• Title/Summary/Keyword: Secure Development

Search Result 1,865, Processing Time 0.028 seconds

Implementation of LabVIEW based Testbed for MHA FTSR (LabVIEW 기반의 MHA 명령방식 비행종단수신기 점검장비 구현)

  • Kim, Myung-Hwan;Hwang, Soo-Sul;Lim, You-Cheol;Ma, Keun-Su
    • Aerospace Engineering and Technology
    • /
    • v.13 no.1
    • /
    • pp.55-62
    • /
    • 2014
  • FTSR(Flight Termination System Receiver) is a device that receives a ground command signal to abort a flight mission when abnormal conditions occur in the space launch vehicle. The secure tone command message shall consist of a series of 11 character tone pattern. Each character consists of the sum of two tones which taken from a set of 7 tones defined by IRIG(Inter-Range Instrumentation Group) in the audio frequency range. The MHA(Modified High alphabet) command adds a security feature to the secure tone command by using the predefined difference code. In order to check the function and performance of MHA FTSR, which is under development, for KSLV-II, the testbed should have functions of RF signal generation, receiver's output port monitoring, RS-422 communication and test data management. In this paper, we first briefly introduce MHA command and FTSR interface, and then show the LavVIEW based testbed include its H/W configuration, S/W implementation and test results.

Case Study : Application of Specific Evaluation Criteria For Safety Circuit Design of EN ISO 13849-1 (사례 연구 : EN ISO 13849-1의 안전회로 설계를 위한 구체적 평가 기준의 적용)

  • Jung, Hwansuk;Lee, Dongju
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.41 no.1
    • /
    • pp.94-101
    • /
    • 2018
  • With the development of industrial technology and science, production and manufacturing facilities have been enhanced and improved, and the importance of the safety of workers has also been regulated and limited by various safety management methods. As a way to secure the safety of the workers from the production facility, the fail-safe and fool-proof methods are now being applied. Any possible insecure behavior and unsafe conditions can be removed by adopting the standards and specifications that are now secure the safety of workers and equipment. This research analyzes EN ISO 13849-1 international and European standards during CE certification. In order to secure acceptable reduced risks, the risk assessment process of ISO 12100 and the processes for reducing its risk are applied. In the current ISO 13849-1 standard, the criteria for the required performance level PLr (Required Performance Level) for the applicable risk and safety functions through the risk assessment are subjective and not subdivided. Therefore, the evaluation criteria are likely to cause judge's judgement error due to qualitative judgement. This research focuses on evaluation and acceptable performance level setting for the safety circuit of the equipment. We propose an objective and specific evaluation criteria to secure safety, and the proposed evaluation criteria are applied to the case study of the safety circuit for the equipment. In order to secure the safety of the entire safety circuit, the improvement of the MTTFd and DC level related to the SRP/CS (Safety-Related Parts of Control Systems)' lifetime is required for the future research.

Study on the OMAC-SNEP for Unattended Security System Using Wireless Sensor Networks (무선 센서 네트워크를 이용한 무인 경비 시스템에서의 OMAC-SNEP 기술에 관한 연구)

  • Lee Seong-Jae;Kim Hak-Beom;Youm Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.1
    • /
    • pp.105-114
    • /
    • 2006
  • Ubiquitous Sensor Network consists of a number of sensor nodes with a limited computation power and limited communication capabilities, and a sensor node is able to communicate with each other at anytime and in any place. Due to the rapid research and development in sensor networks, it will rapidly grow into environments where hmm beings can interact in an intuitive way with sensing objects which can be PDAs, sensors, or even clothes in the future. We are aiming at realizing an Unattended Secure Security System to apply it to Ubiquitous Sensor Network. In this paper, the vulnerabilities in the Unattended security system are identified, and a new protocol called OMAC-SNEP is proposed for the Unattended Secure Security System. Because the CBC-MAC in SNEP is not secure unless the message length is fixed, the CBC-MAC in SNEP was replaced with OMAC in SNEP. We have shown that the proposed protocol is secure for my bit length of messages and is almost as efficient as the CBC-MAC with only one key. OMAC-SNEP can be used not only in Unattended Security System, but also any other Sensor Networks.

Some Design Approaches for Practical Use of Small Urban Spaces

  • Kim, Do-Kyong;Hong, Hyung-Soon;Suh, Joo-Hwan
    • Journal of the Korean Institute of Landscape Architecture International Edition
    • /
    • no.1
    • /
    • pp.192-201
    • /
    • 2001
  • Today, the availabity of usable pieces of land in urbanized areas is very limited. Specifically, it is very difficult to secure a piece of land to be used as a park for the public, mainly due to the high price of land in cities. However, the City of Seoul has carried out three action plans to secure land deemed for insufficient parks and to vitalize these small piece of land in downtown areas such as following: 1. Ssamzie-park(Korean version of a 'vest pocket park') Development Plan in 1990 through 1991. 2. Modernization Plan for Children's Parks since 1994. 3. Maeul-madang (Korean version of 'community garden')Development Plan since 1996. The purpose of this study was to present some design approaches for practical use of small urban spaces by articulating the concepts of Modernization Plan for Children's Park and Maeul-madang Development Plan of the winning entries and by describing how the concepts were actualized in reality.

  • PDF

Identification of Vehicle Using Edge Detection (S/W 개발 보안의 필요성과 기대효과)

  • Shin, SY;Kim, DK;Lee, CW;Lee, HC;Lee, TW;Park, KH
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.741-742
    • /
    • 2016
  • Secure Coding is in the development phase, removing a potential security vulnerability that could lead to attacks such as hacking in advance, says the technique to develop secure software from external attacks. In this paper, we'll learn about the needs and expectations of the effectiveness of these security software development. Due to this, the threat to the safe software development project, and there is an effect to improve quality.

  • PDF

Advanced Navigation Technology Development Trend as an Unmanned Vehicle Core Technology

  • Seok, Hyo-Jeong;Hwang, In Seong;Kang, Wanggu
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.10 no.4
    • /
    • pp.235-242
    • /
    • 2021
  • Unmanned Aerial Vehicles (UAVs), which were used for military purposes, are gradually expanding their application fields under the influence of electrification and digitalization. Starting from the field of aerial imaging and Intelligence Surveillance and Reconnaissance (ISR) mission, nowadays the possibility of Urban Air Mobility (UAM), which transports passengers and cargo with drones, is widely under discussion. In order to occupy the rapidly growing global unmanned aerial vehicle market in advance, it is necessary to secure core technologies and develop key UAVs components based on the new technologies. In the navigation field, it is necessary to secure a precise position with guaranteed reliability and continuity, unrelated to the operating environments. The reliability and continuity should be secured in the algorithm level and in the H/W component levels also. In order to achieve this technical goal, the Ministry of Science and ICT has launched the 'Unmanned Vehicle Core Technology Research and Development Program' in 2019 to support the R&D on the unmanned vehicle technologies. In this paper, authors introduce the unmanned vehicle core technology research and development program to the related researchers. The authors summarize the backgrounds of the program and show the technological tasks and objectives on the sub-programs in the unmanned vehicle navigation program. We present the program schedules especially focused on the test and evaluation of the developed technologies and components.

Demand Forecast of Industrial Research and Development Manpower (연구개발 인력의 산업별 수요 예측)

  • Seo, In-Seok;Kim, Ji-Soo;Kim, Dong-Mook
    • IE interfaces
    • /
    • v.5 no.1
    • /
    • pp.47-60
    • /
    • 1992
  • Korean government plans to expand R & D expenditures to 39.8 billion dollars (5 percent of GNP) and to secure 150,000 R & D manpower (30 per 10,000 population) until 2001. This paper deals with industrial research and development manpower and is to forecast the demand of science and technology manpower to keep pace with the economic development goals which includes advancement of science and technology. This is composed of two parts. The first part is the review of the basic concepts of this research while the second one projects and overall future demand of science and technology manpower.

  • PDF

A Study on Application Methodology of SPDL Based on IEC 62443 Applicable to SME Environment (중소기업환경에서 적용 가능한 IEC 62443 기반의 개발 보안 생애주기 프로세스 적용 방안 연구)

  • Jin, Jung Ha;Park, SangSeon;Kim, Jun Tae;Han, Keunhee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.6
    • /
    • pp.193-204
    • /
    • 2022
  • In a smart factory environment in a small and medium-sized enterprise (SME) environment, sensors and actuators operating on actual manufacturing lines, programmable logic controllers (PLCs) to manage them, human-machine interface (HMI) to control and manage such PLCs, and consists of operational technology server to manage PLCs and HMI again. PLC and HMI, which are in charge of control automation, perform direct connection with OT servers, application systems for factory operation, robots for on-site automation, and production facilities, so the development of security technology in a smart factory environment is demanded. However, smart factories in the SME environment are often composed of systems that used to operate in closed environments in the past, so there exist a vulnerable part to security in the current environment where they operate in conjunction with the outside through the Internet. In order to achieve the internalization of smart factory security in this SME environment, it is necessary to establish a process according to the IEC 62443-4-1 Secure Product Development Life cycle at the stage of smart factory SW and HW development. In addition, it is necessary to introduce a suitable development methodology that considers IEC 62443-4-2 Component security requirements and IEC 62443-3 System security requirements. Therefore, this paper proposes an application plan for the IEC 62443 based development security process to provide security internalization to smart factories in an SME environment.

A Legal & Institutional Supporting on Local Broadcast Development - Syntactic Approach about Special Act on the Development of Local Broadcasting (지역방송발전을 위한 법적·제도적 지원방안 -지역방송 발전지원 특별법의 성과와 한계를 중심으로)

  • Kang, Chul-Soo;Kim, Dug-Mo
    • Journal of Digital Convergence
    • /
    • v.15 no.1
    • /
    • pp.45-52
    • /
    • 2017
  • According to the change in media environment, a support plan for local broadcast has been required. In terms of legal and institutional support for the development of local broadcast, the enactment of special Act for local broadcast has become a breakthrough. In this point of view, we analyzed the performance and the limitation of the special Act. As a literature research, analyzing the literature and related-ordinances, we have sought legal and institutional support plans for the local broadcast. As a result, with the Local Broadcast Development Council being in charge of legislative right and responsibility, a plan to empower them to have legal and institutional authority should be drawn; another plan to secure independence in operating a fund and to promote the capability to produce local broadcast programs and the distribution system should be drawn; the other elaborate plan for the locality index that assesses the locality is required. Local broadcast should be on a way to secure not only public interest and concern but locality and diversity; legal and institutional plans should be sought.

(An HTTP-Based Application Layer Security Protocol for Wireless Internet Services) (무선 인터넷 서비스를 위한 HTTP 기반의 응용 계층 보안 프로토콜)

  • 이동근;김기조;임경식
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.377-386
    • /
    • 2003
  • In this paper, we present an application layer protocol to support secure wireless Internet services, called Application Layer Security(ALS). The drawbacks of the two traditional approaches to secure wireless applications motivated the development of ALS. One is that in the conventional application-specific security protocol such as Secure HyperText Transfer Protocol(S-HTTP), security mechanism is included in the application itself. This gives a disadvantage that the security services are available only to that particular application. The other is that a separate protocol layer is inserted between the application and transport layers, as in the Secure Sockets Layer(SSL)/Transport Layer Security(TLS). In this case, all channel data are encrypted regardless of the specific application's requirements, resulting in much waste of network resources. To overcome these problems, ALS is proposed to be implemented on top of HTTP so that it is independent of the various transport layer protocols, and provides a common security interface with security applications so that it greatly improves the portability of security applications. In addition, since ALS takes advantages of well-known TLS mechanism, it eliminates the danger of malicious attack and provides applications with various security services such as authentication, confidentiality integrity and digital signature, and partial encryption. We conclude this paper with an example of applying ALS to the solution of end-to-end security in a present commercial wireless protocol stack, Wireless Application Protocol.