• Title/Summary/Keyword: Security Drone

Search Result 136, Processing Time 0.025 seconds

Safety Management of Steel Pipe Scaffold using UAV (무인항공기(UAV)를 활용한 건설현장 가시설물 안전관리)

  • Jun, Byong-Hee;Kim, Nam-Gyun;Jun, Kyo-Won;Choi, Bong-Jin
    • Journal of Korean Society of Disaster and Security
    • /
    • v.12 no.3
    • /
    • pp.59-67
    • /
    • 2019
  • In this study, the UAV (Unmammed Aerial Vehicle) was applied for the photogrammetry of the construction site and the safety management of steel pipe scaffold. The research site is a temporary facility for building reinforcement on Samcheok Campus of Kangwon National University. The installation condition of the steel pipe scaffold was investigated, and the pillar distance, the beam distance and the wale distance were surveyed. As a result, it was found that the beam distance of the scaffold in the longitudinal direction was in good agreement with the standard, but the pillar distance and the wale distance were found to be less than the standard. Three-dimensional data can be used in drone shooting to enable three-dimensional measurement, so that it is possible to measure facilities hidden or located inside other facilities. Through the drone shooting, the condition of the site can be quickly recorded and the surveying can be carried out without interfering with the work of the field personnel. Although the installation of the temporary structure must be strictly observed to ensure the safety of the workers, it is found that the installation standards are still neglected in the field. In order to prevent this practice, it was thought that the legal system should be supplemented so that it could be checked periodically by using UAV in the field process management.

International Law on Drone's Military use - Focuse on Proportionality and Discrimination Principles - (드론의 군사적 활용에 따른 국제법적 쟁점 - 차별의 원칙과 비례성 원칙을 중심으로-)

  • Cho, Hong-Je;Kang, Ho-Jeung
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.35 no.1
    • /
    • pp.127-152
    • /
    • 2020
  • Despite growing international cooperation for maintenance of international peace and security, wars continue to occur due to conflicted state interests. Continuing conflicts has advanced development of various weapon systems such as global integrated intelligence, surveillance and reconnaissance. However, with a big increase in the number of civilian casualties caused by the weapon systems development, the international community has also advanced diplomatic efforts to minimize deaths of civilian and military personnel. Therefore, it is essential to observe the principle of discrimination between combatants and non-combatants when operating unmanned aerial vehicles (UAVs), better known as drones. Drones have become more capable of distinguishing combatants from non-combatants due to its high-tech prowess. In the operation of drones, any parties involved in combat or the war are responsible for mounting civilian casualties. In addition, it should comply with the principle of proportionality that calls for a balance between results of such action and expected military advantage anticipated from the attack. The rule of proportionality prohibits use of military force which may be expected to cause excessive civilian harm. Drones have been able to track and monitor targets for hours and select the accurate locations of the targets. The aim is to reduce civilian losses and damage to a minimum. Drones meet the standards of Article 51.4 of the Additional Protocol.

A Study on Vulnerability of Cyber Electronic Warfare and Analysis of Countermeasures for swarm flight of the NBC Reconnaissance Drones (화생방 정찰 드론의 군집비행 시 사이버전자전 취약점 및 대응방안 분석)

  • Kim, Jee-won;Park, Sang-jun;Lee, Kwang-ho;Jung, Chan-gi
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.133-139
    • /
    • 2018
  • The 5 Game changer means the concepts of the army's operation against the enemy's asymmetric threats so that minimize damage to the public and leads to victory in war in the shortest time. A study of network architecture of Dronebot operation is a key study to carry out integrated operation with integrated C4I system by organically linking several drones battle groups through ICT. The NBC reconnaissance drones can be used instead of vehicles and humans to detect NBC materials and share situations quickly. However, there is still a lack of research on the swarm flight of the NBC reconnaissance drones and the weaknesses of cyber electronic warfare. In this study, we present weaknesses and countermeasures of CBRNs in swarm flight operations and provide a basis for future research.

  • PDF

A Study on the Effective Military Use of Drones (드론의 효과적인 군사분야 활용에 관한 연구)

  • Lee, Young Uk
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.61-70
    • /
    • 2020
  • The unmanned aerial vehicle that emerged with the 4th Industrial Revolution attracts attention not only from Korea but also from around the world, and its utilization and market size are gradually expanding. For the first time, it was used for military purposes, but it is currently used for transportation, investigation, surveillance, and agriculture. China, along with the US and Europe, is emerging as a leader in the commercial unmanned aerial vehicle market, and Korea, which has the world's seventh-largest technology in related fields, is striving to promote various technology development policies and system improvement related to unmanned aerial vehicles. Military drones will revolutionize the means of war by using a means of war called an unmanned system based on theories such as network-oriented warfare and effect-oriented warfare. Mobile equipment, including drones, is greatly affected by environmental factors such as terrain and weather, as well as technological developments and interests in the field. Now, drones are being used actively in many fields, and especially in the military field, the use of advanced drones is expected to create a new defense environment and provide a new paradigm for war.

The Smart Medicine Delivery Using UAV for Elderly Center

  • Li, Jie;Weiwei, Goh;N.Z., Jhanjhi;David, Asirvatham
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.1
    • /
    • pp.78-88
    • /
    • 2023
  • Medication safety and medicine delivery challenge the well-being of the elderly and the management of the elderly center. With the outbreak of COVID-19, the elderly in the care center were challenged by the inconvenience of the medication restocking. The purpose of this paper accentuates the importance of the design and development of an UAV-based Smart Medicine Case (UAV-SMC) to improve the performance of medication management and medicine delivery in the elderly center. The researchers came up with the design of UAV-SMC in the light of the UAV and IoT technology to improve the performance of both Medication Practice Management (MPM) and Low Inventory Detection and Delivery (LIDD). Based on the result, with UAV-SMC, the performance of both MPM and LIDD was significantly improved. The UAV-SMC improves the efficacy of medication management in the elderly center by 26.97 to 149.83 seconds for each medication practice and 9.03 mins for each time of medicine delivery in Subang Jaya Malaysia. This paper only investigates the adoption of UAV-SMC in the content of elderly center rather than other industries. The authors consider integrating the UAV-SMC with the e-pharmacy system in the future. In conclusion, the UAV-SMC has significantly improved the medication management and guard the safety of elderly and caretaker in the elderly in the post-pandemic times.

Secret Sharing based Node Authentication in FANET (FANET에서의 비밀분산 기반 노드 인증)

  • Yang Ji Hun;Lee Soo Jin
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.25-34
    • /
    • 2022
  • This paper proposes a secret sharing based fast node authentication technique applicable to Flying Ad-Hoc Network (FANET) that can be used to construct self-organized communication network in multi drones and drone squadrons operations. Before deployment, each node stores an exponential share, exponential secret and a portion of PUF CRP table. After being deployed in the field, in the early-stage of network formation, each node broadcasts its ID, exponential share and a hash value of PUF Response and pseudo-random number. Then each node performs a reconstruction of the exponential secret using the exponential shares transmitted from neighboring nodes. When the exponential secret is reconstructed, simultaneous authentication is completed for all nodes that have transmitted the exponential share used in the reconstruction. A node that transmits an incorrect exponential share to disturb the reconstruction of the exponential secret during the authentication process can be detected before performing the reconstruction through the verification of the hash value, and will be excluded from the reconstruction.

Risk Analysis for Protecting Personal Information in IoT Environments (사물인터넷(IoT) 환경에서의 개인정보 위험 분석 프레임워크)

  • Lee, Ae Ri;Kim, Beomsoo;Jang, Jaeyoung
    • Journal of Information Technology Services
    • /
    • v.15 no.4
    • /
    • pp.41-62
    • /
    • 2016
  • In Internet of Things (IoT) era, more diverse types of information are collected and the environment of information usage, distribution, and processing is changing. Recently, there have been a growing number of cases involving breach and infringement of personal information in IoT services, for examples, including data breach incidents of Web cam service or drone and hacking cases of smart connected car or individual monitoring service. With the evolution of IoT, concerns on personal information protection has become a crucial issue and thus the risk analysis and management method of personal information should be systematically prepared. This study shows risk factors in IoT regarding possible breach of personal information and infringement of privacy. We propose "a risk analysis framework of protecting personal information in IoT environments" consisting of asset (personal information-type and sensitivity) subject to risk, threats of infringement (device, network, and server points), and social impact caused from the privacy incident. To verify this proposed framework, we conducted risk analysis of IoT services (smart communication device, connected car, smart healthcare, smart home, and smart infra) using this framework. Based on the analysis results, we identified the level of risk to personal information in IoT services and suggested measures to protect personal information and appropriately use it.

A Study on the Concept of Operations and Improvement of the Design Methodology for the Physical Protection System of the National Infrastructure - Focused on Nuclear Power Plants - (국가기반시설 물리적 방호체계 운영개념 및 설계방법 개선방안 연구: 원자력발전소를 중심으로)

  • Na, Seog-Jong;Sung, Ha-Yan;Choi, Sun-Hee
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.9-38
    • /
    • 2019
  • As the scales & density of the Korean national infrastructures have been increased, they will be identified as rich and attractive potential targets for intensified North Korea's attack in the rear region and terrorism attack. In addition, due to changes in security environment such as drone threats and lack of security forces under the 52-hour workweek law, I think that it is the proper time point to reevaluate the effectiveness and appropriateness of the current physical protection system and its shift to a new system. In this study, the direction and improvement of the perimeter physical protection systems of the national infrastructures are to be studied from the viewpoints of its concepts of operations and design methodology, focusing on the nuclear power plant. The reason why we focus on nuclear power plants is because they cause wide-range and long-term damages caused by radioactive materials disperal and pollution, along with short-term damage caused by the interruption of electricity generation in the event of damage to nuclear power plants. With the aim of extracting improvement directions, as we will comprehensively review domestic research trends and domestic·overseas related laws, and consider Korea's specificity, we try to reframe the concept of operation - systematization, mobilization and flexibility -, and establish criteria on system change. In order to improve the technical performance of the new perimeter physical protection system, we study on high-fidelity·multi-methodology based integrated design methodology, breaking from individual silo-type design methods, and I suggest improvement of government procurement, its expansion to export business and other national infrastructure.

Classification of Trusted Boot Technology Components based on Hardware Dependency (하드웨어 종속/독립성에 따른 신뢰성 부팅 기술 구성 요소 분류)

  • Park, Keon-Ho;Kim, Sieun;Lee, Yangjae;Lee, SeongKee;Kang, Tae In;Kim, Hoon Kyu;Park, Ki-woong
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.14 no.6
    • /
    • pp.44-56
    • /
    • 2018
  • Researches on military weapons are actively studied to improve national defense power of each country. The military weapon system is being used not only as a weapon but also as a reconnaissance and surveillance device for places where it is difficult for people to access. If such a weapon system becomes an object of attack, military data that is important to national security can be leaked. Furthermore, if a device is taken, it can be used as a terrorist tool to threaten its own country. So, security of military devices is necessarily required. In order to enhance the security of a weapon system such as drone, it is necessary to form a chain of trust(CoT) that gives trustworthiness to the overall process of the system from the power on until application is executed. In this paper, by analyzing the trusted computing-based boot technology, we derive trusted boot technology components and classify them based on hardware dependence/independence. We expect our classification of hardware dependence/independence to be applied to the trusted boot technology of our self-development ultraprecision weapon system to improve the defense capability in our military.

Mid to Long Term R&D Direction of UAV for Disaster & Public Safety (재난치안용 무인기 중장기 연구개발 방향)

  • Kim, Joune Ho
    • Journal of Aerospace System Engineering
    • /
    • v.14 no.5
    • /
    • pp.83-90
    • /
    • 2020
  • Disasters are causing significant damage to the lives and property of our society and are recognized as social problems that need to be solved nationally and globally. The 4th industrial revolution technologies affecting society as a whole such as the Internet of Things(IoT), Artificial Intelligence(AI), Drones(Unmanned Aerial Vehicles), and Big Data are continuously absorbed into the disaster and safety industries as scientific and technological tools for solving social problems. Very soon, twenty-nine domestic UAV-related organizations/companies will complete the construction of a multicopter type small UAV integrated system ('17~'20) that can be operated at disaster and security sites. The current work considers and proposes the mid-to-long term R&D direction of disaster UAV as a strategic asset of the national disaster response system. First, the trends of disaster and safety industry and policy are analyzed. Subsequently, the development status and future plans of small UAV, securing shortage technology, and strengthening competitiveness are analyzed. Finally, step-by-step R&D direction of disaster UAV in terms of development strategy, specialized mission, platform, communication, and control and operation is proposed.