• Title/Summary/Keyword: Control System Security

Search Result 1,725, Processing Time 0.033 seconds

A Study on the MS-WP Cryptographic Processor for Wireless Security Transmission Network among Nodes of Water-Processing Measurement-Control-Equipment (수처리 계측제어설비 노드들 간의 무선 안전 전송을 위한 MS-WP 암호 프로세서에 관한 연구)

  • Lee, Seon-Keun;Yu, Chool;Park, Jong-Deok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.3
    • /
    • pp.381-387
    • /
    • 2011
  • Measurement controller that acquire and control and observe data from scattering sensors is organic with central control room. Therefore, measurement controller is efficient wireless network than wire network. But, serious problem is happened in security from outside if use wireless network. Therefore, this paper proposed suitable MS-WP cryptographic system to measurement control wireless network to augment network efficiency of measure controller. Result that implement proposed MS-WP cryptographic system by chip level and achieve a simulation, confirmed that 130% processing rate increase and system efficiency are increased double than AES algorithm. Proposed MS-WP cryptographic system augments security and is considered is suitable to measurement controller because that low power is possible and the processing speed is fast.

Remote Secure Entrance Control System using RFID and TCP/IP (RFID와 TCp/IP를 활용한 원격 보안 출입 제어 시스템)

  • Kim, Jeong-Sook;Kim, Cheon-Shik;Yoon, Eun-Jun;Hong, You-Sik
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.6
    • /
    • pp.60-67
    • /
    • 2008
  • At present, RFID system is highly welcomed as a substitute system with its bar code recognition system and self recognition equipment. Consequently, the system has multi applications and can be complementing to its security. In particular, RFID system is significantly related with electronic transaction equipments : transportation card, ID card in check point, attendance sheet. Based upon these characteristic, the system is becoming extremely popular in the field of logistics, harbor and stock management, animal control and product circulation & distribution. In this dissertation, I would like to present a more efficient and stable remote entry control system with the network-based TCP/IP. It is a simple example of ubiquitous computing function. Above all, approved protocol system should be applied to the remote entry control function. Its efficient function with the applied approval protocol based-remote entry control system should be confirmed. Therefore, a preliminary test should be prerequisite in automatic entrance function with the embedded and TCP/IP-based RFID system.

GDPR Compliant Blockchain Based Access Control(GCBAC) (GDPR 준수 가능한 블록체인 기반 접근제어 시스템)

  • Lim, Joon Ho;Chun, Ji Young;Noh, Geontae;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.981-997
    • /
    • 2020
  • Blockchain technology can provide a high level security based on a decentralized distributed ledger and consensus-based structure. In order to increase the utilization of blockchain technology, it is necessary to find a way to use it in fields that require personal data processing such as health care and e-commerce. To achieve this goal, the blockchain based system should be able to comply with data privacy regulations represented by European Union(EU)'s GDPR(General Data Protection Regulation). However, because of the properties of the blockchain like the immutability and decentralized recorded data, it is difficult to technically implement the requirements of the existing privacy regulations on the blockchain. In this paper, we propose a multi-chain based access control system that can guarantee the rights of the personal data subject required by GDPR by utilizing Chameleon Hash and Attribute Based Encryption (ABE). Finally, we will show through security analysis that our system can handle personal data while maintaining confidentiality and integrity.

A Study on the Integration Control System Development for Smoke Control (연기제어를 위한 통합제어시스템 개발에 관한 연구)

  • Lee, Dong-Myung
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.6 no.4 s.23
    • /
    • pp.15-20
    • /
    • 2006
  • This study developed integration control system that improve efficiency and give flexibility of smoke control system and can improve prevention of disasters performance. The reliable each kind sensor and of integration control system was developed by establishing the specifications, algorithms and constructing engineering data. More correct and reliable control function of optimization can be obtained by the central control from integration control system rather than the existent individual control. This sees to do to impose flexibility to smoke control system. Also, this will provide the basics of integration control system and ability security of smoke control system and can construct smoke control system of performance based.

A Development of Web-based Integrated Security Management System for Firewalls (웹 기반의 방화벽 통합 보안 관리 시스템 개발)

  • Lee, Dong-Young;Kim, Dong-Soo;Hong, Seung-Sun;Chung, Tai-Myoung
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.10
    • /
    • pp.3171-3181
    • /
    • 2000
  • With a remarkable growth and expansionof Internet, the security issues emerged from intrusions and attacks such as computer viruses, dental of servives and backings to destroy intormation have been considered as serious threats for Internet and the provate networks. To protect networks from those attacks, many nendors have developed various security systems such as firewalls, intrusion detection systems, and access control systems. However managing those systems individually requres too much work and high cost. Thus, integrated security managemanet and eatabliashment of consistent security policy for various security products has become more important. In this paper, we propose integrated security manabement system called WISMSF(Web based Integrated Security Management System for Fireswalls) to monitor and contro various kinds of firewalls WISMSF consists of three components-clients, integrated engine, and agents. It supports the transparent management functions of security products, easy ways of defining security policies, and simple expansion of managed ranges.

  • PDF

A Study on Application Methodology of SPDL Based on IEC 62443 Applicable to SME Environment (중소기업환경에서 적용 가능한 IEC 62443 기반의 개발 보안 생애주기 프로세스 적용 방안 연구)

  • Jin, Jung Ha;Park, SangSeon;Kim, Jun Tae;Han, Keunhee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.6
    • /
    • pp.193-204
    • /
    • 2022
  • In a smart factory environment in a small and medium-sized enterprise (SME) environment, sensors and actuators operating on actual manufacturing lines, programmable logic controllers (PLCs) to manage them, human-machine interface (HMI) to control and manage such PLCs, and consists of operational technology server to manage PLCs and HMI again. PLC and HMI, which are in charge of control automation, perform direct connection with OT servers, application systems for factory operation, robots for on-site automation, and production facilities, so the development of security technology in a smart factory environment is demanded. However, smart factories in the SME environment are often composed of systems that used to operate in closed environments in the past, so there exist a vulnerable part to security in the current environment where they operate in conjunction with the outside through the Internet. In order to achieve the internalization of smart factory security in this SME environment, it is necessary to establish a process according to the IEC 62443-4-1 Secure Product Development Life cycle at the stage of smart factory SW and HW development. In addition, it is necessary to introduce a suitable development methodology that considers IEC 62443-4-2 Component security requirements and IEC 62443-3 System security requirements. Therefore, this paper proposes an application plan for the IEC 62443 based development security process to provide security internalization to smart factories in an SME environment.

Image Features Based Secure Access Control for Data Content Protection (데이터 내용 보호를 위한 이미지 특징 기반의 보안 접근 제어)

  • Ha, Sunju;Park, Daechul
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.171-180
    • /
    • 2013
  • Data security is always an important issue. In particular, the current emerging cloud computing system inevitably raises the issue of data security. However, data security is no longer safe with a simple way, but requires rather advanced method to secure the data. In this paper, instead of exploiting the existing text-based cryptography approach an image-based access control of data content is studied to present a higher level of data security. Color key chain is generated both using histogram value of the original image, and the location information and featured color information extracted by geometric transformation to form the security key to access secure data content. Finally, the paper addresses design interface and implementation for data content access control for evaluation of the proposed scheme.

An Implementation of NEIS′DB Security Using RBAC based on PMI (PMI기반의 RBAC를 이용한 NEIS의 DB 보안 구현)

  • Ryoo Du-Gyu;Moon Bong-Keun;Jun Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.31-45
    • /
    • 2004
  • Public Key Infrastructure(PKI) provides a strong authentication. Privilege Management Infrastructure(PMI) as a new technology can provide user's attribute information. The main function of PMI is to give more specified authority and role to user. To authenticate net and role, we have used digital signature. Role Based Access Control(RBAC) is implemented by digital signature. RBAC provides some flexibility for security management. NEIS(National Education Information System) can not always provide satisfied quality of security management. The main idea of the proposed RNEIS(Roll Based NEIS) is that user's role is stored in AC, access control decisions are driven by authentication policy and role. Security manager enables user to refer to the role stored in user's AC, admits access control and suggests DB encryption by digital signature.

A Testbed for the Security Issues of Limited-resource Internet Appliances

  • Vorapojpisut, S.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.762-766
    • /
    • 2004
  • This paper introduces a testbed which is suitable for the study of security issues arising in applications involving internet appliances. The testbed implements secure door locks by utilizing the intranet in the building and is composed of two main parts, namely a database server and door locks each of which equipped with a custom-made embedded system. The main objective is to provide a platform for teaching the conflict among real-time specifications, security requirements, and limited-resource constraints. After definitions of threat, vulnerability, and attack are given, we discuss how the testbed can be applied as an education tool for these concepts. Finally, the effects of sequential and multitasking operations are given as a case study.

  • PDF

Requirements analysis of high-speed recording and playback capabilities in the vessel traffic control system (해상교통관제시스템에서 고속 배속을 지원하기 위한 녹화재생 기능 요구사항 분석)

  • Oh, Seung-Hee;Lee, Byung-Gil
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2013.10a
    • /
    • pp.125-127
    • /
    • 2013
  • 해상교통관제시스템(Vessel Traffic System: VTS)에서는 해상 사건/사고를 사후 확인하거나 해상 교통량 확인을 위해 사용하기 위한 목적으로 VTS에서 발생하는 데이터를 저장 및 관리한다. 특정 지역에 대한 장시간 교통량 확인에서는 녹화된 재생 데이터를 고속 배속으로 실행시켜 살펴보는 것이 시간 단축에 큰 도움이 된다. 그런데 일반 영상이 아닌 VTS 서브 시스템간 주고 받은 메시지와 영상이 포함된 VTS 녹화재생에서는 고속 배속을 지원하는데 자연스럽지 않은 문제점이 발생하고 있다. 따라서 본 논문에서는 VTS 녹화재생 기능이 고속 배속을 지원하기 위해 필요한 요구사항을 분석한다.

  • PDF