• Title/Summary/Keyword: Port Security

Search Result 307, Processing Time 0.028 seconds

A Study on Security Issues Due to Foreign Function Interface in Rust (Rust 언어의 FFI로 인한 취약에 대한 연구)

  • Martin, Kayondo;Bang, In-Young;You, Jun-Seung;Seo, Ji-Won;Paek, Yun-Heung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.05a
    • /
    • pp.151-154
    • /
    • 2021
  • Rust is a promising system programming language that made its debut in 2010. It was developed to address the security problems in C/C++. It features a property called ownership, on which it relies to mitigate memory attacks. For this and its many other features, the language has consistently gained popularity and many companies have begun to seriously consider it for production uses. However, Rust also supports safe and unsafe regions under which the foreign function interface (FFI), used to port to other languages, falls. In the unsafety region, Rust surrenders most of its safety features, allowing programmers to perform operations without check. In this study, we analyze the security issues that arise due to Rust's safety/unsafety property, especially those introduced by Rust FFI.

A Design of Maritime Information Network System Based on Mesh Network (Mesh Network 기반의 해상 정보 네트워크 시스템 설계)

  • Seo, Ki-Yeol;Oh, Se-Woong;Choi, Deuk-Jae;Park, Sang-Hyun;Suh, Sang-Hyun
    • Journal of Navigation and Port Research
    • /
    • v.31 no.6
    • /
    • pp.497-502
    • /
    • 2007
  • The important purposes of research in ship operation are to ensure safe navigation, high efficiency of transportation, high accuracy, and security. IMO, develops a broad strategy for incorporating the use of new technologies in a structured way to ensure that their use is compliant with the various electronic navigational and communication technologies and services that are already available. As a base research for E-Navigation, therefore, this paper proposes a maritime information network based on Mesh Network that is one of the maritime broadband solutions. Firstly, this paper analyzes an international port network system and the requirements of port network for E-Navigation. Finally, it designs the maritime information network system based on Mesh Network and shows its validity for E-Navigation.

A Design of a Personnel Control System Using RF Tag in Port Facilities (RF 태그를 활용한 항만 내 인원관리 시스템)

  • Cha, Jin-Man;Park, Yeoun-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.520-523
    • /
    • 2010
  • In the field of network sense for the Ubiquitous environment, the technology of RFID is a significant part. Due to the real time processing of information and the property of network, RFID has been used in service field such as distribution, administrative control of physical distribution, remote measuring device, and security, instead of currently used bar-code. The management system of port facilities using the current RFID technology has the effects of reducing working hours and improvement in data processing, but it is not proper for human resource allocation since it is dominantly worked for physical resources. In this paper, we designed and implemented personnel control system using RFID of 2.4GHz in port facilities which presents a monitoring system for safety operation and increase of efficiency using RFID in order to overcome the limitations and problems of current port operation management techniques.

  • PDF

Design and Implementation of the Device Independent RFID Middleware Component for the Next Generation Port-Logistics (차세대 항만물류를 위한 장치 독립형 RFID 미들웨어 구성요소의 설계 및 구현)

  • Jang, Su-Wan;Kim, Jong-Deok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.1
    • /
    • pp.124-130
    • /
    • 2007
  • RFID technology is considered as a promising solution to increase efficiency of port logistics. Especially active RFID technology, such as e-Seal for container security, is receiving attention nowadays. If active RFID system is combined with passive RFID and legacy bar-code system overall efficiency of port logistics can be improved However, due to the device dependent control interface of RFID readers, there are many difficulties in making active-passive combined RFID system environment. In this paper, we introduce Smart Reader Interface (SRI) system, which provides a device independent RFID reader interrace to control different kinds of RFID readers by hiding device dependent control interface through adapter architecture which is similar to device driver of conventional operating systems. The key design objectives of SRI are the followings; conformance to the related standard. efficiency in processing, easy addition of an adapter for a new RFID reader. Actually, the implemented SRI system can support various kinds of commercial RFID readers, and through the test carried out not only in laboratory but also in the container terminal in the GwangYang Port, its practicality is verified.

A Study on Colors through Regeneration Design for Abandoned Factory Buildings - The Color of Buildings in the Port Area of Bongnae-dong, Yeongdo, Busan as an Example - (폐공장 건물 재생디자인에 대한 색채 관한 연구 - 부산 영도 봉래동 항만지역 건축물 색채를 중심으로 -)

  • Li, XinTong;Zhang, Ning;Cho, Joung-Hyung
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.10
    • /
    • pp.177-188
    • /
    • 2021
  • In South Korea, with the advancement of the 'Port' project, the regeneration industry adapted to the modern economic development has been promoted, leading to construction around the port was also redefined. Therefore, through regeneration, the problem of image construction of buildings around the port has been re-examined, in which color is an important content of image construction. In this study, the exterior walls of abandoned factory buildings in the port area of Bongnaedong, Pusan were selected as the color research object and evaluated according to the characteristics of the regenerated factory buildings combined with the building color function. Technically, KSCP color analysis system is used for color analysis. In this way, the color plan for the exterior walls of the factory buildings is proposed to visually enhance the image of abandoned factory buildings and attract more attention, thus driving the regional economic development. The results of this study show that in order to adapt to the regional, industrial and commercial characteristics of the regenerated port space, the color hue, lightness, chroma and use area of the building can be changed to enhance the aesthetic value and enhance the inductivity and security.

Design and Implementation of ARIA Cryptic Algorithm (ARIA 암호 알고리듬의 하드웨어 설계 및 구현)

  • Park Jinsub;Yun Yeonsang;Kim Young-Dae;Yang Sangwoon;Chang Taejoo;You Younggap
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.42 no.4 s.334
    • /
    • pp.29-36
    • /
    • 2005
  • This paper presents the first hardware design of ARIA that KSA(Korea Standards Association) decided as the block encryption standard at Dec. 2004. The ARIA cryptographic algorithm has an efficient involution SPN (Substitution Permutation Network) and is immune to known attacks. The proposed ARIA design based on 1 cycle/round include a dual port ROM to reduce a size of circuit md a high speed round key generator with barrel rotator. ARIA design proposed is implemented with Xilinx VirtexE-1600 FPGA. Throughput is 437 Mbps using 1,491 slices and 16 RAM blocks. To demonstrate the ARIA system operation, we developed a security system cyphering video data of communication though Internet. ARIA addresses applications with high-throughput like data storage and internet security protocol (IPSec and TLS) as well as IC cards.

A Study on the Security Threats of IoT Devices Exposed in Search Engine (검색엔진에 노출된 IoT 장치의 보안 위협에 대한 연구)

  • Han, Kyong-Ho;Lee, Seong-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.1
    • /
    • pp.128-134
    • /
    • 2016
  • IoT devices including smart devices are connected with internet, thus they have security threats everytime. Particularly, IoT devices are composed of low performance MCU and small-capacity memory because they are miniaturized, so they are likely to be exposed to various security threats like DoS attacks. In addition, in case of IoT devices installed for a remote place, it's not easy for users to control continuously them and to install immediately security patch for them. For most of IoT devices connected directly with internet under user's intention, devices exposed to outside by setting IoT gateway, and devices exposed to outside by the DMZ function or Port Forwarding function of router, specific protocol for IoT services was used and the devices show a response when services about related protocol are required from outside. From internet search engine for IoT devices, IP addresses are inspected on the basis of protocol mainly used for IoT devices and then IP addresses showing a response are maintained as database, so that users can utilize related information. Specially, IoT devices using HTTP and HTTPS protocol, which are used at usual web server, are easily searched at usual search engines like Google as well as search engine for the sole IoT devices. Ill-intentioned attackers get the IP addresses of vulnerable devices from search engine and try to attack the devices. The purpose of this study is to find the problems arisen when HTTP, HTTPS, CoAP, SOAP, and RestFUL protocols used for IoT devices are detected by search engine and are maintained as database, and to seek the solution for the problems. In particular, when the user ID and password of IoT devices set by manufacturing factory are still same or the already known vulnerabilities of IoT devices are not patched, the dangerousness of the IoT devices and its related solution were found in this study.

A Study of the Intelligent Connection of Intrusion prevention System against Hacker Attack (해커의 공격에 대한 지능적 연계 침입방지시스템의 연구)

  • Park Dea-Woo;Lim Seung-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.2 s.40
    • /
    • pp.351-360
    • /
    • 2006
  • Proposed security system attacks it, and detect it, and a filter generation, a business to be prompt of interception filtering dates at attack information public information. inner IPS to attack detour setting and a traffic band security, different connection security system, and be attack packet interceptions and service and port interception setting. Exchange new security rule and packet filtering for switch type implementation through dynamic reset memory by real time, and deal with a packet. The attack detection about DDoS, SQL Stammer, Bug bear, Opeserv worm etc. of the 2.5 Gbs which was an attack of a hacker consisted in network performance experiment by real time. Packet by attacks of a hacker was cut off, and ensured the normal inside and external network resources besides the packets which were normal by the results of active renewal.

  • PDF

Security-intensified SSL VPN and WLCAPT Virtual Server Design (SSL VPN의 보안 강화와 WLCAPT 가상 서버 설계)

  • Jeong Eun-Hee;Choi Eun-Sil;Lee Byung-Kwan
    • Journal of Internet Computing and Services
    • /
    • v.5 no.6
    • /
    • pp.45-58
    • /
    • 2004
  • This paper consists of two parts, One is the ECC( GF(2/sup m/)) algorithm to improve the security strength and the processing time of SSL VPN and the other is the WLCAPT algorithm instead of LSNAT for the security strength of virtual server. In general when corporates use SSL protocol in order to build VPN, they use RSA algorithm with the problem of security and processing time about authentication and confidentiality, In this paper, a shared public key is generated with ECSPK which uses ECC( GF(2/sup m/)) algorithm to improve the security and processing time instead of RSA In addition, WLCAPT algorithm proposed in this paper is applied to virtual server which resides in the server side and then after NAT translation, the actual server of headquarter is securely communicated with it.

  • PDF

A Study on Privacy Security in Maritime Information Gateway System (지능형 해상교통정보 연계시스템에서의 개인정보 보안에 관한 연구)

  • Yong-hak Song;Hyun Kim;Deuk-Jae Cho;Jong-Hwa Beak;Do-yeon Kim
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.05a
    • /
    • pp.202-203
    • /
    • 2023
  • The Ministry of Oceans and Fisheries is providing maritime safety services through the operation of the Korean e-Navigation service, and research is continuously needed to improve reliability and quality to secure the competitiveness of the system. In order to secure such competitiveness, we presented the basic design for the big-data maritime information gateway system for minimizes thereal-time operation impact of the Korean e-Navigation service, and a theoretical hardware structure diagram including pseudonymization procedures to implement the overall system and solve privacy security issues. However, the proposed structure diagram and design include only the overall concept, to link real-time maritime information, required detailed privacy security method to satisfy the Privacy Act of the Republic of Korea. To solve this problem, this study will identify factors to violate the Privacy Act within the real-time maritime information(privacy of shipowner, shipping company, captain, navigator, fisherman, etc.) linked by the big-data maritime information gateway system, and research the method to link the secured information to other institutions by encrypting identified the factors.

  • PDF