• Title/Summary/Keyword: Embedded System Security

Search Result 226, Processing Time 0.03 seconds

Implementation of the web based environment monitoring system supporting the NMS protocol (NMS를 지원하는 웹기반 환경 감시 시스템의 구현)

  • Bae, Kwang-Jin;Yim, Kang-Bin
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.831-832
    • /
    • 2006
  • In this paper, we introduce a canonical framework of the large-scaled web-based sensor gateway and practically implement it as the environment monitoring system. The system consists of a central management server, up to 250 local embedded subsystems and up to 250 sensor or actuator nodes for each subsystem. The node information is gathered periodically through a well-defined protocol on the sensor network and converted to the web contents and the SNMP MIB objects according to its data type. The MIB objects are well-defined and include system, network, sensor, actuator and alarm specific data classes. Because there is an increasing trend that a large number of sites are willing to adapt unmanned sensing and control, the developed system will play a key role to efficiently manage a large scale sensor networked system such as environment monitoring systems or countermeasure systems against disaster and calamities.

  • PDF

Embedded-based Power Monitoring Security Module Design (임베디드 전력 모니터링 보안 모듈 설계)

  • Yoon, Chan-Ho;Kim, Gwang-Jun;Jang, Chang-Soo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.10
    • /
    • pp.1485-1490
    • /
    • 2013
  • The demonstration project of the electrical grid for Smart grid is progressed, the smart digital appliances AV technology, Smart home energy management technology charging the management function of complex energy for the automation management of air conditioning and heating, humidity and air, the health care technology charging the design of housing for the elderly and disabled and the measurement of individual bio information, and the Smart home security technology dealing with the biometric security and motion sensors, etc. have been studied. The power monitoring terminal which uses a variety of wired and wireless networks and protocol is the target additionally to be considered in addition to the security vulnerabilities that was occurred in the existing terminal. In this research paper, the author analyzes the cryptographic techniques corresponding to the smart meter occurred by the problems that are exposed on the outside which are vulnerable to physical attacks, and intends to propose the design of the security systems for the Smart meter terminal being able to maximize the efficiency of the terminal.

Trend and future prospect on the development of technology for electronic security system (기계경비시스템의 기술 변화추세와 개발전망)

  • Chung, Tae-Hwang;So, Sung-Young
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.225-244
    • /
    • 2009
  • Electronic security system is composed mainly of electronic-information-communication device, so system technology, configuration and management of the electronic security system could be affected by the change of information-communication environment. This study is to propose the future prospect on the development of technique for electronic security system through the analysis of the trend and the actual condition on the development of technique. This study is based on literature study and interview with user and provider of electronic security system, also survey was carried out by system provider and members of security integration company to come up with more practical result. Hybrid DVR technology that has multi-function such as motion detection, target tracking and image identification is expected to be developed. And 'Embedded IP camera' technology that internet server and image identification software are built in. Those technologies could change the configuration and management of CCTV system. Fingerprint identification technology and face identification technology are continually developed to get more reliability, but continual development of surveillance and three-dimension identification technology for more efficient face identification system is needed. As radio identification and tracking function of RFID is appreciated as very useful for access control system, hardware and software of RFID technology is expected to be developed, but government's support for market revitalization is necessary. Behavior pattern identification sensor technology is expected to be developed and could replace passive infrared sensor that cause system error, giving security guard firm confidence for response. The principle of behavior pattern identification is similar to image identification, so those two technology could be integrated with tracking technology and radio identification technology of RFID for total monitoring system. For more efficient electronic security system, middle-ware's role is very important to integrate the technology of electronic security system, this could make possible of installing the integrated security system.

  • PDF

A vehicle Diagnosis and Control System via Mobile Network

  • Choi, Yong-Wun;Lee, Yong-Doo;Hong, Won-Kee
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.85-90
    • /
    • 2005
  • The advance of mobile and telematics technologies has produced vehicles with various convenient services for drivers. Specifically lots of researches and several technologies have been developed to provide services of a remote vehicle diagnosis and control. The existing and representative product for a vehicle control is a RCS (remote control system), but it has a problem of short control distance and fragile security. In this paper, a telematics terminal embedded with CDMA and GPS is designed, which can be connected to the Internet. It allows a driver with a cellular phone to remotely diagnosis and control a vehicle via wireless network and SMS.

  • PDF

Kalman Filter Based Resilient Cyber-Physical System and its Application to an Autonomous Vehicle (칼만필터를 이용한 사이버 물리 시스템의 자율 복원성 확보 기법 및 자율주행차량 적용 연구)

  • Kim, Jae-Hoon;Kim, Dong-Gil;Lee, Dong-Ik
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.14 no.5
    • /
    • pp.239-247
    • /
    • 2019
  • Recently, successful attacks on cyber-physical systems have been reported. As existing network security solutions are limited in preventing the system from malicious attacks, appropriate countermeasures are required from the perspective of the control. In this paper, the cyber and physical attacks are interpreted in terms of actuator and sensor attacks. Based on the interpretation, we suggest a strategy for designing Kalman filters to secure the resilience and safety of the system. Such a strategy is implemented in details to be applied for the lateral control of autonomous driving vehicle. A set of simulation results verify the performance of the proposed Kalman filters.

Lightweight Home Network Middleware Security Mechanism supporting Mobility Management (이동성 관리를 지원하는 경량 홈 네트워크 미들웨어 보안 기술)

  • Koh Kwang-Man;Hyun Ho-Jae;Hong Ju-Hee;Han Sun-Young
    • The KIPS Transactions:PartC
    • /
    • v.13C no.3 s.106
    • /
    • pp.375-382
    • /
    • 2006
  • As various kinds of embedded systems (or devices) become widely available, research on home network middleware which can access and control embedded home appliances are actively being progressed. However, there is a significant problem in applying the home network technology to embedded systems because of their limited storage space and low computing power. In this paper, we present a lightweight middleware for home network on embedded systems. Also, we propose a mechanism for mobility management which adopts the anycast technology.

Sensors Network and Security and Multimedia Enhancement

  • Woo, Seon-mi;Lee, Malrey
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.1
    • /
    • pp.64-68
    • /
    • 2016
  • These fields are integrated to visualize and finalize the proposed development, in simulation environment. SCADA (supervisory control and data acquisition) systems and distributed control systems (DCSs) are widely deployed in all over the world, which are designed to control the industrial infrastructures, in real ways. To supervise and control the various parts of designed systems; trends to require a deep knowledge to understand the overall functional needs of industries, which could be a big challenge. Industrial field devices (or network sensors) are usually distributed in many locations and are controlled from centralized site (or main control center); the communication provides various signs of security issues. To handle these issues, the research contribution will twofold: a method using cryptography is deployed in critical systems for security purposes and overall transmission is controlled from main controller site. At controller site, multimedia components are employed to control the overall transmission graphically, such as system communication, bytes flows, security embedded parameters and others, by the means of multimedia technology.

Analyses of Requirement of Security and Threat of IoT Application (사물 인터넷 통신망의 적용에 따른 보안 위협과 보안 요구사항 분석)

  • Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.1025-1026
    • /
    • 2015
  • With the development of sensor, wireless mobile communication, embedded system and cloud computing, the technologies of Internet of Things have been widely used in real word. Connecting wireless sensor networks with traditional communication networks or Internet, IoT gateway plays an important role in IoT applications. It facilitates the integration of wireless sensor networks and mobile communication networks or Internet. The IoT gateway is a key component in IoT application systems. But It has lot of security issues. We analyzed the issues of security and privacy.

  • PDF

Security Threat Trend based on Drone Embedded System and Network Protocol (드론 임베디드 시스템 및 네트워크 프로토콜 기반 보안위협 동향)

  • Sang-Hyeon Park;In-Su Jung;Jin Kwak
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.190-191
    • /
    • 2023
  • IoT(Internet of Things) 기술을 기반으로 한 드론은 사용자의 요청에 따라 데이터 처리, 수집, 송·수신 등에 고도화된 ICT(Information and Communications Technology) 기술을 활용하고 있다. 또한, 드론은 ICT 기술이 발전함에 따라 문화, 소방, 국방 등 다양한 분야에 적용되어 사용자에게 편의를 제공하고 있다. 그러나, 드론에 적용되는 ICT 기술과 드론에 탑재되는 기술들이 고도화됨에 따라 드론 모듈 내 펌웨어 및 무선 네트워크를 대상으로 한 보안위협이 증가하고 있다. 따라서 본 논문은 드론의 보안위협에 대응하기 위하여 드론 임베디드 시스템 및 네트워크 프로토콜을 대상으로한 최신 보안위협 동향을 분석한다.

Modeling in System Engineering: Conceptual Time Representation

  • Al-Fedaghi, Sabah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.153-164
    • /
    • 2021
  • The increasing importance of such fields as embedded systems, pervasive computing, and hybrid systems control is increasing attention to the time-dependent aspects of system modeling. In this paper, we focus on modeling conceptual time. Conceptual time is time represented in conceptual modeling, where the notion of time does not always play a major role. Time modeling in computing is far from exhibiting a unified and comprehensive framework, and is often handled in an ad hoc manner. This paper contributes to the establishment of a broader understanding of time in conceptual modeling based on a software and system engineering model denoted thinging machine (TM). TM modeling is founded on a one-category ontology called a thimac (thing/machine) that is used to elaborate the design and analysis of ontological presumptions. The issue under study is a sample of abstract modeling domains as exemplified by time. The goal is to provide better understanding of the TM model by supplementing it with a conceptualization of time aspects. The results reveal new characteristics of time and related notions such as space, events, and system behavior.