• Title/Summary/Keyword: Secure Monitoring

Search Result 337, Processing Time 0.025 seconds

Development of Realtime Flood Monitoring System composed of CCD Camera and Water Level Gauge (CCD 카메라와 수위계를 조합한 철도교량 실시간 홍수위 감시시스템 개발)

  • Park, Young-Kon;Yoon, Hee-Taek;Kim, Seon-Jong;Shin, Min-Ho;Jung, Seung-Yong
    • Proceedings of the KSR Conference
    • /
    • 2004.06a
    • /
    • pp.224-228
    • /
    • 2004
  • In these days, as it frequently happens that water level in the river exceeds the design floods due to irregular heavy rainfall, so it is required, first of an, to manage with railroad bridge safely. Because train control criterion under heavy rainfall is still not prepared and automatic flood monitoring system for railroad bridges is not used, worry over invisible economic loss due to train passage delay is in existence. Therefore, it is important to secure the safety and detect the risk like turnover or failure of railroad bridges through systematic disaster prevention system. And the transition from conventional monitoring method to real time monitoring method supported by sensors and communication system with high technology is rapidly needed. This research is on developing the real time flood monitoring system which prevents railroad disasters in advance by detecting continuously the water level of railroad bridge through CCD camera and water level gauge.

  • PDF

Secure control of satellite communication system using cryptosystem

  • Hong, Ki-Yoong
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1994.10a
    • /
    • pp.218-223
    • /
    • 1994
  • On the satellite communication system, conventional key issues of control have been focused on the attitude and orbit control, monitoring and control of communication payload such as IOT(In-Orbit-Test) and CSM(Communication System Monitoring) and so on. As the vulnerabilities are being increased on the satellite communication network, security services are required to protect it against security violated attacks. In this paper, a security architecture for satellite communication network is presented in order to provide security services and mechanisms. Authentication protocol and encryption scheme are also proposed for spacecraft command authentication and confidentiality.

  • PDF

Design of Secure Log System in Cloud Computing Environment (클라우드 컴퓨팅 환경에서의 안전한 로그 시스템 설계)

  • Lee, Byung-Do;Shin, Sang Uk
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.2
    • /
    • pp.300-307
    • /
    • 2016
  • Cloud computing that provide a elastic computing service is more complex compared to the existing computing systems. Accordingly, it has become increasingly important to maintain the stability and reliability of the computing system. And troubleshooting and real-time monitoring to address these challenges must be performed essentially. For these goals, the handling of the log data is needed, but this task in cloud computing environment may be more difficult compared to the traditional logging system. In addition, there are another challenges in order to have the admissibility of the collected log data in court. In this paper, we design secure logging service that provides the management and reliability of log data in a cloud computing environment and then analyze the proposed system.

Economical Design of Water Level Monitoring Network for Agricultural Water Quantification (농업용수 정량화를 위한 경제적 수위계측망 설계)

  • Kim, Sun Joo;Kwon, Hyung Joong;Kim, Il Jung;Kim, Phil Shik
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.58 no.5
    • /
    • pp.19-28
    • /
    • 2016
  • This study was to design the optimal locations of the water level monitoring to quantify the agricultural water use in irrigation area supplied from an agricultural reservoir. In most of agricultural areas without TM/TC (Tele-Monitoring and Tele-Control) or monitoring network, irrigation water have been supplied on conventional experience and agricultural reservoir have been operated based on the operating simulation results by HOMWRS (Hydrological Operation Model for Water Resources System). Therefore, this study quantified the amount of agricultural water use in an irrigation area (Musu Reservoir, Jincheon-gun) by establishing water level monitoring network and analyzed the agricultural water saving effect. According to the evaluation of the economic values for water saving effect, the saving agricultural water of 1.7 million ton was analyzed to have economic values of 0.85 million won as water for living, and 1.78 million won as water for industrial use. It is identified to secure economic feasibility of the new water monitoring network by establishing one monitoring point in the entrance, irrigation area and endpoint through the economic analysis.

Service Scenarios for Green House Gas Monitoring Service over NGN

  • Choi, Sam-Gil;Kim, Dong-Il;Lee, Soong-Hee
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.4
    • /
    • pp.401-404
    • /
    • 2011
  • Considerations for green house gas (GHG) monitoring over next generation network (NGN) are regarded as a green convergence service for the successful reduction of GHG emission leading to resolve global warming issue in that NGN is expected to provide secure connections to fixed-and-mobile converged (FMC) features. Model-based scenario approach is an appropriate way to standardize and actualize the desired service. This paper first describes the service scenario of GHG monitoring service over NGN.

A Low Power Wireless Communication-based Air Pollutants Measuring System (저전력 무선통신 기반 대기오염 측정시스템)

  • Kang, Jeong Gee;Lee, Bong Hwan
    • Journal of Information Technology Applications and Management
    • /
    • v.28 no.6
    • /
    • pp.87-95
    • /
    • 2021
  • Recently interest for air pollution is gradually increasing. However, according to the environmental assessment of air quality, the level of air pollution in the nation is quite serious, and air pollutants measuring facilities are also not enough. In this paper, a secure air pollutants sensor system based low power wireless communication is designed and implemented. The proposed system is composed of three parts: air pollutants measuring sensors module, LoRa-based data transmission module, and monitoring module. In the air pollutants measuring module, the MSP430 board with six big air pollutants measuring sensors are used. The air pollutants sensing data is transmitted to the control server in the monitoring system using LoRa transmission module. The received sensing data is stored in the database of the monitoring system, and visualized in real-time on the map of the sensor locations. The implemented air pollutant sensor system can be used for measuring the level of air quality conveniently in our daily lives.

Site Monitoring and investigation plan for LILW disposal (방사성폐기물 처분장 부지감시 계획)

  • Baek, Seung-Jong
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.6 no.4
    • /
    • pp.369-385
    • /
    • 2008
  • The purpose of site monitoring and investigation is to offer the basic data for performance assessment and design of low- and intermediate-level radioactive waste(LILW) disposal facility by monitoring variations of main site properties continually in the stage of pre-operation, operation and post-closure. Main contents of site monitoring are as follows. In the stage of pre-operation, suitability evaluation for disposal facility and monitoring for constructing and operating disposal facility are performed. In the operation period, monitoring is performed including surroundings to research the influence to environment with operating disposal facility and operate safely and efficiently. In the post-closure period, monitoring about major site properties is performed to prevent the effect of radioactive waste from disposal facility and to secure long-term safety.

  • PDF

A Secure Health Data Transmission Protocol Using Identity-Based Proxy Re-Encryption in Remote Healthcare Monitoring System (원격건강정보 모니터링 시스템에서 신원기반 프록시 재암호화 기법을 이용한 건강정보 전송 보안 프로토콜)

  • Noh, Si-Wan;Park, Youngho;Rhee, Kyung-Hyune
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.4
    • /
    • pp.197-202
    • /
    • 2017
  • The remote healthcare monitoring system enables a doctor to diagnose and monitor patient's health problem from a distance. Previous researches have focused on key establishment method between a patient and a particular doctor to solve personal health information disclosure problem in data transmission process. However, when considering a misdiagnosis of doctor, the result of a diagnosis by a many doctors is more reliable. In previous work, in order to select multiple doctors, patient should generate shared key for each chosen doctor and perform many times encryptions. Therefore, in this paper, we propose a secure data transmission protocol for receiving diagnosis from multiple doctors using identity-based proxy re-encryption scheme. In proposed protocol, a patient don't need key management work for session key. Also, monitoring server performs re-encryption process on behalf of patient. So, we can reduce computational burden of patient in previous work.

TriSec: A Secure Data Framework for Wireless Sensor Networks Using Authenticated Encryption

  • Kumar, Pardeep;Cho, Sang-Il;Lee, Dea-Seok;Lee, Young-Dong;Lee, Hoon-Jae
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.2
    • /
    • pp.129-135
    • /
    • 2010
  • Wireless sensor networks (WSNs) are an emerging technology and offers economically viable monitoring solution to many challenging applications. However, deploying new technology in hostile environment, without considering security in mind has often proved to be unreasonably unsecured. Apparently, security techniques face many critical challenges in WSNs like data security and secrecy due to its hostile deployment nature. In order to resolve security in WSNs, we propose a novel and efficient secure framework called TriSec: a secure data framework for wireless sensor networks to attain high level of security. TriSec provides data confidentiality, authentication and data integrity to sensor networks. TriSec supports node-to-node encryption using PingPong-128 stream cipher based-privacy. A new PingPong-MAC (PP-MAC) is incorporated with PingPong stream cipher to make TriSec framework more secure. PingPong-128 is fast keystream generation and it is very suitable for sensor network environment. We have implemented the proposed scheme on wireless sensor platform and our result shows their feasibility.

Hidden Indicator Based PIN-Entry Method Using Audio Signals

  • Seo, Hwajeong;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • v.15 no.2
    • /
    • pp.91-96
    • /
    • 2017
  • PIN-entry interfaces have high risks to leak secret values if the malicious attackers perform shoulder-surfing attacks with advanced monitoring and observation devices. To make the PIN-entry secure, many studies have considered invisible radio channels as a secure medium to deliver private information. However, the methods are also vulnerable if the malicious adversaries find a hint of secret values from user's $na{\ddot{i}}ve$ gestures. In this paper, we revisit the state-of-art radio channel based bimodal PIN-entry method and analyze the information leakage from the previous method by exploiting the sight tracking attacks. The proposed sight tracking attack technique significantly reduces the original password complexities by 93.8% after post-processing. To keep the security level strong, we introduce the advanced bimodal PIN-entry technique. The new technique delivers the secret indicator information through a secure radio channel and the smartphone screen only displays the multiple indicator options without corresponding numbers. Afterwards, the users select the target value by following the circular layout. The method completely hides the password and is secure against the advanced shoulder-surfing attacks.