• Title/Summary/Keyword: Cyber-physical system

Search Result 225, Processing Time 0.027 seconds

UAV Path Creation Tool for Wildfire Reconnaissance in CPS Environment (CPS환경에서 산불 정찰을 위한 무인기 비행경로 생성 도구)

  • Ji-Won Jeong;Chang-Hui Bae;EuTeum Choi;SeongJin Lee
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.18 no.6
    • /
    • pp.327-333
    • /
    • 2023
  • Existing studies on the UAV (Unmanned Aerial Vehicle)-based CPS (Cyber Physical System) environment lack forest fire monitoring and forest fire reconnaissance using real-world UAVs. So, it is necessary to monitor forest fires early through CPS based on real-world UAVs with high reliability and resource management efficiency. In this paper presents an MFG (Misstion File Generater) that automatically generates a flight path of an UAV for forest fire monitoring in a CPS environment. MFG generates flight paths based on a hiking trail with a high fire probability due to a true story of an entrant. We have confirmed that the flight path generated by MFG can be applied to the UAV. Also, we have verified that the UAV flies according to the flight path generated by MFG in simulation, with a negligible error rate.

A Study on the Measures for the Development of Electronic Security in the 4th Industrial Revolution Era (4차 산업혁명 시대 Electronic Security 발전 방안에 관한 연구)

  • Kim, Min Su
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.109-114
    • /
    • 2020
  • Currently, in the 4th industrial revolution era(4IR), the convergent infrastructure has been established by actively utilizing data based on the existing digital technological innovation in the 3rd industrial revolution. Thus, the technological innovation based on the knowledge-information society needs to put innovative efforts for creating new business models in various areas. Thus, this study aims to present an Electronic Security Framework by suggesting the Cyber-Physical Security System(CPSS) that could more accurately predict and efficiently utilize it based on structured data obtained by collecting, analyzing, and processing an enormous amount of unstructured data which is a core technology distinguished from the 3rd industrial revolution.

Design and Load Map of the Next Generation Convergence Security Framework for Advanced Persistent Threat Attacks

  • Lee, Moongoo
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.3 no.2
    • /
    • pp.65-73
    • /
    • 2014
  • An overall responding security-centered framework is necessary required for infringement accidents, failures, and cyber threats. On the other hand, the correspondence structures of existing administrative, technical, physical security have weakness in a system responding to complex attacks because each step is performed independently. This study will recognize all internal and external users as a potentially threatening element. To perform connectivity analysis regarding an action, an intelligent convergence security framework and road map is suggested. A suggested convergence security framework was constructed to be independent of an automatic framework, such as the conventional single solution for the priority defense system of APT of the latest attack type, which makes continuous reputational attacks to achieve its goals. This study suggested the next generation convergence security framework to have preemptive responses, possibly against an APT attack, consisting of the following five hierarchical layers: domain security, domain connection, action visibility, action control, and convergence correspondence. In the domain, the connection layer suggests a security instruction and direction in the domains of administrative, physical and technical security. The domain security layer has consistency of status information among the security domain. A visibility layer of an intelligent attack action consists of data gathering, comparison and decision cycle. The action control layer is a layer that controls the visibility action. Finally, the convergence corresponding layer suggests a corresponding system of before and after an APT attack. The administrative security domain had a security design based on organization, rule, process, and paper information. The physical security domain is designed to separate into a control layer and facility according to the threats of the control impossible and control possible. Each domain action executes visible and control steps, and is designed to have flexibility regarding security environmental changes. In this study, the framework to address an APT attack and load map will be used as an infrastructure corresponding to the next generation security.

A security study for Control Network: Security Threat Using Control Protocol (제어 네트워크의 프로토콜을 이용한 보안 위협 연구)

  • Choi, DongJun;Lee, JaeWoo
    • The Journal of Society for e-Business Studies
    • /
    • v.25 no.2
    • /
    • pp.99-108
    • /
    • 2020
  • Unlike a general IT environment, an industrial control system is an environment where stability and continuity are more important than security. In the event of a security accident in the industrial control system, physical motion can be controlled, so physical damage can occur and physical damage can even result in personal injury. Cyber attacks on industrial control systems are not simply cyber damage, but terrorism. However, the security of industrial control systems has not been strengthened yet, and many vulnerabilities are actually occurring. This paper shows that the PLC can be remotely controlled by analyzing the connection process and packets for the PLC protocol used in the industrial control system and bypassing the security mechanism existing in the protocol. Through this, we intend to raise the security awareness of the industrial control system.

Design and Implementation of Real-Time Indirect Health Monitoring System for the Availability of Physical Systems and Minimizing Cyber Attack Damage (사이버 공격 대비 가동 물리장치에 대한 실시간 간접 상태감시시스템 설계 및 구현)

  • Kim, Hongjun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1403-1412
    • /
    • 2019
  • Effect of damage and loss cost for downtime is huge, if physical devices such as turbines, pipe, and storage tanks are in the abnormal state originated from not only aging, but also cyber attacks on the control and monitoring system like PLC (Programmable Logic Controller). To improve availability and dependability of the physical devices, we design and implement an indirect health monitoring system which sense temperature, acceleration, current, etc. indirectly, and put sensor data into Influx DB in real-time. Then, the actual performance of detecting abnormal state is shown using the indirect health monitoring system. Analyzing data are acquired using the real-time indirect health monitoring system, abnormal state and security threats can be double-monitored and lower maintenance cost utilizing prognostics and health management.

Detecting Malware in Cyberphysical Systems Using Machine Learning: a Survey

  • Montes, F.;Bermejo, J.;Sanchez, L.E.;Bermejo, J.R.;Sicilia, J.A.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.3
    • /
    • pp.1119-1139
    • /
    • 2021
  • Among the scientific literature, it has not been possible to find a consensus on the definition of the limits or properties that allow differentiating or grouping the cyber-physical systems (CPS) and the Internet of Things (IoT). Despite this controversy the papers reviewed agree that both have become crucial elements not only for industry but also for society in general. The impact of a malware attack affecting one of these systems may suppose a risk for the industrial processes involved and perhaps also for society in general if the system affected is a critical infrastructure. This article reviews the state of the art of the application of machine learning in the automation of malware detection in cyberphysical systems, evaluating the most representative articles in this field and summarizing the results obtained, the most common malware attacks in this type of systems, the most promising algorithms for malware detection in cyberphysical systems and the future lines of research in this field with the greatest potential for the coming years.

A Dream into Reality: Smart Internet of Things

  • Islam, Md. Motaharul;Hossain, Al Amin;Hasan, Md. Sabbir;Aazam, Mohammad;Morales, Mauricio Alejandro Gomez;Lee, Seung-Jin;Hung, Pham Phuoc;Huh, Eui-Nam
    • Annual Conference of KIPS
    • /
    • 2013.05a
    • /
    • pp.869-870
    • /
    • 2013
  • Once upon a time people dreamt for a connected world. But most of the people consider dream as simple as a dream. But when this dream come into reality, the dreamer sometimes alive and sometimes not. But the later generations get outcome from the visionary dream of the former. This is the way of life. If we consider the whole world as a cyber physical system, if everything connects everything, how do we feel then? It is the smart Internet of things that may connect the whole world. This paper addresses few challenges and opportunities of this envisioned connected World. We identify different systems as cyber physical system and it ultimately contribute to the cloud infrastructure.

Efficient Data Distribution Service in CPS (CPS에서 효율적인 데이터분배 기술)

  • Lee, Soo-Hyung;Kim, Won-Tae;Ryou, Jae-Cheol
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.7 no.5
    • /
    • pp.241-246
    • /
    • 2012
  • As the convergence between the conventional physical systems and IT computing resource is increased, the new paradigm of embedded system called Cyber Physical System (CPS) emerged. CPSs have many sensors, actuators and computing devices to understand and to control the physical system. As these all components are tightly coupled each other, standardized middleware such as Data Distribution Service (DDS) is considered to be deployed. But DDS takes too long time to discover each other in the large-scal CPS environment and has not precise specification of its execution architecture to provide efficient data exchange. In this paper, we design the efficient DDS architecture for development with interoperability to provide the high reliable data distribution. in real-time and propose the communication entity discovery procedure.

A Cyber-Physical Information System for Smart Buildings with Collaborative Information Fusion

  • Liu, Qing;Li, Lanlan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1516-1539
    • /
    • 2022
  • This article shows a set of physical information fusion IoT systems that we designed for smart buildings. Its essence is a computer system that combines physical quantities in buildings with quantitative analysis and control. In the part of the Internet of Things, its mechanism is controlled by a monitoring system based on sensor networks and computer-based algorithms. Based on the design idea of the agent, we have realized human-machine interaction (HMI) and machine-machine interaction (MMI). Among them, HMI is realized through human-machine interaction, while MMI is realized through embedded computing, sensors, controllers, and execution. Device and wireless communication network. This article mainly focuses on the function of wireless sensor networks and MMI in environmental monitoring. This function plays a fundamental role in building security, environmental control, HVAC, and other smart building control systems. The article not only discusses various network applications and their implementation based on agent design but also demonstrates our collaborative information fusion strategy. This strategy can provide a stable incentive method for the system through collaborative information fusion when the sensor system is unstable in the physical measurements, thereby preventing system jitter and unstable response caused by uncertain disturbances and environmental factors. This article also gives the results of the system test. The results show that through the CPS interaction of HMI and MMI, the intelligent building IoT system can achieve comprehensive monitoring, thereby providing support and expansion for advanced automation management.

Control measures in Cyberspace in the light of Rimland theory (림랜드 이론으로 본 사이버공간 통제방안 (북한의 사이버전 사례연구를 중심으로))

  • Dong-hyun Kim;Soo-jin Lee;Wan-ju Kim;Jae Sung Lim
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.11-16
    • /
    • 2022
  • Development of science technology make integrated CPS(Cyber-Physical System) appear. In CPS era, cyberspace and physical-space are hard to separate anymore, that is developing toward integrated CPS. The reality is not stopping, that is consistently changing and the concept of space is developing too. But several articles are considering for cyberspace and physical-space separately, and they are developing tailed alternative each case. The theorical approaching that is not considering reality is dwelled on past, and is dangerous from dropping down to floating cloud that is not considering progressed reality. This article is suggested to consider rimland theory to control measures in cyberspace. That is dedicated to integrated approaching from physical-space to cyberspace. And that is developing concreted controling measures in cyberspace. Especially, this article is suggested to policy alternative by analyzing north korea cyber warfare from rimland theory including human sources. Simplicity is the ultimate sophistication. This article make integrated approaching effects about cyberspace and physical-space to preparing in the CPS era.