• Title/Summary/Keyword: Cyber Safety

Search Result 272, Processing Time 0.022 seconds

A Research on Effective Cyber-Physical Systems Tests Using EcoHILS (EcoHILS를 활용한 효율적인 CPS 시험에 관한 연구)

  • Kim, Min-Jo;Kang, Sungjoo;Chun, In-Geol;Kim, Won-Tae
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.9 no.4
    • /
    • pp.211-217
    • /
    • 2014
  • Cyber-Physical Systems(CPS) that mostly provides safety-critical and mission-critical services requires high reliability, so that system testing is an essential and important process. Hardware-In-the-Loop Simulation(HILS) is one of the extensively used techniques for testing hardware systems. However, most conventional HILS has problems that it is difficult to support a distributed operating environment and to reuse a HILS platform. In this paper, we introduce EcoHILS(ETRI CPS Open Human-Interactive hardware-in-the-Loop Simulator) in order to test CPS effectively. Moreover, feasibility tests and performance tests of EcoHILS are performed to confirm its effectiveness.

Kalman Filter Based Resilient Cyber-Physical System and its Application to an Autonomous Vehicle (칼만필터를 이용한 사이버 물리 시스템의 자율 복원성 확보 기법 및 자율주행차량 적용 연구)

  • Kim, Jae-Hoon;Kim, Dong-Gil;Lee, Dong-Ik
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.14 no.5
    • /
    • pp.239-247
    • /
    • 2019
  • Recently, successful attacks on cyber-physical systems have been reported. As existing network security solutions are limited in preventing the system from malicious attacks, appropriate countermeasures are required from the perspective of the control. In this paper, the cyber and physical attacks are interpreted in terms of actuator and sensor attacks. Based on the interpretation, we suggest a strategy for designing Kalman filters to secure the resilience and safety of the system. Such a strategy is implemented in details to be applied for the lateral control of autonomous driving vehicle. A set of simulation results verify the performance of the proposed Kalman filters.

The Proposal of Installations Standards for Commercial Kitchen Automatic Fire System (상업용 주방자동소화장치 도입과 설치기준 제안)

  • Lee, Changwoo;Kang, Dowoo;Oh, Seungju;Ham, Eungu;Cho, Yongsun
    • Journal of the Society of Disaster Information
    • /
    • v.12 no.1
    • /
    • pp.89-97
    • /
    • 2016
  • According to the statistics released by Ministry of Public Safety and Security, the number of restaurant fires in Korea reached around 2,400 and 169 damages of human life and damages to property was approximately over $8.8 billion for recent 3 years. It could be desirable having automatic commercial fire-extinguishing equipment at commercial facilities excluding housing facilities for the safety, applying at the place first where it has been more risky and expected fire can be occurred relatively because economical burden can be accelerated. In order to do this, adjust its level to meet the same level of the kitchen for 'Specific Target for Fire Fighting' that "gas leak alarm" has be equipped relevant regulations and it is considered and reasonable to expand the limit of application gradually.

Analysis on The Characteristics of Occupancy Prediction and The Fire Hazard in Narrow Dwelling Space (협소 거주공간 재실자 특성 및 화재위험성 분석)

  • Lee, Changwoo;Oh, Seungju;Yoo, Juyoul;Kim, Jinsung;Cho, Ahra;Cho, Yongsun
    • Journal of the Society of Disaster Information
    • /
    • v.12 no.4
    • /
    • pp.342-349
    • /
    • 2016
  • The objectives of this study is analysis of the characteristics of fire risk and survey of narrow dwelling space(the Karaoke, Gosiwon etc). The narrow dwelling space has special structure characteristics; the narrow and the complex escape rote. Gosiwon have very separate and exclusive space room, so have the problem a suppression of fire. Furthermore almost Karaokes located in basement have a complex and limitary escape rote. Therefore we should research and development the exploration equipment that search a source of the fire and a emergency rescuer in the scene of the fire.

AC4E: An Access Control Model for Emergencies of Mission-Critical Cyber-Physical Systems

  • Chen, Dong;Chang, Guiran;Jia, Jie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2052-2072
    • /
    • 2012
  • Access control is an essential security component in protecting sensitive data and services from unauthorized access to the resources in mission-critical Cyber-Physical Systems (CPSs). CPSs are different from conventional information processing systems in such that they involve interactions between the cyber world and the physical world. Therefore, existing access control models cannot be used directly and even become disabled in an emergency situation. This paper proposes an adaptive Access Control model for Emergences (AC4E) for mission-critical CPSs. The principal aim of AC4E is to control the criticalities in these systems by executing corresponding responsive actions. AC4E not only provides the ability to control access to data and services in normal situations, but also grants the correct set of access privileges, at the correct time, to the correct set of subjects in emergency situations. It can facilitate adaptively responsive actions altering the privileges to specific subjects in a proactive manner without the need for any explicit access requests. A semiformal validation of the AC4E model is presented, with respect to responsiveness, correctness, safety, non-repudiation and concurrency, respectively. Then a case study is given to demonstrate how the AC4E model detects, responds, and controls the emergency events for a typical CPS adaptively in a proactive manner. Eventually, a wide set of simulations and performance comparisons of the proposed AC4E model are presented.

A Study on the Citation of Defense Cyber Protection Partnership for Safe Supply Chain Management (안전한 공급망 관리를 위한 국방사이버보호 파트너십 인증 방안 연구)

  • Kim, Jong-hwa;Kim, Yongchul;Kim, Kyoung Min;Kang, Jeongheung
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.101-107
    • /
    • 2019
  • Our military's cyberspace is under constant threat from the enemy. These cyber threats are targeted at the information service assets held by the military, and securing the security of the organization's information service assets is critical. However, since Information assets can not be 100% selt-sufficient in any organization as well as the military, acquisition of information assets by the supply chain is an inevitable. Therefor, after reviewing supply chain protection measures to secure the safety of the military supply chain, we proposed a method for securing supply chain companies through the citation of partnership based on the validated trust model.

Cyber Terror Threat Elimination Method Study for Safe Smart World (안전한 스마트월드를 위한 사이버 테러위협 제거 방안 연구)

  • Han, Choong-Hee;Han, ChangHee
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.107-113
    • /
    • 2021
  • Recently, large-scale research and efforts aimed at the smart world such as smart city, smart home, smart transportation, and smart care are continuing. As these smart worlds become more common, the expansion of connectivity with the Internet and the threat of cyber terrorism will be inevitable. Increasing the threat of cyber terrorism is increasing the likelihood of a massive disaster and safety accident. Therefore, in this paper, we examine smart worlds that are expanded in various forms and derive the security threat factors that smart worlds have. In addition, it is proposed to block the threat of terrorism from abroad if access from abroad is not required when constructing a smart world. Through this, we intend to present a method to eliminate cyber terror threats for the establishment and operation of a safe smart world.

An Efficient Anonymous Authentication Scheme with Secure Communication in Intelligent Vehicular Ad-hoc Networks

  • Zhang, Xiaojun;Mu, Liming;Zhao, Jie;Xu, Chunxiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3280-3298
    • /
    • 2019
  • Vehicular ad-hoc networks (VANETs) have become increasingly significant in intelligent transportation systems, they play a great role in improving traffic safety and efficiency. In the deployment of intelligent VANETs, intelligent vehicles can efficiently exchange important or urgent traffic information and make driving decisions. Meanwhile, secure data communication and vehicle's identity privacy have been highlighted. To cope with these security issues, in this paper, we construct an efficient anonymous authentication scheme with secure communication in intelligent VANETs. Combing the ElGamal encryption technique with a modified Schnorr signature technique, the proposed scheme provides secure anonymous authentication process for encrypted message in the vehicle-to-infrastructure communication model, and achieves identity privacy, forward security, and reply attack resistance simultaneously. Moreover, except the trusted authority (TA), any outside entity cannot trace the real identity of an intelligent vehicle. The proposed scheme is designed on an identity-based system, which can remove the costs of establishing public key infrastructure (PKI) and certificates management. Compared with existing authentication schemes, the proposed scheme is much more practical in intelligent VANETs.

Cloud Computing Based Analysis Incorporated with the Internet of Things (IoT) in Nuclear Safety Assessment for Fukushima Dai-ichi Disaster (후쿠시마 다이-이치 재해에 대한 원자력 안전 평가에서 사물 인터넷 (IoT)과 통합된 클라우드 컴퓨팅 기반 분석)

  • Woo, Tae-Ho;Jang, Kyung-Bae
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.1
    • /
    • pp.73-81
    • /
    • 2020
  • The internet of things (IoT) using cloud computing is applied to nuclear industry in which the nuclear power plant (NPP) accident is analyzed for the safety assessment. The Fukushima NPP accident is modeled for the accident simulations where the earthquake induced plant failure accident is used for analyzing the cloud computing technology. The fast and reasonable treatment in the natural disaster was needed in the case of the Fukushima. The real time safety assessment (RTSA) and the Monte-Carlo real time assessment (MCRTA) are constructed. This cloud computing could give the practicable method to prepare for the future similar accident.

The Study of Simulation for Reproduce Accidents of Narrow Dwelling Space (협소 거주공간 사고 재현을 위한 시뮬레이션 연구)

  • Lee, Changwoo;Choi, Beakyoul;Kim, Jinsung;Cho, Yongsun;Yoo, Juyoul
    • Journal of the Society of Disaster Information
    • /
    • v.12 no.3
    • /
    • pp.210-218
    • /
    • 2016
  • In this study, the fire analysis program FDS and Pathfinder was used to analysis a simulated accidental fire of a narrow dwelling space as a test bed. The results showed that the evacuation time of the H form internal building structure was the fastest at 285 seconds. In addition, when the automatic sprinkler system functioned with the entrances closed, the temperature distribution was lower and the visible smoke density was reduced.