• Title/Summary/Keyword: 첨단 보안

Search Result 147, Processing Time 0.029 seconds

Research on functional area-specific technologies application of future C4I system for efficient battlefield visualization (미래 지휘통제체계의 효율적 전장 가시화를 위한 기능 영역별 첨단기술 적용방안)

  • Sangjun Park;Jungho Kang;Yongjoon Lee;Jeewon Kim
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.109-119
    • /
    • 2023
  • C4I system is an integrated battlefield information system that automates the five elements of command, control, communications, computers, and information to efficiently manage the battlefield. C4I systems play an important role in collecting and analyzing enemy positions, situations, and operational results to ensure that all services have the same picture in real time and optimize command decisions and mission orders. However, the current C4I has limitations whenever a new weapon system is introduced, as it only provides battlefield visualization in a single area focusing on the battlefield situation for each military service. In a future battlefield that expands not only to land, sea, and air domains but also to cyber and space domains, improved command and control decisions will be possible if organic data from various weapon systems is gathered to quickly visualize the battlefield situation desired by the user. In this study, the visualization technology applicable to the future C4I system is divided into map area, situation map area, and display area. The technological implementation of this future C4I system is based on various data and communication means such as 5G networks, and is expected to enable hyper-connected battlefield visualization that utilizes a variety of high-quality information to enable realistic and efficient battlefield situation awareness.

A Study on the Korea Future Internet Promotion Plan for Cyber Security Enhancement (사이버 보안 강화를 위한 한국형 미래 인터넷 추진 방안에 관한 연구)

  • Lim, Gyoo-Gun;Jin, Hai-Yan;Ahn, Jae-Ik
    • Informatization Policy
    • /
    • v.29 no.1
    • /
    • pp.24-37
    • /
    • 2022
  • Amid rapid changes in the ICT environment attributed to the 4th Industrial Revolution, the development of information & communication technology, and COVID-19, the existing internet developed without considering security, mobility, manageability, QoS, etc. As a result, the structure of the internet has become complicated, and problems such as security, stability, and reliability vulnerabilities continue to occur. In addition, there is a demand for a new concept of the internet that can provide stability and reliability resulting from digital transformation-geared advanced technologies such as artificial intelligence and IoT. Therefore, in order to suggest a way of implementing the Korean future internet that can strengthen cybersecurity, this study suggests the direction and strategy for promoting the future internet that is suitable for the Korean cyber environment through analyzing important key factors in the implementation of the future internet and evaluating the trend and suitability of domestic & foreign research related to future internet. The importance of key factors in the implementation of the future internet proceeds in the order of security, integrity, availability, stability, and confidentiality. Currently, future internet projects are being studied in various ways around the world. Among numerous projects, Bright Internet most adequately satisfies the key elements of future internet implementation and was evaluated as the most suitable technology for Korea's cyber environment. Technical issues as well as strategic and legal issues must be considered in order to promote the Bright Internet as the frontrunner Korean future internet. As for technical issues, it is necessary to adopt SAVA IPv6-NID in selecting the Bright Internet as the standard of Korean future internet and integrated data management at the data center level, and then establish a cooperative system between different countries. As for strategic issues, a secure management system and establishment of institution are needed. Lastly, in the case of legal issues, the requirement of GDPR, which includes compliance with domestic laws such as Korea's revised Data 3 Act, must be fulfilled.

Traffic Operation Strategy for the Mixed Traffic Flow on Autonomous Vehicle Pilot Zone: Focusing on Pangyo Zero City (자율주행차 혼재 시 시범운행지구 교통운영전략 수립: 판교제로시티를 중심으로)

  • Donghyun Lim;Woosuk Kim;Jongho Kim;Hyungjoo Kim
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.22 no.1
    • /
    • pp.172-191
    • /
    • 2023
  • This study was undertaken to strategize the mixed traffic operation of autonomous vehicles in the pilot zone. This was achieved by analyzing the changes expected when autonomous vehicles are mixed in the autonomous vehicle pilot zone. Although finding a safe and efficient traffic operation strategy is required for the pilot zone to serve as a test bed for autonomous vehicles, there is no available operation strategy based on the mixture of autonomous vehicles. In order to presents a traffic operation strategies for each period of autonomous vehicle introduction, traffic efficiency and safety analysis was performed according to the autonomous vehicle market percentage rate. Based on the analysis results, the introduction stage was divided into introductory stage, transition period, and stable period based on the autonomous vehicle market share of 30% and 70%. This study presents the following traffic operation strategies. Considering the traffic flow operation strategy, we suggest the advancement of the existing road infrastructure at the introductory stage, and operating an autonomous driving lane and the mileage system during the transition period. We also propose expanding the operation of autonomous driving lanes and easing the speed limit during the stable period. In the traffic safety strategy, we present a manual and legal system for responding to autonomous vehicle accidents in the introductory stage, an analysis of the causes of autonomous vehicle accidents and the implementation of preventive policies in the transition period, and the advancement of the autonomous system and the reinforcement of the security system during the stable period. Through the traffic operation strategy presented in this study, we foresee the possibility of preemptively responding to the changes of traffic flow and traffic safety expected due to the mixture of autonomous vehicles in the autonomous vehicle pilot zone in the future.

Analysis for Willingness to Pay of the Advanced Railway System (차세대전동차 시스템 도입에 따른 이용자 지불의사금액 결정요인분석)

  • Ha, Oh-Keun;Kim, Yong-Jin;Oh, Mi-Young;Park, Dong-Joo;Lee, Soo-Beom
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.4
    • /
    • pp.113-122
    • /
    • 2010
  • Research and development related to advanced railway systems is currently underway presently to promote the maintenance and economic feasibility of subways, and the aim of such research and development is to enhance the functionality, passenger convenience, system safety and reliability assurance of the subway. In this situation, a study that predicts the effect that the development of such an advanced railway system would have on subway users is required. To this end, this study derived willingness to pay and decision factors with the introduction of an advanced railway system after surveying passengers who use subway lines 1~8. The Price Sensitivity Method (PSM) was applied to derive the willingness to pay in relation to user convenience (operating speed, ride comfort, safety, comfort, security and informativeness) with the introduction of an advanced railway system. In addition, willingness to pay and decision factors were examined after explaining the effects of introducing an advanced railway system in detail to subway users. Through the analysis, it was found that willingness to pay amounted to a premium of 148 won ~ 161 won with the introduction of an advanced railway system, and that this was affected by factors such as gender, frequency of use, satisfaction with comfort, and satisfaction with security.

A Scheme of Security Drone Convergence Service using Cam-Shift Algorithm (Cam-Shift 알고리즘을 이용한 경비드론 융합서비스 기법)

  • Lee, Jeong-Pil;Lee, Jae-Wook;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.5
    • /
    • pp.29-34
    • /
    • 2016
  • Recently, with the development of high-tech industry, the use of the drones in various aspects of daily life is rapidly advancing. With technical and functional advancements, drones have an advantage of being easy to be utilized in the areas of use according to various lifestyles. In addition, through the diversification of the drone service converged with image processing medium such as camera and CCTV, an automated security system that can replace humans is expected to be introduced. By designing these unmanned security technology, a new convergence security drone service techniques that can strengthen the previous drone application technology will be proposed. In the proposed techniques, a biometric authentication technology will be designed as additional authentication methods that can determine the safety incorporated with security by selecting the search and areas of an object focusing on the objects in the initial windows and search windows through OpenCV technology and CAM-Shift algorithm which are an object tracking algorithm. Through such, a highly efficient security drone convergence service model will be proposed for performing unmanned security by using the drones that can continuously increase the analysis of technology on the mobility and real-time image processing.

A Study of Modified Parallel Feistel Structure of Data Speed-up DES (DES의 데이터 처리속도 향상을 위한 변형된 병렬 Feistel 구조에 관한 연구)

  • Lee, Seon-Keun;kIM, Hyeoung-Kyun;Kim, Hwan-Yong
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.37 no.12
    • /
    • pp.91-97
    • /
    • 2000
  • With the brilliant development of information communication and the rapid spread of internet, current network communication is carrying several up-to-date functions such as electronic commerce, activation of electro currency or electronic signature and will produce more advanced services in the future. Information communication network such as that electronic commerce would demand the more safe and transparent guard of network, and anticipate the more fast performance of network. In this paper, in order to meet the several demands, DES(data encryption standard) with parallel feistel structure, which feistel structure of the basic structure of DES is transformed into in parallel, is proposed. The existing feistel structure can't use pipeline method for the structural problem of DES itself-the propagation of error. therefore, this modified parallel feistel structure could improve largely the performance of DES which had to have the trade-off relation between data processing speed and data security and in addition a method proposed in SEED having adopted the modified parallel feistel structure shows more excellent secure function and/or fast processing ability. The used CAD Tool use Synopsys Ver. 1999. 10 in both of synthesis and simulation.

  • PDF

A Study on Analysis and Enhancement Strategy of South Korea's Defense Industry Exports Amidst Global Geopolitical Crisis (세계 지정학적 위기 속에서 한국의 방산수출 분석 및 강화 전략 연구)

  • Dongbum Kim;Youngsam Yoon
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.181-188
    • /
    • 2024
  • Amid global geopolitical crises that are heightening tensions worldwide, the importance of national security is being reevaluated. Consequently, South Korea is gaining attention in the global defense market due to its superior technology, competitive pricing, and rapid delivery capabilities. The increasing international demand for defense materials offers opportunities for the development of the domestic defense industry and has the potential to lead to long-term defense strategies and an expansion of exports. In particular, the development of future advanced weapons systems and the expansion of defense exports are likely to be possible through a deep understanding of the international political and economic situation and proactive defense diplomacy. This study analyzes the impact of current global geopolitical crises on Korea's defense industry and presents effective strategies based on these findings, including innovative improvements to defense acquisition systems and the discovery of overseas defense cooperation partners to strengthen defense exports. This strategic approach aims to balance domestic consumption with exports, enhance military strength, and improve the country's standing in the international community. Therefore, efforts are needed to ensure the sustainable growth of the defense industry, enabling South Korea to achieve economies of scale and play a pivotal role in the global defense industry.

Face Disguise Detection System Based on Template Matching and Nose Detection (탬플릿 매칭과 코검출 기반 얼굴 위장 탐지 시스템)

  • Yang, Jae-Jun;Cho, Seong-Won;Lee, Kee-Seong
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.22 no.1
    • /
    • pp.100-107
    • /
    • 2012
  • Recently the need for advanced security technologies are increasing as the occurrence of intelligent crime is growing fastly. Previous methods for face disguise detection are required for the improvement of accuracy in order to be put to practical use. In this paper, we propose a new disguise detection method using the template matching and Adaboost algorithm. The proposed system detects eyes based on multi-scale Gabor feature vector in the first stage, and uses template matching technique in oreder to increase the detection accuracy in the second stage. The template matching plays a role in determining whether or not the person of the captured image has sunglasses on. Adaboost algorithm is used to determine whether or not the person of the captured image wears a mask. Experimental results indicate that the proposed method is superior to the previous methods in the detection accuracy of disguise faces.

Fake Face Detection System Using Pupil Reflection (동공의 반사특징을 이용한 얼굴위조판별 시스템)

  • Yang, Jae-Jun;Cho, Seong-Won;Chung, Sun-Tae
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.5
    • /
    • pp.645-651
    • /
    • 2010
  • Recently the need for advanced security technologies are increasing as the occurrence of intelligent crime is growing fastly. Previous liveness detection methods are required for the improvement of accuracy in order to be put to practical use. In this paper, we propose a new fake image detection method using pupil reflection. The proposed system detects eyes based on multi-scale Gabor feature vector in the first stage, and uses template matching technique in oreder to increase the detection accuracy in the second stage. The template matching plays a role in determining the allowed eye area. The infrared image that is reflected in the pupil is used to decide whether or not the captured image is fake. Experimental results indicate that the proposed method is superior to the previous methods in the detection accuracy of fake images.

The Design and Implementation of Mobile base on Access Control System Using ZigBee Method (지그비 기술을 이용한 무선기반의 출입 통제 시스템 설계 및 구현)

  • Joo, Heon-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.2
    • /
    • pp.211-220
    • /
    • 2008
  • The home network technology which used USN is developing quickly. Use yet line to a lot of part as home network technology. Recently be leap into prominence to technology core of home network as wireless technology a ZigBee. ZigBee Perceive with cognition from tag and sensor as use USN, and processing, save, integration, and provide information. Implement the access control system which used technology BigBee with design at these papers. The wireless-based construction that used ZigBee. The influence that can let you implement early a Ubiquitous society is technology there being. Also, show by a large spinoff in an allied industry field, and improve the quality of life, and invention calls value added of leading edge IT service and product. The implementation of mobile base on access control system using zigbee method is expected to be helpful for the convenience in home network use.

  • PDF