• 제목/요약/키워드: Military-Information Security Management System

검색결과 64건 처리시간 0.2초

유비쿼터스 센서 네트워크 기술을 활용한 무인감시체계 연구 (A study on unmanned watch system using ubiquitous sensor network technology)

  • 위겸복
    • 안보군사학연구
    • /
    • 통권7호
    • /
    • pp.271-303
    • /
    • 2009
  • "Ubiquitous sensor network" definition is this-Someone attaches electro-magnetic tag everything which needs communication between man to man, man to material and material to material(Ubiquitous). By using attached every electro-magnetic tag, someone detects it's native information as well as environmental information such as temperature, humidity, pollution and infiltration information(Sensor). someone connects it realtime network and manage generated information(Network). 21st century's war is joint combined operation connecting with ground, sea and air smoothly in digitalized war field, and is systematic war provided realtime information from sensor to shooter. So, it needs dramatic development on watch reconnaissance, command and control, pinpoint strike etc. Ubiquitous computing and network technologies are essential in national defense to operate 21st century style war. It is possible to use many parts such as USN combined smart dust and sensor network to protect friend unit as well as to watch enemy's deep area by unmanned reconnaissance, wearable computer upgrading soldier's operational ability and combat power dramatically, RFID which can be used material management as well as on time support. Especially, unmanned watch system using USN is core part to transit network centric military service and to get national defense efficiency which overcome the dilemma of national defense person resource reducing, and upgrade guard quality level, and improve combat power by normalizing guardian's bio rhythm. According to the test result of sensor network unmanned watch system, it needs more effort and time to stabilize because of low USN technology maturity and using maturity. In the future, USN unmanned watch system project must be decided the application scope such as application area and starting point by evaluating technology maturity and using maturity. And when you decide application scope, you must consider not only short period goal as cost reduction, soldier decrease and guard power upgrade but also long period goal as advanced defense ability strength. You must build basic infra in advance such as light cable network, frequency allocation and power facility etc. First of all, it must get budget guarantee and driving force for USN unmanned watch system project related to defense policy. You must forwarded the USN project assuming posses of operation skill as procedure, system, standard, training in advance. Operational skill posses is come from step by step application strategy such as test phase, introduction phase, spread phase, stabilization phase and also repeated test application taking example project.

  • PDF

Marine Incidents Management and Information Exchange Technologies in the Process of Safe Ship Operation

  • Oleksiy, Melnyk;Yana, Volianska;Oleg, Onishchenko;Svitlana, Onyshchenko;Alla, Bondar;Andrii, Golovan;Nataliia, Cheredarchuk;Iryna, Honcharuk;Tetyana, Obnyavko
    • International Journal of Computer Science & Network Security
    • /
    • 제23권1호
    • /
    • pp.64-70
    • /
    • 2023
  • Maritime transport is dominant in the overall volume of all international transportation. Existence and overcoming of problems, which cause pressure on shipping safety, remain actual and fully concern both maritime and inland transport. Increasing speed and cargo capacity of the ships along with the reduction of crew members lead to the automation of a growing number of work processes, which indicates the need to actively introduce appropriate measures in the security system of sea-going ships and commercial ports and to develop modern approaches to minimize negative events and incidents in the process of ship operation. Advantages in use of modern methods of monitoring the safety of ship operations, management of possible events and incidents, including investigation of accidents, first, aimed at prevention of negative occurrences and ways of prevention on this basis. Considering statistics on incidents increase, this work presents analysis of general ship accident rate, study of major accidental events growth annually, and investigation of causes of incidents, which most frequently occur in port waters and at open sea. A survey of current approaches to ensuring the safety of shipping by implementing effective tools, such as event and incident management, has been conducted.

RFID를 이용한 출석관리 시스템 개발 (The Development of Attendance Management System Using the RFID)

  • 박소희;문병철
    • 정보교육학회논문지
    • /
    • 제11권2호
    • /
    • pp.139-146
    • /
    • 2007
  • 현재 RFID(Radio Frequency Identification) 카드를 이용한 활용분야는 의료, 유통, 군사, 제조, 보안, 등 다양하게 확장되고 있다. RFID 기술은 식별 대상을 원거리에서 무선 주파수를 통해 한꺼번에 많은 정보를 인식할 수 있는 장점으로 인하여, 기존에 사용하던 바코드를 대체할 기술로서 주목받고 있다. 또한, 학교에서도 도서대출 관리 및 학생출석 관리 등의 RFID를 이용한 시스템에 대한 관심이 높아지고 있다. 본 논문은 RFID 카드를 이용한 출석관리 시스템을 개발하였으며, 교수들은 출석현황을 모바일로 확인할 수 있도록 하였고, 학생들은 웹을 통해서 언제든지 자신의 출석현황을 조회할 수 있도록 하였다. 그리고 학생들의 정보는 RFID 태그가 내장된 학생증을 소지하는 것만으로도 RFID 카드 판독기를 통해 정보가 수신된 후 DB에 저장되게 하였으며, 교수와 학생은 각각 관리자 프로그램과 웹 프로그램을 통해 출석부와 시간표를 관리하고 출력할 수 있다.

  • PDF

시스템 ID를 이용한 USN의 보안 취약성 개선 (USN Security Enhancement Using System IDs)

  • 김현주;정종문
    • 대한전자공학회논문지TC
    • /
    • 제46권2호
    • /
    • pp.73-80
    • /
    • 2009
  • 군사용이나 환경 감시등의 영역에서 응용되고 있는 유비쿼터스 센서 네트워크(Ubiquitous Sensor Network)는 센서 정보의 도청이나, 비정상적 패킷의 유통, 메시지의 재사용 등 데이터의 위 변조와 같은 외부의 공격에 쉽게 노출되는 환경에서 동작하기 때문에, 보안은 필수적으로 갖추어져야 하는 중요한 기능이다. 저전력, 초소형, 저비용의 장점을 갖는 ZigBee는 유비쿼터스 센서 네트워크를 구현하는 최적의 기술로 주목받고 있다. 그러나 ZigBee 보안 시스템에는 심각한 문제점들을 가지고 있다. 본 논문에서는 USN의 대표적인 예로 ZigBee 보안 시스템이 가지고 있는 문제점들을 자세히 분석하고, 이를 해결하여 USN에 적합한 보안 프로토콜을 새롭게 제안하고 그 효율성을 비교 분석한다.

Development of Evaluation System for Defense Informatization Level

  • Sim, Seungbae;Lee, Sangho
    • Journal of Multimedia Information System
    • /
    • 제6권4호
    • /
    • pp.271-282
    • /
    • 2019
  • There is a description that you cannot manage what you do not measure. The Korea Ministry of National Defense (MND) is conducting evaluations in various fields to obtain meaningful effects from IT investments, and views that the evaluation of the defense informatization sector is divided into defense informatization policy evaluation and defense informatization project evaluation. The defense informatization level evaluation can measure the informatization level of MND and the armed forces or organizations. Since the evaluation system being studied to measure the level of defense informatization is composed mainly of qualitative metrics, it is necessary to reconstruct it based on quantitative metrics that can guarantee objectivity. In addition, for managing the level of change by evaluation objects, the evaluation system should be designed with a focus on homeostasis of metrics so that it can be measured periodically. Moreover, metrics need to be promoted in terms of performance against targets. To this end, this study proposes to measure the level of defense informatization by dividing it into defense information network, computer systems, interoperability and standardization, information security, information environment, and information system use, and suggests their metrics.

위협 헌팅을 적용한 사이버 상황인식 시스템 개발에 관한 연구 (A Study for Cyber Situation Awareness System Development with Threat Hunting)

  • 이재연;최정인;박상현;김병진;현대원;김관영
    • 한국군사과학기술학회지
    • /
    • 제21권6호
    • /
    • pp.807-816
    • /
    • 2018
  • Threat hunting is defined as a process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions. The main concept of threat hunting is to find out weak points and remedy them before actual cyber threat has occurred. And HMM(Hunting Maturity Matrix) is suggested to evolve hunting processes with five levels, therefore, CSOC(Cyber Security Operations Center) can refer HMM how to make them safer from complicated and organized cyber attacks. We are developing a system for cyber situation awareness system with pro-active threat hunting process called unMazeTM. With this unMaze, it can be upgraded CSOC's HMM level from initial level to basic level. CSOC with unMaze do threat hunting process not only detecting existing cyber equipment post-actively, but also proactively detecting cyber threat by fusing and analyzing cyber asset data and threat intelligence.

Text Mining과 네트워크 분석을 활용한 교육훈련용 모의사격 시뮬레이션 경험지식 분석 (Analysis of Experience Knowledge of Shooting Simulation for Training Using the Text Mining and Network Analysis)

  • 김성규;손창호;김종만;정세교;박재현;전정환
    • 한국군사과학기술학회지
    • /
    • 제20권5호
    • /
    • pp.700-707
    • /
    • 2017
  • Recently, the military need more various education and training because of the increasing necessity of various operation. But the education and training of the military has the various difficulties such as the limitations of time, space and finance etc. In order to overcome the difficulties, the military use Defense Modeling and Simulation(DM&S). Although the participants in training has the empirical knowledge from education and training based on the simulation, the empirical knowledge is not shared because of particular characteristics of military such as security and the change of official. This situation obstructs the improving effectiveness of education and training. The purpose of this research is the systematizing and analysing the empirical knowledge using text mining and network analysis to assist the sharing of empirical knowledge. For analysing texts or documents as the empirical knowledge, we select the text mining and network analysis. We expect our research will improve the effectiveness of education and training based on simulation of DM&S.

국가 사이버전 대비방안 연구 (A Study on the Preparation of National Cyber Warfare)

  • 김귀남
    • 융합보안논문지
    • /
    • 제6권4호
    • /
    • pp.141-151
    • /
    • 2006
  • 지난 2003년 1월 25일 인터넷 마비사고와 2004년 주요 국가기관 해킹사건을 겪으면서 사이버 위협의 파괴력이 국가안보에 직접적이고 심각하게 위협하는 단계에까지 도달하였다. 그래서 사이버테러나 사이버전(cyber warfare)은 더 이상 가상적 상황이 아닌 현실적이며, 실체적인 안보상황으로 상대국의 군사지휘체계는 물론 통신, 에너지, 금융, 수송체계 등 국가 주요기능 무력화의 전쟁 개념의 확대로 재인식되고 있다. 이러한 시점에서 정보전, 정보작전, 네트워크 중심전등 혼재된 유사 용어들 속에서 사이버전에 대한 명확한 개념 정립 필요하고 각 국의 사이버전 동향 분석 및 국내 사이버전 현황 분석을 통해 문제점을 식별, 보완책 마련이 필요하다. 그래서 본 논문에서는 국가적 위기를 효율적으로 관리하고, 효과적이며 능동적으로 사이버전을 수행할 수 있는 발전방향과 상대적으로 사이버전 관련 기술 및 전문 인력 운영적측면에서 열세에 놓여 있는 군의 사이버전 수행체계에 대한 혁신방향을 연구를 하였다.

  • PDF

A Danger Theory Inspired Protection Approach for Hierarchical Wireless Sensor Networks

  • Xiao, Xin;Zhang, Ruirui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권5호
    • /
    • pp.2732-2753
    • /
    • 2019
  • With the application of wireless sensor networks in the fields of ecological observation, defense military, architecture and urban management etc., the security problem is becoming more and more serious. Characteristics and constraint conditions of wireless sensor networks such as computing power, storage space and battery have brought huge challenges to protection research. Inspired by the danger theory in biological immune system, this paper proposes an intrusion detection model for wireless sensor networks. The model abstracts expressions of antigens and antibodies in wireless sensor networks, defines meanings and functions of danger signals and danger areas, and expounds the process of intrusion detection based on the danger theory. The model realizes the distributed deployment, and there is no need to arrange an instance at each sensor node. In addition, sensor nodes trigger danger signals according to their own environmental information, and do not need to communicate with other nodes, which saves resources. When danger is perceived, the model acquires the global knowledge through node cooperation, and can perform more accurate real-time intrusion detection. In this paper, the performance of the model is analyzed including complexity and efficiency, and experimental results show that the model has good detection performance and reduces energy consumption.

무선랜 환경에서 양자 엔트로피 칩 기반 암호모듈을 적용한 드론 피아식별과 안전한 정보 제공 기술 제안 (A Proposal for Drone Entity Identification and Secure Information Provision Technology Using Quantum Entropy Chip-Based Cryptographic Module in WLAN Environment)

  • 정서우;윤승환;이옥연
    • 정보보호학회논문지
    • /
    • 제32권5호
    • /
    • pp.891-898
    • /
    • 2022
  • 세계적 관심과 함께 드론은 물품 수송, 산림 보호, 안전 관리 등 활용 분야의 저변을 확대해 나가고 있으며 드론은 활용 분야 확대 및 규모 확장에 따라 군사 작전, 환경 감시 등 다양한 분야에서 군집 비행이 응용되고 있다. 현재 국내에서는 특정 산업 분야의 서비스를 위한 이음 5G와 같은 특화망을 구축해 나가고 있다. 이와 관련하여 드론 시스템 또한 AI와 자율비행 등과 융합된 서비스를 제공하기 위해 특화망을 구축하려는 움직임이 보이고 있다. 드론이 여러 서비스와 융합됨에 따라 다양한 환경에서의 다양한 보안 위협 또한 종속되고 있으며, 이에 대응하여 국내에서는 드론 보안에 대한 요구사항과 가이드라인을 마련하고 있는 추세이다. 본 논문에서는 드론 시스템 중 드론의 군집 비행 시스템과 이를 위한 이음 5G와 같은 이동통신 특화망에서 무선랜과 양자 엔트로피 기반 난수 발생기를 탑재한 암호모듈을 활용하여 군집 비행 드론 간 피아식별 및 안전한 정보 제공 기술 방법을 제안하고, 구현에 참고할 수 있는 테스트 벡터를 제공한다.