• Title/Summary/Keyword: Integrated defense system

Search Result 269, Processing Time 0.025 seconds

The Secure Chip for Software Illegal Copy Protection (소프트웨어 불법복제방지를 위한 보안칩)

  • 오명신;한승조
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.4
    • /
    • pp.87-98
    • /
    • 2002
  • Software has been developed very fast as information has become important value. Illegal software copy has been the main problem of developing software business. Recently used protecting lock system for software copy has not guaranteed perfectly from easily cracked-defense system. This paper, therefore, proposes 96-bit block cipher with 112-bit length to replace a DES(Data Encryption Standard) algorithm. Security chip by ASIC(Application Specific Integrated Circuit) security module is presented for software copy protection. Then, an auto block protecting algorithm is designed for the security chip. Finally, controlling driver and library are built for the security chip.

An Improved SysML-Based Failure Model for Safety Verification By Simulation (시뮬레이션을 통해 안전성 검증을 위한 개선된 SysML 기반 고장 모델)

  • Kim, Chang-Won;Lee, Jae-Chon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.10
    • /
    • pp.410-417
    • /
    • 2018
  • System design errors are more likely to occur in modern systems because of their steadily increasing size and complexity. Failures due to system design errors can cause safety-related accidents in the system, resulting in extensive damage to people and property. Therefore, international standards organizations, such as the U.S. Department of Defense and the International Electrotechnical Commission, have established international safety standards to ensure system safety, and recommend that system design and safety activities should be integrated. Recently, the safety of a system has been verified by modeling through a model-based system design. On the other hand, system design and safety activities have not been integrated because the model for system design and the failure model for safety analysis and verification were developed using different modeling language platforms. Furthermore, studies using UML or SysML-based failure models for deriving safety requirements have shown that these models have limited applicability to safety analysis and verification. To solve this problem, it is essential to extend the existing methods for failure model implementation. First, an improved SysML-based failure model capable of integrating system design and safety verification activities should be produced. Next, this model should help verify whether the safety requirements derived via the failure model are reflected properly in the system design. Therefore, this paper presents the concept and method of developing a SysML-based failure model for an automotive system. In addition, the failure model was simulated to verify the safety of the automotive system. The results show that the improved SysML-based failure model can support the integration of system design and safety verification activities.

A Study on Constructing a RMF Optimized for Korean National Defense for Weapon System Development (무기체계 개발을 위한 한국형 국방 RMF 구축 방안 연구)

  • Jung keun Ahn;Kwangsoo Cho;Han-jin Jeong;Ji-hun Jeong;Seung-joo Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.827-846
    • /
    • 2023
  • Recently, various information technologies such as network communication and sensors have begun to be integrated into weapon systems that were previously operated in stand-alone. This helps the operators of the weapon system to make quick and accurate decisions, thereby allowing for effective operation of the weapon system. However, as the involvement of the cyber domain in weapon systems increases, it is expected that the potential for damage from cyber attacks will also increase. To develop a secure weapon system, it is necessary to implement built-in security, which helps considering security from the requirement stage of the software development process. The U.S. Department of Defense is implementing the Risk Management Framework Assessment and Authorization (RMF A&A) process, along with the introduction of the concept of cybersecurity, for the evaluation and acquisition of weapon systems. Similarly, South Korea is also continuously making efforts to implement the Korea Risk Management Framework (K-RMF). However, so far, there are no cases where K-RMF has been applied from the development stage, and most of the data and documents related to the U.S. RMF A&A are not disclosed for confidentiality reasons. In this study, we propose the method for inferring the composition of the K-RMF based on systematic threat analysis method and the publicly released documents and data related to RMF. Furthermore, we demonstrate the effectiveness of our inferring method by applying it to the naval battleship system.

Fabrication of 5,000V, 4-Inch Light Triggered Thyristor using Boron Diffusion Process and its Characterization (Boron 확산공정을 이용한 5,000V, 4인치 광 사이리스터의 제작 및 특성 평가)

  • Park, Kun-Sik;Cho, Doohyung;Won, Jongil;Lee, Byungha;Bae, Youngseok;Koo, Insu
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.24 no.6
    • /
    • pp.411-418
    • /
    • 2019
  • Light-triggered thyristors (LTTs) are essential components in high-power applications, such as HVDC transmission and several pulsed-power applications. Generally, LTT fabrication includes a deep diffusion of aluminum as a p-type dopant to form a uniform p-base region, which needs careful concern for contamination and additional facilities in silicon semiconductor manufacturing factories. We fabricated 4-inch 5,000 V LTTs with boron implantation and diffusion process as a p-type dopant. The LTT contains a main cathode region, edge termination designed with a variation of lateral doping, breakover diode, integrated resistor, photosensitive area, and dV/dt protection region. The doping concentration of each region was adjusted with different doses of boron ion implantation. The fabricated LTTs showed good light triggering characteristics for a light pulse of 905 nm and a blocking voltage (VDRM) of 6,500 V. They drove an average on-state current (ITAVM) of 2,270 A, peak nonrepetitive surge current (ITSM) of 61 kA, critical rate of rise of on-state current (di/dt) of 1,010 A/㎲, and limiting load integral (I2T) of 17 MA2s without damage to the device.

Inflow Noise Characteristics of the Sensor in Low Wave Number Region Using Transfer Function (전달함수를 이용한 저파수 영역에서의 센서 유입 소음 특성 연구)

  • Park, Ji-hye;Lee, Jongkil;Shin, Ku-kyun;Cho, Chi-yong
    • 대한공업교육학회지
    • /
    • v.34 no.1
    • /
    • pp.238-251
    • /
    • 2009
  • The noise itself that affects the sensor array is defined as the noise which happens in the place where the system is installed and the circumference noise which comes from the ocean. The array structure for detecting acoustic signal in the underwater effected turbulent layer flow noise. In this paper to design the conformal array spectral density function was introduced and several cases of flow induced noise which affect transfer function were simulated. Modified Corcos wall pressure model was used as turbulent boundary layer flow noise. The effect of noise has been reduced as integrated sum of transfer function has been reduced by decreasing elastomer thickness and density when kx is in low wave number area. Also the characteristics of transfer function by Corcos wall pressure displayed the product of frequency density function. This simulation results can be applied to the conformal array design in unmmaned underwater vehicle in the near future.

A Suggestion of Methodologies for Modular and Integrated Verification of WA-DGNSS Reference Station Software Suitable for Validation & Verification of DO-278 (DO-278의 Validation & Verification에 적합한 WA-DGNSS 기준국 소프트웨어의 모듈별 통합 검증 방법론 제시)

  • Yoon, Donghwan;Park, Byung-Woon;Choi, Wan-Sik;Kee, Changdon;Seo, Seungwoo;Park, Junpyo
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.1
    • /
    • pp.15-21
    • /
    • 2015
  • WA-DGNSS is a system to service for users using a satellite which received correction data from ground station that calculates the relative errors of the tracked GNSS signals and sends to a satellite. Users are guaranteed the reliability of the GNSS signal and the accuracy of positioning. ICAO recommends the application of WA-DGNSS for the airplane taking off and landing process. In this paper, we suggests methods to verify of the pre-developed WA-DGNSS reference software constituting modules and an integration test process refer to the RTCA DO-278 which is a document for the development process of an aeronautics software. Also, we statistically verified the reference software test through our methods. And then, we confirmed to performance the function of the reference software properly.

A Fault Management Design of Dual-Redundant Flight Control Computer for Unmanned Aerial Vehicle (무인기용 이중화 비행조종컴퓨터의 고장관리 설계)

  • Oh, Taegeun;Yoon, Hyung-Sik
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.50 no.5
    • /
    • pp.349-357
    • /
    • 2022
  • Since the flight control computer of unmanned aerial vehicle (UAV) is a flight critical equipment, it is necessary to ensure reliability and safety from the development step, and a redundancy-based fault management design is required in order to operate normally even a failure occurs. To reduce cost, weight and power consumption, the dual-redundant flight control system design is considered in UAV. However, there are various restrictions on the fault management design. In this paper, we propose the fault detection and isolation designs for the dual-redundant flight control computer to satisfy the safety requirements of an UAV. In addition, the flight control computer developed by applying the fault management design performed functional tests in the integrated test environment, and after performing FMET in the HILS, its reliability was verified through flight tests.

Development of multi-media multi-path Optimization Network Technology Using RNN Algorithm (RNN 알고리즘을 이용한 다매체 다중경로 최적화 네트워크 기술 개발)

  • Pokki Park;Youngdong Kim
    • Convergence Security Journal
    • /
    • v.24 no.3
    • /
    • pp.95-104
    • /
    • 2024
  • The performance capability of the future battlefield depends on whether the next-generation technology of the Fourth Industrial Revolution, called ABCMS (AI, Bigdata, Cloud, Mobile, Security), can be applied to secure innovative defense capabilities It is no exaggeration to say. In addition, the future military operation environment is rapidly changing into a net work-oriented war (NCW) in which all weapon systems mutually share battlefield information and operate in real-time within a single integrated information and communication network based on the network and is expanding to the scope of operation of the manned and unmanned complex combat system. In particular, communication networks responsible for high-speed and hyperconnectivity require high viability and efficiency in power operation based on multi-tier (defense mobile, satellite, M/W, wired) networks for the connection of multiple combat elements and smooth distribution of information. From this point of view, this study is different from conventional single-media, single-path transmission with fixed specifications, It is an artificial intelligence-based transmission technology using RNN (Recurrent Neural Networks) algorithm and load distribution during traffic congestion using available communication wired and wireless infrastructure multimedia simultaneously and It is the development of MMMP-Multi-Media Multi-Path adaptive network technology.

Development of C2 Virtual Linked Simulator For Engineering and Engagement Level Battle Experimentation (공학-교전급 전투실험을 위한 C2 가상모의 연동 시뮬레이터 개발)

  • Lee, Sangtae;Lee, Seungyoung;Hwang, Kun-Chul;Kim, Saehwan;Lee, Kyuhyun
    • Journal of the Korea Society for Simulation
    • /
    • v.22 no.4
    • /
    • pp.11-19
    • /
    • 2013
  • The Korean naval weapon systems, combat experiments establish the concept of Battle operations, and create the future of the new weapons system. Doctrine development and training as well as ranging from experiments for evaluate the performance of mission operations for combat experiments are used. The battle lab is effectively support tool for the Korean Naval battle experiments. The battle lab is through a dedicated testing facility and to build efficient and effective simulation-based acquisition supporting environment. In this paper, the ship / submarines C2 operations virtual simulator was developed to support the concept of Battle operations of naval combat experiments in training and tactical development. The ship C2 operations virtual simulator makes the anti-ship and anti-aircraft the engagement scenario for performed experiments using the SADM. The submarines C2 operations virtual simulator makes the anti-submarine engagement scenario for performed experiments using EAS. EAS System was created before reuse. EAS system by modifying the additional interfaces HLA-RTI has been reused. Reflected in the tactics and training after analysis of the results through the battle experiment. Also increase training fidelity through operator involvement. The anti-ship and anti-aircraft system architecture (SADM) and anti-submarine system architecture (EAS) requires unique design of system framework since two separate architectures should be integrated into a system. An C2 virtual linked architecture was used to integrate different system architecture. A C2 virtual linked software framework, designed that have integrated protocol for battle experimental linkage and battlefield visualization environment.

Vulnerability Analysis on a VPN for a Remote Monitoring System

  • Kim Jung Soo;Kim Jong Soo;Park Il Jin;Min Kyung Sik;Choi Young Myung
    • Nuclear Engineering and Technology
    • /
    • v.36 no.4
    • /
    • pp.346-356
    • /
    • 2004
  • 14 Pressurized Water Reactors (PWR) in Korea use a remote monitoring system (RMS), which have been used in Korea since 1998. A Memorandum of Understanding on Remote Monitoring, based on Enhanced Cooperation on PWRs, was signed at the 10th Safeguards Review Meeting in October 2001 between the International Atomic Energy Agency (IAEA) and Ministry Of Science and Technology (MOST). Thereafter, all PWR power plants applied for remote monitoring systems. However, the existing method is high cost (involving expensive telephone costs). So, it was eventually applied to an Internet system for Remote Monitoring. According to the Internet-based Virtual Private Network (VPN) applied to Remote Monitoring, the Korea Atomic Energy Research Institute (KAERI) came to an agreement with the IAEA, using a Member State Support Program (MSSP). Phase I is a Lab test. Phase II is to apply it to a target power plant. Phase III is to apply it to all the power plants. This paper reports on the penetration testing of Phase I. Phase I involved both domestic testing and international testing. The target of the testing consisted of a Surveillance Digital Integrated System (SDIS) Server, IAEA Server and TCNC (Technology Center for Nuclear Control) Server. In each system, Virtual Private Network (VPN) system hardware was installed. The penetration of the three systems and the three VPNs was tested. The domestic test involved two hacking scenarios: hacking from the outside and hacking from the inside. The international test involved one scenario from the outside. The results of tests demonstrated that the VPN hardware provided a good defense against hacking. We verified that there was no invasion of the system (SDIS Server and VPN; TCNC Server and VPN; and IAEA Server and VPN) via penetration testing.