• Title/Summary/Keyword: Security Navigation

Search Result 373, Processing Time 0.022 seconds

A Study on Analysis of Requirements in the Smart Societal Security Wireless Network (스마트 사회안전무선통신망 요구사항 분석에 관한 연구)

  • Choi, Jae-Myeong;Woo, Byung-Hoon;Kang, Heau-Jo
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.5
    • /
    • pp.518-523
    • /
    • 2014
  • The development of Societal and Scientific technologies have increased risk of dysfunction caused by new technologies such as nuclear power, information technology. Also, urbanization and population density is increasing risk to high-rise building fires, traffic accidents, crime and etc. Implementation of wireless communication network on the societal security is very necessary for prevention, preparation and response against these risks. It always consists maintenance, management and the network must be maintained in an emergency. In this paper, we studied the societal security wireless communication network for prevention, preparation and response against complex disasters, and analyzed requirements(essential function, add-ons) for implementation network in the societal security wireless network.

Image Security System Using Push Server and Smart Device (푸시 서버와 스마트 디바이스를 이용한 영상보안 시스템)

  • Park, Seung-Hwan;Oh, U-Chul;Kim, Chang-Bok
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.6
    • /
    • pp.588-593
    • /
    • 2014
  • Recently, the smart devices has been possessed by a large majority of the adult, and offered various personalization services. This paper proposed the lightweight Intelligent Image Security System that notice the existence of any intruder in real time at the place of requiring the security by using smart device. The proposed image security system recognized whether or not intruder exists using the difference frame on the basis of Integral Image and the dynamic background updating algorithms. The intrusion notification is achieved by using the GCM push server that send massages in the application unit of user mobile device, and the SMTP mail server which is use of e-mail standard protocol. In case of the occurrence of intruder, GCM push server send an push-massage by the private mobile device, and SMTP mail server send the intruder's photograph and intrusion time. By the convergence of the various image processing algorithms and the performance of smart device, The proposed image security system can be applied to the various Intelligent Image Security field.

Analysis of Digital VHF data system requirement for electronic Navigation (e-Navigation 실현을 위한 디지털 VHF 데이터 시스템의 요구사항 분석)

  • Park, Ok-Sun;Kim, Dae-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.593-596
    • /
    • 2010
  • Currently, maritime information service is provided by a variety of equipments such as satellites, radar and VHF devices with independent standards and protocols. However, the increase of vessel traffic and development of global marine industries need an infrastructure providing seamless information transfer for the safety, security and protection of the marine environment. Therefore, we propose features and requirements of future VHF data systems and equipments as a component of e-Navigation.

  • PDF

Concept & Implementation of Three-Layered Vessel Traffic Management System

  • Jung, Min;Song, Chae-Uk
    • Journal of Navigation and Port Research
    • /
    • v.34 no.2
    • /
    • pp.91-95
    • /
    • 2010
  • Recently IMO and IALA have developed the strategy of e-Navigation and the concepts of VTM to enhance the safety, efficiency and security of vessel traffic and protection of the marine environment. And current technical and functional trends require vessel traffic management systems to be improved so as to control vessel traffic not only in waters of harbour area, but also within EEZ waters. Under the consideration of these circumstances, a three-layered vessel traffic management system was proposed in this paper. The proposed system consists of three sub-systems, called Local VTS, Regional VTS and National VTS, and those sub-systems are designed respectively to be suitable for managing vessel traffic within their own jurisdiction waters.

A National Monitoring System Supporting E-Navigation

  • Jeong, Jung-Sik;Park, Seong-Hyun;An, Kwang
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.2
    • /
    • pp.335-338
    • /
    • 2006
  • This report introduces a National Vessel Monitoring System(NVMS) within the General Information Center On Maritime Safety and Security(GICOMS) project and a national legislation system for ship's safety management in Korea. We also represent future directions of NVMS in terms of E-Navigation(E-Nav), which is the new study item for COMSAR and NAV that has been adopted from the Maritime Safety Committee(MSC) 81st session. It concludes the future E-Nav system, when it is built, that all functions of NVMS should be used by NVMS controllers as well as mariners, and we should also consider the existing NVMS infrastructure including S/W and H/W.

  • PDF

A Study on Privacy Security in Maritime Information Gateway System (지능형 해상교통정보 연계시스템에서의 개인정보 보안에 관한 연구)

  • Yong-hak Song;Hyun Kim;Deuk-Jae Cho;Jong-Hwa Beak;Do-yeon Kim
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.05a
    • /
    • pp.202-203
    • /
    • 2023
  • The Ministry of Oceans and Fisheries is providing maritime safety services through the operation of the Korean e-Navigation service, and research is continuously needed to improve reliability and quality to secure the competitiveness of the system. In order to secure such competitiveness, we presented the basic design for the big-data maritime information gateway system for minimizes thereal-time operation impact of the Korean e-Navigation service, and a theoretical hardware structure diagram including pseudonymization procedures to implement the overall system and solve privacy security issues. However, the proposed structure diagram and design include only the overall concept, to link real-time maritime information, required detailed privacy security method to satisfy the Privacy Act of the Republic of Korea. To solve this problem, this study will identify factors to violate the Privacy Act within the real-time maritime information(privacy of shipowner, shipping company, captain, navigator, fisherman, etc.) linked by the big-data maritime information gateway system, and research the method to link the secured information to other institutions by encrypting identified the factors.

  • PDF

A Study on the Technology Trends for Implementation of Homeland Security (국토안보 구현을 위한 기술 동향 연구)

  • Jeong, Seung-Hui;Han, Jong-Wook;Choi, Yong-Seok;Oh, Chang-Heon
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.6
    • /
    • pp.991-997
    • /
    • 2009
  • Recently, many countries are developing and investing in various homeland security technologies against terrorism. The importance of homeland security has been growing because of nuclear weapon threat from North Korea, the burning of cultural assets, and violence crimes. Therefore, in this paper, we have described and analyzed the trends related to homeland security technology. The main techniques toward homeland security are aggregation technology, integration technology, collaboration technology, categorization technology, intelligence technology, and mining technology. Those are likely to become the growth potentials until fade out of threat. Therefore, we require more government policies to support a budget enlargement.

  • PDF

A Study on Logistics Security Recognition of Domestic Logistics Enterprises (국내물류기업의 물류보안 인식에 관한 연구)

  • Lee, Jea-Won;Ryu, Hyung-Geun;Yeon, Joung-Hum
    • Journal of Navigation and Port Research
    • /
    • v.34 no.1
    • /
    • pp.45-50
    • /
    • 2010
  • After September 11 attacks, as recently the range about security of physical distribution is rapidly spreading temporally & spatially, and it considers that the demand of understanding about logistics company is more than that of the past, now is the time that to establish policy for a comprehensive and systematic support policy that targets the entire supply chain considering the competitive of logistics beyond the responsibility for security of the field of import and export simply. In this respect, this study has identified recognition of domestic logistics company about global logistics security system that has recently been implemented in the country, and this level of recognition has really examined what is the impact of its logistics competitiveness and an intention to invest in related areas in the future. Based on this, this study has also proposed the supporting promotion and education for the expansion of logistics security of government & related agencies and effective way promoting to establish policies regarding this.

A study on the development of cybersecurity experts and training equipment for the digital transformation of the maritime industry (해양산업 디지털전환을 위한 사이버보안 전문 인력양성 방안연구)

  • Jinho Yoo;Jeounggye Lim;Kaemyoung Park
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2022.11a
    • /
    • pp.137-139
    • /
    • 2022
  • As cyber threats in the maritime industry increase due to the digital transformation, the needs for cyber security training for ship's crew and port engineers has increased. The training of seafarers is related to the IMO's STCW convention, so cyber security training also managed and certified, and it is necessary to develop a cybersecurity training system that reflects the characteristics of the OT systemof ships and ports. In this paper, with the goal of developing a training model based on the IMO cyber risk management guideline, developing a cyber security training model based on the characteristics of maritime industry threats, and improving the effectiveness of cyber security training using AR/VR and metaverse, A method for developing a system for nurturing cyber security experts is presented.

  • PDF

IACS UR E26 - Analysis of the Cyber Resilience of Ships (국제선급협회 공통 규칙 - 선박의 사이버 복원력에 대한 기술적 분석)

  • Nam-seon Kang;Gum-jun Son;Rae-Chon Park;Chang-sik Lee;Seong-sang Yu
    • Journal of Advanced Navigation Technology
    • /
    • v.28 no.1
    • /
    • pp.27-36
    • /
    • 2024
  • In this paper, we analyze the unified requirements of international association of classification societies - cyber resilience of ships, ahead of implementation of the agreement on July 1, 2024, and respond to ship cyber security and resilience programs based on 5 requirements, 17 details, and documents that must be submitted or maintained according to the ship's cyber resilience,. Measures include document management such as classification certification documents and design documents, configuration of a network with enhanced security, establishment of processes for accident response, configuration management using software tools, integrated network management, malware protection, and detection of ship network security threats with security management solutions. proposed a technology capable of real-time response.