• Title/Summary/Keyword: Embedded System Security

Search Result 225, Processing Time 0.027 seconds

Design of User Certification Module of Home Gateway System based on OSGi (OSGi 기반 홈게이트웨이 시스템의 사용자 인증 모듈 설계)

  • Myung, Sun-Kyu;Kim, Gwang-Hyun
    • Convergence Security Journal
    • /
    • v.10 no.2
    • /
    • pp.27-35
    • /
    • 2010
  • We implemented an application system which is able to verify visitor identification for remote bundle control based on OSGi and web camera control using embedded linux system. This system are designed open Oscar framework by porting java on the embedded linux system and implemented web camera system in local area networks. Also This system can verify information of visitor from receiving the data of RFID reader and designed the wireless internet system in home. Basically, in this paper we expect that home network system development and the period of application service development are reduced with integrated service provision based on OSGi.

Implementation and Performance Analysis of Partition-based Secure Real-Time Operating System (파티션 기반 보안 실시간 운영체제의 구현 및 성능 분석)

  • Kyungdeok Seo;Woojin Lee;Byeongmin Chae;Hoonkyu Kim;Sanghoon Lee
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.99-111
    • /
    • 2022
  • With current battlefield environment relying heavily on Network Centric Warfare(NCW), existing weaponary systems are evolving into a new concept that converges IT technology. Majority of the weaponary systems are implemented with numerous embedded softwares which makes such softwares a key factor influencing the performance of such systems. Furthermore, due to the advancements in both IoT technoogies and embedded softwares cyber threats are targeting various embedded systems as their scope of application expands in the real world. Weaponary systems have been developed in various forms from single systems to interlocking networks. hence, system level cyber security is more favorable compared to application level cyber security. In this paper, a secure real-time operating system has been designed, implemented and measured to protect embedded softwares used in weaponary systems from unknown cyber threats at the operating system level.

Omnidirectional Camera System Design for a Security Robot (경비용 로봇을 위한 전방향 카메라 장치 설계)

  • Kim, Kilsu;Do, Yongtae
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.3 no.2
    • /
    • pp.74-81
    • /
    • 2008
  • This paper describes a low-cost omnidirectional camera system designed for the intruder detection capability of a security robot. Moving targets on sequential images are detected first by an adaptive background subtraction technique, and the targets are identified as intruders if they fail to enter a password within a preset time. A warning message is then sent to the owner's mobile phone. The owner can check scene pictures posted by the system on the web. The system developed worked well in experiments including a situation when the indoor lighting was suddenly changed.

  • PDF

Development of an Indoor Networked Security Robot System (네트워크 기반 실내 감시 로봇 시스템 개발)

  • Park, Keun Young;Heo, Guen Sub;Lee, Sang Ryong;Lee, Choon Young
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.3 no.3
    • /
    • pp.136-142
    • /
    • 2008
  • Mobile robots can offer services like intelligent monitoring in an indoor environment using network connection with remote users. In this paper, we designed and developed a networked security robot system with various sensors, such as flame detector, gas detector, sound monitoring module, and temperature sensor, etc. The robot can be accessed through a web service and the user can check the status of the environment. Using ADAMS software, we defined the motor specification for a worst-case condition of climbing over a obstacle. We applied the robot system in monitoring office condition.

  • PDF

Tracking of Moving Object Based on Embedded System (임베디드 기반의 이동물체 추적)

  • Jung, Dae-Yung;Lee, Sang-Lak;Choi, Han-Go
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2005.11a
    • /
    • pp.209-212
    • /
    • 2005
  • This paper describes detection and tracking of a moving object for unmanned visual surveillance. security systems. Using images obtained from camera it detects and tracks a moving object and displays bounding box enclosing the moving object. The algorithm for detection and tracking is tested using a personal computer, and then implemented on EMPOS II embedded system. Simulation results show that the tracking of a moving object based on embedded system is working well. However it needs to improve image acquisition time for real time implementation to apply security systems.

  • PDF

A Lightweight Packet Filter for Embedded System (임베디드 시스템을 위한 경량의 패킷필터)

  • Lee, Byong-Kwon;Jeon, Joong-Nam
    • The KIPS Transactions:PartC
    • /
    • v.13C no.7 s.110
    • /
    • pp.813-820
    • /
    • 2006
  • The advance of computer and communication technologies enables the embedded systems to be equipped with the network communication interfaces. Their appearance in network leads to security issues on the embedded systems. An easy way to overcome the security problem is to adopt the packet filter that is implemented in the general computer systems. However, general packet filters designed for host computers are not suitable to embedded systems because of their complexity. In this paper, we propose a lightweight packet filter for embedded systems. The lightweight packet filter is implemented in the kernel code. And we have installed a Web-GUI interface for user to easily set the filtering policies at remote space. The experimental results show that the proposed packet filter decreases the packet delivery time compared to the packet filter designed for host computers and it is comparable to the systems without packet filter.

A Testbed for the Security Issues of Limited-resource Internet Appliances

  • Vorapojpisut, S.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.762-766
    • /
    • 2004
  • This paper introduces a testbed which is suitable for the study of security issues arising in applications involving internet appliances. The testbed implements secure door locks by utilizing the intranet in the building and is composed of two main parts, namely a database server and door locks each of which equipped with a custom-made embedded system. The main objective is to provide a platform for teaching the conflict among real-time specifications, security requirements, and limited-resource constraints. After definitions of threat, vulnerability, and attack are given, we discuss how the testbed can be applied as an education tool for these concepts. Finally, the effects of sequential and multitasking operations are given as a case study.

  • PDF

Development of an Image Tracking System Using an USB Camera on an Embedded System (USB Camera를 이용한 이미지 트래킹을 위한 Pan/Tilt 제어용 Embedded System 개발)

  • Kim, Hie-Sik;Nam, Chul;Ayurzana, Odgera;Ha, Kwan-Yong
    • Proceedings of the KIEE Conference
    • /
    • 2005.05a
    • /
    • pp.182-184
    • /
    • 2005
  • An embedded system has been applied to many fields including households and industrial sites. The embedded system is implemented fur image tracking in security area. This system supports a fixed IP far the reliable server operation on TCP/IP networks. A real time video image on the is analyzed to detect a certain invader who jumped into the observed area. The digital camera is connected at the USB host port of the target board. The video images from the video camera is continuously analyzed and displayed at the Linux web-server. The moving vector of the invaders on the continuous image frames is calculated and then it sends the calculated pan/tilt movement. That used Block matching algorithm and edge detection algorithm for past speed. And the displacement vector is used at pan/tilt motor control through RS232 serial cable. The experiment result showed tracking performance by the moving part speed of 10 to 150 pixels/sec.

  • PDF

A Study on the Development Site Security for Embedded Software (임베디드 소프트웨어 개발현장보안에 관한 연구)

  • Yeo, Sang-Soo;Kim, Tai-Hoon;Cho, Sung-Eon;Kouich, Sakurai
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.3
    • /
    • pp.259-265
    • /
    • 2007
  • Systematic components for implementing ubiquitous computing, for example, electronic devices, electric home appliances, and controllers, etc, are consist of not only circuits but also softwares expected to do some special system-controlling functions, and these softwares used to be called like as embedded software. Because embedded software is a core component controlling systems, the codes or control flows should be protected from being opened to the public or modified. Embedded software security can be divided into 2 parts: first is the unauthorized access to development site and embedded software, second is the unauthorized disclosure or modification. And this research is related to the first aspect of them.This paper proposes some security check requirements related to embedded software development site by analyzing the ALC_DVS.1 of the ISO/IEC 15408 and Base Practices (BPs) of the ISO/IEC 21827. By applying this research, we expect to protect unauthorized modification of embedded software indirectly.

  • PDF

Implementation of Embedded System for a Fast Iris Identification Based on USN (고속의 홍채인식을 위한 USN기반의 임베디드 시스템 구현)

  • Kim, Shin-Hong;Kim, Shik
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.4 no.4
    • /
    • pp.190-194
    • /
    • 2009
  • Iris recognition is a biometric technology which can identify a person using the iris pattern. Recently, using iris information is used in many fields such as access control and information security. But Perform complex operations to extract features of the iris. Because high-end hardware for real-time iris recognition is required. This paper is appropriate for the embedded environment using local gradient histogram embedded system with iris feature extraction methods based on USN(Ubiquitous Sensor Network). Experimental results show that the performance of proposed method is comparable to existing methods using Gabor transform noticeably improves recognition performance and it is noted that the processing time of the local gradient histogram transform is much faster than that of the existing method and rotation was also a strong attribute.

  • PDF