• Title/Summary/Keyword: Drone Security

Search Result 148, Processing Time 0.026 seconds

A study on Improving the Performance of Anti - Drone Systems using AI (인공지능(AI)을 활용한 드론방어체계 성능향상 방안에 관한 연구)

  • Hae Chul Ma;Jong Chan Moon;Jae Yong Park;Su Han Lee;Hyuk Jin Kwon
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.19 no.2
    • /
    • pp.126-134
    • /
    • 2023
  • Drones are emerging as a new security threat, and the world is working to reduce them. Detection and identification are the most difficult and important parts of the anti-drone systems. Existing detection and identification methods each have their strengths and weaknesses, so complementary operations are required. Detection and identification performance in anti-drone systems can be improved through the use of artificial intelligence. This is because artificial intelligence can quickly analyze differences smaller than humans. There are three ways to utilize artificial intelligence. Through reinforcement learning-based physical control, noise and blur generated when the optical camera tracks the drone may be reduced, and tracking stability may be improved. The latest NeRF algorithm can be used to solve the problem of lack of enemy drone data. It is necessary to build a data network to utilize artificial intelligence. Through this, data can be efficiently collected and managed. In addition, model performance can be improved by regularly generating artificial intelligence learning data.

A Study on Application Methods of Drone Technology (드론기술 적용 방안 연구)

  • Kim, Hee-Wan
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.6
    • /
    • pp.601-608
    • /
    • 2017
  • In the fourth industrial revolution, drones are an important element to lead the industry by converging with information technology. Drones are developing various technologies by combining with communication / navigation / traffic management technology, control and detection / avoidance technology, sensor technology, SW and application technology. However, there are various problems in order to settle the drone technology. In this paper, it will be examined the problems of application of drones through application fields of drones, domestic and foreign cases, and core technologies of drones. The growth of the drone market requires improvement of laws and institutions. This paper proposed security vulnerability, privacy and safety problem in wireless communication, and present technical and management problems for drone service in the Korean environment in particular.

A General Acoustic Drone Detection Using Noise Reduction Preprocessing (환경 소음 제거를 통한 범용적인 드론 음향 탐지 구현)

  • Kang, Hae Young;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.881-890
    • /
    • 2022
  • As individual and group users actively use drones, the risks (Intrusion, Information leakage, and Sircraft crashes and so on) in no-fly zones are also increasing. Therefore, it is necessary to build a system that can detect drones intruding into the no-fly zone. General acoustic drone detection researches do not derive location-independent performance by directly learning drone sound including environmental noise in a deep learning model to overcome environmental noise. In this paper, we propose a drone detection system that collects sounds including environmental noise, and detects drones by removing noise from target sound. After removing environmental noise from the collected sound, the proposed system predicts the drone sound using Mel spectrogram and CNN deep learning. As a result, It is confirmed that the drone detection performance, which was weak due to unstudied environmental noises, can be improved by more than 7%.

Analysis of the Possibility of Recovering Deleted Flight Records by DJI Drone Model (DJI 드론 모델별 삭제 비행기록 복구 가능성 분석)

  • YeoHoon Yoon;Joobeom Yun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.4
    • /
    • pp.609-619
    • /
    • 2023
  • Recently, crimes using drones, one of the IoT industries have been continuously reported. In particular, drones are characterized by easy access and free movement, so they are used for various crimes such as transporting explosives, transporting drugs, and illegal recording. In order to analyze and investigate these criminal acts, drone forensic research is highly emphasized. Media data, PII, and flight records are digital forensic artifacts that can be acquired from drones, in particluar flight records are important artifacts since they can be used to trace drone activities. Therefore, in this paper, the characteristics of the deleted flight record files of DJI drones are presented and verified using the Phantom3, Phantom4 andMini2 models, two drones with differences in characteristics. Additionally, the recovery level is analyzed using the flight record file characteristics, and lastly, drones with the capacity to recover flight records for each drone model and drone models without it are classified.

Data access control of KP-ABE scheme for secure communication in drone environment

  • Hwang, Yong-Woon;Kim, Su-Hyun;Lee, Im-Yeong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.4
    • /
    • pp.53-60
    • /
    • 2022
  • Recently, as the amount of data collected by drones has rapidly increased, it is necessary to support cloud computing technology that can securely and efficiently store and process data. However, various security threats such as stealing, leaking, or tampering with data communicated by drones can occur due to attackers. Therefore, there is a need for security technology to provide secure communication of data collected from drones. Among various security technologies, the KP-ABE scheme, which is attribute-based encryption, is a security technology that satisfies two characteristics: data encryption and user access control. This paper researched the KP-ABE scheme and proposed a secure data access control scheme to the drone environment. This proposed scheme provides confidentiality and integrity of data communicated in a drone environment and secure access control and availability. In addition, it provides a fast ciphertext search and constant size ciphertext among the requirements to be provided in the KP-ABE scheme.

A Proposal for Drone Entity Identification and Secure Information Provision Technology Using Quantum Entropy Chip-Based Cryptographic Module in WLAN Environment (무선랜 환경에서 양자 엔트로피 칩 기반 암호모듈을 적용한 드론 피아식별과 안전한 정보 제공 기술 제안)

  • Jung, Seowoo;Yun, Seunghwan;Yi, Okyeon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.891-898
    • /
    • 2022
  • Along with global interest, drones are expanding the base of utilization such as transportation of goods, forest protection, and safety management, and cluster flights are being applied in various fields such as military operations and environmental monitoring. Currently, specialized networks such as e-UM 5G for services in specific industries are being established in Korea. In this regard, drone systems are also moving to establish specialized networks to provide services that are fused with AI and autonomous flight. As drones converge with various services, various security threats in various environments are also subordinated, and in response, requirements and guidelines for drone security are being prepared in Korea. In this paper, we propose a technology method for peer identification and safe information provision between cluster flight drones by utilizing a cryptographic module equipped with wireless LAN and quantum entropy-based random number generator in a cluster flight system and a mobile communication network such as e-UM 5G.

Deregulation Necessity for the Invigoration of Drone Utilization in the Geospatial Information Field

  • Heo, Joonghyeok;Park, Joonkyu
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.40 no.4
    • /
    • pp.351-357
    • /
    • 2022
  • In this study, a direction for deregulation that can increase the use of drones in the field of spatial information is presented. Regulations and administrative procedures for drone operation showed similar procedures in Japan, the United States, and Korea, such as reporting flight equipment, driver's license, and prohibition of flying within a specific flight zone. In the United States, policies to encourage the use of commercial drones have been implemented, and Japan has slightly tightened regulations on drone operation to protect the Olympics and important national facilities. As a result of the study, in the area where drone operation is restricted for geospatial data construction, Korea was setting the largest area, and GIS analysis showed that Korea's drone flight restricted area was more than 19.4% of the country's land area. In order to increase the utilization of drones in the construction and utilization of spatial information in the future, it is necessary to reset the drone flight restriction zone and reduce the area of the drone flight restriction zone. In addition, it was found that Korea is the only country that has formal and specific regulations on geospatial information security management. In order to increase the construction of geospatial information using drones, it is necessary to ease GSD (Ground Sample Distance)regulations.

Design of a Static ARP Table Management xApp for an E2 Interface Security in Open RAN (Open RAN에서의 E2 인터페이스 보호를 위한 정적 ARP 테이블 관리 xApp 설계)

  • Jihye Kim;Jaehyoung Park;Jong-Hyouk Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.381-382
    • /
    • 2024
  • Open RAN(Radio Access Network)을 선도적으로 연구하고 있는 O-RAN Alliance에서는 Open RAN의 E2 인터페이스에서 발생 가능한 보안 위협 중 하나로 MitM(Man-in-the-Middle) 공격을 명시하였다. 그러나 이에 대응하기 위한 보안 요구사항으로는 3계층 보안 프로토콜인 IPsec 사용을 명시하고 있으며, 2계층 공격인 ARP(Address Resolution Protocol) 스푸핑에 대한 요구사항은 명시하고 있지 않다. 따라서 본 논문에서는 MitM 공격 중 하나인 ARP 스푸핑으로부터 E2 인터페이스를 보호하기 위해, Near-RT RIC의 ARP 테이블에서 E2 인터페이스로 연결되는 장비에 대한 MAC 주소를 정적으로 설정할 수 있는 xApp을 제안한다.

Efficient Scheduling Algorithm for drone power charging

  • Tajrian, Mehedi;Kim, Jai-Hoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.05a
    • /
    • pp.60-61
    • /
    • 2019
  • Drones are opening new horizon as a major Internet-of-Things (IoT) player which is a network of objects. Drone needs to charge itself during providing services from the charging stations. If there are lots of drones and one charging station, then it is a critical situation to decide which drone should get charged first and make order of priorities for drones to get charged sequentially. In this paper, we propose an efficient scheduling algorithm for drone power charging (ESADPC), in which charging station would have a scheduler to decide which drone can get charged earlier among many other drones. Simulation results have showed that our algorithm reduces the deadline miss ration and turnaround time.

Interoperable Attribute-based Access Control Framework for Heterogeneous IoT Platforms (이기종 사물인터넷 플랫폼 간의 상호운용 가능한 속성기반 접근제어 프레임워크)

  • Kang, Giluk;Koo, Jahoon;Kim, Young-Gab
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.11a
    • /
    • pp.219-221
    • /
    • 2022
  • 현재 사물인터넷 플랫폼이 활발히 개발됨에 따라, 이를 기반으로 사용자에게 많은 서비스가 제공되고 있다. 그러나 플랫폼들이 독자적으로 개발되고 있어 상호운용이 보장되지 못하고 있는 상황이다. 특히, 플랫폼마다 리소스를 표현하는 방식이 서로 불일치하여 리소스가 공유되더라도 이기종 플랫폼의 사용자는 리소스를 사용할 수 없는 문제가 있다. 더욱이 각각의 플랫폼들이 다양한 접근제어 모델을 사용함에 따라, 이기종 플랫폼의 사용자가 리소스 접근을 요청하더라도 인증/인가를 수행할 수 없는 상황이다. 결과적으로, 이러한 상호운용성 문제는 사물인터넷의 주요 목적인 초연결성을 달성하는 데 한계를 가져오고 있다. 이에, 본 논문에서는 이기종 사물인터넷 플랫폼 간의 상호운용이 가능한 속성기반 접근제어 프레임워크를 제안하고자 한다. 본 프레임워크는 MDR(Metadata Registry)를 기반으로 속성기반 접근제어를 위한 속성 불일치 문제를 해결하고 허가형 블록체인을 이용하여 속성기반 접근제어를 사용하지 않는 플랫폼이라도 접근제어에 대한 상호운용을 달성할 수 있도록 한다.