• Title/Summary/Keyword: Container Security

Search Result 111, Processing Time 0.026 seconds

A Study on The Development of Container Security Device(CSD) based on Active RFID (능동형 RFID 기반 컨테이너 보안 장치(CSD)의 개발에 관한 연구)

  • Choi, Hyung-Rim;Kim, Jae-Joong;Kang, Moo-Hong;Shin, Joong-Jo;Shon, Jung-Rock;Moon, Young-Sik;Lee, Eun-Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2B
    • /
    • pp.244-251
    • /
    • 2010
  • CSD is Active RFID based Container Security Device which is proposed by the U.S Department of Home Security. It is mounted inside the container to sense opening of the container door. ConTracer is the CSD which is developed in this research whose major features are sensing door opening status as well as history inquiring on internal environment and shock to the container by mounting the temperature/humidity/shock sensors. Moreover, its RFID frequency bandwidth uses 433MHz and 2.4GHz to correspond actively to the radio regulations used by different countries. This paper introduces the development trend of CSD, compares the ConTracer which is developed thru this research and other company's CSD, and introduces CSD System which is designed and established using ConTracer. Finally, the implemented CSD System is verified by applying the demonstration service to container distribution between Korea and China.

Performance Evaluation for 2.45GHz Antenna used for Container security Device(Con Tracer) (컨테이너 보안 장치(ConTracer)에 활용되는 2.45GHz 안테나에 대한 성능 검증)

  • Lee, Eun-Kyu;Shon, Jung-Rock;Choi, Sung-Pill;Moon, Young-Sik;Kim, Jae-Joong;Choi, Hyung-Rim
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.8
    • /
    • pp.1642-1646
    • /
    • 2011
  • In this paper, A Design of 2.45GHz and GPS antenna Integrated Board using Container security Device(ConTracer) for container cargo transportation is proposed and experimentally evaluate. Integrated antenna board include 2.4GHz chip and Ceramic GPS antenna is also consider the impact of RF interference based on simulation for applied to steel container. After a careful comparison and analysis a part of the container door for its best performance, We conduct tests to characterize. The proposed integrated antenna board is suitable for container cargo transportation application in steel container field.

A Study for a Methodology to Analyze Container Delays versus Security (보안대비 컨테이너 지연분석을 위한 방법론적 연구)

  • Yoon, Dae-Gwun
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.13 no.1 s.28
    • /
    • pp.47-54
    • /
    • 2007
  • After September 11, 2001, the United State's Customs and Border Protection (CBP) has set up inspection stations in seaport terminals. The inspection station, however, may directly and indirectly affect delay time in the seaports, increasing by especially high and severe level of security. This paper studies for a methodology to analyze container delays versus security incurring by the various layouts of the inspection station in the United States.

  • PDF

Exploratory Study on Enhancing Cyber Security for Busan Port Container Terminals (부산항 컨테이너 터미널 사이버 보안 강화를 위한 탐색적 연구)

  • Do-Yeon Ha;Yul-Seong Kim
    • Journal of Navigation and Port Research
    • /
    • v.47 no.6
    • /
    • pp.437-447
    • /
    • 2023
  • By actively adopting technologies from the Fourth Industrial Revolution, the port industry is trending toward new types of ports, such as automated and smart ports. However, behind the development of these ports, there is an increasing risk of cyber security incidents and threats within ports and container terminals, including information leakage through cargo handling equipment and ransomware attacks leading to disruptions in terminal operations. Despite the necessity of research to enhance cyber security within ports, there is a lack of such studies in the domestic context. This study focuses on Busan Port, a representative port in South Korea that actively incorporates technology from the Fourth Industrial Revolution, in order to discover variables for improving cyber security in container terminals. The research results categorized factors for enhancing cyber security in Busan Port's container terminals into network construction and policy support, standardization of education and personnel training, and legal and regulatory factors. Subsequently, multiple regression analysis was conducted based on these factors, leading to the identification of detailed factors for securing and enhancing safety, reliability, performance, and satisfaction in Busan Port's container terminals. The significance of this study lies in providing direction for enhancing cyber security in Busan Port's container terminals and addressing the increasing incidents of cyber security attacks within ports and container terminals.

Long-Term Container Allocation via Optimized Task Scheduling Through Deep Learning (OTS-DL) And High-Level Security

  • Muthakshi S;Mahesh K
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.4
    • /
    • pp.1258-1275
    • /
    • 2023
  • Cloud computing is a new technology that has adapted to the traditional way of service providing. Service providers are responsible for managing the allocation of resources. Selecting suitable containers and bandwidth for job scheduling has been a challenging task for the service providers. There are several existing systems that have introduced many algorithms for resource allocation. To overcome these challenges, the proposed system introduces an Optimized Task Scheduling Algorithm with Deep Learning (OTS-DL). When a job is assigned to a Cloud Service Provider (CSP), the containers are allocated automatically. The article segregates the containers as' Long-Term Container (LTC)' and 'Short-Term Container (STC)' for resource allocation. The system leverages an 'Optimized Task Scheduling Algorithm' to maximize the resource utilisation that initially inquires for micro-task and macro-task dependencies. The bottleneck task is chosen and acted upon accordingly. Further, the system initializes a 'Deep Learning' (DL) for implementing all the progressive steps of job scheduling in the cloud. Further, to overcome container attacks and errors, the system formulates a Container Convergence (Fault Tolerance) theory with high-level security. The results demonstrate that the used optimization algorithm is more effective for implementing a complete resource allocation and solving the large-scale optimization problem of resource allocation and security issues.

Kubernetes of cloud computing based on STRIDE threat modeling (STRIDE 위협 모델링에 기반한 클라우드 컴퓨팅의 쿠버네티스(Kubernetes)의 보안 요구사항에 관한 연구)

  • Lee, Seungwook;Lee, Jaewoo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.7
    • /
    • pp.1047-1059
    • /
    • 2022
  • With the development of cloud computing technology, container technology that provides services based on a virtual environment is also developing. Container orchestration technology is a key element for cloud services, and it has become an important core technology for building, deploying, and testing large-scale containers with automation. Originally designed by Google and now managed by the Linux Foundation, Kubernetes is one of the container orchestrations and has become the de facto standard. However, despite the increasing use of Kubernetes in container orchestration, the number of incidents due to security vulnerabilities is also increasing. Therefore, in this paper, we study the vulnerabilities of Kubernetes and propose a security policy that can consider security from the initial development or design stage through threat analysis. In particular, we intend to present a specific security guide by classifying security threats by applying STRIDE threat modeling.

Policy Based Cloned CSD Detection Mechanism in Logistics (항만 물류 환경에서의 복제된 CSD 탐지를 위한 정책 기반 복제 탐지 매커니즘)

  • Hwang, Ah-Reum;Suh, Hwa-Jung;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.1
    • /
    • pp.98-106
    • /
    • 2012
  • CSD(Container Security Device) is a security device with sensors that can detect the abnormal behavior such as illegal opening of a container door. Since the CSD provides security and safety of the container, CSD should not only provide security services such as confidentiality and integrity but also cloning detection. If we can not detect the cloned CSD, an adversary can use the cloned CSD for many illegal purposes. In this paper, we propose a policy based cloned CSD detection mechanism. To evaluate proposed clone detection mechanism, we have implemented the proposed scheme and evaluated the results.

A Study on Impact of the U.S. Security Initiatives on Korean Participants in Global Supply Chain (미국물류보안규범이 우리나라의 공급망 참여자에 미치는 영향과 대응방안)

  • Huh, Eun-Sook
    • International Commerce and Information Review
    • /
    • v.10 no.1
    • /
    • pp.217-236
    • /
    • 2008
  • The purpose of this paper is to discuss the impact of the New Container Security Initiatives of U.S., CSI(Container Security Initiative) and C-TPAT(Customs-Trade Partnership against Terrorism). The CSI which aims to pre-screen high-risk containers in ports of loading. It is a unilateral effort that seeks to develop bi-lateral agreements between the United States and foreign countries with significant container trade volumes into the U.S. C-TPAT is a voluntary initiative to develop cooperative security relationships between the U.S. government and U.S. firms in the global supply chain. Government and Industry have already responded with proposals to create more confidence in supply chain security. These proposals call for heightened inspection and scrutiny of the goods flowing through a supply chain, increased information exchange among participants of supply chain. While government and the private sector are working together to launch new initiative to create more secure and reliable supply chains, industry is rapidly exploring the potential of new technologies such as RFID. The security recommendations will eventually become the requirements to be complied with by importers and their supplier extending to the carriers. It is needed that Korean shippers involved in US importer's supply chain should pay attention to the requirements and start implementing the security measures.

  • PDF

Development of Smartphone Application for Monitoring Container Cargo (컨테이너화물 모니터링을 위한 스마트폰 애플리케이션 개발)

  • Choi, Hyung-Rim;Son, Hee-Mok
    • Journal of Information Technology Services
    • /
    • v.13 no.1
    • /
    • pp.209-220
    • /
    • 2014
  • Most of monitoring systems in logistics industry have limitations on monitoring container information in real-time. And customers only could check information gathered from certain points through web browser. That is why it is very hard to take actions in advance when emergency situation has happened. But if customers could check information such as position and status of freight in real-time through their mobile devices, they could take prompt actions. So, in this study, mobile application based on mobile devices is developed to monitor position and status information of the container in real-time. Entire devices monitoring container in aspect of logistics security are handled by workers in the field. So it is strongly required to develop monitoring system operated in mobile devices. For that reason this study aims to develop mobile application in order to monitor information related to container security and safety in real-time.

A Study on Pipeline Design Methods for Providing Secure Container Image Registry (안전한 컨테이너 이미지 레지스트리 제공을 위한 파이프라인 설계 방안에 관한 연구)

  • Seong-Jae Ko;Sun-Jib Kim
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.3
    • /
    • pp.21-26
    • /
    • 2023
  • The development and distribution approach of applications is transitioning from a monolithic architecture to microservices and containerization, a lightweight virtualization technology, is becoming a core IT technology. However, unlike traditional virtual machines based on hypervisors, container technology does not provide concrete security boundaries as it shares the same kernel. According to various preceding studies, there are many security vulnerabilities in most container images that are currently shared. Accordingly, attackers may attempt exploitation by using security vulnerabilities, which may seriously affect the system environment. Therefore, in this study, we propose an efficient automated deployment pipeline design to prevent the distribution of container images with security vulnerabilities, aiming to provide a secure container environment. Through this approach, we can ensure a safe container environment.