• 제목/요약/키워드: Secure Monitoring

검색결과 341건 처리시간 0.033초

객체지향 설계론을 이용한 발사체 시뮬레이터 개발 (The Development of Launch Vehicle Simulator Using an Object-orinted Design)

  • 최원;정해욱;서진호;홍일희
    • 한국시뮬레이션학회:학술대회논문집
    • /
    • 한국시뮬레이션학회 2005년도 춘계학술대회 논문집
    • /
    • pp.106-111
    • /
    • 2005
  • LCC(Launch Control Center) in NARO Space Center perform a data monitoring and control through the interface to the external system of launch vehicle. Launch Control function needs a high reliability and processing speed. Hence, LCC's remote control system configure a real time system. An important role of the Simulation system is discovering a risk element and minimize it When developing a launch control system. Also, secure a development technique to solve the risks. Launch Vehicle simulator is composed of various component at characteristic of the Launch Vehicle. To be like this each function component the developer will be able to develop easily in order, it using the LabVIEW which is a Graphical Program and it programs, The LabVIEW GOOP(Graphical Object-orinted Programming) which supports an Object-orinted programming it uses with the Component it develops will have a strong point which reusability and a unit test, maintenance, size of program and individual developments.

  • PDF

통계적 여과기법에서 퍼지 규칙을 이용한 적응적 보안 경계 값 결정 방법 (An Adaptive Threshold Determining Method in Senor Networks using Fuzzy Logic)

  • 선청일;조대호
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 한국정보통신설비학회 2008년도 정보통신설비 학술대회
    • /
    • pp.177-180
    • /
    • 2008
  • There are many application areas of sensor networks, such as surveillance, hospital monitoring, and home network. These are dependent on the secure operation of networks, and will have serious outcome if the networks is injured. An adversary can inject false data into the network through the compromising node. Ye et al. proposed a statistical en-route filtering scheme (SEF) to detect such false data during forwarding process. In this scheme, it is important that the choice of the threshold value since it trades off security and overhead. This paper presents an adaptive threshold value determining method in the SEF using fuzzy logic. The fuzzy logic determines a security distance value by considering the situation of the network. The Sensor network is divided into several areas by the security distance value, it can each area to uses the different threshold value. The fuzzy based threshold value can reduce the energy consumption in transmitting.

  • PDF

Implementation of Multi-Precision Multiplication over Sensor Networks with Efficient Instructions

  • Seo, Hwajeong;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • 제11권1호
    • /
    • pp.12-16
    • /
    • 2013
  • Sensor network is one of the strongest technologies for various applications including home automation, surveillance system and monitoring system. To ensure secure and robust network communication between sensor nodes, plain-text should be encrypted using encryption methods. However due to their limited computation power and storage, it is difficult to implement public key cryptography, including elliptic curve cryptography, RSA and pairing cryptography, on sensor networks. However, recent works have shown the possibility that public key cryptography could be made available in a sensor network environment by introducing the efficient multi-precision multiplication method. The previous method suggested a broad rule of multiplication to enhance performance. However, various features of sensor motes have not been considered. For optimized implementation, unique features should be handled. In this paper, we propose a fully optimized multiplication method depending on a different specification for sensor motes. The method improves performance by using more efficient instructions and general purpose registers.

A Study on the Realization of Protocol Stack for I/O Elements Control for Multi-devices and Field Level

  • Kwak, Chang-Yong;Kim, Tae-Hwa;Kwon, Soon-Jae;Son, Jeong-Ki
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2001년도 ICCAS
    • /
    • pp.52.1-52
    • /
    • 2001
  • System establishment using a network may be a decisive factor both for creating a flexible production system and increasing reliability and serve as a basis for setting up of a management system that will make the designing, maintenance, and repair easier. It is therefore imperative to develop a protocol which is simple to use for communications and connections among different devices. The objectives of this study is to establish communications protocol stack that will enable to conduct an effective monitoring of production facilities and to secure flexibility of reduction control system, and to improve the working ratio of the production facilities by centralization of communications system through effective collecting and storing of the diversified data of multi-type and multi-device production facilities.

  • PDF

지하수위에 따른 철도사면의 안정성 변화 (The Variation of Slope Stability by Ground Water Level in Railway Lines)

  • 김현기;신민호;신지수
    • 한국철도학회:학술대회논문집
    • /
    • 한국철도학회 2008년도 추계학술대회 논문집
    • /
    • pp.789-795
    • /
    • 2008
  • Slope stability is affected by various factors. For safety management of slopes, monitoring systems have been widely constructed along railway lines. The representative data from the systems are variations of ground profile such like ground water level and pore water pressure etc. and direct displacement measured by ground clinometer and tension wire sensor. Slopes are mainly effected by rainfall and rainfall causes the decrease of factor of safety(FOS). Because FOS varies linearly by the variation of ground water level and pore pressure, it has a weak point that could not define the time and proper warning sign to secure the safety of the train. In this study, alternative of FOS such as reliability index and probability of failure is applied to slope stability analysis introducing the reliability concept. FOS, reliability index, probability of failure and velocity of probability of failure of the slopes by variation of ground water level are investigated for setting up the specification of safety management of slopes. By executing case study of a slope(ILLO-IMSUNGLI), it is showed to be applied to specification of safety management.

  • PDF

Vehicle-logo recognition based on the PCA

  • Zheng, Qi;Lee, Hyo Jong
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2012년도 춘계학술발표대회
    • /
    • pp.429-431
    • /
    • 2012
  • Vehicle-logo recognition technology is very important in vehicle automatic recognition technique. The intended application is automatic recognition of vehicle type for secure access and traffic monitoring applications, a problem not hitherto considered at such a level of accuracy. Vehicle-logo recognition can improve Vehicle type recognition accuracy. So in this paper, introduces how to vehicle-logo recognition. First introduces the region of the license plate by algorithm and roughly located the region of car emblem based on the relationship of license plate and car emblem. Then located the car emblem with precision by the distance of Hausdorff. On the base, processing the region by morphologic, edge detection, analysis of connectivity and pick up the PCA character by lowing the dimension of the image and unifying the PCA character. At last the logo can be recognized using the algorithm of support vector machine. Experimental results show the effectiveness of the proposed method.

작업자 안전을 고려한 무인 폐기물 수거차 시스템 개발 (Development of Unmanned Vehicles System for Waste Collection Considering Worker Safety)

  • 정민권;김상호;이상무;원대희;소병록;이상준
    • 로봇학회논문지
    • /
    • 제17권4호
    • /
    • pp.477-483
    • /
    • 2022
  • In this paper, we propose waste collection vehicle system with a safety device for worker safety and an autonomous driving function. The steering system is applied as MDPS (Motor Drive Power Steering) system to control the waste collection vehicle of the internal combustion engine. Safety-related errors is prevented through redundancy brake of the integrated system and the control braking system. In order to ensure safety between workers and waste collection vehicles, work guidelines and safety devices for emergency stop in case of danger are applied to vehicles. In addition, this research is conducted on improving the working efficiency through vehicle condition monitoring system and a short-range control system for field test. This research is aimed to secure stability through demonstration and contribute to the industrialization of unmanned waste collection vehicles.

Privacy Inferences and Performance Analysis of Open Source IPS/IDS to Secure IoT-Based WBAN

  • Amjad, Ali;Maruf, Pasha;Rabbiah, Zaheer;Faiz, Jillani;Urooj, Pasha
    • International Journal of Computer Science & Network Security
    • /
    • 제22권12호
    • /
    • pp.1-12
    • /
    • 2022
  • Besides unexpected growth perceived by IoT's, the variety and volume of threats have increased tremendously, making it a necessity to introduce intrusion detections systems for prevention and detection of such threats. But Intrusion Detection and Prevention System (IDPS) inside the IoT network yet introduces some unique challenges due to their unique characteristics, such as privacy inference, performance, and detection rate and their frequency in the dynamic networks. Our research is focused on the privacy inferences of existing intrusion prevention and detection system approaches. We also tackle the problem of providing unified a solution to implement the open-source IDPS in the IoT architecture for assessing the performance of IDS by calculating; usage consumption and detection rate. The proposed scheme is considered to help implement the human health monitoring system in IoT networks

Development of Radar-enabled AI Convergence Transportation Entities Detection System for Lv.4 Connected Autonomous Driving in Adverse Weather

  • Myoungho Oh;Mun-Yong Park;Kwang-Hyun Lim
    • International journal of advanced smart convergence
    • /
    • 제12권4호
    • /
    • pp.190-201
    • /
    • 2023
  • Securing transportation safety infrastructure technology for Lv.4 connected autonomous driving is very important for the spread of autonomous vehicles, and the safe operation of level 4 autonomous vehicles in adverse weather has limitations due to the development of vehicle-only technology. We developed the radar-enabled AI convergence transportation entities detection system. This system is mounted on fixed and mobile supports on the road, and provides excellent autonomous driving situation recognition/determination results by converging transportation entities information collected from various monitoring sensors such as 60GHz radar and EO/IR based on artificial intelligence. By installing such a radar-enabled AI convergence transportation entities detection system on an autonomous road, it is possible to increase driving efficiency and ensure safety in adverse weather. To secure competitive technologies in the global market, the development of four key technologies such as ① AI-enabled transportation situation recognition/determination algorithm, ② 60GHz radar development technology, ③ multi-sensor data convergence technology, and ④ AI data framework technology is required.

Security Threat Analysis for Remote Monitoring and Control Functions of Connected Car Services

  • Jin Kim;Jinho Yoo
    • Journal of Information Processing Systems
    • /
    • 제20권2호
    • /
    • pp.173-184
    • /
    • 2024
  • The connected car services are one of the most widely used services in the Internet of Things environment, and they provide numerous services to existing vehicles by connecting them through networks inside and outside the vehicle. However, although vehicle manufacturers are developing services considering the means to secure the connected car services, concerns about the security of the connected car services are growing due to the increasing number of attack cases. In this study, we reviewed the research related to the connected car services that have been announced so far, and we identified the threats that may exist in the connected car services through security threat modeling to improve the fundamental security level of the connected car services. As a result of performing the test to the applications for connected car services developed by four manufacturers, we found that all four companies' applications excessively requested unnecessary permissions for application operation, and the apps did not obfuscate the source code. Additionally, we found that there were still vulnerabilities in application items such as exposing error messages and debugging information.