• Title/Summary/Keyword: Security Area

Search Result 1,688, Processing Time 0.025 seconds

A Study on the Development of Secure Communication Channel Using PUF Technology in M-IoT Environment (M-IoT 환경에서 PUF 기술을 활용한 안전한 통신채널 구성 기법)

  • Kim, Sumin;Lee, Soo Jin
    • Convergence Security Journal
    • /
    • v.19 no.5
    • /
    • pp.107-118
    • /
    • 2019
  • Based on the Internet of Things technology, one of the core technologies of the fourth industrial revolution, our Ministry of Defense is also pushing to establish M-IoT in defense area to improve management efficiency, innovate military culture and strengthen military power. However, devices connected to the Military Internet of Things can be easily exposed to various of cyber threats as most of them are developed and with a focus on improving sensing and communication skills that collect and transmit data. And it is not easy to uniquely identify the numerous heterogeneous devices, and to establish a secure communication channel between devices or between devices and management servers. In this paper, based on PUF technology, we propose a novel key management scheme that can uniquely identify the various devices, and generate the secret keys needed for the establishment of a secure communication channel using non-replicable information generated by the PUF. We also analyze the efficiency of our proposed scheme through comparison with existing key management scheme and verify the logic and security using BAN Logic.

Military Entrance Control System Using Military Insignia UHF RFID Tags (군 계급장 UHF RFID 태그를 이용한 군 보안출입관리 시스템)

  • Nam, Seahyeon;Chung, You Chung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.11
    • /
    • pp.966-971
    • /
    • 2013
  • This paper introduces development of a Military Entrance Control System using the developed military insignia UHF RFID tags. Generally, in the military entrance control system, the security identification (ID) card with HF RFID tag can be used, to increase the security level, the developed insignia UHF RFID tags are used in the enforced military entrance control system. The general metal insignias, have been worn on a hat or on the shoulder pads of a military uniforms, are simulated and developed as UHF RFID insignia tags. The military entrance control system can manage the name, rank, address (information of military personnel), time and date of entrance and the history of entrance of the security area.

A Suggestion on the Traffic Flagger System in Japan (일본 교통유도 경비제도의 시사점)

  • Kim, Il-Gon
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2010.05a
    • /
    • pp.200-203
    • /
    • 2010
  • The obstructive factors of the smoothly running traffic are street improvement, major commercial buildings like department stores, the large markets, the stadiums, the concert buildings, a lot of steady cars for using parking lot. The accident of cost many lives and traffic congestion from these factors cause the result that it enables to pay the enormous expenditure socially and financially. For solving these problems, Japan adopts the Traffic Flagger System in 1972. This task has the effects of improving traffic flow in the traffic jam and mitigating risk of car accidents as leading pedestrians and vehicles thereby the task carries into effect in the area where the accident took place. Moreover, this security task is rapid growth after adopting and 59.6%(5,317) of the whole security company 8,924 in Japan based on December 2009 registered as the traffic leading security business. While South Korea is demanded of the measures about obstructive factors of the smoothly running traffic, it represents the limitation of the system and the safety management. Thus the current study suggests the we will analyze South Korea's actual condition and then discuss the law and education system for a realizable plan reached the public-Private cooperation for adopting Japan's Traffic Leading Security System.

  • PDF

The case study on wireless lan design technique for Bansong purification plant using network integrated management system and security switch (네트워크 통합관리시스템과 보안스위치를 이용한 반송정수장 무선랜 구축사례)

  • Park, Eunchul;Choi, Hyunju
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.32 no.4
    • /
    • pp.309-315
    • /
    • 2018
  • Currently, the commercialization of the $5^{th}$ Generation (5G) service is becoming more prevalent in domestic communication network technology. This has reduced communication delay time and enabled large-capacity data transmission and video streaming services in real-time. In order to keep pace with these developments, K-water has introduced a smart process control system in water purification plants to monitor the status of the water purification process. However, since wireless networks are based on the public Long Term Evolution (LTE) network, communication delay time remains high, and high-resolution video services are limited. This is because communication networks still have a closed structure due to expense and security issues. Therefore, with 5G in its current form, it is very difficult to accommodate future services without improving the infrastructure of its communication networks. In recognition of these problems, this study implemented the authentication and management function of wireless networks on a wired network management system in the K-water Bansong water purification plant. The results confirmed that wired Local Area Network (LAN) services give a higher security performance than an expensive commercial wireless LAN system. This was achieved by using an Internet Protocol (IP) address management system of wired networks and the packet filtering function of the Layer2 (L2) switch. This study also confirmed that it is possible to create a wireless LAN service that is 3.7 times faster than the existing LTE communication network.

Definition of aggressive response scale through quantitative evaluation of cyber attack (사이버공격의 정량적 피해평가를 통한 공세적 대응규모 산정)

  • Hong, Byoungjin;Lim, Jaesung;Kim, Wanju;Cho, Jaemyoung
    • Convergence Security Journal
    • /
    • v.17 no.4
    • /
    • pp.17-29
    • /
    • 2017
  • Various cyber attacks against our society and the government are continuing, and cases and damages are reported from time to time. And the area of cyber attack is not limited to cyberspace, but it is expanding into physical domain and affecting it. In the military arena, we have established and implemented the principle of responding proportionally to enemy physical attacks. This proportionality principle is also required in the version where the region is expanding. In order to apply it, it is necessary to have a quantitative and qualitative countermeasure against cyber attack. However, due to the nature of cyber attacks, it is not easy to assess the damage accurately and it is difficult to respond to the proportionality principle and the proportional nature. In this study, we calculated the damage scale by quantitatively and qualitatively evaluating the cyber attack damage using the Gorden-Lobe model and the security scoring technique based on the scenario. It is expected that the calculated results will be provided as appropriate level and criterion to counteract cyber attack.

Development of Malicious Traffic Detection and Prevention System by Embedded Module on Wireless LAN Access Point (무선 LAN Access Point에서 임베디드 형태의 유해 트래픽 침입탐지/차단 시스템 개발)

  • Lee, Hyung-Woo;Choi, Chang-Won
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.12
    • /
    • pp.29-39
    • /
    • 2006
  • With the increasing popularity of the wireless network, the vulnerability issue on IEEE 802.1x Wireless Local Area Network (WLAN) are more serious than we expected. Security issues range from mis-configured wireless Access Point(AP) such as session hijacking to Denial of Service(DoS) attack. We propose a new system based on intrusion detection or prevention mechanism to protect the wireless network against these attacks. The proposed system has a security solution on AP that includes an intrusion detection and protection system(IDS/IPS) as an embedded module. In this paper, we suggest integrated wireless IDS/IPS module on AP with wireless traffic monitoring, analysis and packet filtering module against malicious wireless attacks. We also present that the system provides both enhanced security and performance such as on the university wireless campus network.

  • PDF

Authentication and Key Exchange Protocol for Wireless Internet using Passwords (무선 인터넷을 위한 패스워드 기반의 인증 및 키 교환 프로토골)

  • Nyang, Dae-Hun;Lee, Sok-Joon
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.3
    • /
    • pp.324-332
    • /
    • 2002
  • We design authentication protocols for wireless internet not using certificates but using passwords. The target protocols include WTLS and the certificate request protocol in the wireless PKI(Public Key Infrastructure). When a password based protocol is designed and implemented for authentication and key exchange, care mutt be taken of the short length and of the not-so-randomness of passwords. To frustrate the offline guessing attack that makes use of those weaknesses, our two protocols are dependent on the password based authentication protocol that has security proof. In this paper, how to design systematically the security protocols for authentication and key exchange using passwords is presented, and the methodology hopes to be useful in some other area that needs authentication using passwords.

A Study on the Development of a Training Course for Maritime Security Operatives (해상특수경비원 교육과정 개발에 관한 연구)

  • Doo, Hyun-Wook;Ahn, Young-Joong;Jo, So-Hyun
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.24 no.2
    • /
    • pp.223-231
    • /
    • 2018
  • In West Africa and Southeast Asia including Somalia, piracy attacks still take place that threaten safety of ships and the lifes of seafarers. In order to protect Korean flag ships and the seafarers on board from piracy attacks, the government of the Republic of Korea established the Act to Prevent Piracy Attacks on International Ships on Dec. 27, 2016. This act legally provides for the establishment of Maritime Security Operatives (MSO) on board ships navigating high risk areas to ensure security. Furthermore, mandated training for MSOs is required to prepare them to carry out their duties effectively. In this paper, a new training course for MSOs according to domestic law is suggested through analysis of IMO documents and the MSO training provided by foreign nations.

An intelligent video security system for the tracking of multiple moving objects (복수의 동체 추적을 위한 지능형 영상보안 시스템)

  • Kim, Byung-Chul
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.359-366
    • /
    • 2013
  • Due to the development and market expansion of image analysis and recognition technology, video security such as CCTV cameras and digital storage devices, are required for real-time monitoring systems and intelligent video security systems. This includes the development of more advanced technologies. A rotatable PTZ camera, in a CCTV camera system, has a zoom function so you can acquire a precise picture. However it can cause blind spots, and can not monitor two or more moving objects at the same time. This study concerns, the intelligent tracking of multiple moving objects, CCTV systems, and methods of video surveillance. An intelligent video surveillance system is proposed. It can accurately shoot broad areas and track multiple objects at the same time, much more effectively than using one fixed camera for an entire area or two or more PTZ cameras.

Tracking ond Distance Measurement of the Moving Object in Stereo Camera System as a Security Equipment (방범 설비의 스테레오 카메라 시스템에서 이동객체의 추적과 거리측정)

  • 이재수;홍권의;손영우
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.17 no.4
    • /
    • pp.106-115
    • /
    • 2003
  • In crossing stereo camera system as a security equipment system, a new algorithm for the tracking method of the moving object and the measurement method of distance of the object from cameras to moving object is proposed. The stereo input images are matched by a pixel for the moving object extraction, then the moving elements obtained from an adaptive threshold's value for an error correction and the moving object area extracted by noise eliminative algorithm. In addition to, the moving object traced by control pan/tilt of cameras using a coordinate value of the moving object, and the measurement method of distance to moving object by using special features of the crossing stereo camera system is proposed. From the experimental results, the proposed algorithm was found to be able to measure of the distance and trace for moving object in a stereo security camera system. The error rate of a distance measurement be existed within 6%. Moreover in implementation the proposed algorithm, the stereo security system, the automatic moving robot system and the stereo remote control system will be applied practical application.