• Title/Summary/Keyword: Cyber physical system

Search Result 221, Processing Time 0.02 seconds

A Study on the Possibility for Incident Investigation Using PLC Logs (PLC 로그의 사고조사 활용 가능성에 관한 연구)

  • Chang, Yeop;Kim, Taeyeon;Kim, Woo-Nyon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.745-756
    • /
    • 2020
  • An ICS(industrial control system) is a complex system that safely and efficiently monitors and controls industrial processes such as electric power, water treatment, transportation, automation plants and chemical plants. Because successful cyber attacks targeting ICS can lead to casualties or serious economic losses, it becomes a prime target of hacker groups sponsored by national state. Cyber campaigns such as Stuxnet, Industroyer and TRITON are real examples of successful ICS attacks, and were developed based on the deep knowledge of the target ICS. Therefore, for incident investigation of ICSs, inspectors also need knowledge of control processes and accident investigation techniques specialized for ICSs. Because there is no applicable technology, it is especially necessary to develop techniques and tools for embedded controllers located at cyber and physical boundaries. As the first step in this research, we reviewed logging capability of 4 PLC(Programmable Logic Controller)s widely used in an ICS area, and checked whether selected PLCs generate logs that can be used for digital investigation in the proposed cyber attack scenario.

THE REDEFINITION OF SUPPORT SYSTEM FOR LIFELONG EDUCATION FOR THE DEVELOPMENTAL DISABLED BASED ON UNIVERSITY: LEADING THE ESTABLISHMENT OF AN INTEGRATED COMPOSITION SYSTEM BETWEEN COOPERATION WITH LOCAL RELATED ORGANIZATIONS AND FOSTERING QUALIFICATIONS FOR PROFESSIONALS THROUGH CONNECTION WITH CURRICULUM BEYOND THE LEVEL OF USE OF PHYSICAL SPACE

  • Kim, Young-Jun;Kim, Wha-Soo;Rhee, Kun-Yong
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.52-60
    • /
    • 2021
  • This study is conducted with the aim of redefining the university-based lifelong education support system for developmental disabled. The research method consisted of procedures in parallel with literature analysis and expert meetings. As for the contents of the study, a composition system that recognized the problems and solutions of lifelong education for the developmental disabled based on universities was primarily presented. Through this, it was suggested that universities can form an academic foundation for the establishment of a lifelong education support system for the developmental disabled along with the convergence field. In addition, a structural model related to this was presented along with the aspect that universities could develop a curriculum for lifelong education for the developmental disabled according to the school foundation. Also, a composition system was suggested that universities can develop lifelong education curriculum for people with developmental disabilities to lead the cooperation of local related organizations such as welfare centers for the disabled and lifelong education centers for the developmentally disabled. As a result of the study, it was analyzed that leadership in the university-based lifelong education support system for developmental disabled can contribute to fostering professional manpower qualifications and establishing cooperation with local related organizations in an integrated composition system.

A Study on the Security Enhancement for Personal Healthcare Information of CloudHIS (CloudHIS의 개인 의료정보를 위한 보안강화에 관한 연구)

  • Cho, Young-Sung;Chung, Ji-Moon;Na, Won-Shik
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.9
    • /
    • pp.27-32
    • /
    • 2019
  • Along with the growth of u-Healthcare, we propose a security enhancement based on network separation for CloudHIS with for handling healthcare information to cope with cyber attack. To protect against all security threats and to establish clear data security policies, we apply desktop computing servers to cloud computing services for CloudHIS. Use two PCs with a hypervisor architecture to apply physical network isolation and select the network using KVM switched controller. The other is a logical network separation using one PC with two OSs, but the network is divided through virtualization. Physical network separation is the physical connection of a PC to each network to block the access path from both the Internet and the business network. The proposed system is an independent desktop used to access an intranet or the Internet through server virtualization technology on a user's physical desktop computer. We can implement an adaptive solution to prevent hacking by configuring the CloudHIS, a cloud system that handles medical hospital information, through network separation for handling security enhancement.

Experimental Implementation of Digital Twin Simulation for Physical System Optimization (물리시스템 최적화를 위한 디지털 트윈 시뮬레이션의 실험적 구현)

  • Kim, Kyung-Ihl
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.4
    • /
    • pp.19-25
    • /
    • 2021
  • This study proposes a digital twin implementation method through simulation so that the manufacturing process can be optimized in a manual manufacturing site. The scope of the proposal is a knowledge management mechanism that collects manual motion with a sensor and optimizes the manufacturing process with repetitive experimental data for motion recognition. In order to achieve the research purpose, a simulation of the distribution site was conducted, and a plan to create an optimized digital twin was prepared by repeatedly experiencing the work simulation based on the basic knowledge expressed by the worker's experience. As a result of the experiment, it was found that it is possible to continuously improve the manufacturing process by transmitting the result of configuring the optimized resources to the physical system by generating the characteristics of the work space configuration and working step within a faster time with the simulation that creates the digital twin.

A Study on CPS-based Mold Life-cycle Management System for Smart Factory (스마트 공장을 위한 CPS 기반 금형 수명 관리 시스템에 관한 연구)

  • Shin, Hyun-Jun;Kim, Sung-Jin;Oh, Chang-Heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.816-818
    • /
    • 2016
  • The Industry 4.0 should decide work operation of manufacture facilities by itself. But small and medium sized enterprises(SMEs) still not prepared these work operations. In this paper, we had research that work operation manufacture facilities of a management system of mold life-cycle based on CPS. The management system of mold manages life-cycle using by shot, this information offers users by cloud system. This system will help SMEs products quality improve and business operation more efficiency.

  • PDF

Study on the Characteristics of Media Environment of MRS (혼합현실공간(MRS)의 미디어환경 특성연구)

  • Han, Jung-Yeob;Ahn, Jin-Keun
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.11
    • /
    • pp.169-179
    • /
    • 2010
  • In these days, space design is evolving to the mixed reality space where fused on-line and off-line. But, standard and measure of mixed reality space has not been suggested and there has been little research about media environment and expression method as a mixed system either. That's why here I suggest four media environments and their characteristics that act not only as a critical point in the mixed reality space based on ubiquitous technology but also as a standard for spatial discerning. 1) Real space that is a media environment only seen by human visual and tactical sense is evolving using expression methods like new materials based on digital technology and LED. 2) Augmented reality space is a media environment using information instruments is expressed with diverse 2D and 3D contents. 3) Cyber Space is a environment depends totally on media instruments is produced by perfect graphic information without any spatial and physical limitations. 4) Augmented cyber space is realized only through the displays in cyber studio and is a space where real objects and graphic information are mixed. Depending on the purpose of the experience, media environment and expressional characteristics of mixed reality space can be fused, blended, and mixed, and that can be realized to the intelligent information space where one can experience without spatial, visual, informational limitations. In the future, studies on physical characteristics of contents according to the media environment characteristics are necessary.

A Study on the Application of Cybersecurity by Design of Critical Infrastructure (주요기반시설의 사전예방적보안(Cybersecurity by Design) 적용 방안에 관한 연구)

  • YOO, Jiyeon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.674-681
    • /
    • 2021
  • Cyber attacks targeting critical infrastructure are on the rise. Critical infrastructure is defined as core infrastructures within a country with a high degree of interdependence between the different structures; therefore, it is difficult to sufficiently protect it using outdated cybersecurity techniques. In particular, the distinction between the physical and logical risks of critical infrastructure is becoming ambiguous; therefore, risk management from a comprehensive perspective must be implemented. Accordingly, as a means of further actively protecting critical infrastructure, major countries have begun to apply their security and cybersecurity systems by design, as a more expanded concept is now being considered. This proactive security approach (CSbD, Cybersecurity by Design) includes not only securing the stability of software (SW) safety design and management, but also physical politics and device (HW) safety, precautionary and blocking measures, and overall resilience. It involves a comprehensive security system. Therefore, this study compares and analyzes security by design measures towards critical infrastructure that are leading the way in the US, Europe, and Singapore. It reflects the results of an analysis of optimal cybersecurity solutions for critical infrastructure. I would like to present a plan for applying by Design.

A Marketing Strategy Implementation for Korea Postal Service (마케팅 전략실행을 통한 우정서비스 경쟁력 강화방안)

  • Kim Yong-Shik
    • Management & Information Systems Review
    • /
    • v.3
    • /
    • pp.257-285
    • /
    • 1999
  • Korea Postal Service(KPS) nowadays lies in competitive environment with alternative business such as door-to-door delivery service. Customers began to complain about postal service quality and ask the government to reform a public firm through management innovation. But, Korea Postal Service has not met the break-even point between it's revenue and expenditure because the service is under the government system and cannot independently make major decisions on products, pricing, services, personnel management, financial policies and etc. The objective of this study is to provide marketing planners and practitioners with some guidelines when they establish marketing strategies and to help marketers on theories and practical instructions about postal service marketing when they interact with customers. I. A field survey on both customer satisfaction and internal staff satisfaction was conducted to get some ideas for the marketing strategy planning. II. Practical guidelines and instructions were made for marketers to communicate with customers in various areas such as pricing, product, service demand, marketing channel, promotion, and etc. III. Some suggestions on marketing policies for planners and mangers in the marketing strategy were described including personnel resource as well as physical resource. IV. Special issues on small packet market and direct mail market were discussed and some alternative solutions were proposed. V. Database marketing strategy was emphasized to get new business opportunities such as direct mail, and to provide differential services to customers as much as their contribution into the profitability for KPS. VI. Cyber Post Office should be constructed on Internet to provide new services which are combined with physical material flow and information technologies.

  • PDF

Design and Implementation of Building Control System based 3D Modeling (3D 모델링 기반 빌딩관제시스템의 설계 및 구현)

  • Moon, Sang Ho;Kim, Byeong Mok;Lee, Gye Eun
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.5
    • /
    • pp.673-682
    • /
    • 2020
  • Buildings are becoming more and more high-rise and large-scale in recent years, so in the event of a disaster such as a fire, enormous human and economic damage is expected. Therefore, management, security, and fire control are essential for large buildings in the city. Because these large buildings are very complex outside and inside, they need a three-dimensional control based on 3D modeling rather than a simple flat-oriented control. To do this, this paper designed and implemented a building control system based on 3D modeling. Specifically, we designed a 3D building / facility editing module for 3D modeling of buildings, a 3D based control module for building control, and a linkage module that connects information such as firefighting equipment, electrical equipment and IoT equipment. Based on this design, a building control system based on 3D modeling was implemented.

Design and Implementation of a CAN Data Analysis Test Bench based on Raspberry Pi

  • Pant, Sudarshan;Lee, Sangdon
    • Journal of Multimedia Information System
    • /
    • v.6 no.4
    • /
    • pp.239-244
    • /
    • 2019
  • With the development of Cyber-Physical Systems(CPS), several technologies such as automation control, automotive and intelligent house systems have been developed. To enable communication among various components of such systems, several wired and wireless communication protocols are used. The Controller Area Network(CAN) is one of such wired communication protocols that is popularly used for communication in automobiles and other machinery in the industry. In this paper, we designed and implemented a response time analysis system for CAN communication. The reliable data transfer among various electronic components in a significant time is crucial for the smooth operation of an electric vehicle. Therefore, this system is designed to conveniently analyze the response time of various electronic components of a CAN enabled system. The priority for transmission of the messages in the CAN bus is determined by the message identifier. As the number of nodes increases the transmission of low priority messages is delayed due to the existence of higher priority messages on the bus. We used Raspberry Pi3 and PiCAN2 board to simulate the data transfer for studying the comparative delay in low priority nodes.