• Title/Summary/Keyword: AIS network

Search Result 60, Processing Time 0.026 seconds

Harbor management network using Wireless-LAN. (무선랜을 이용한 항만관리통신망)

  • 강민수;성길영;이상욱;김현덕;박연식
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.4
    • /
    • pp.782-786
    • /
    • 2004
  • The Wireless-LAN was developed and Wired-LAN substitution from the field which the space where it is restricted is special it used. But, from the field which is various the use is attempted to listen to recently. The shedding of blood which the oceanic accident which occurs recently5 year for is principal is The GMDSS with the formation vessel which is managed with agreement depends here upon and it is a collision of the small-sized vessel which is not managed. Cause the Facilities for the safety-communications system is not introduced is the actual condition in poverty of the small-sized vessel. In this study, recently with the AIS where becomes the introduction it proposed similar function the system which is cheap it does.

Intrusion Detection System of Network Based on Biological Immune System (생체 면역계를 이용한 네트워크 침입탐지 시스템)

  • Sim, Kwee-Bo;Yang, Jae-Won;Lee, Dong-Wook;Seo, Dong-Il;Choi, Yang-Seo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.12 no.5
    • /
    • pp.411-416
    • /
    • 2002
  • Recently, the trial and success of malicious cyber attacks has been increased rapidly with spreading of Internet and the activation of a internet shopping mall and the supply of an online internet, so it is expected to make a problem more and more. Currently, the general security system based on Internet couldn't cope with the attack properly, if ever, other regular systems have depended on common softwares to cope with the attack. In this paper, we propose the positive selection mechanism and negative selection mechanism of T-cell, which is the biological distributed autonomous system, to develop the self/non-self recognition algorithm, the anomalous behavior detection algorithm, and AIS (Artificial Immune System) that is easy to be concrete on the artificial system. The proposed algorithm can cope with new intrusion as well as existing one to intrusion detection system in the network environment.

Navigational Anomaly Detection using a Traffic Network Model (교통 네트워크 모델 기반 이상 운항 선박 식별에 관한 연구)

  • Jaeyong Oh;Hye-Jin Kim
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.29 no.7
    • /
    • pp.828-835
    • /
    • 2023
  • Vessel traffic service operators (VTSOs) need to quickly and accurately analyze the maritime traffic situation in the vessel traffic service (VTS) area and provide information to the vessels. However, if traf ic increases rapidly, the workload of VTSOs increases, and they may not be able to provide adequate information. Therefore, it is essential to develop VTSO support technologies that can reduce their workload and provide consistent information. In this paper, we propose a model for automatically detecting abnormal vessels in the VTS area. The proposed model consists of a positional model and a contextual model and is specifically optimized for the traffic characteristics of the target area. The implemented model was tested by using real-world data collected at a test center (Daesan Port VTS). Our experiments confirmed that the model could automatically detect various abnormal situations, and the results were validated through expert evaluation.

Design of Network Attack Detection and Response Scheme based on Artificial Immune System in WDM Networks (WDM 망에서 인공면역체계 기반의 네트워크 공격 탐지 제어 모델 및 대응 기법 설계)

  • Yoo, Kyung-Min;Yang, Won-Hyuk;Kim, Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.4B
    • /
    • pp.566-575
    • /
    • 2010
  • In recent, artificial immune system has become an important research direction in the anomaly detection of networks. The conventional artificial immune systems are usually based on the negative selection that is one of the computational models of self/nonself discrimination. A main problem with self and non-self discrimination is the determination of the frontier between self and non-self. It causes false positive and false negative which are wrong detections. Therefore, additional functions are needed in order to detect potential anomaly while identifying abnormal behavior from analogous symptoms. In this paper, we design novel network attack detection and response schemes based on artificial immune system, and evaluate the performance of the proposed schemes. We firstly generate detector set and design detection and response modules through adopting the interaction between dendritic cells and T-cells. With the sequence of buffer occupancy, a set of detectors is generated by negative selection. The detection module detects the network anomaly with a set of detectors and generates alarm signal to the response module. In order to reduce wrong detections, we also utilize the fuzzy number theory that infers the degree of threat. The degree of threat is calculated by monitoring the number of alarm signals and the intensity of alarm occurrence. The response module sends the control signal to attackers to limit the attack traffic.

Online Identification for Normal and Abnormal Status of Water Quality on Ocean USN (해양 USN 환경에서 수질환경의 온라인 정상·비정상 상태 구분)

  • Jeoung, Sin-Chul;Ceong, Hee-Taek
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.4
    • /
    • pp.905-915
    • /
    • 2012
  • This paper suggests the online method to identify normal and abnormal state of water quality on the ocean USN. To define normal of the ocean water quality, we utilize the negative selection algorithm of artificial immunity system which has self and nonself identification characteristics. To distinguish abnormal status, normal state set of the ocean water quality needs to be defined. For this purpose, we generate normal state set base on mutations of each data and mutation of the data as logical product. This mutated normal (or self) sets used to identify abnormal status of the water quality. We represent the experimental result about mutated self set with the Gaussian function. Through setting the method on the ocean sensor logger, we can monitor whether the ocean water quality is normal or abnormal state by online.

Real-time monitoring of berthing/deberthing operations process for entering/leaving vessels using VTS system in Busan northern harbor, Korea (부산 북항에서 VTS 시스템에 의한 출입항 선박의 접이안 작업과정의 실시간 모니터링)

  • Lee, Dae-Jae
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.45 no.3
    • /
    • pp.165-176
    • /
    • 2009
  • The process of berthing/deberthing operations for entering/leaving vessels in Busan northern harbor was analyzed and evaluated by using an integrated VTS(vessel traffic service) system installed in the ship training center of Pukyong National University, Busan, Korea. The integrated VTS system used in this study was consisted of ARPA radar, ECDIS(electronic chart display and information system), backup(recording) system, CCTV(closed-circuit television) camera system, gyro-compass, differential GPS receiver, anemometer, AIS(automatic identification system), VHF(very high frequency) communication system, etc. The network of these systems was designed to communicate with each other automatically and to exchange the critical information about the course, speed, position and intended routes of other traffic vessels in the navigational channel and Busan northern harbor. To evaluate quantitatively the overall dynamic situation such as maneuvering motions for target vessel and its tugboats while in transit to and from the berth structure inside a harbor, all traffic information in Busan northern harbor was automatically acquired, displayed, evaluated and recorded. The results obtained in this study suggest that the real-time tracking information of traffic vessels acquired by using an integrated VTS system can be used as a useful reference data in evaluating and analyzing exactly the dynamic situation such as the collision between ship and berth structure, in the process of berthing/deberthing operations for entering/leaving vessels in the confined waters and harbor.

A Hybrid Course-Based Routing Protocol Suitable for Vessel Ad Hoc Networks (선박 애드 혹 네트워크에 적합한 복합적 항로기반 경로배정 프로토콜)

  • Son, Joo-Young;Mun, Seong-Mi
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.32 no.5
    • /
    • pp.775-784
    • /
    • 2008
  • It is not easy to access very high speed Internet services at sea due to some technical and economical problems. In order to realize the very high speed Internet services at sea like on land, new communication network models based on MANET should be adopted. In this paper, a new MANET model at sea is provided, which considered the ocean environments, and the characteristics and movement of vessels. On the basis of the fact that most vessels navigate on the predetermined courses, which are the shortest paths between source and destination ports in most cases, a type of location oriented routing protocol is proposed in this paper. The Hybrid Course-Based Routing Protocol(HCBR) makes use of the static information such as courses and positions of ports to proactively find the shortest paths not only among ports but also the cross points of courses. HCBR also makes use of the locational information of vessels obtained via GPS and AIS systems to reactively discover the shortest route by which data packets are delivered between them. We have simulated the comparison of the performance of HCBR with those of LAR scheme 1 and scheme2, the most typical protocols using geographical information. The simulation results show that HCBR guarantees the route discovery even without using any control packet. They also show that HCBR is more reliable(40%) and is able to obtain more optimal routes(10%) than LAR scheme1 and scheme2 protocols.

Verification of a Communication Method Secure against Attacks Using Convergence Hash Functions in Inter-vehicular Secure Communication (차량간 보안 통신에서 융합 해시함수를 이용하여 공격에 안전한 통신방법 검증)

  • Lee, Sang-Jun;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.9
    • /
    • pp.297-302
    • /
    • 2015
  • The increase in applying IT to vehicles has given birth to smart cars or connected cars. As smarts cars become connected with external network systems, threats to communication security are on the rise. With simulation test results supporting such threats to Convergence security in vehicular communication, concerns are raised over relevant vulnerabilities, while an increasing number of studies on secure vehicular communication are published. Hacking attacks against vehicles are more dangerous than other types of hacking attempts because such attacks may threaten drivers' lives and cause social instability. This paper designed a Convergence security protocol for inter-vehicle and intra-vehicle communication using a hash function, nonce, public keys, time stamps and passwords. The proposed protocol was tested with a formal verification tool, Casper/FDR, and found secure and safe against external attacks.

Examining the Generative Artificial Intelligence Landscape: Current Status and Policy Strategies

  • Hyoung-Goo Kang;Ahram Moon;Seongmin Jeon
    • Asia pacific journal of information systems
    • /
    • v.34 no.1
    • /
    • pp.150-190
    • /
    • 2024
  • This article proposes a framework to elucidate the structural dynamics of the generative AI ecosystem. It also outlines the practical application of this proposed framework through illustrative policies, with a specific emphasis on the development of the Korean generative AI ecosystem and its implications of platform strategies at AI platform-squared. We propose a comprehensive classification scheme within generative AI ecosystems, including app builders, technology partners, app stores, foundational AI models operating as operating systems, cloud services, and chip manufacturers. The market competitiveness for both app builders and technology partners will be highly contingent on their ability to effectively navigate the customer decision journey (CDJ) while offering localized services that fill the gaps left by foundational models. The strategically important platform of platforms in the generative AI ecosystem (i.e., AI platform-squared) is constituted by app stores, foundational AIs as operating systems, and cloud services. A few companies, primarily in the U.S. and China, are projected to dominate this AI platform squared, and consequently, they are likely to become the primary targets of non-market strategies by diverse governments and communities. Korea still has chances in AI platform-squared, but the window of opportunities is narrowing. A cautious approach is necessary when considering potential regulations for domestic large AI models and platforms. Hastily importing foreign regulatory frameworks and non-market strategies, such as those from Europe, could overlook the essential hierarchical structure that our framework underscores. Our study suggests a clear strategic pathway for Korea to emerge as a generative AI powerhouse. As one of the few countries boasting significant companies within the foundational AI models (which need to collaborate with each other) and chip manufacturing sectors, it is vital for Korea to leverage its unique position and strategically penetrate the platform-squared segment-app stores, operating systems, and cloud services. Given the potential network effects and winner-takes-all dynamics in AI platform-squared, this endeavor is of immediate urgency. To facilitate this transition, it is recommended that the government implement promotional policies that strategically nurture these AI platform-squared, rather than restrict them through regulations and stakeholder pressures.

A Ship-Wake Joint Detection Using Sentinel-2 Imagery

  • Woojin, Jeon;Donghyun, Jin;Noh-hun, Seong;Daeseong, Jung;Suyoung, Sim;Jongho, Woo;Yugyeong, Byeon;Nayeon, Kim;Kyung-Soo, Han
    • Korean Journal of Remote Sensing
    • /
    • v.39 no.1
    • /
    • pp.77-86
    • /
    • 2023
  • Ship detection is widely used in areas such as maritime security, maritime traffic, fisheries management, illegal fishing, and border control, and ship detection is important for rapid response and damage minimization as ship accident rates increase due to recent increases in international maritime traffic. Currently, according to a number of global and national regulations, ships must be equipped with automatic identification system (AIS), which provide information such as the location and speed of the ship periodically at regular intervals. However, most small vessels (less than 300 tons) are not obligated to install the transponder and may not be transmitted intentionally or accidentally. There is even a case of misuse of the ship'slocation information. Therefore, in this study, ship detection was performed using high-resolution optical satellite images that can periodically remotely detect a wide range and detectsmallships. However, optical images can cause false-alarm due to noise on the surface of the sea, such as waves, or factors indicating ship-like brightness, such as clouds and wakes. So, it is important to remove these factors to improve the accuracy of ship detection. In this study, false alarm wasreduced, and the accuracy ofship detection wasimproved by removing wake.As a ship detection method, ship detection was performed using machine learning-based random forest (RF), and convolutional neural network (CNN) techniquesthat have been widely used in object detection fieldsrecently, and ship detection results by the model were compared and analyzed. In addition, in this study, the results of RF and CNN were combined to improve the phenomenon of ship disconnection and the phenomenon of small detection. The ship detection results of thisstudy are significant in that they improved the limitations of each model while maintaining accuracy. In addition, if satellite images with improved spatial resolution are utilized in the future, it is expected that ship and wake simultaneous detection with higher accuracy will be performed.