• Title/Summary/Keyword: Physical Security System

Search Result 460, Processing Time 0.029 seconds

X-Ray Security Checkpoint System Using Storage Media Detection Method Based on Deep Learning for Information Security

  • Lee, Han-Sung;Kim Kang-San;Kim, Won-Chan;Woo, Tea-Kun;Jung, Se-Hoon
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.10
    • /
    • pp.1433-1447
    • /
    • 2022
  • Recently, as the demand for physical security technology to prevent leakage of technical and business information of companies and public institutions increases, the high tech companies are operating X-ray security checkpoints at building entrances to protect their intellectual property and technology. X-ray security checkpoints are operated to detect cameras and storage media that may store or leak important technologies in the bags of people entering and leaving the building. In this study, we propose an X-ray security checkpoint system that automatically detects a storage medium in an X-ray image using a deep learning based object detection method. The proposed system consists of an edge computing unit and a cloud-computing unit. We employ the RetinaNet for automatic storage media detection in the X-ray security checkpoint images. The proposed approach achieved mAP of 95.92% on private dataset.

Development of Convergence Security Industry Knowledge Map for the 4th Industrial Revolution Security Infrastructure (4차 산업혁명의 보안 인프라 구축을 위한 융합보안산업 지식 맵 개발)

  • Lee, Daesung
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.173-180
    • /
    • 2019
  • As the 4th Industrial Revolution(Industry 4.0), symbolized as CPS(Cyber Physical System), spreads around the world, it is essential to establish a converged security infrastructure to secure technical stability and reliability of various cyber systems to be implemented in the future. In this study, we will investigate the phenomenon of broad convergence security industry and technology including the concept of life safety in relation to the spread of the 4th industrial revolution, and analyze the possibility of linkage between related knowledge to promote academic-industrial cooperation necessary for the convergence of security. we would like to propose a comprehensive development policy on human resource development, technology development and policy improvement.

Performance Analysis of Physical Layer Security based on Decode-and-Forward using Jammer and Diversity (재머와 다이버시티를 사용하는 복호 후 재전송 기반 물리 계층 보안의 성능 분석)

  • Park, Sol;Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.2
    • /
    • pp.49-54
    • /
    • 2018
  • In this paper, we study the secrecy outage probability when using cooperative diversity and jammer in a relay system based on decode-and-forward. MRC method is used in receiver and eavesdroppers to obtain cooperative diversity. To use the MRC technique, direct links between the sender and receiver, and between the sender and the eavesdropper are used, respectively. Jammers are used to generate intentional noise siganls to increase security capacity. Jammers generate intentional noise, degrading the channel quality of the eavesdropper and helping physical layer security be realized. The secrecy outage probability is used to evaluate security performance. Assume that the system is under the Rayleigh fading channel.

Orthogonal variable spreading factor encoded unmanned aerial vehicle-assisted nonorthogonal multiple access system with hybrid physical layer security

  • Omor Faruk;Joarder Jafor Sadiqu;Kanapathippillai Cumanan;Shaikh Enayet Ullah
    • ETRI Journal
    • /
    • v.45 no.2
    • /
    • pp.213-225
    • /
    • 2023
  • Physical layer security (PLS) can improve the security of both terrestrial and nonterrestrial wireless communication networks. This study proposes a simplified framework for nonterrestrial cyclic prefixed orthogonal variable spreading factor (OVSF)-encoded multiple-input and multiple-output nonorthogonal multiple access (NOMA) systems to ensure complete network security. Various useful methods are implemented, where both improved sine map and multiple parameter-weighted-type fractional Fourier transform encryption schemes are combined to investigate the effects of hybrid PLS. In addition, OVSF coding with power domain NOMA for multi-user interference reduction and peak-toaverage power ratio (PAPR) reduction is introduced. The performance of $\frac{1}{2}$-rated convolutional, turbo, and repeat and accumulate channel coding with regularized zero-forcing signal detection for forward error correction and improved bit error rate (BER) are also investigated. Simulation results ratify the pertinence of the proposed system in terms of PLS and BER performance improvement with reasonable PAPR.

Control strategy for the substructuring testing systems to simulate soil-structure interaction

  • Guo, Jun;Tang, Zhenyun;Chen, Shicai;Li, Zhenbao
    • Smart Structures and Systems
    • /
    • v.18 no.6
    • /
    • pp.1169-1188
    • /
    • 2016
  • Real-time substructuring techniques are currently an advanced experimental method for testing large size specimens in the laboratory. In dynamic substructuring, the whole tested system is split into two linked parts, the part of particular interest or nonlinearity, which is tested physically, and the remanding part which is tested numerically. To achieve near-perfect synchronization of the interface response between the physical specimen and the numerical model, a good controller is needed to compensate for transfer system dynamics, nonlinearities, uncertainties and time-varying parameters within the physical substructures. This paper presents the substructuring approach and control performance of the linear and the adaptive controllers for testing the dynamic characteristics of soil-structure-interaction system (SSI). This is difficult to emulate as an entire system in the laboratory because of the size and power supply limitations of the experimental facilities. A modified linear substructuring controller (MLSC) is proposed to replace the linear substructuring controller (LSC).The MLSC doesn't require the accurate mathematical model of the physical structure that is required by the LSC. The effects of parameter identification errors of physical structure and the shaking table on the control performance of the MLSC are analysed. An adaptive controller was designed to compensate for the errors from the simplification of the physical model in the MLSC, and from parameter identification errors. Comparative simulation and experimental tests were then performed to evaluate the performance of the MLSC and the adaptive controller.

A Development of the Model for Evaluating the Security of Information Systems in Health Care Organizations (의료기관의 정보보안 수준 측정을 위한 평가모형 개발)

  • Ahn, Sun-Ju;Kwon, Soon-Man
    • Korea Journal of Hospital Management
    • /
    • v.10 no.4
    • /
    • pp.98-112
    • /
    • 2005
  • The purpose of this study is to develop a framework for evaluating security levels in hospitals. We classify security indicators into administrative, technical and physical safeguards. The security evaluation model for hospital information systems was applied to three general hospitals. The analysis of the results showed a low security level in information systems. In particular, requirements for administrative and physical safeguards were very low. Hospitals need strict security policies more than other organizations because their information systems contain patients' highly confidential data. The evaluation model developed in this study can be used for guidelines and as a checklist for hospitals. The security evaluation in hospital informational systems needs to be an essential element of hospital evaluation.

  • PDF

A comparative study on the regulations of civil aviation security related between South Korea and U.S.A. (${\cdot}$ 미 항공보안관련 법규의 비교 연구;국내항공법과 미연방항공법의 비교)

  • Han, K.K.;Lee, K.S.
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.9 no.2
    • /
    • pp.55-62
    • /
    • 2001
  • A safe and secure civil aviation system is a critical component of the nation's overall security, physical infrastructure, and economic foundation. Although it is not fully known at this time what actually occurred or which of the weaknesses in the nation's aviation security apparatus contributed to the terrible events of 11 September in the U.S.A., it is clear that serious weaknesses exist in our aviation security system including regulation system. Actually, defectiveness of regulations structure and contents concerned in aviation security were discussed in various studies. On this study, we have identified defectiveness in aviation security regulation system by the comparative study between 14 CFR and Korean regulations. Finally, we are to provide some suggestions and alternatives to improve aviation security regulation system in this country.

  • PDF

A DEVELOPMENT FRAMEWORK FOR SOFTWARE SECURITY IN NUCLEAR SAFETY SYSTEMS: INTEGRATING SECURE DEVELOPMENT AND SYSTEM SECURITY ACTIVITIES

  • Park, Jaekwan;Suh, Yongsuk
    • Nuclear Engineering and Technology
    • /
    • v.46 no.1
    • /
    • pp.47-54
    • /
    • 2014
  • The protection of nuclear safety software is essential in that a failure can result in significant economic loss and physical damage to the public. However, software security has often been ignored in nuclear safety software development. To enforce security considerations, nuclear regulator commission recently issued and revised the security regulations for nuclear computer-based systems. It is a great challenge for nuclear developers to comply with the security requirements. However, there is still no clear software development process regarding security activities. This paper proposes an integrated development process suitable for the secure development requirements and system security requirements described by various regulatory bodies. It provides a three-stage framework with eight security activities as the software development process. Detailed descriptions are useful for software developers and licensees to understand the regulatory requirements and to establish a detailed activity plan for software design and engineering.

Design of Accident Situation ID Recording System using JPMP-SID Security Tag (보안 JPMP-SID Tag를 활용한 사고 상황 ID 기록 시스템 설계)

  • Choi, Jang-Sik;Choi, Sung-Yeol;Kim, Sang-Choon
    • Convergence Security Journal
    • /
    • v.11 no.3
    • /
    • pp.85-90
    • /
    • 2011
  • JPMP SID Tag is the security senor tag to provides physical information protective function using sensor module, has impossible feature to copy and fake the data which is stored in the tag. So data which is stored in the JPMP SID Tag has authenticity, integrity, originality. Therefore JPMP SID Tag could be applied in the place where the security of data is demanded. This paper propose the system using the JPMP SID Tag to acquire and protect digital evidence where cause investigation of accident is necessary. Also, proposed systems is complement of software security with composition secondary control logic for JPMP SID tag access control.

Design of Access Security System in conjunction with SNS Service based on the Physical Computing (피지컬 컴퓨팅 기반에서의 SNS 서비스를 연계한 출입 보안 시스템 설계)

  • Kim, Heewan;Jung, Gillyoung
    • Journal of Service Research and Studies
    • /
    • v.5 no.2
    • /
    • pp.93-101
    • /
    • 2015
  • Today, various access security technology appeared in this society as a result of the informatization and automation. Most building, floor, or door security certification system for the office units are installed, but there are many inconvenient matters. In order to minimises this, we used the face recognition function via the camera, and various sensors. In this paper, I designed the access security system through physical computing which Arduino offered, facial recognition program, and Twitter. Check that the personal information stored in the individual RFID tag is matched to the personal information stored on the existing server. Face recognition program input the face using a camera, and allow to confirm the identity. The system's abnormal or when the unauthenticated person is to penetrate, the system transmits the Twitter status message to the manager. It was designed continuously to monitor the status in real time in this way.