• 제목/요약/키워드: Infrastructure Vulnerability

검색결과 133건 처리시간 0.024초

Optimized Security Algorithm for IEC 61850 based Power Utility System

  • Yang, Hyo-Sik;Kim, Sang-Sig;Jang, Hyuk-Soo
    • Journal of Electrical Engineering and Technology
    • /
    • 제7권3호
    • /
    • pp.443-450
    • /
    • 2012
  • As power grids are integrated into one big umbrella (i.e., Smart Grid), communication network plays a key role in reliable and stable operation of power grids. For successful operation of smart grid, interoperability and security issues must be resolved. Security means providing network system integrity, authentication, and confidentiality service. For a cyber-attack to a power grid system, which may jeopardize the national security, vulnerability of communication infrastructure has a serious impact on the power grid network. While security aspects of power grid network have been studied much, security mechanisms are rarely adopted in power gird communication network. For security issues, strict timing requirements are defined in IEC 61850 for mission critical messages (i.e., GOOSE). In this paper, we apply security algorithms (i.e., MD-5, SHA-1, and RSA) and measure their processing time and transmission delay of secured mission critical messages. The results show the algorithms satisfying the timing requirements defined in IEC 61850 and we observer the algorithm that is optimal for secure communication of mission critical messages. Numerical analysis shows that SHA-1 is preferable for secure GOOSE message sending.

소프트웨어 기반 Loran-C 신호 처리 (Software-Based Loran-C Signal Processing)

  • 임준혁;임성혁;김우현;지규인
    • 제어로봇시스템학회논문지
    • /
    • 제16권2호
    • /
    • pp.188-193
    • /
    • 2010
  • With GPS being the primary navigation system, Loran use is in steep decline. However, according to the final report of vulnerability assessment of the transportation infrastructure relying on the global positioning system prepared by the John A. Volpe National Transportation Systems Center, there are current attempts to enhance and re-popularize Loran as a GPS backup system through the characteristic of the ground based low frequency navigation system. To advance the Loran system such as Loran-C modernization and eLoran development, research is definitely needed in the field of Loran-C receiver signal processing as well as Loran-C signal design and the technology of a receiver. We have developed a set of Matlab tools, which implement a software Loran-C receiver that performs the receiver's position determination through the following procedure. The procedure consists of receiving the Loran-C signal, cycle selection, calculation of the TDOA and range, and receiver's position determination through the Least Square Method. We experiences the effect of an incorrect cycle selection and various error factors (ECD, ASF, sky wave, CRI, etc.) from the result of the Loran-C signal processing. It is apparent that researches which focus on the elimination and mitigation of various error factors need to be investigated on a software Loran-C receiver. These aspects will be explored in further work through the method such as PLL and Kalman filtering.

취약점 별 아티팩트 사례 분석을 통한 아티팩트 그룹핑 연구 : 어도비 플래시 플레이어 취약점을 이용하여 (A Study on Artifact Grouping by Analyzing Artifact Case by Vulnerability : Using Adobe Flash Player Vulnerabilities)

  • 송병관;김선광;권은진;진승택;김종혁;김형철;김민수
    • 융합보안논문지
    • /
    • 제19권1호
    • /
    • pp.87-95
    • /
    • 2019
  • 점차 고도화되는 사이버 공격에 의한 많은 침해사고로 피해가 증가하고 있다. 많은 기관 및 기업체에서는 사고 탐지를 위한 인프라만에 많은 자원을 투자하기에 초기대응에 미흡하다. 침해사고의 초기대응은 공격의 유입경로 파악이 우선이며, 이루어지고 있는 많은 사이버 공격은 소프트웨어 취약점을 대상으로 하고 있다. 따라서, 소프트웨어 취약점을 대상으로 윈도우 시스템의 아티팩트를 분석하고, 분석한 데이터를 분류하면 신속한 초기대응에 활용할 수 있다. 그러므로 소프트웨어 별 공격 유입 시 남는 아티팩트를 분류하여 침해사고 분석 시에 활용할 수 있는 아티팩트 그룹핑을 제시한다.

Analysis of Range Measurement Based on MF DGNSS Infrastructures

  • Son, Pyo-Woong;Han, Younghoon;Seo, Kiyeol;Fang, Tae Hyun
    • Journal of Positioning, Navigation, and Timing
    • /
    • 제11권4호
    • /
    • pp.245-250
    • /
    • 2022
  • As location-based services using the Global Navigation Satellite System (GNSS) are diversified, concerns about the vulnerability of GNSS to radio disturbance and deception are also growing. Accordingly, countries that own and operate GNSS, such as the United States, Russia, and Europe, are also developing additional navigation systems that can compensate for GNSS' weaknesses. Among them, an R-Mode system that transmits navigation signals using an infrastructure that transmits differential GNSS (DGNSS) information using signals from the medium frequency band currently in operation is being developed in Europe and Korea. Since 2020, Korea has improved four DGNSS transmission stations, including Chungju, Eocheongdo, Palmido, and Socheongdo, to transmit R-Mode signals and test navigation performance in some parts of the West Sea. In this paper, we intend to establish a testbed for measuring the distance of R-Mode signals currently being transmitted and analyze the results. It is confirmed that the distance measurement performance varies depending on the antenna type, diurnal variation, and propagation path of the signal.

시스템다이내믹스 모델을 이용한 농업용수 시스템의 기후 복원력 평가 (Climate Resilience Assessment of Agricultural Water System Using System Dynamics Model)

  • 최은혁
    • 한국농공학회논문집
    • /
    • 제63권4호
    • /
    • pp.65-86
    • /
    • 2021
  • This study aims at testing a hypothesis that the resilience of agricultural water systems is characterized by trade-offs and synergies of effects from climate and socioeconomic change. To achieve this, an Agricultural Water System Climate Resilience Assessment (ACRA) framework is established to evaluate comprehensive resilience of an agricultural water system to the combined impacts of the climate and socioeconomic changes with a case study in South Korea. Understanding dynamic behaviors of the agricultural water systems under climate and socioeconomic drivers is not straightforward because the system structure includes complex interactions with multiple feedbacks across components in water and agriculture sectors and climate and socioeconomic factors, which has not been well addressed in the existing decision support models. No consideration of the complex interactions with feedbacks in a decision making process may lead to counterintuitive and untoward evaluation of the coupled impacts of the climate and socioeconomic changes on the system performance. In this regard, the ACRA framework employs a System Dynamics (SD) approach that has been widely used to understand dynamics of the complex systems with the feedback interactions. In the ACRA framework applied to the case study in South Korea, the SD model works along with HOMWRS simulation. The ACRA framework will help to explore resilience-based strategies with infrastructure investment and management options for agricultural water systems.

소모형 센서 네트워크 환경에 적합한 키 관리 스킴 (A Key Management Scheme for Commodity Sensor Networks)

  • 김용호;이화성;이동훈
    • 정보보호학회논문지
    • /
    • 제16권2호
    • /
    • pp.71-80
    • /
    • 2006
  • 신뢰할 수 있는 무선 센서 네트워크 통신을 위해, 무선 센서 노드들 사이의 보안 키들은 안전하게 설립되어야 한다. 최근에, Anderson, Chad 그리고 Perrig들은 소모형 센서 네트워크 환경을 위한 보안 키 설립 스킴을 제안하였다. 그들은 공격 가능성이 적은 소모형 센서 네트워크 환경에 적합한 현실적인 공격 모델을 제안하였다. 그러나 제안된 스킴은 그들이 정의한 공격 모델에서 취약점을 가지고 있다. 본 논문에서는 그 취약점을 설명하고 개선된 스킴을 제안한다. 더불어, 우리가 제안한 스킴은 추가적인 통신비용을 요구하지 않으면서 센서 배치 전에 센서 노드가 잠재적인 키를 저장 할 필요도 없다.

Buffer Overflow Attack and Defense Techniques

  • Alzahrani, Sabah M.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12호
    • /
    • pp.207-212
    • /
    • 2021
  • A buffer overflow attack is carried out to subvert privileged program functions to gain control of the program and thus control the host. Buffer overflow attacks should be prevented by risk managers by eradicating and detecting them before the software is utilized. While calculating the size, correct variables should be chosen by risk managers in situations where fixed-length buffers are being used to avoid placing excess data that leads to the creation of an overflow. Metamorphism can also be used as it is capable of protecting data by attaining a reasonable resistance level [1]. In addition, risk management teams should ensure they access the latest updates for their application server products that support the internet infrastructure and the recent bug reports [2]. Scanners that can detect buffer overflows' flaws in their custom web applications and server products should be used by risk management teams to scan their websites. This paper presents an experiment of buffer overflow vulnerability and attack. The aims to study of a buffer overflow mechanism, types, and countermeasures. In addition, to comprehend the current detection plus prevention approaches that can be executed to prevent future attacks or mitigate the impacts of similar attacks.

Indonesia in the BIMP-EAGA: Assessing Connectivity Development in Reducing Inequality

  • Sandy Nur Ikfal Raharjo;Tri Nuke Pudjiastuti
    • 수완나부미
    • /
    • 제16권1호
    • /
    • pp.175-203
    • /
    • 2024
  • With the enactment of international free trade and economic agreements and cooperation, BIMP-EAGA is an opportunity to accelerate development and economic growth in eastern Indonesia. This subregional cooperation could be used to reduce the development gap or inequality between the western and eastern regions, which are geographically, demographically, and economically different. This cooperation also may accelerate development in the border area. This study analyzes Indonesia's policies related to connectivity in BIMP-EAGA subregional cooperation and its implementation. The study results show that the National Secretariat of Sub-Regional Economic Cooperation has encouraged cooperation clusters ranging from natural resources, transportation, infrastructure, ICT, and tourism to MSMEs. In terms of connectivity, Indonesia is also involved in the development program of three economic corridors, namely West Borneo, East Borneo, and Sulu-Sulawesi. Indonesia's involvement in the three corridors has boosted the connectivity of Indonesia's territory, especially border areas, with neighboring countries. Connectivity has covered not only physical but also institutional and people-to-people dimensions. However, there are still several challenges, ranging from the standardization of the Customs, Immigration, and Quarantine (CIQ) mechanisms, improvement of institutional quality, and consistent strong political will among the involved parties. In addition, considering the vulnerability of the BIMP subregion to transnational crimes and acts of radical terrorism, BIMP-EAGA needs to think about solutions to overcome these cross-border security problems so that the momentum of development in the subregion may be sustained.

농어촌용수 및 농업생산기반시설의 실태조사에 따른 기후변화 영향 분석 (Analysis on the Impact of Climate Change on the Survey of Rural Water District and Agricultural Production Infrastructure)

  • 김수진;배승종;최진용;김성필;은상규;유승환;장태일;고남영;황세운;김성준;박태선;정경훈;송석호
    • 한국농공학회논문집
    • /
    • 제60권5호
    • /
    • pp.1-15
    • /
    • 2018
  • This study aims to effective survey on actual condition for impact and vulnerability assessment on climate change in agriculture and rural community (limited to rural water and agricultural infrastructure, Paragraph 3, Article 2 of the Rearrangement of Agricultural and Fishing Villages Act) entrusted to Korea Rural Community Corporation based on the Law (Paragraph 2, Article 47 of the Framework Act on Agriculture, Rural community and Food industry). The results are summarized as follows. The rural water was divided into three categories (abnormal climate, water use, and flood control), and 31 indicators were selected. The reservoirs were divided into four categories, and 20 indicators were selected. The pumping stations were divided into two categories, 7 indicators, and the drainage pump stations were divided into two categories, 5 indicators were chosen. A survey on actual condition of each indicator was conducted and the result of the impact assessment was calculated. The 65 rural water showed values ranged from 0.855 to 1.308. The reservoir ranged from 0.966 to 23.338 as a result of the impact assessment on the 16 indicators. The pumping station was able to calculate the results of the safety inspection and the thorough safety inspection, and the drainage pump station was able to calculate only the result of the safety inspection. It is judged that it will be necessary to secure and analyze data on indicators with no data in the future. The results of this research can be utilized as baseline data that can deal with climate change preemptively.

NDGNSS 인프라를 활용한 국내 해상 백업 PNT 서비스 연구 (A Study on Backup PNT Service for Korean Maritime Using NDGNSS)

  • 한영훈;이상헌;박슬기;황태현;박상현
    • 한국항해항만학회지
    • /
    • 제43권1호
    • /
    • pp.42-48
    • /
    • 2019
  • 4차 산업혁명 사회에서의 PNT(Position, Navigation, and Timing) 정보의 중요성은 과거와는 또 다른 의미를 가진다. 자율 주행차, 자율 운항선박, 스마트그리드 그리고 국가 주요 기간시설에서는 PNT 정보의 고정확성 이외에도 지속가능하고, 신뢰할만한 서비스를 요구하고 있다. PNT 정보를 제공하는 가장 대표적인 시스템인 위성항법시스템은 지구 대기 밖 위성으로부터 신호를 수신하므로 수신 신호전력이 낮고, 민간신호의 경우 신호구조가 공개되어 있다. 따라서 비의도적 또는 의도적인 간섭이나 해킹에 취약하다. 사용자 관점에서 적은 비용으로 높은 성능의 PNT 정보를 쉽게 획득할 수 있는 위성항법시스템은 해킹의 취약성 때문에 이에 대한 보완이 요구된다. 이에 따라 응용분야 별로 다양한 연구가 진행되고 있으며, 본 논문에서는 기회신호 측면에서 현재 구축, 운영 중인 해상항법 및 통신 인프라를 활용한 R-Mode(Ranging Mode) 기술에 대해 다룬다. 이를 위하여 현재 전국망의 중파 비컨 기반 보강정보를서비스하고 있는 NDGNSS(Nationwide Differential Global Navigation Satellite System) 인프라에 대해 알아보고, 시뮬레이션을 통하여 국내 해상분야에서의 백업 PNT 기술로서의 가능성을 확인한다.