we also define the behavior and managed information for business logic layer as core level. As an illustration of the CIS, we present a successful considerations which is widely helpful to user when they make decision in component development and assemble. Also, we expect to component reusability and efficiency in business domain.

  • PDF

Design of Navigation System for Low Cost Unmanned Aerial Vehicle (저가형 무인항공기 운용을 위한 항법시스템 설계)

  • Lee, Jang-Ho;Kim, Sung-Pil;Park, Mu-Hyeok;Ahn, Iee-Ki
    • Journal of Advanced Navigation Technology
    • /
    • 제8권2호
    • /
    • pp.105-111
    • /
    • 2004
  • This paper describes the design of navigation system for an unmanned target drone which is operated by Korean army as for anti-air gun shooting training. Current target drone is operated by pilot control of on-board servo motor via remote control system. Automatic flight control system for the target drone greatly reduces work load of ground pilot and can increase application area of the drone. Most UAVs being operated nowdays use high-priced sensors as AHRS and IMU to measure the attitude, but those are costly. This paper introduces the development of low-cost automatic flight control system with low-cost sensors. The integrated automatic flight control system has been developed by integrating combining power module, switching module, monitoring module and RC receiver as an one module. The performance of navigation for low cost unmanned aerial vehicle, unmanned target drone as our test bed in this paper is verified by both Hardware in the loop simulation(HILS) to test performance of GPS as GPS output frequency high and results of flight test.

  • PDF

Interactive ADAS development and verification framework based on 3D car simulator (3D 자동차 시뮬레이터 기반 상호작용형 ADAS 개발 및 검증 프레임워크)

  • Cho, Deun-Sol;Jung, Sei-Youl;Kim, Hyeong-Su;Lee, Seung-gi;Kim, Won-Tae
    • Journal of IKEEE
    • /
    • 제22권4호
    • /
    • pp.970-977
    • /
    • 2018
  • The autonomous vehicle is based on an advanced driver assistance system (ADAS) consisting of a sensor that collects information about the surrounding environment and a control module that determines the measured data. As interest in autonomous navigation technology grows recently, an easy development framework for ADAS beginners and learners is needed. However, existing development and verification methods are based on high performance vehicle simulator, which has drawbacks such as complexity of verification method and high cost. Also, most of the schemes do not provide the sensing data required by the ADAS directly from the simulator, which limits verification reliability. In this paper, we present an interactive ADAS development and verification framework using a 3D vehicle simulator that overcomes the problems of existing methods. ADAS with image recognition based artificial intelligence was implemented as a virtual sensor in a 3D car simulator, and autonomous driving verification was performed in real scenarios.

Security Threat and Policy Analysis to Secure the Safety and Reliability of the Smart Grid (지능형 전력망의 안전성과 신뢰성 확보를 위한 보안위협과 정책 분석)

  • Lee, Daesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • 제25권10호
    • /
    • pp.1381-1390
    • /
    • 2021
  • Smart grid is a representative convergence new technology in the era of the 4th industry revolution that deals with three broad security areas consisting of control system, the power grid, and the consumer. As it is a convergence new technology of the 4th industrial society, it is true that it can have a positive effect on the country's technological development, growth engine, and economic feasibility in the future. However, since the smart grid is expected to cause enormous damage in the event of a security accident, energy-related organizations must prepare various security measures to predict and respond to the latest security incidents. In this paper, the current status of domestic and foreign smart grids, trends in security standards, vulnerabilities and threats, and prospects for smart grid security technologies are to be considered.

Vibration-Based Signal-Injection Attack Detection on MEMS Sensor (진동 신호를 사용한 MEMS 센서 대상 신호오류 주입공격 탐지 방법)

  • Cho, Hyunsu;Oh, Heeseok;Choi, Wonsuk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제31권3호
    • /
    • pp.411-422
    • /
    • 2021
  • The autonomous driving system mounted on the unmanned vehicle recognizes the external environment through several sensors and derives the optimum control value through it. Recently, studies on physical level attacks that maliciously manipulate sensor data by performing signal-injection attacks have been published. signal-injection attacks are performed at the physical level and are difficult to detect at the software level because the sensor measures erroneous data by applying physical manipulations to the surrounding environment. In order to detect a signal-injection attack, it is necessary to verify the dependability of the data measured by the sensor. As so far, various methods have been proposed to attempt physical level attacks against sensors mounted on autonomous driving systems. However, it is still insufficient that methods for defending and detecting the physical level attacks. In this paper, we demonstrate signal-injection attacks targeting MEMS sensors that are widely used in unmanned vehicles, and propose a method to detect the attack. We present a signal-injection detection model to analyze the accuracy of the proposed method, and verify its effectiveness in a laboratory environment.

A study on Software Maintenance of Domestic Weapon System by using the Automatic Test Equipment

  • Chae, Il-Kwon
    • Journal of the Korea Society of Computer and Information
    • /
    • 제27권1호
    • /
    • pp.51-59
    • /
    • 2022
  • As the weapon system's dependence on software functions increased, software became a key factor in controlling the weapon system. In addition, as software development becomes more important domestically and internationally, software verification becomes an issue. The recent defense market has recognized this point and is demanding a plan for weapon system software maintenance. In this paper, we propose a weapon system software maintenance plan using Automatic Test Equipment. The specific method is to use a simulator to check the software function and identify failure cases. This is an effective way for developers to reduce the Total Corrective Maintenance Time(TCM) of the weapon system by reducing the time it takes to identify failure cases. It has been proven that the proposed Automatic Test Equipment can achieve software maintenance and excellent Maintainability and Operational Availability compared to the existing ones.