• 제목/요약/키워드: Security Drone

검색결과 136건 처리시간 0.026초

Implications on US DoD Counter-Small Aircraft Systems Strategy (미 국방부 소형드론 대응전략과 시사점)

  • Kang-Il Seo;Sang-Keun Cho;Ki-Won Kim;In-keun Son;Sang-Hyuk Park
    • The Journal of the Convergence on Culture Technology
    • /
    • 제9권4호
    • /
    • pp.239-243
    • /
    • 2023
  • Due to recent small unmanned aircraft threats by North Korea and unsuccessful reponses, severe concerns about future national security have been being increasingly surged. Especially it is notable and unaccpetable to see that North Korea's small drones flying over capical areas over 7 hours were not efficiently detected and identified even though South Korea already recognized the threats since early 2010s. Meanwhile a US military troop operating THAAD system on Seung-Joo, South Korea successfully shot down unidentified small drone on Jan 2023. The threats caused by small unmanned aircraft is worrisome not only to South Korea, but also to international nations. This paper surveyed US DoD Strategy for countering small aircraft systems and suggest how to improve our current anti-dron systems so that small unmanned aircraft threats will be dynamically diminished or neutralized as fast as we can.

Vulnerability Case Analysis of Wireless Moving Vehicle (무선이동체의 취약점 사례 분석)

  • Oh, Sangyun;Hong, Jinkeun
    • Journal of the Korea Convergence Society
    • /
    • 제9권8호
    • /
    • pp.41-46
    • /
    • 2018
  • As the industry related to drones has been activated, the public interest in drones has increased explosively, and many cases of drone-using are increasing. In the case of military drones, the security problem is the level of defense of the aircraft or cruise missiles, but commercial small and low cost drones are often released and utilized without security count-measure. This makes it possible for an attacker to easily gain access to the root of the drones, access internal files, or send fake packets. However, this droning problem can lead to another dangerous attack. In this regard, this paper has identified the vulnerabilities inherent in the commercial drones by analyzing the attack cases in the communication process of the specific drones. In this paper, we analyze and test the vulnerability in terms of scanning attack, meson attack, authentication revocation attack, packet stop command attack, packet retransmission attack, signal manipulation and de-compile attack. This study is useful for the analysis of drones attack and vulnerability.

Protective plan by the drone development in Major National Facilities (무인항공기 발전에 따른 국가중요시설 보호방안)

  • Cho, Min Sang;Shin, Seung Gyoon
    • Convergence Security Journal
    • /
    • 제15권3_1호
    • /
    • pp.3-9
    • /
    • 2015
  • With the development of technology, small UAVs are used in various forms. From military UAV to the Amazon drone, the UAVs are applied to increasing fields for its merits which can replace human work more fast and precisely than what human used to do. Yet, the use and development of UAVs cannot be embraced indiscreetly. There exist negative aspects along with its convenience and positive use. In military use, for instance, the use of UAV can handle dangerous missions in place of human beings but at the same time, it can be very threatening weapons that put people in danger of being attacked at unknown time and places. Therefore, this study discusses the safety measures for major national facilities. Through theoretical understanding of UAVs and major national facilities, the study explores into key concepts and reviewed the cases that threatened our nation's safety. The study also makes suggestions on the policies of the use of UAV to secure national safety.

Development of Unmanned Aircraft in the Fourth Industrial Revolution (4차 산업혁명시대 우리나라 드론의 발전 방향)

  • Lee, Young Uk
    • Convergence Security Journal
    • /
    • 제18권5_2호
    • /
    • pp.3-10
    • /
    • 2018
  • The drone is an unmanned aircraft that can be steered and controlled using radio waves on the ground, and the pilot moves unmanned without boarding. The history of the unmanned airplane began with military use, and the first unmanned aerial flight was the first successful flight of the 'Sperry Aerial Torpedo' drones built in the United States in 1917 with a bomb. With the development of unmanned aerial technology, the use of military drones has expanded to a wider field. Recently, the use of drones has been utilized in various fields such as agriculture, industry, logistics, broadcasting, and safety, and the scale of the market is also expanding. Although the drones are becoming indispensable to penetrate our lives, they can be used for bad purposes depending on the intended use of the user, but the risk factors are overlooked. Therefore, technical defects related to drones and accidents caused by operator's mistakes can not be completely prevented. However, privacy infringement, security leakage, and terrorism, which may be caused by illegal use of drones, It will not be inhibited and will accelerate.

  • PDF

A Design of a Drone for Cleaning Polluted Areas on the Surface of Solar Panels using a 3-D SLAM Technique (SLAM 기술을 활용한 태양광 발전기 패널 표면의 오염영역 청소 드론 설계)

  • Jang, Woo-Hee;Kim, Ye-Eun;Kim, Hee-Jeong;Lee, Eun-Jin;Geun, Yoon Taek;Lee, Hong-Chang;Lee, Kwangjae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 한국정보처리학회 2019년도 추계학술발표대회
    • /
    • pp.1056-1059
    • /
    • 2019
  • 본 논문은 SLAM 기술로 3D 매핑하고 태양광 발전기 패널 표면의 오염영역을 파악하여 청소하는 자율비행 드론에 대한 연구이다. 본 프로젝트에서 구현된 드론은 SLAM 기술을 활용하여 3D 매핑과 ROS Topic 통신으로 자율비행을 하면서 카메라로 촬영한 영상에서 태양광 발전기 패널을 파악하고 패널에 있는 얇은 먼지막을 프로펠러에 의하여 발생하는 바람으로 제거한다. 그리고 열화상 카메라로 확인된 고오염 또는 고장으로 인한 발열 부분에 페인트 볼을 떨어트려 시각적으로 표시하고 관리자에게 능동적으로 알린다. 이로 인해 제안된 방법에 따라 넓은 영역에 분포된 다수의 태양광 발전기 패널의 오염정도를 쉽게 파악하고 저오염 영역의 즉각적인 청소 및 고오염 영역의 빠른 보고로 인하여 전반적인 태양광 발전 효율을 제고할 수 있으며, 수동으로 이루어지는 인력 관리에 비하여 오염지역 파악 및 제거 시간이 보다 빠르고 정확하게 이루어질 수 있다.

Analysis and implications of North Korea's new strategic drones 'Satbyol-4', 'Satbyol-9' (북한의 신형 전략 무인기 '샛별-4형', '샛별-9형' 분석과 시사점)

  • Kang-Il Seo;Jong-Hoon Kim;Man-Hee Won;Dong-Min Lee;Jae-Hyung Bae;Sang-Hyuk Park
    • The Journal of the Convergence on Culture Technology
    • /
    • 제10권2호
    • /
    • pp.167-172
    • /
    • 2024
  • In major wars of the 21st century, drones are expanding beyond surveillance and reconnaissance to include land and air as well as sea and underwater for purposes such as precision strikes, suicide attacks, and cognitive warfare. These drones will perform multi-domain operations, and to this end, they will continue to develop by improving the level of autonomy and strengthening scalability based on the High-Low Mix concept. Recently, drones have been used as a major means in major wars around the world, and there seems to be a good chance that they will evolve into game changers in the future. North Korea has also been making significant efforts to operate reconnaissance and attack drones for a long time. North Korea has recently continued to engage in provocations using drones, and its capabilities are gradually becoming more sophisticated. In addition, with the recent emergence of new strategic Drones, wartime and peacetime threats such as North Korea's use of these to secure surveillance, reconnaissance and early warning capabilities against South Korea and new types of provocations are expected to be strengthened. Through this study, we hope to provide implications by analyzing the capabilities of North Korea's strategic Drones, predicting their operation patterns, and conducting active follow-up research on the establishment of a comprehensive strategy, such as our military's drone deployment and counter-drone system solutions.

AI-based Masking Service For Personal Information Protection On Drone-shooting Videos (드론 촬영물에서의 개인정보 보호를 위한 AI 기반 마스킹 서비스)

  • Shin, Dayeon;Kim, Hyoin;Ryu, Hyewon;Lee, Siyoung;Kim, Myungjoo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 한국정보처리학회 2020년도 추계학술발표대회
    • /
    • pp.401-404
    • /
    • 2020
  • 최근 드론 산업은 미래를 이끌어갈 신산업으로 부상하고 있다. 이러한 기대에도 불구하고 드론으로 인해 생기는 여러 문제들 중에서 개인정보침해 관련 문제는 기술적으로 쉽게 풀리지 않아서 드론 사용에 대한 법적인 규제만 더 강화하고 있는 실정이다. 본 논문은 드론 촬영물이 묵시적으로 가지고 있는 개인정보 침해문제를 클라우드 환경 가운데 기술적으로 풀어내었다. 사용자는 자신의 개인정보 침해 요소가 제거된 안전한 영상을 이용할 수 있도록 실시간 촬영 시 특정 사람 객체에 대한 마스킹을 진행할 수 있다. 라즈베리파이 카메라와 드론을 이용해 동영상을 촬영한 뒤 소켓 통신을 통해 이를 클라우드 환경에서의 서버로 전송하면 서버는 실시간으로 마스킹 처리를 진행하며 마스킹이 완료된 영상은 최종적으로 서버에 저장된다. 사용자는 모든 사람 객체 마스킹과 특정인을 제외한 모든 사람 객체 마스킹이라는 두 가지 옵션 중에서 원하는 옵션을 선택하여 개인정보 마스킹 처리를 진행할 수 있다.

A Study on the countermeasures and drones's threats in Military security (군보안상 드론위협과 대응방안)

  • Kim, Doo-hwan;Lee, Youn-hwan
    • Journal of Digital Convergence
    • /
    • 제16권10호
    • /
    • pp.223-233
    • /
    • 2018
  • The forces to protect people's life and property against the enemy attack is an organization which is regulated by the constitutional law. In terms of nature, its security is a significant factor to determine success or failure for the war. However, recently the 4th industrial revolution represents the rapid change in the advancement of civilization and technology. It can influence on the environment of military security which can make various changes. Unless taking proper action againsty these changes, it can inflict a vital harm for the organization of forces and its internal security. In this aspect, this study discuss new threats of the military security, above all, the most technical improvements and harms for the drones in terms of security. In addition, the advantages and disadvantages of drones which can influence on the ragions of military command and control, information operations, maneuvers, firepower, operation sustainment supports are analyzed. Moreover, this study set the purpose of developmental security measure for security threats in the aspects of military security.

Analysis of Security Vulnerability in U2U Authentication Using MEC in IoD Environment (IoD 환경에서 MEC를 활용한 U2U 인증에서 보안 취약점 분석)

  • Choi, Jae Hyun;Lee, Sang Hoon;Jeong, Ik Rae;Byun, Jin Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제31권1호
    • /
    • pp.11-17
    • /
    • 2021
  • Due to the recent development of the Internet of Things (IoT) and the increase in services using drones, research on IoD is actively underway. Drones have limited computational power and storage size, and when communicating between drones, data is exchanged after proper authentication between entities. Drones must be secure from traceability because they contain sensitive information such as location and travel path. In this paper, we point out a fatal security vulnerability that can be caused by the use of pseudonyms and certificates in existing IoD research and propose a solution.

System Design for Multi Mission Drone (드론을 이용한 다중 임무수행 시스템 설계)

  • Yun, Hyunkyong;Kim, Minkuk;Choi, Kwanghoon;Kim, Jaihoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 한국정보처리학회 2016년도 추계학술발표대회
    • /
    • pp.731-732
    • /
    • 2016
  • 본 논문에서는 드론을 이용하여 재난 현장에서 다수의 조난자를 구조하기 위한 다중임무 수행 시스템을 설계하고 직접 제작한 드론을 이용하여 시스템을 검증해 보았다. 먼저, 조난 영역을 설정하고 라즈베리파이를 이용한 사진 매핑을 통해 조난자의 위치를 파악한다. 다음으로, 우선순위에 따라 임무 수행 순서가 정해지고 이에 따른 임무를 미치는 방식으로 구성된다. 재난 현장에서 제안한 시스템을 사용한다면 드론이 스스로 판단하여 임무를 수행하므로 위급상황에 대한 빠른 대처가 가능할 것으로 판단된다.