• Title/Summary/Keyword: Security Drone

Search Result 148, Processing Time 0.023 seconds

Efficient object tracking algorithm based on multi-drone collaboration (드론을 활용한 협업기반의 효율적인 대상물 추적 알고리즘)

  • Yun, Hyun Kyoung;Choi, Kwang Hoon;Kim, Jai-Hoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.04a
    • /
    • pp.42-45
    • /
    • 2016
  • 본 논문은 기동성은 있지만 한정된 비행시간과 비행거리를 가진 드론을 이용한 지능형 영상 보안 감시 시스템을 제안한다. 드론이 가지는 한계점을 보완하기 위해 그리드 기반으로 시스템을 구성하며 분할된 영역에서 다중 드론간 대상물의 효율적인 추적 및 감시 모니터링을 위해 연계 추적 방식을 이용한다. 먼저, 한정된 비행거리를 위해 각 드론스테이션 간의 최적 거리를 제안한다. 제안한 최적 거리를 통해 생성된 중첩 감시영역에서 효율적 연계 추적을 위해 드론의 전력상태와 대상물의 이동방향을 고려한 최적의 드론 선정 알고리즘을 제시한다. 제안한 알고리즘은 케이스 스터디를 통해 그 응용 가능성을 검토한다.

Institutional Information Management and Automation System

  • M.Ahmad Nawaz Ul Ghani;Taimour Nazar;Syed Zeeshan Hussain Shah Gellani;Zaman Ashraf
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.107-112
    • /
    • 2023
  • World is moving towards digitization at a rapid pace, so the enterprises have developed information systems for management of their business. Empowering educational institutes with information systems are become very important and vital. Doing everything manually is very difficult for students, teachers and staff. Information system can enhance their efficiency and save a lot of time; this research proposed system will solve this issue by providing services like class room reservation, e-library facility, online submission etc. in a secured environment. Up till now limited attention has been paid to utilize robots and drones for automation inside educational institutes. Our proposed system incorporates robots and drones to fill this gap in automation being used in institutes. Through this research, the aim is to improve the efficiency of learning and services in educational institutions or universities.

Internet of Drone: Identity Management using Hyperledger Fabric Platforms

  • Etienne, Igugu Tshisekedi;Kang, Sung-Won;Rhee, Kyung-hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.05a
    • /
    • pp.204-207
    • /
    • 2022
  • The uses of drones are increasing despite the fact that many of us are still skeptical. In the near future, the data that will be created and used by them will be very voluminous, hence the need to find an architecture that allows good identity management and access control in a decentralized way while guaranteeing security and privacy. In this article, we propose an architecture using hyperledger fabric blockchain platform which will manage the identity in a secure way starting with the registration of the drones on the network then an access control thanks to Public Key Infrastructure (PKI) and membership service provider (MSP) to enable decision-making within the system.

Privacy-Preserving Facial Image Authentication Framework for Drones (드론을 위한 암호화된 얼굴 이미지 인증 프레임워크 제안)

  • Hyun-A Noh;Joohee Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.229-230
    • /
    • 2024
  • 최근 드론으로 극한 환경에서 범죄 수배자 및 실종자를 탐색하는 시도가 활발하다. 이때 생체 인증 기술인 얼굴 인증 기술을 사용하면 탐색 효율이 높아지지만, 암호화되지 않은 인증 프로토콜 적용 시 생체 정보 유출의 위험이 있다. 본 논문에서는 드론이 수집한 얼굴 이미지 템플릿을 암호화하여 안전하게 인증할 수 있는 효율적인 생체 인증 프레임워크인 DF-PPHDM(Privacy-Preserving Hamming Distance biometric Matching for Drone-collected Facial images)을 제안한다. 수집된 얼굴 이미지는 암호문 형태로 서버에 전달되며 서버는 기존 등록된 암호화된 템플릿과의 Hamming distance 분석을 통해 검증한다. 제안한 DF-PPHDM을 RaspberryPI 4B 환경에서 직접 실험하여 분석한 결과, 한정된 리소스를 소유한 드론에서 효율적인 구현이 가능하며, 인증 단계에서 7.83~155.03 ㎲ (microseconds)가 소요된다는 것을 입증하였다. 더불어 서버는 드론이 전송한 암호문으로부터 생체 정보를 복구할 수 없으므로 프라이버시 침해 문제를 예방할 수 있다. 향후 DF-PPHDM에 AI(Artificial Intelligence)를 결합하여 자동화 기능을 추가하고 코드 최적화를 통해 성능을 향상시킬 예정이다.

A Study on Vulnerability Analysis and Memory Forensics of ESP32

  • Jiyeon Baek;Jiwon Jang;Seongmin Kim
    • Journal of Internet Computing and Services
    • /
    • v.25 no.3
    • /
    • pp.1-8
    • /
    • 2024
  • As the Internet of Things (IoT) has gained significant prominence in our daily lives, most IoT devices rely on over-the-air technology to automatically update firmware or software remotely via the network connection to relieve the burden of manual updates by users. And preserving security for OTA interface is one of the main requirements to defend against potential threats. This paper presents a simulation of an attack scenario on the commoditized System-on-a-chip, ESP32 chip, utilized for drones during their OTA update process. We demonstrate three types of attacks, WiFi cracking, ARP spoofing, and TCP SYN flooding techniques and postpone the OTA update procedure on an ESP32 Drone. As in this scenario, unpatched IoT devices can be vulnerable to a variety of potential threats. Additionally, we review the chip to obtain traces of attacks from a forensics perspective and acquire memory forensic artifacts to indicate the SYN flooding attack.

Terrain Data Construction and FLO-2D Modeling of the Debris-Flow Occurrences Area (토석류 발생지역 지형자료 구축 및 FLO-2D 모델링)

  • Oh, Chae-Yeon;Jun, Kye-Won
    • Journal of Korean Society of Disaster and Security
    • /
    • v.12 no.4
    • /
    • pp.53-61
    • /
    • 2019
  • Occurrences of debris flow are a serious danger to roads and residential located in mountainous areas and cause a lot of property loss. In this study, two basins were selected and spatial data were constructed to simulate the occurred debris flow from mountainous areas. The first basin was to use the Terrestrial LiDAR to scan the debris flow occurrence section and to build terrain data. For the second basin, use drones the sediment in the basin was photographed and DSM (Digital surface model) was generated. And to analyze the effect of the occurrence of debris flow on downstream side, FLO-2D, two-dimensional commercial model, was used to simulate the flow region of the debris flow. And it was compared with the sedimentation area of terrestrial LiDAR and drone measurement data.

A Case Study of Recent New Terrorism and Potential Patterns in South Korea (최근 국외 뉴테러리즘의 사례분석과 국내 발생가능 유형에 대한 연구)

  • Jeon, Yong-Jae;Lee, Chang-Bae;Lee, Seung-Hyun
    • Korean Security Journal
    • /
    • no.53
    • /
    • pp.11-33
    • /
    • 2017
  • Terrorism has existed in the entire human history and has become a significant topic in criminology while prior studies has focused on North Korea as the perpetrator, and this prevents an in-depth discussion of the international trends of terrorism. As soft targets are the main target of new terrorism and because we never ignore the significance of the consequences, there are needs for more studies on the topic. This study conducted a case study of major terrorism attacks and surveyed professionals in the field via an AHP analysis in order to find the characteristics of terrorism and its potential patterns in South Korea. As a result, we found that North Korea or the left-wing may utilize homemade bomb, motor vehicle or drone for the purpose of attacking multi-use facilities in South Korea. For policy implications, we insist developing a better CPTED approach on those facilities, improving professionalism of cyber-watchdog via more training and education, stricter control on drone permit, and operation of counseling centers for preventing radicalization.

  • PDF

Cable-supported Bridge Safety Inspection Blind Spot Elimination Technology using Drones (드론을 활용한 케이블지지교량 안전점검 사각지대 해소 기술)

  • Sungjin Lee;Bongchul Joo;Jungho Kim
    • Journal of Korean Society of Disaster and Security
    • /
    • v.15 no.4
    • /
    • pp.31-38
    • /
    • 2022
  • In the case of special bridges whose superstructure is supported by cables, there are many blind spots that are difficult to access without special equipment and personnel. As a result, there are difficulties in the safety inspection of special bridges. The purpose of this study is to review the inspection blind spots of cable-supported bridges such as cable-stayed bridges and suspension bridges, and to study ways to eliminate blind spots using drones. To this end, the cables, stiffened girder, and pylons of the cable-stayed bridge located in the sea were inspected using drones. Through this study, it was confirmed that external safety inspection of special bridges that are difficult for inspectors to access is possible using drones. In particular, drone inspection to check the external condition and damage of the pylon, which is a blind spot for inspection of special bridges, is a very effective safety inspection method.

A Study on the Application of the 4th Industrial Drone to the Military Field (4차 산업시대 드론의 군사 분야 적용에 관한 연구)

  • Lee Young Uk
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.75-84
    • /
    • 2022
  • In the 4th industry, drones are being used while having a close relationship with our lives. The development and use of various drones suggests a new paradigm for the domestic industry in the future, and is expected to become more advanced and scientific. Meanwhile, in the field of defense, efforts are being made in various ways to overcome the social phenomenon of reduced service resources. It is concentrating its efforts on strengthening the national defense power by preparing an exit strategy to supplement the shortage of service resources and to maintain and improve combat power, and by combining various science and technology related to the 4th industry. The military is planning to reinforce its combat power in connection with future industries to effectively respond and perform missions in preparation for the future combat aspects that have been researched and planned, and is planning an unmanned combat system for the science and technology army by investing a separate budget. Therefore, we systematically introduce and utilize drones, which are the core of the unmanned combat system, to create more active combat power and seek countermeasures for the battle vacuum, It is expected to provide a new paradigm for the battlefield when using advanced technology developed in the private sector and grafting it to the military sector.

A Study on the Surface Damage Detection Method of the Main Tower of a Special Bridge Using Drones and A.I. (드론과 A.I.를 이용한 특수교 주탑부 표면 손상 탐지 방법 연구)

  • Sungjin Lee;Bongchul Joo;Jungho Kim;Taehee Lee
    • Journal of Korean Society of Disaster and Security
    • /
    • v.16 no.4
    • /
    • pp.129-136
    • /
    • 2023
  • A special offshore bridge with a high pylon has special structural features.Special offshore bridges have inspection blind spots that are difficult to visually inspect. To solve this problem, safety inspection methods using drones are being studied. In this study, image data of the pylon of a special offshore bridge was acquired using a drone. In addition, an artificial intelligence algorithm was developed to detect damage to the pylon surface. The AI algorithm utilized a deep learning network with different structures. The algorithm applied the stacking ensemble learning method to build a model that formed the ensemble and collect the results.