• Title/Summary/Keyword: Secure Monitoring

Search Result 337, Processing Time 0.027 seconds

Development of Real-time Process Management System for improving safety of Shop Floor (생산현장의 안전성 향상을 위한 실시간 공정관리 시스템 개발)

  • Lee, Seung Woo;Nam, So Jeong;Lee, Jai Kyung;Lee, Hwa Ki
    • Journal of the Korea Safety Management & Science
    • /
    • v.15 no.4
    • /
    • pp.171-178
    • /
    • 2013
  • Workers are avoiding production/manufacturing sites due to the poor working environment and concern over safety. Small and medium-sized businesses introduce new equipment to secure safety in the production site or ensure effective process management by introducing the real-time monitoring technique for existing equipment. The importance of real-time monitoring of equipment and process in the production site can also be found in the ANSI/ISA-195 model. Note, however, that most production sites still use paper-based work slip as a process management technique. Data reliability may deteriorate because information on the present condition of the production site cannot be collected/analyzed properly due to manual data writing by the worker. This paper introduces the monitoring and process management technique based on a direct facility interface to secure safety in the field by improving the poor working environment and enhance there liability and real-time characteristics of the production data. Since the data is collected from equipment in real-time directly through the SIB-based interface and PLC-based interface, problems associated with workers' manual data input are expected to be solved; safety can also be improved by enhancing workers' attention to work by minimizing workers' injuries and disruption.

IoT and Wireless Sensor Network Monitoring for Campus Security (캠퍼스 보안을 위한 IoT 및 무선 센서 네트워크 모니터링)

  • Mateen, Ahmed;Zhu, Qingsheng;Afsar, Salman;Usman, Muhammad
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.33-41
    • /
    • 2018
  • The idea of the Internet of Things as a platform on the Smart Campus has become increasingly popular. It requires an infrastructure consisting of communication networks, sensor nodes and gateways to connect to the Internet. Each sensor node is responsible for gathering data from the environment. This document outlines a network of wireless sensors on the Internet for the application of Smart Campus monitoring. Wireless sensor network Monitoring have become a complete solution to using a low power implementation and integrated systems. The numerous restrictions however result from the low communication range, the limited computing power, the lack of availability of the network protocol, the lack of programming security and the security failures in the areas of confidentiality, integrity and availability. A new security technique and its functionality for WSNM nodes developed. Development in the research of a secure network and suggestions for avoiding denial of service (DOS) and complexity attacks. These systems if properly implemented can provide an energy efficiency mechanism through pre-allocation and a new key from key management models with a secure routine algorithm.

Implementation of Remote Monitoring Scenario using CDMA Short Message Service for Protected Crop Production Environment

  • Bae, Keun-Soo;Chung, Sun-Ok;Kim, Ki-Dae;Hur, Seung-Oh;Kim, Hak-Jin
    • Journal of Biosystems Engineering
    • /
    • v.36 no.4
    • /
    • pp.279-284
    • /
    • 2011
  • Protected vegetable production area is greater than 26% of the total vegetable production area in Korea, and portion of protected production area is increasing for flowers and fruits. To secure stable productivity and profitability, continuous and intensive monitoring and control of protected crop production environment is critical, which is labor- and time-consuming. Failure to maintain proper environmental conditions (e.g., light, temperature, humidity) leads to significant damage to crop growth and quality, therefore farmers should visit or be present close to the production area. To overcome these problems, application of remote monitoring and control of crop production environment has been increasing. Wireless monitoring and control systems have used CDMA, internet, and smart phone communications. Levels of technology adoption are different for farmers' needs for their cropping systems. In this paper, potential of wireless remote monitoring of protected agricultural environment using CDMA SMS text messages was reported. Monitoring variables were outside weather (precipitation, wind direction and velocity, temperature, and humidity), inside ambient condition (temperature, humidity, $CO_2$ level, and light intensity), irrigation status (irrigation flow rate and pressure), and soil condition (volumetric water content and matric potential). Scenarios and data formats for environment monitoring were devised, tested, and compared. Results of this study would provide useful information for adoption of wireless remote monitoring techniques by farmers.

Implementation of LabVIEW based Testbed for MHA FTSR (LabVIEW 기반의 MHA 명령방식 비행종단수신기 점검장비 구현)

  • Kim, Myung-Hwan;Hwang, Soo-Sul;Lim, You-Cheol;Ma, Keun-Su
    • Aerospace Engineering and Technology
    • /
    • v.13 no.1
    • /
    • pp.55-62
    • /
    • 2014
  • FTSR(Flight Termination System Receiver) is a device that receives a ground command signal to abort a flight mission when abnormal conditions occur in the space launch vehicle. The secure tone command message shall consist of a series of 11 character tone pattern. Each character consists of the sum of two tones which taken from a set of 7 tones defined by IRIG(Inter-Range Instrumentation Group) in the audio frequency range. The MHA(Modified High alphabet) command adds a security feature to the secure tone command by using the predefined difference code. In order to check the function and performance of MHA FTSR, which is under development, for KSLV-II, the testbed should have functions of RF signal generation, receiver's output port monitoring, RS-422 communication and test data management. In this paper, we first briefly introduce MHA command and FTSR interface, and then show the LavVIEW based testbed include its H/W configuration, S/W implementation and test results.

Secure and Fine-grained Electricity Consumption Aggregation Scheme for Smart Grid

  • Shen, Gang;Su, Yixin;Zhang, Danhong;Zhang, Huajun;Xiong, Binyu;Zhang, Mingwu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1553-1571
    • /
    • 2018
  • Currently, many of schemes for smart grid data aggregation are based on a one-level gateway (GW) topology. Since the data aggregation granularity in this topology is too single, the control center (CC) is unable to obtain more fine-grained data aggregation results for better monitoring smart grid. To improve this issue, Shen et al. propose an efficient privacy-preserving cube-data aggregation scheme in which the system model consists of two-level GW. However, a risk exists in their scheme that attacker could forge the signature by using leaked signing keys. In this paper, we propose a secure and fine-grained electricity consumption aggregation scheme for smart grid, which employs the homomorphic encryption to implement privacy-preserving aggregation of users' electricity consumption in the two-level GW smart grid. In our scheme, CC can achieve a flexible electricity regulation by obtaining data aggregation results of various granularities. In addition, our scheme uses the forward-secure signature with backward-secure detection (FSBD) technique to ensure the forward-backward secrecy of the signing keys. Security analysis and experimental results demonstrate that the proposed scheme can achieve forward-backward security of user's electricity consumption signature. Compared with related schemes, our scheme is more secure and efficient.

ZigBee Security Using Attribute-Based Proxy Re-encryption

  • Seo, Hwajeong;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.4
    • /
    • pp.343-348
    • /
    • 2012
  • ZigBee Network is enabling technology for home automation, surveillance and monitoring system. For better secure network environment, secure and robust security model is important. The paper proposes an application, attribute-based proxy re-encryption on ZigBee networks. The method can distribute the authority to designated sensor nodes to decrypt re-encrypted ciphertext with associated attributes. However, a previous method is required to compute complex pairing operations. The high complexity is not suited to low resource device sensor networks, and it does not provide routing security either. To resolve these problems, we present a novel mechanism. The method can reduce overhead by imposing overhead to full function devices and ensure routing paths as well.

Analyses of Enhancement of Authentication Mechanism for Security and Privacy Under Healthcare System With RFID Application (RFID를 이용한 헬스시스템에서의 정보보안 향상을 인증 메카니즘 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.154-156
    • /
    • 2012
  • This paper presents a user authentication scheme for healthcare application using wireless medical sensor networks, where wireless medical sensors are used for patients monitoring. These medical sensors' sense the patient body data and transmit it to the professionals (e.g., doctors, nurses, and surgeons). Since, the data of an individual are highly vulnerable; it must ensures that patients medical vital signs are secure, and are not exposed to an unauthorized person. In this regards, we have proposed a user1 authentication scheme for healthcare application using medical sensor networks. The proposed scheme includes: a novel two-factor professionals authentication (user authentication), where the healthcare professionals are authenticated before access the patient's body data; a secure session key is establish between the patient sensor node and the professional at the end of user authentication. Furthermore, the analysis shows that the proposed scheme is safeguard to various practical attacks and achieves efficiency at low computation cost.

  • PDF

Research on key management for supervisory control and data acquisition system (원격 감시 제어시스템에서 키 관리 방안 연구)

  • Lee, Keonjik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.4
    • /
    • pp.29-42
    • /
    • 2020
  • SCADA (Supervisory Control and Data Acquisition) systems for remote monitoring, data acquisition and control are applied to major industrial infrastructures including power, water and railroad. Recently, there are many researches on key management scheme for secure communication due to change to the open network environment. These systems are located at far distances and are connected to the main control center through various types of communication methods. Due to the nature of these systems, they are becoming the significant targets of cyber attack. We propose an efficient key management scheme which is established on ID-based cryptosystem without an expensive computation on MTU (Master Terminal Unit), Sub-MTU, and RTU (Remote Terminal Unit). The proposed method is secure and effective in key management among multiple legitimate devices.

RADIATION MONITORING SYSTEM FOR ADVANCED SPENT FUEL CONDITIONING PROCESS FACITLITY

  • Kook Dong-Hak;Choung Won-Myung;Lee Eun-Pyo;You Gil-Sung;Cho Il-Je;Kwon Kie-Chan;Lee Won-Kyoung;Ku Jeoung-Hoe
    • Proceedings of the Korean Radioactive Waste Society Conference
    • /
    • 2005.11b
    • /
    • pp.149-155
    • /
    • 2005
  • The $ACP^1$ is under development for effective management of spent fuel by converting $UO_2$ into U-metal. For demonstration of this process, $\alpha-\gamma$ type new hotcell was built in the $IMEF^2$ basement. To secure against radiation hazard, this facility needs radiation monitoring system which will observe the entire operating area before the hotcell and service area at back of it. This system consists of 7 parts; Area Monitor for $\gamma$-ray, Room Air Monitor for particulate and iodine in both area, Hotcell Monitor for hotcell inside high radiation and rear door interlock, Duct Monitor for particulate of outlet ventilation, Iodine Monitor for iodine of outlet duct, CCTV for watching workers and material movement, Server for management of whole monitoring system. After installation and test of this, radiation monitoring system will be expected to assist the successful ACP demonstration.

  • PDF

Selection of Sensing Members in a High-rise Building Structures using Displacement Participation Factors and Strain Energy Density (변위기여도 및 변형에너지밀도를 활용한 초고층 건물의 센싱 부재 선정)

  • Lee, Hong-Min;Park, Sung-Woo;Park, Hyo-Seon
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.22 no.4
    • /
    • pp.349-354
    • /
    • 2009
  • To rationally secure and maintain the safety and serviceability of a high-rise building, monitoring of structural responses of members is necessary. As such health monitoring of large-scale building structures has received growing attention by researchers in recent years. However, due to a very large number of members complexity of structural responses of a high-rise building structure, practical difficulties exist in selection of structural members to be sensored for assessment of structural safety of a structure. In this paper, a selection technique for active members for safety monitoring of a high-rise building based on displacement participation factor and strain energy density of a member is investigated.