• Title/Summary/Keyword: Cyber Architecture

Search Result 159, Processing Time 0.027 seconds

The Proposal of Installations Standards for Commercial Kitchen Automatic Fire System (상업용 주방자동소화장치 도입과 설치기준 제안)

  • Lee, Changwoo;Kang, Dowoo;Oh, Seungju;Ham, Eungu;Cho, Yongsun
    • Journal of the Society of Disaster Information
    • /
    • v.12 no.1
    • /
    • pp.89-97
    • /
    • 2016
  • According to the statistics released by Ministry of Public Safety and Security, the number of restaurant fires in Korea reached around 2,400 and 169 damages of human life and damages to property was approximately over $8.8 billion for recent 3 years. It could be desirable having automatic commercial fire-extinguishing equipment at commercial facilities excluding housing facilities for the safety, applying at the place first where it has been more risky and expected fire can be occurred relatively because economical burden can be accelerated. In order to do this, adjust its level to meet the same level of the kitchen for 'Specific Target for Fire Fighting' that "gas leak alarm" has be equipped relevant regulations and it is considered and reasonable to expand the limit of application gradually.

Design and Implementation of Green Light Optimal Speed Advisory Based on Reference Mobility Models (GLOSA-RMM) in Cyber-Physical Intersection Systems (CPIS) (사이버-물리 교차로 시스템에서 참조이동모형 기반 녹색신호 최적화 가속도 조언의 설계 및 구현)

  • Jeong, Han-You;Suramardhana, Tommy Adhyasa;Nguyen, Hoa-Hung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.8
    • /
    • pp.544-554
    • /
    • 2014
  • In this paper, we introduce a cyber-physical intersection systems (CPIS) which intimately interconnects roadside units (RSU) located at intersection, on-board units (OBU) of moving vehicles, and smartphone apps. Based on the architecture of CPIS, we also present a green light optimal speed advisory based on the reference mobility models (GLOSA-RMM) to reduce intersection stopping time (IST) and fuel consumption. Based on several reference mobility models, the GLOSA-RMM determines the appropriate speed advisory by taking into account the current mobility and the intersection traffic light status, and then provides screen/voice GLOSA instructions to minimize the driver's distraction. We show that the GLOSA-RMM can reduce both the IST and the fuel consumption through the numerical results obtained from the prototype of the CPIS consisting of the OBU, the RSU and the smartphone app.

A Study on Vulnerability of Cyber Electronic Warfare and Analysis of Countermeasures for swarm flight of the NBC Reconnaissance Drones (화생방 정찰 드론의 군집비행 시 사이버전자전 취약점 및 대응방안 분석)

  • Kim, Jee-won;Park, Sang-jun;Lee, Kwang-ho;Jung, Chan-gi
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.133-139
    • /
    • 2018
  • The 5 Game changer means the concepts of the army's operation against the enemy's asymmetric threats so that minimize damage to the public and leads to victory in war in the shortest time. A study of network architecture of Dronebot operation is a key study to carry out integrated operation with integrated C4I system by organically linking several drones battle groups through ICT. The NBC reconnaissance drones can be used instead of vehicles and humans to detect NBC materials and share situations quickly. However, there is still a lack of research on the swarm flight of the NBC reconnaissance drones and the weaknesses of cyber electronic warfare. In this study, we present weaknesses and countermeasures of CBRNs in swarm flight operations and provide a basis for future research.

  • PDF

An Architecture of a Dynamic Cyber Attack Tree: Attributes Approach (능동적인 사이버 공격 트리 설계: 애트리뷰트 접근)

  • Eom, Jung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.67-74
    • /
    • 2011
  • In this paper, we presented a dynamic cyber attack tree which can describe an attack scenario flexibly for an active cyber attack model could be detected complex and transformed attack method. An attack tree provides a formal and methodical route of describing the security safeguard on varying attacks against network system. The existent attack tree can describe attack scenario as using vertex, edge and composition. But an attack tree has the limitations to express complex and new attack due to the restriction of attack tree's attributes. We solved the limitations of the existent attack tree as adding an threat occurrence probability and 2 components of composition in the attributes. Firstly, we improved the flexibility to describe complex and transformed attack method, and reduced the ambiguity of attack sequence, as reinforcing composition. And we can identify the risk level of attack at each attack phase from child node to parent node as adding an threat occurrence probability.

VANET Privacy Assurance Architecture Design (VANET 프라이버시 보장 아키텍처 설계)

  • Park, Su-min;Hong, Man-pyo;Shon, Tae-shik;Kwak, Jin
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.81-91
    • /
    • 2016
  • VANET is one of the most developed technologies many people have considered a technology for the next generation. It basically utilizes the wireless technology and it can be used for measuring the speed of the vehicle, the location and even traffic control. With sharing those information, VANET can offer Cooperative ITS which can make a solution for a variety of traffic issues. In this way, safety for drivers, efficiency and mobility can be increased with VANET but data between vehicles or between vehicle and infrastructure are included with private information. Therefore alternatives are necessary to secure privacy. If there is no alternative for privacy, it can not only cause some problems about identification information but also it allows attackers to get location tracking and makes a target. Besides, people's lives or property can be dangerous because of sending wrong information or forgery. In addition to this, it is possible to be information stealing by attacker's impersonation or private information exposure through eavesdropping in communication environment. Therefore, in this paper we propose Privacy Assurance Architecture for VANET to ensure privacy from these threats.

Development of Virtual Classroom for Computer System Architecture based on the Flash ActionScript (플래시 액션스크립트 기반의 컴퓨터 시스템 구조 가상 학습실 개발)

  • Seo Ho-Joon
    • Journal of Engineering Education Research
    • /
    • v.7 no.4
    • /
    • pp.16-21
    • /
    • 2004
  • According to the appearance of various virtual websites using multimedia technologies for engineering education, the internet applications in engineering education have drawn much interests. But unidirectional communication, simple text/image based webpages and tedious learning process without motivation etc. have made the lowering of educational efficiency in cyberspace. Thus, to cope with these difficulties this paper presents a web-based educational Flash movies based on ActionScript language for understanding the principles of the computer system architecture. The proposed Flash movies provides the improved learning methods which can enhance the interests of learners. The results of this paper can be widely used to improve the efficiency of cyberlectures in the cyber university. Several sample Flash movies are illustrated to show the validity of the proposed learning method.

An Implementation of Remote Examination System on Internet using lava/SWING (Java를 이용한 인터넷기반 원격시 험시스템의 구현)

  • 김윤호;박운영
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.6
    • /
    • pp.915-922
    • /
    • 2002
  • This paper presents an implementation of an Remote Examination System on Internet using Java and SWING GUI API. The system is consisted of three parts: generating examination part that is Java application, answering questions part that is Java Applet, reviewing results part that is Java Applet. The first part is implemented with the 2-tier client/server architecture and the last two parts is implemented the 3-tier client/server architecture. Database programming is done using Java JDBC API for database independence and portability. This system can be used the evaluation of lectures, and substituted for pen-and-pencil examinations or adopted to survey applications based on Internet.

An Anonymous Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Biometrics and Smartcards

  • Reddy, Alavalapati Goutham;Das, Ashok Kumar;Yoon, Eun-Jun;Yoo, Kee-Young
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.3371-3396
    • /
    • 2016
  • Authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in computing technologies and associated constraints. Lu et al. recently proposed a biometrics and smartcards-based authentication scheme for multi-server environment. The careful analysis of this paper demonstrates Lu et al.'s protocol is susceptible to user impersonation attacks and comprises insufficient data. In addition, this paper proposes an improved authentication with key-agreement protocol for multi-server architecture based on biometrics and smartcards. The formal security of the proposed protocol is verified using the widely accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to ensure that our protocol can withstand active and passive attacks. The formal and informal security analysis, and performance analysis sections determines that our protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

A Study on Fire Risk Assessment of a EPS room using Fire Simulation (시뮬레이션 분석을 통한 EPS실 화재위험성 평가에 관한 연구)

  • Ham, Eungu;Kim, Dongcheol;Lee, Changwoo
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.4
    • /
    • pp.581-588
    • /
    • 2015
  • This study was conducted by utilizing simulation (FDS6) the fire characteristics of the flammable substances such as cable compartment of a small space in the EPS room type. In the partitioned space of a room EPS supply of oxygen does not facilitate the combustion of the upward-sloping curve, as in a standard fire curve is not observed. Simulation results in a situation where ventilation is limited to the heat release rate and smoke emission characteristics of the fire showed a complex and unstable form a repeating rise and fall. Fire time was longer than the fire load. Change in the smoke emission than the heat release rate is slow, but changes of the overall surface was found to exhibit affinity.

A Comprehensive Analyses of Intrusion Detection System for IoT Environment

  • Sicato, Jose Costa Sapalo;Singh, Sushil Kumar;Rathore, Shailendra;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.16 no.4
    • /
    • pp.975-990
    • /
    • 2020
  • Nowadays, the Internet of Things (IoT) network, is increasingly becoming a ubiquitous connectivity between different advanced applications such as smart cities, smart homes, smart grids, and many others. The emerging network of smart devices and objects enables people to make smart decisions through machine to machine (M2M) communication. Most real-world security and IoT-related challenges are vulnerable to various attacks that pose numerous security and privacy challenges. Therefore, IoT offers efficient and effective solutions. intrusion detection system (IDS) is a solution to address security and privacy challenges with detecting different IoT attacks. To develop an attack detection and a stable network, this paper's main objective is to provide a comprehensive overview of existing intrusion detections system for IoT environment, cyber-security threats challenges, and transparent problems and concerns are analyzed and discussed. In this paper, we propose software-defined IDS based distributed cloud architecture, that provides a secure IoT environment. Experimental evaluation of proposed architecture shows that it has better detection and accuracy than traditional methods.