• 제목/요약/키워드: Secure Monitoring

검색결과 337건 처리시간 0.02초

CCD 카메라와 수위계를 조합한 철도교량 실시간 홍수위 감시시스템 개발 (Development of Realtime Flood Monitoring System composed of CCD Camera and Water Level Gauge)

  • 박영곤;윤희택;김선종;신민호;정승용
    • 한국철도학회:학술대회논문집
    • /
    • 한국철도학회 2004년도 춘계학술대회 논문집
    • /
    • pp.224-228
    • /
    • 2004
  • In these days, as it frequently happens that water level in the river exceeds the design floods due to irregular heavy rainfall, so it is required, first of an, to manage with railroad bridge safely. Because train control criterion under heavy rainfall is still not prepared and automatic flood monitoring system for railroad bridges is not used, worry over invisible economic loss due to train passage delay is in existence. Therefore, it is important to secure the safety and detect the risk like turnover or failure of railroad bridges through systematic disaster prevention system. And the transition from conventional monitoring method to real time monitoring method supported by sensors and communication system with high technology is rapidly needed. This research is on developing the real time flood monitoring system which prevents railroad disasters in advance by detecting continuously the water level of railroad bridge through CCD camera and water level gauge.

  • PDF

Secure control of satellite communication system using cryptosystem

  • Hong, Ki-Yoong
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 1994년도 Proceedings of the Korea Automatic Control Conference, 9th (KACC) ; Taejeon, Korea; 17-20 Oct. 1994
    • /
    • pp.218-223
    • /
    • 1994
  • On the satellite communication system, conventional key issues of control have been focused on the attitude and orbit control, monitoring and control of communication payload such as IOT(In-Orbit-Test) and CSM(Communication System Monitoring) and so on. As the vulnerabilities are being increased on the satellite communication network, security services are required to protect it against security violated attacks. In this paper, a security architecture for satellite communication network is presented in order to provide security services and mechanisms. Authentication protocol and encryption scheme are also proposed for spacecraft command authentication and confidentiality.

  • PDF

클라우드 컴퓨팅 환경에서의 안전한 로그 시스템 설계 (Design of Secure Log System in Cloud Computing Environment)

  • 이병도;신상욱
    • 한국멀티미디어학회논문지
    • /
    • 제19권2호
    • /
    • pp.300-307
    • /
    • 2016
  • Cloud computing that provide a elastic computing service is more complex compared to the existing computing systems. Accordingly, it has become increasingly important to maintain the stability and reliability of the computing system. And troubleshooting and real-time monitoring to address these challenges must be performed essentially. For these goals, the handling of the log data is needed, but this task in cloud computing environment may be more difficult compared to the traditional logging system. In addition, there are another challenges in order to have the admissibility of the collected log data in court. In this paper, we design secure logging service that provides the management and reliability of log data in a cloud computing environment and then analyze the proposed system.

농업용수 정량화를 위한 경제적 수위계측망 설계 (Economical Design of Water Level Monitoring Network for Agricultural Water Quantification)

  • 김선주;권형중;김일정;김필식
    • 한국농공학회논문집
    • /
    • 제58권5호
    • /
    • pp.19-28
    • /
    • 2016
  • This study was to design the optimal locations of the water level monitoring to quantify the agricultural water use in irrigation area supplied from an agricultural reservoir. In most of agricultural areas without TM/TC (Tele-Monitoring and Tele-Control) or monitoring network, irrigation water have been supplied on conventional experience and agricultural reservoir have been operated based on the operating simulation results by HOMWRS (Hydrological Operation Model for Water Resources System). Therefore, this study quantified the amount of agricultural water use in an irrigation area (Musu Reservoir, Jincheon-gun) by establishing water level monitoring network and analyzed the agricultural water saving effect. According to the evaluation of the economic values for water saving effect, the saving agricultural water of 1.7 million ton was analyzed to have economic values of 0.85 million won as water for living, and 1.78 million won as water for industrial use. It is identified to secure economic feasibility of the new water monitoring network by establishing one monitoring point in the entrance, irrigation area and endpoint through the economic analysis.

Service Scenarios for Green House Gas Monitoring Service over NGN

  • Choi, Sam-Gil;Kim, Dong-Il;Lee, Soong-Hee
    • Journal of information and communication convergence engineering
    • /
    • 제9권4호
    • /
    • pp.401-404
    • /
    • 2011
  • Considerations for green house gas (GHG) monitoring over next generation network (NGN) are regarded as a green convergence service for the successful reduction of GHG emission leading to resolve global warming issue in that NGN is expected to provide secure connections to fixed-and-mobile converged (FMC) features. Model-based scenario approach is an appropriate way to standardize and actualize the desired service. This paper first describes the service scenario of GHG monitoring service over NGN.

저전력 무선통신 기반 대기오염 측정시스템 (A Low Power Wireless Communication-based Air Pollutants Measuring System)

  • 강정기;이봉환
    • Journal of Information Technology Applications and Management
    • /
    • 제28권6호
    • /
    • pp.87-95
    • /
    • 2021
  • Recently interest for air pollution is gradually increasing. However, according to the environmental assessment of air quality, the level of air pollution in the nation is quite serious, and air pollutants measuring facilities are also not enough. In this paper, a secure air pollutants sensor system based low power wireless communication is designed and implemented. The proposed system is composed of three parts: air pollutants measuring sensors module, LoRa-based data transmission module, and monitoring module. In the air pollutants measuring module, the MSP430 board with six big air pollutants measuring sensors are used. The air pollutants sensing data is transmitted to the control server in the monitoring system using LoRa transmission module. The received sensing data is stored in the database of the monitoring system, and visualized in real-time on the map of the sensor locations. The implemented air pollutant sensor system can be used for measuring the level of air quality conveniently in our daily lives.

방사성폐기물 처분장 부지감시 계획 (Site Monitoring and investigation plan for LILW disposal)

  • 백승종
    • 방사성폐기물학회지
    • /
    • 제6권4호
    • /
    • pp.369-385
    • /
    • 2008
  • 부지감시 및 조사의 목적은 운영 전, 운영중 및 폐쇄 후 단계에서 변화가 예상되는 주요 부지특성을 지속적으로 감시함으로써 방사성폐기물처분장의 성능평가 및 설계에 필요한 기초자료를 제공하는 것이다. 부지감시의 단계별 주요내용은 다음과 같다. 운영전 단계에는 부지의 적합성 평가 및 처분장 건설과 운영에 필요한 주요 부지특성을 감시하며, 운영 중 단계에는 안전하고 효율적인 운영과 환경에 미치는 영향을 판단하기 위하여 주변지역을 포함하여 주요 부지특성을 감시한다. 폐쇄 후 단계에는 처분장의 방사성 물질로 인한 영향을 사전에 예방하고, 처분장의 장기적 안전성을 위하여 필요한 주요 부지특성 항목을 감시한다.

  • PDF

원격건강정보 모니터링 시스템에서 신원기반 프록시 재암호화 기법을 이용한 건강정보 전송 보안 프로토콜 (A Secure Health Data Transmission Protocol Using Identity-Based Proxy Re-Encryption in Remote Healthcare Monitoring System)

  • 노시완;박영호;이경현
    • 정보처리학회논문지:컴퓨터 및 통신 시스템
    • /
    • 제6권4호
    • /
    • pp.197-202
    • /
    • 2017
  • 원격 건강정보 모니터링 시스템에서 의사는 원격지에서 환자의 건강상태를 진단하거나 모니터링하여 적절한 의료서비스를 제공한다. 기존의 연구들은 공개된 네트워크를 통한 전송과정에서 환자의 민감한 건강정보의 노출로 인한 문제를 해결하기 위해 환자와 의사 사이에 비밀 공유키를 생성하여 메시지를 암호화하는 방법에 중점을 두고 있었다. 하지만 의사의 오진을 고려할 때 다수의 의사에게 진단을 받는 것이 좀 더 신뢰할 수 있는 진단결과를 얻을 수 있다. 하지만 기존 프로토콜에서는 환자가 여러 의사에게 메시지를 전달하기 위해서는 모든 의사와 각각 공유하는 키의 생성이 필요하고 전송과정에서 선택한 모든 의사들을 위해 여러 번의 암호문 생성과정을 필요로 하였다. 이에 본 논문에서는 신원기반 프록시 재암호화 기법을 사용한 원격건강정보 모니터링 시스템의 전송 보안 프로토콜을 제안한다. 제안 프로토콜에서 환자는 별도의 세션키 관리가 필요하지 않고 전송과정에서 환자가 비밀키로 생성한 암호문을 모니터링 서버에서 재암호화하여 선택한 의사에게 전달하므로 기존 프로토콜을 적용했을 때 환자에게 필요한 과도한 연산부담을 개선할 수 있다.

TriSec: A Secure Data Framework for Wireless Sensor Networks Using Authenticated Encryption

  • Kumar, Pardeep;Cho, Sang-Il;Lee, Dea-Seok;Lee, Young-Dong;Lee, Hoon-Jae
    • Journal of information and communication convergence engineering
    • /
    • 제8권2호
    • /
    • pp.129-135
    • /
    • 2010
  • Wireless sensor networks (WSNs) are an emerging technology and offers economically viable monitoring solution to many challenging applications. However, deploying new technology in hostile environment, without considering security in mind has often proved to be unreasonably unsecured. Apparently, security techniques face many critical challenges in WSNs like data security and secrecy due to its hostile deployment nature. In order to resolve security in WSNs, we propose a novel and efficient secure framework called TriSec: a secure data framework for wireless sensor networks to attain high level of security. TriSec provides data confidentiality, authentication and data integrity to sensor networks. TriSec supports node-to-node encryption using PingPong-128 stream cipher based-privacy. A new PingPong-MAC (PP-MAC) is incorporated with PingPong stream cipher to make TriSec framework more secure. PingPong-128 is fast keystream generation and it is very suitable for sensor network environment. We have implemented the proposed scheme on wireless sensor platform and our result shows their feasibility.

Hidden Indicator Based PIN-Entry Method Using Audio Signals

  • Seo, Hwajeong;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • 제15권2호
    • /
    • pp.91-96
    • /
    • 2017
  • PIN-entry interfaces have high risks to leak secret values if the malicious attackers perform shoulder-surfing attacks with advanced monitoring and observation devices. To make the PIN-entry secure, many studies have considered invisible radio channels as a secure medium to deliver private information. However, the methods are also vulnerable if the malicious adversaries find a hint of secret values from user's $na{\ddot{i}}ve$ gestures. In this paper, we revisit the state-of-art radio channel based bimodal PIN-entry method and analyze the information leakage from the previous method by exploiting the sight tracking attacks. The proposed sight tracking attack technique significantly reduces the original password complexities by 93.8% after post-processing. To keep the security level strong, we introduce the advanced bimodal PIN-entry technique. The new technique delivers the secret indicator information through a secure radio channel and the smartphone screen only displays the multiple indicator options without corresponding numbers. Afterwards, the users select the target value by following the circular layout. The method completely hides the password and is secure against the advanced shoulder-surfing attacks.