• Title/Summary/Keyword: 컨테이너 보안

Search Result 109, Processing Time 0.027 seconds

A Study on Design of 2.45GHz and GPS antenna Integrated Board using Container security Device(ConTracer) (컨테이너 보안 장치(ConTracer)에 활용되는 2.45GHz 및 GPS 안테나 통합 보드 설계에 관한 연구)

  • Lee, Eun-Kyu;Moon, Young-Sik;Shin, Joong-Jo;Shon, Jung-Rock;Choi, Sung-Pill;Kim, Jae-Joong;Choi, Hyung-Rim
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.502-505
    • /
    • 2011
  • In this paper, A Design of 2.45GHz and GPS antenna Integrated Board using Container security Device(ConTracer) for container cargo transportation is proposed and experimentally evaluate. Integrated antenna board include 2.4GHz chip and Ceramic GPS antenna is also consider the impact of RF interference based on simulation for applied to steel container. After a careful comparison and analysis a part of the container door for its best performance, We conduct tests to characterize. The proposed integrated antenna board is suitable for container cargo transportation application in steel container field.

  • PDF

An Empirical Investigation on the Effect of Logistics Security in Import and Export Risk Management (물류보안이 수출입 리스크관리에 미치는 영향에 관한 실증연구)

  • Yi, Hong-Won;Kim, Jae-Bong
    • Journal of Navigation and Port Research
    • /
    • v.38 no.3
    • /
    • pp.317-325
    • /
    • 2014
  • The government of South Korea has introduced various security measures in the supply chain, such as CSI (including a 24-hour rule) and AEO (Authorized Economic Operator), in compliance with global security trends and the war on terror. However, many participants in the import and export process are still unfamiliar with the purposes and functions of CSI, the 24-hour rule, and AEO. As such, considering these risks as obstacles or as factors that interfere with the import and export process, this study suggests proper management schemes, which can identify, measure and evaluate these risks.

Design and Performance Evaluation for GPS/GLONASS Antenna used for Container tracking (컨테이너 위치 추적에 활용되는 GPS/GLONASS 안테나 설계 및 성능 검증)

  • Lee, Eun-Kyu;Choi, Sung-Pill;Moon, Young-Sik;Kim, Jae-Joong;Choi, Hyung-Rim
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.7
    • /
    • pp.1544-1550
    • /
    • 2013
  • In recent years, Container Security Device(CSD) using GPS & GLONASS to improve logistics efficiency are being extensively researched. The purpose of this paper is to examine the performance development antenna usable cargo container security transport. Antenna developed by study were optimized to match logistics environment apply to GPS/GLONASS dual frequency for monitering system. The measure of antenna have confirmation about frequency characteristics each 1575.42MHz, 1602MHz and VSWR is 2:1 measured in return loss -9.54dB. Reliability of this antenna has been verified about GPS/GLONASS through test-operation between the south korea and Russia.

물류보안평영시스템 도입에 따른 정책적 방향설정에 대한 연구

  • Kim, Hyeon
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2009.06a
    • /
    • pp.145-146
    • /
    • 2009
  • 우리나라는 최근 국제적으로 물류보안이 더욱 강화됨에 따라 항만뿐만 아니라 물류 전구간의 보안을 강화하는 여러 가지 조치를 도입하기 시작했다. 국토해양부는 국제선박 및 항만시설 보안에 관한 법률을 제정하는 것을 계기로 '항만 보안체제 정비 및 보안역량 강화방안'을 검토하고 있으며, 현재 국제적으로 강화되는 물류보안 추세를 우리나라 항만 경쟁력 제고에 활용하는 방안을 추진하고 있다. 물류보안의 관점에서 상품의 생산지에서 최종 소비지에 이르는 물류 전 구간에서 테러가 발생하는 경우 인명과 재산 피해는 물론 국제 교역로가 차단되는 물류 왜곡현상이 일어날 수 있다. 또한 선적항이나 양하 항에서 화물에 대한 안전조치를 강화하고, 컨테이너에 대한 검사비율을 높일 경우 화물의 지체 현상이 발생해 선박은 물론 화주에게도 막대한 피해를 줄 수 있을 것이다. 이러한 이유로 인하여 ISO 및 국제기구에서 요구하고 있는 물류보안 제도의 기준을 알아보고 대처방안과 정책적 추진사항을 제시하고자 한다.

  • PDF

Performance Analysis of Sharing Library in Various Container Runtime Environments for Serverless Computing (서버리스 컴퓨팅을 위한 다양한 컨테이너 런타임 환경에서 라이브러리 공유 성능 분석)

  • Kim, Sejin;Yu, Heonchang
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.113-115
    • /
    • 2020
  • 서버리스 컴퓨팅에는 가상머신보다 가벼운 장점을 지닌 컨테이너 기술이 많이 사용되었다. 하지만 여러 사용자들의 어플리케이션이 하나의 서버 인스턴스를 공유해서 사용하기 때문에, 취약점으로 인해서 여러 문제점이 생길 수 있다. 이에 서버리스 컴퓨팅 제공자들은 서버리스 컴퓨팅에 적합하며 보안을 강조한 기술들을 발표하고 있다. 대표적으로 구글에서 개발한 샌드박스 형태의 컨테이너 런타임을 제공하는 gVisor 와 오픈스택 재단에서 개발한 Kata Containers 가 있다. 본 논문에서는 미리 준비된 라이브러리를 공유하여 서버리스 컴퓨팅의 콜드 스타트를 완화시키는 관점에서, gVisor와 Kata Containers 환경에서 라이브러리를 불러올 때 기존의 도커 컨테이너 환경과의 차이를 비교하고 분석한다.

A Security Model for Duplication Resistant eSeal (복제 공격 저항성을 갖는 전자봉인 보안 모델)

  • Kim, Joo-Hae;Choi, Eun-Young;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.111-116
    • /
    • 2007
  • An eSeal(Electrical Seal) is an active RFID device which installed on the door of a container. The main role of the tag is to make sure the seal is not breaking by unauthorized people. Because an eSeal uses RFID system, we need to prevent eavesdrop and impersonate. Moreover, an eSeal which uses a secure protocol must not be able to duplicate. If duplication resistant property is not provide to a eSeal, an attacker may replace a object in the sealed container and reseal the container with duplicated eseal to hide breaking of the eSeal. In this paper, we provide a protocol which resist duplicate an eSeal during prevent eavesdrop and impersonation.

Analysis of the Impact of Host Resource Exhaustion Attacks in a Container Environment (컨테이너 환경에서의 호스트 자원 고갈 공격 영향 분석)

  • Jun-hee Lee;Jae-hyun Nam;Jin-woo Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.1
    • /
    • pp.87-97
    • /
    • 2023
  • Containers are an emerging virtualization technology that can build an isolated environment more lightweight and faster than existing virtual machines. For that reason, many organizations have recently adopted them for their services. Yet, the container architecture has also exposed many security problems since all containers share the same OS kernel. In this work, we focus on the fact that an attacker can abuse host resources to make them unavailable to benign containers-also known as host resource exhaustion attacks. Then, we analyze the impact of host resource exhaustion attacks through real attack scenarios exhausting critical host resources, such as CPU, memory, disk space, process ID, and sockets in Docker, the most popular container platform. We propose five attack scenarios performed in several different host environments and container images. The result shows that three of them put other containers in denial of service.

Comparative Analysis of Container for High Performance Computing

  • Lee, Jaeryun;Chae, Yunchang;Tak, Byungchul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.9
    • /
    • pp.11-20
    • /
    • 2020
  • In this paper, we propose the possibility of using containers in the HPC ecosystem and the criteria for selecting a proper PMI library. Although demand for container has been growing rapidly in the HPC ecosystem, Docker container which is the most widely used has a potential security problem and is not suitable for the HPC. Therefore, several HPC containers have appeared to solve this problem and the chance of performance differences also emerged. For this reason, we measured the performance difference between each HPC container and Docker container through NAS Parallel Benchmark experiment and checked the effect of the type of PMI library. As a result, the HPC container and the Docker container showed almost the same performance as native, or in some cases, rather better performance was observed. In the result of comparison between PMI libraries showed that PMIx was not superior to PMI-2 in all conditions.

A Case Study of Automation Management System of Damaged Container in the Port Gate (항만 게이트의 데미지 컨테이너 관리 자동화 시스템 구축 사례연구)

  • Cha, Sang-Hyun;Noh, Chang-Kyun
    • Journal of Navigation and Port Research
    • /
    • v.41 no.3
    • /
    • pp.119-126
    • /
    • 2017
  • As container vessels get larger, container terminals are also likely to grow. The problem that arises is that the growing volume should be handled in the same amount of time as before. Container terminals are introducing an automation system in order to overcome the limitations of existing manual methods and to continuously reduce operating expenses. Because, Manual handling of carrying containers gate in and out of terminals causes inaccurate data, which results in confusion. An alternative is for containers to be labeled with barcodes that can be scanned into a system with a scanner, but this takes quite a long time and is inconvenient. A RFID system, also known as a gate automation system, can solve these problems by reducing the time of gate management with a technology that detects number identification plates, helping operators more efficiently perform gate management work. Having said that, with this system, when container damage is detected, gate operators make and keep documents manually. These documents, which are insufficient evidence in proving container damage, result in customer claims. In addition, it is difficult for gate operators and other workers to manage containers, exposing them to danger and accidents. This study suggests that if an automation system is introduced at gates, containers can be managed by a video storage system in order to better document damage The video system maintains information on container damage, allowing operators the ability to search for videos they need upon customer request, also allowing them to be better prepared for customer claims. In addition, this system reduces necessary personnel and risk of accidents near gates by integrating a wide range of work.

Development of Digital Signal Processing Board for Detection Array Module Signal Processing System (Array 검출 Module 신호처리 System의 Digital Signal Processing Board 개발)

  • Park, Ge-O;Sung, So-Young;Kim, Young-kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.375-378
    • /
    • 2017
  • Shipping and logistics safety, security system is strengthening worldwide, the development of shipping and logistics safety security core technology for national security logistics system construction has been carried out. In addition, it is necessary to localize the Array Detection System, which is a core component of the container search machine, to cope with the 100% pre-inspection of the container scheduled for 2018 in the United States. In this paper, we propose a study on a self-developed Digital Signal Processing Board among the array detection systems that replace foreign products.

  • PDF