• Title/Summary/Keyword: 원격 식별

Search Result 155, Processing Time 0.03 seconds

Evaluation of Utilization of Satellite Remote Sensing Data for Drought Monitoring (가뭄 모니터링을 위한 인공위성 원격탐사자료의 활용 가능성 평가)

  • Won, Jeongeun;Son, Youn-Suk;Lee, Sangho;Kang, Limseok;Kim, Sangdan
    • Korean Journal of Remote Sensing
    • /
    • v.37 no.6_2
    • /
    • pp.1803-1818
    • /
    • 2021
  • As the frequency of drought increases due to climate change, it is very important to have a monitoring system that can accurately determine the situation of widespread drought. However, while ground-based meteorological data has limitations in identifying all the complex droughts in Korea, satellite remote sensing data can be effectively used to identify the spatial characteristics of drought in a wide range of regions and to detect drought. This study attempted to analyze the possibility of using remote sensing data for drought identification in South Korea. In order to monitor various aspects of drought, remote sensing and ground observation data of precipitation and potential evapotranspiration, which are major variables affecting drought, were collected. The evaluation of the applicability of remote sensing data was conducted focusing on the comparison with the observation data. First, to evaluate the applicability and accuracy of remote sensing data, the correlations with observation data were analyzed, and drought indices of various aspects were calculated using precipitation and potential evapotranspiration for meteorological drought monitoring. Then, to evaluate the drought monitoring ability of remote sensing data, the drought reproducibility of the past was confirmed using the drought index. Finally, a high-resolution drought map using remote sensing data was prepared to evaluate the possibility of using remote sensing data for actual drought in South Korea. Through the application of remote sensing data, it was judged that it would be possible to identify and understand various drought conditions occurring in all regions of South Korea, including unmeasured watersheds in the future.

암호$\cdot$시큐리티기술의 현황과 전망

  • 대한전기협회
    • JOURNAL OF ELECTRICAL WORLD
    • /
    • s.262
    • /
    • pp.82-89
    • /
    • 1998
  • 인터넷을 비롯하여 컴퓨터 네트워크와 통신의 급격한 발전으로 정보시큐리티의 중요성이 주목받고 있다. 정보시큐리티 대책의 기본은 기술적 대책에서부터 시작된다. 암호기술은 비밀 유지와 인증이라는 기본기능을 갖고 있으며, 직접적으로 정보를 지키는 일과 함께 다른 정보시큐리티기술의 요소로도 사용된다. 암호와 함께 사용되는 시큐리티기술로서 인간의 신체적 특징을 활용한 개인식별, 공공 공간과 중요시설 등의 대규모 범위에 대한 원격감시 그리고 이것들을 통합하는 응용시스템이 있다.

  • PDF

The Method for Colorizing SAR Images of Kompsat-5 Using Cycle GAN with Multi-scale Discriminators (다양한 크기의 식별자를 적용한 Cycle GAN을 이용한 다목적실용위성 5호 SAR 영상 색상 구현 방법)

  • Ku, Wonhoe;Chun, Daewon
    • Korean Journal of Remote Sensing
    • /
    • v.34 no.6_3
    • /
    • pp.1415-1425
    • /
    • 2018
  • Kompsat-5 is the first Earth Observation Satellite which is equipped with an SAR in Korea. SAR images are generated by receiving signals reflected from an object by microwaves emitted from a SAR antenna. Because the wavelengths of microwaves are longer than the size of particles in the atmosphere, it can penetrate clouds and fog, and high-resolution images can be obtained without distinction between day and night. However, there is no color information in SAR images. To overcome these limitations of SAR images, colorization of SAR images using Cycle GAN, a deep learning model developed for domain translation, was conducted. Training of Cycle GAN is unstable due to the unsupervised learning based on unpaired dataset. Therefore, we proposed MS Cycle GAN applying multi-scale discriminator to solve the training instability of Cycle GAN and to improve the performance of colorization in this paper. To compare colorization performance of MS Cycle GAN and Cycle GAN, generated images by both models were compared qualitatively and quantitatively. Training Cycle GAN with multi-scale discriminator shows the losses of generators and discriminators are significantly reduced compared to the conventional Cycle GAN, and we identified that generated images by MS Cycle GAN are well-matched with the characteristics of regions such as leaves, rivers, and land.

Replay Attack based Neutralization Method for DJI UAV Detection/Identification Systems (DJI UAV 탐지·식별 시스템 대상 재전송 공격 기반 무력화 방식)

  • Seungoh Seo;Yonggu Lee;Sehoon Lee;Seongyeol Oh;Junyoung Son
    • Journal of Aerospace System Engineering
    • /
    • v.17 no.4
    • /
    • pp.133-143
    • /
    • 2023
  • As drones (also known as UAV) become popular with advanced information and communication technology (ICT), they have been utilized for various fields (agriculture, architecture, and so on). However, malicious attackers with advanced drones may pose a threat to critical national infrastructures. Thus, anti-drone systems have been developed to respond to drone threats. In particular, remote identification data (R-ID)-based UAV detection and identification systems that detect and identify illegal drones with R-ID broadcasted by drones have been developed, and are widely employed worldwide. However, this R-ID-based UAV detection/identification system is vulnerable to security due to wireless broadcast characteristics. In this paper, we analyze the security vulnerabilities of DJI Aeroscope, a representative example of the R-ID-based UAV detection and identification system, and propose a replay-attack-based neutralization method using the analyzed vulnerabilities. To validate the proposed method, it is implemented as a software program, and verified against four types of attacks in real test environments. The results demonstrate that the proposed neutralization method is an effective neutralization method for R-ID-based UAV detection and identification systems.

Intelligent Mobile Surveillance System Based on Wireless Communication (무선통신에 기반한 지능형 이동 감시 시스템 개발)

  • Jang, Jae-Hyuk;Sim, Gab-Sig
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.2
    • /
    • pp.11-20
    • /
    • 2015
  • In this paper, we develop an intelligent mobile surveillance system based on binary CDMA for the unmanned automatic tracking and surveillance. That is, we implement a intelligent surveillance system using the binary CDMA wireless communication technology which is applied the merit of CDMA and TDMA on it complexly. This system is able to monitor the site of the accident on network in real time and process the various situations by implementing the security surveillance system. This system pursues an object by the 360-degree using camera, expands image using a PTZ(Pan/Tilt/Zoom) camera zooming function, identifies the mobile objects image within a screen and transfers the identified image to the remote site. Finally, we show the efficiency of the implemented system through the simulation of the controlled situations, such as tracking coverage on objects, object expansion, object detection number, monitoring the remote transferred image, number of frame per second by the image output signal etc..

A Proposal of Simultaneous Acquisition Performance Test Method for Telemetry System (원격 측정 시스템 동시계측 성능시험 방법 제안)

  • Park, Yu-kwang;Lee, Woon-moon;Kim, Bok-ki
    • Journal of Advanced Navigation Technology
    • /
    • v.24 no.3
    • /
    • pp.218-223
    • /
    • 2020
  • There are communication methods that guarantees real-time and method of performing the simultaneous acquisition through the synchronized multi-channels to improve the reliability of the telemetry system. Such synchronized systems need to be verified to confirm the simultaneous measurement performance of channels. In this paper, we propose a method to measure the time difference between synchronized channels in a telemetry system through simultaneous acquisition performance test. The simulation signal is applied for measurement and the difference between the sampling period and the simulation signal period is defined as the concept of time resolution. The principle of checking the measurement time difference between channels through time resolution was explained. In addition, the proposed principle was verified through simulation in the situation when measurement time difference may occur. And a procedure for identifying a measurement time difference in an actual telemetry system is described.

산업 제어 시스템 네트워크 분석 저지를 위한 트래픽 난분석화 기법

  • Lee, Yangjae;Jung, Hye-Lim;Ahn, Sung-Kyu;Park, Ki-Woong
    • Review of KIISC
    • /
    • v.30 no.5
    • /
    • pp.25-33
    • /
    • 2020
  • 산업 제어 시스템 대상 원격 관제 기술은 관리자의 즉각적 대응을 통해 산업 재해 발생 확률 저하를 위한 핵심기술로 주목받고 있다. 그러나 산업 제어 시스템 원격 관제 기술은 원격의 관리자와 통신하기 위해 외부 네트워크 연결이 필수적이며, 따라서 공격자들에게 기존 산업 제어 시스템에 존재하지 않던 새로운 네트워크 취약점을 노출하게 된다. 산업 제어시스템은 네트워크 취약점을 해결하기 위해 터널링 프로토콜 또는 패킷 암호화 솔루션을 사용하고 있지만, 이러한 솔루션은 패킷 메타데이터를 분석하는 네트워크 트래픽 분석 공격을 방어하지 못한다. 공격자는 네트워크 트래픽 분석을 통해 패킷의 송수신 대상, 통신 빈도, 활성화 상태 등을 알 수 있으며 획득한 정보를 다음 공격을 위한 초석으로 사용할 수 있다. 따라서 기존의 솔루션들이 해결하지 못하는 산업 제어 시스템 네트워크 환경에서 발생하는 잠재적인 문제들을 해결하기 위해 네트워크 트래픽 분석 난이도를 향상시켜 분석을 방어하는 솔루션이 필요하다. 본 논문에서는 패킷 메타데이터를 분석하는 네트워크 트래픽 분석 공격을 어렵게 하고자 패킷 분할 및 병합 기반 네트워크 트래픽 난분석화 기법을 제안한다. 본 논문에서 제안하는 기법의 참여자인 관리자와 산업 기기는 각각 일정한 크기의 그룹으로 묶인다. 그리고 원격 관제를 위해 관리자와 산업 기기 간 송수신되는 모든 패킷을 대상으로 분할 노드를 경유하도록 한다. 분할노드는 패킷의 난분석화를 위한 핵심 요소로써, 관리자와 산업 기기 사이에 송수신되는 모든 패킷을 상호 목적 대상 그룹의 개수로 분할한다. 그리고 분할한 패킷 조각에 패킷 식별자와 번호를 부여하여 패킷 조각을 모두 수신한 목적대상이 올바르게 패킷을 병합할 수 있도록 하였다. 그리고 분할노드는 목적 대상이 속한 그룹의 모든 참여자에게 서로 다른 패킷 조각들을 전달함으로써 공격자가 패킷의 흐름을 알 수 없도록 하여 산업 제어 시스템 정보를 수집하는 것을 방어한다. 본 논문에서 제안하는 패킷 분할 및 병합 기반 트래픽 난분석화 기법을 통해 산업 제어 시스템을 대상으로 한 트래픽 분석 공격을 방어함으로써 네트워크 공격의 피해를 줄이고 추가적인 네트워크 공격을 차단할 수 있을 것으로 기대된다.

Monitoring the Ecological Drought Condition of Vegetation during Meteorological Drought Using Remote Sensing Data (원격탐사자료를 활용한 기상학적 가뭄 시 식생의 생태학적 가뭄 상태 모니터링)

  • Won, Jeongeun;Jung, Haeun;Kang, Shinuk;Kim, Sangdan
    • Korean Journal of Remote Sensing
    • /
    • v.38 no.5_3
    • /
    • pp.887-899
    • /
    • 2022
  • Drought caused by meteorological factors negatively affects vegetation in terrestrial ecosystems. In this study, the state in which meteorological drought affects vegetation was defined as the ecological drought of vegetation, and the ecological drought condition index of vegetation (EDCI-veg) was proposed to quantitatively monitor the degree of impact. EDCI-veg is derived from a copula-based bi-variate joint probability model between vegetation and meteorological drought information, and can be expressed numerically how affected the current vegetation condition was by the drought when the drought occurred. Comparing past meteorological drought events with their corresponding vegetation condition, the proposed index was examined, and it was confirmed that EDCI-veg could properly monitor the ecological drought of vegetation. In addition, it was possible to spatially identify ecological drought conditions by creating a high-resolution drought map using remote sensing data.

High-Resolution Mapping Techniques for Coastal Debris Using YOLOv8 and Unmanned Aerial Vehicle (YOLOv8과 무인항공기를 활용한 고해상도 해안쓰레기 매핑)

  • Suho Bak;Heung-Min Kim;Youngmin Kim;Inji Lee;Miso Park;Tak-Young Kim;Seon Woong Jang
    • Korean Journal of Remote Sensing
    • /
    • v.40 no.2
    • /
    • pp.151-166
    • /
    • 2024
  • Coastal debris presents a significant environmental threat globally. This research sought to improve the monitoring methods for coastal debris by employing deep learning and remote sensing technologies. To achieve this, an object detection approach utilizing the You Only Look Once (YOLO)v8 model was implemented to develop a comprehensive image dataset for 11 primary types of coastal debris in our country, proposing a protocol for the real-time detection and analysis of debris. Drone imagery was collected over Sinja Island, situated at the estuary of the Nakdong River, and analyzed using our custom YOLOv8-based analysis program to identify type-specific hotspots of coastal debris. The deployment of these mapping and analysis methodologies is anticipated to be effectively utilized in managing coastal debris.

A Study on the Security Requirements Analysis to Build a Zero Trust-Based Remote Work Environment (제로트러스트 기반의 원격 근무 환경을 구축하기 위한 보안요구사항 분석 연구)

  • Hae-na Kim;Ye-jun Kim;Seung-joo Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.1
    • /
    • pp.83-102
    • /
    • 2024
  • Recently, as the use of the cloud increases year by year and remote work within the enterprise has become one of the new types of work, the security of the cloud-based remote work environment has become important. The introduction of zero trust is required due to the limitations of the existing perimeter security model that assumes that everything in the internal network is safe. Accordingly, NIST and DoD published standards related to zero trust architecture, but the security requirements of that standard describe only logical architecture at the abstract level. Therefore, this paper intends to present more detailed security requirements compared to NIST and DoD standards by performing threat modeling for OpenStack clouds. After that, this research team performed a security analysis of commercial cloud services to verify the requirements. As a result of the security analysis, we identified security requirements that each cloud service was not satisfied with. We proposed potential threats and countermeasures for cloud services with zero trust, which aims to help build a secure zero trust-based remote working environment.