• Title/Summary/Keyword: Security Drone

Search Result 136, Processing Time 0.024 seconds

The Modeling of Management Data and Drones Recommendation for Military Operation Support Mission (군 작전지원 임무 수행을 위한 드론 추천 및 관리 데이터 모델링)

  • Park, Keun-Seog;cheon, Sang-pil;Eom, Jung-ho
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.133-140
    • /
    • 2018
  • As the core technology of the 4th Industrial Revolution is applied to drone, the potential for growth in the field of unmanned aerial vehicles is very large, and the utilization of civilian & military fields in the domestic & foreign is increasing rapidly. Because application areas of drone in the civilian field is various, it is excellent in terms of cost effectiveness and high value in utilization when it is used for military operation support mission. Especially, in the case of the Air Force, it is expected that military usage effectiveness will be high if drone replaces various air operations support missions such as aircraft inspection, supply of military supplies, base security. We find out the missions that can utilize drones for military operations support and propose the recommendation and data management plan accordingly. We recommend the most suitable drones and equipment that perform similar missions in the private sector and propose the data modeling of relational database.

  • PDF

The probable use of UAV(Unmanned Aerial Vehicle) in crime, cybercrime, and terrorism and responses (무인기 개발과 범죄, 사이버 범죄, 테러 활용 가능성과 대응방안)

  • Joh, Hyeon-Jin;Yun, Min-Woo
    • Korean Security Journal
    • /
    • no.46
    • /
    • pp.189-216
    • /
    • 2016
  • In March 2015, the North Korean UAVs (Unmanned Aerial Vehicles) were found and countries around the world have actively developed UAVs. UAVs or Drone have become commercialized and more civilians use UAVs for leisure. The positive possibilities of UAV use expand. However, there could be the negative sides of UAV use. The UAVs could be used for the purpose of various crime, cybercrime, and terrorism. For instance, hacking devices attached drone could be infiltrated into the sensitive networks to steal personal informations and public data. This could be a new dimension of cybercrime. As the number of internet users and cyberspace rapidly expands, problems of crimes could be worsened both quantitatively and qualitatively. By contrast, defensive measures against such threats are limited. Especially, the Korean society is vulnerable despite its well-advanced internet and computer network technology. This article investigates the current UAV types and its developments, discusses various possibilites of UAV-related crime, cybercrime, and terrorism, and proposes responses.

  • PDF

Use of Drones in the cultural industries (드론의 문화산업분야 활용방안에 관한 연구)

  • Yoon, Hongkeun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.4
    • /
    • pp.99-112
    • /
    • 2015
  • Drones are more formally known as unmanned aerial vehicles without a human pilot aboard. Its flight is controlled either autonomously by onboard computers or by the remote control of a pilot on the ground. This research aims to analyze market trends and technological developments of drones, use cases and constraints of drones in the cultural industries take advantage of the possibility of future drones. Drones are looking for broadcasting, movie, theater, games, toys drones and racing games in a variety of cultural industry. The biggest problem of drone shall provide penalties for breaches of privacy and security issues in the debate. Drones performances are required such as battery capacity and compactness because of the technical limitations. The drones are expected to be used in various fields such as journalism drone, performance tools, augmented reality games, kidult culture. The drones can create a new cultural industry market such as the combination of robotics and drone journalism, drone crowded theater, utilizing drones character games, racing games etc. In conclusion, drones help reduce manpower, time and costs dramatically and will contribute to creating added value in the cultural industries.

A Study on the Establishment of Anti-Drone Concept and Effective Response System (안티드론 개념 정립 및 효과적인 대응체계 수립에 관한 연구)

  • Lee, Donghyuk;Kang, Wook
    • Korean Security Journal
    • /
    • no.60
    • /
    • pp.9-31
    • /
    • 2019
  • Due to the development of technology and popularization of drone, the so-called "dirty drone" that exploits drones for crimes and terrorism has become a social problem, and it is time to seriously consider the "revenge of drones." Indeed, the cases of threats posed by drones are expanding not only to threats to ground facilities, but also to aviation safety threats, more recently to large-scale events, demonstrations and crimes targeting specific personnel, and terrorism. This research clearly defined the concept of anti-drone when it emerged as a new type of social safety threat as it was abused in crime and terrorism, while response to it was not enough yet. Through this process, it was intended to present an effective anti-drones system. We analyzed the major controversial elements of anti-drone, and defined them as "comprehensive response activities at the legal, institutional and technical levels performed by law enforcement agencies, related technology and industrial entities in a way that prevents, detects, and blocks acts that violate public well-being and order, such as crimes and terrorism caused by the drones." To effectively respond to dirty drones, the authority of law enforcement agencies and the enactment of relevant laws were proposed. In the future, a comprehensive and systematic follow-up study of the anti system should be conducted.

Vulnerability Analysis and Demonstration of WiFi Password Cracking in Drone Environment: Based on Products A and B (드론 환경에서의 WiFi 패스워드 크래킹 취약점 분석 및 실증 : A와 B 드론을 대상으로)

  • Wonbin Jeong;Jinwook Kim;Heewon Song;Sejun Hong;Kyungroul Lee
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2024.01a
    • /
    • pp.113-115
    • /
    • 2024
  • 최근 개발되는 드론은 사용자의 편의를 위하여, 사진이나 동영상과 같은 파일을 휴대 기기로 전송하거나 휴대 기기로 드론을 조종하는 것과 같은 휴대 기기를 통한 다양한 기능들을 제공하며, 이러한 기능들은 와이파이를 기반으로 이루어진다. 그러나, 와이파이는 인증 해제 공격이나 Evil Twin 공격과 같은 취약점이 존재하며, 이러한 취약점으로 인하여 드론에서 제공하는 다양한 기능들과 관련된 보안 위협이 발생할 가능성이 존재한다. 따라서, 본 논문에서는 와이파이를 사용하는 드론에서 발생 가능한 취약점을 미리 분석하고 방어하기 위한 목적으로, 와이파이에서 발생 가능한 취약점 중 하나인 패스워드 크래킹 취약점을 분석하였다. 실험 결과, 드론에서 제공하는 와이파이의 패스워드를 크래킹함으로써 공격자가 드론 네트워크 내부로 진입이 가능한 것을 실증하였다. 향후, 드론 환경에서 패스워드 크래킹 뿐만 아니라, 와이파이에서 발생 가능한 다양한 취약점을 분석하고 실증할 예정이다.

  • PDF

Research on legal improvement measurements on drone use

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.3
    • /
    • pp.147-153
    • /
    • 2017
  • The main subject of year 2016 Davos forum was "The 4th Industrial Revolution." Recently, interests and investment in drone market, so called industrial revolution in the sky is growing in many countries around the world. Before, drone was used for military purpose such as reconnaissance or attacking but today, it is used in various private sectors such as unmanned delivery service, agriculture, leisure activities, etc. Presently, many major countries in the world are already involved in the 'war without gunfire' to be dominant in this drone industry. Korean government also has announced an extreme relaxation of regulations for growing drone industry by opening a conference with Ministers related to economics. During the conference, business scope of drone which was limited to agriculture, photographing, and observation was expanded to all the fields except for cases hindering national safety and security. In terms of shooting purpose drone its process of receiving approval for flight and shooting is simplified to online registration. What is more, drone delivery service will be allowed in island areas such as Goheung, Yeongwol, etc from first term of year 2017. Finding the way to apply drone in criminal investigation is also speeding up. Recently, Public Safety Policy Research Center in Korean National Police University has inquired for research service and its result will be out around November. Likewise, although more and stronger foundation for supporting drone industry is made but there are still, some opinions saying that we should take a careful approach in consideration to the side effect such as abuse in crime. One may also try terror by placing a dangerous substance. If drone falls, it may hurt any civilians. Moreover, if shopping purpose drone is hacked, it may result in violation of privacy. Compared to America, Europe, and China, we are at the very beginning stage of drone industry and it is necessary to reorganize legal issues to grow this industry. This can be thought from two perspectives; first, the growth of drone industry is blocked by difficult regulations on Aviation Law and Radio Regulation Law. The second issue is the safety and privacy that are required for operating drone. For the advanced technologies to make human life more profitable, more active and proactive actions are required by criminal law side. In preparation to the second mechanical era where man and machines should go together, I hope that responsible preparation is required in all fields including the criminal law.

PUF-based Secure FANET Routing Protocol for Multi-Drone

  • Park, Yoon-Gil;Lee, Soo-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.9
    • /
    • pp.81-90
    • /
    • 2020
  • In order to operate multi drone efficiently, existing control methods must be improved, and drones must be able to construct communication networks autonomously. FANET(Flying Ad-Hoc Network), which is being considered as an alternative to solving these problems, is based on ad hoc network technology and can be exposed to a variety of security vulnerabilities. However, due to the limited computational power and memory of FANET nodes, and rapid and frequent changes in network topology, it is not easy to apply the existing security measures to FANET without modification. Thus, this paper proposes lightweight security measures applicable to FANET, which have distinct characteristics from existing ad hoc networks by utilizing PUF technology. The proposed security measures utilize unique values generated by non-replicable PUFs to increase the safety of AODV, FANET's reactive routing protocol, and are resistant to various attacks.

Analysis of Regulation and Standardization Trends for Drone Remote ID (드론 원격 식별 규정 및 표준화 동향 분석)

  • Kim, H.W.;Kang, K.S.;Kim, D.H.
    • Electronics and Telecommunications Trends
    • /
    • v.36 no.6
    • /
    • pp.46-54
    • /
    • 2021
  • Drone remote identification (ID) capability is essential to ensure public safety, help law enforcement, and secure the safety and efficiency of the national airspace. Remote ID technology can be used to differentiate compliant drones from illegal drones that pose a potential security risk by providing airspace awareness to the civil aviation agency and law enforcement entities. In addition, the increased safety and efficiency obtained by mandating remote ID will make it possible to operate drones over populated areas and beyond visual lines of sight. In addition, remote ID will allow drones to be safely integrated into unmanned traffic management systems and the national airspace. Remote ID devices can be categorized by type, i.e., broadcast remote ID or network remote ID. The broadcast remote ID, which has high technical maturity and will be applied in the near future, is primarily considered to ensure the security of drones. The network remote ID, which is being developed and tested and will be applied in the distant future, can be used additionally to ensure the safety and the efficiency of the national airspace. In this paper, we analyze the trends on regulation and standardization activities for drone remote ID primarily in the United State and Europe.

The Influence of the COVID-19 Anxiety and Dietary Lifestyles on the Drone Food Delivery Service Attitude (COVID-19 불안감과 식생활 라이프스타일에 따른 드론 음식배달 서비스에 대한 소비자 태도)

  • Zhao, Jun Wei;Park, Hyun Jung
    • Journal of Digital Convergence
    • /
    • v.20 no.2
    • /
    • pp.175-184
    • /
    • 2022
  • This study investigates the impact of COVID-19 anxiety on dietary lifestyle and the effect of different dietary lifestyle on the intention to use drone food delivery services. A questionnaire survey was conducted among 356 Chinese consumers aware of drone food delivery services. Results show that First, COVID-19 anxiety significantly impacted dietary lifestyle, including health pursuit, safety pursuit, and convenience pursuit. Second, the dietary lifestyle of health pursuit, fashion pursuit, and convenience pursuit positively affected service perceptions, including perceived safety and perceived rapidity, perceived compatibility. The dietary lifestyle of taste pursuit positively associated with safety of drone food delivery service, while the dietary lifestyle of safety pursuit positively related to safety and rapidity of drone food delivery services. Third, the perceptions related to security, rapidity, and compatibility of drone food delivery services enhanced service usage intention. Results show that COVID-19 anxiety was positively associated with dietary lifestyle, influencing consumer attitudes toward drone food delivery services.

SD-MTD: Software-Defined Moving-Target Defense for Cloud-System Obfuscation

  • Kang, Ki-Wan;Seo, Jung Taek;Baek, Sung Hoon;Kim, Chul Woo;Park, Ki-Woong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.3
    • /
    • pp.1063-1075
    • /
    • 2022
  • In recent years, container techniques have been broadly applied to cloud computing systems to maximize their efficiency, flexibility, and economic feasibility. Concurrently, studies have also been conducted to ensure the security of cloud computing. Among these studies, moving-target defense techniques using the high agility and flexibility of cloud-computing systems are gaining attention. Moving-target defense (MTD) is a technique that prevents various security threats in advance by proactively changing the main attributes of the protected target to confuse the attacker. However, an analysis of existing MTD techniques revealed that, although they are capable of deceiving attackers, MTD techniques have practical limitations when applied to an actual cloud-computing system. These limitations include resource wastage, management complexity caused by additional function implementation and system introduction, and a potential increase in attack complexity. Accordingly, this paper proposes a software-defined MTD system that can flexibly apply and manage existing and future MTD techniques. The proposed software-defined MTD system is designed to correctly define a valid mutation range and cycle for each moving-target technique and monitor system-resource status in a software-defined manner. Consequently, the proposed method can flexibly reflect the requirements of each MTD technique without any additional hardware by using a software-defined approach. Moreover, the increased attack complexity can be resolved by applying multiple MTD techniques.