• Title/Summary/Keyword: Security equipment

Search Result 603, Processing Time 0.027 seconds

The Susceptibility of Electronic Circuits inside the Cavity by HPEM(High Power Electromagnetics) Environment (금속 함체내부로 입사되는 고출력 전자기 펄스에 대한 전자회로의 민감성 분석)

  • Hwang, Sunl-Mook;Kwon, Hae-Ok;Huh, Chang-Su;Choi, Jin-Soo
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.61 no.12
    • /
    • pp.1892-1897
    • /
    • 2012
  • Modern electronic circuits are of importance for the function of communication, traffic systems and security systems. An intentional threat to these systems could be of big casualties and economic disasters. This study has examined susceptibility of electronic circuits inside the cavity by HPEM(High Power Electromagnetics). The UWB measurements were done at an anechoic chamber using a RADAN voltage source, which can generate a transient impulse of about 200 kV. The HPEM wave penetrated inside the metal case appeared to the long damped ringwave of pulse length compared with the incident wave. In addition, the resonant frequency generated inside the metal case occurred primarily in the range of 1~3 GHz. The frequency band of 1~3 GHz was influenced on the electronic circuit, which was confirmed by an external antenna and an internal absorber. The electronic circuit was influenced by HPEM infiltrated into the cavity at the 86 kV/m out of the metal cases. Also in case of an absorber the susceptibility of an electronic circuit was smallest among other cases(aperture, antenna). It is considered that absorber has a function absorbing electromagnetic wave infiltrated into the cavity and simultaneously limiting resonance by varying a boundary condition inside the cavity. Based on the results, electronic equipment systems could be applied to protection that has suited system requirements.

A Study on Management Plans for Activating of Smart Work (스마트워크 활성화를 위한 경영관리 방안)

  • Lee, Seung-Hee;Do, Hyeon-Ok;Seo, Kyeong-Do
    • Journal of Digital Convergence
    • /
    • v.9 no.4
    • /
    • pp.245-252
    • /
    • 2011
  • This study review about smart work to appear the use of smart device, and find the management plan for activating of smart work. Our national's smart work that is the best internet environment in worldwide fall behind foreign country. This study offers for the activating strategies of smart work. Fist, it is to change perception about smart work. Second, it should be clear up legal definition and category of smart-work. Third, it is that tighten up security of smart equipment. It is hard to achieve effects, as long as we get used to face-to-face work processing. Based on accurate perception about smart work on both employees and manager, this study suggest that it is important to change perception and to make actively use of smart work.

Data Collection Methods to Standardize Protocols of Safety Supervision System (안전관제시스템 프로토콜 표준화를 위한 데이터 수집 방법)

  • Shin, Kwang-Ho;Um, Tae-Hwa;Lim, Dam-Sub;Ahn, Jin
    • Journal of the Korean Society for Railway
    • /
    • v.19 no.2
    • /
    • pp.159-169
    • /
    • 2016
  • The current railway control system in Korea is comprised of signaling, electric rail power, communication, and maintenance systems that are independent of each other. Further, these systems have different mediums and protocols for transmitting the field equipment data to the central control system. The Safety Supervision System has as its purpose the collecting of safety-related data from each system to predict and prevent accidents, this system utilizes standard protocol. Safety-related data need to be collected from field data transmission devices of the existing control system, the data should be collected without affecting the communication of the existing system. In this study, sniffing skill, which is typically used for network traffic monitoring or security, is used to collect data. The problems arising from the use of sniffing devices are noted, and the Packet Conversion Node is proposed as a solution to the problems. Further, functional and performance testing were completed for the prototype, and the software architecture and packet conversion process were verified.

A Study on the Development of Building Control and management System -Focusing on the Lighting Control and Monitoring system- (빌딩 제어 및 관리 시스템 개발에 관한 연구 -조명 제어 관리 시스템 구축을 중심으로-)

  • Cho, Sung-O
    • Korean Institute of Interior Design Journal
    • /
    • v.16 no.4
    • /
    • pp.110-118
    • /
    • 2007
  • Technology has been viewed at various stages of civilization as leading to future progress. The building, its services systems and management of the work process all contribute to the well-being of people within an organization. Productivity relies on there being a general sense of high morale and satisfaction with the workplace. Now buildings are considered as providing a milieu for human creativity. Flexibility, adaptability, service integration and high standards of finishes offer an intelligence threshold. Building Automation System(BAS) - controlled lighting systems may offer incremental energy saving. Conventional Lighting control systems often control equipment in a single room or over the limited area, because they are centralized control systems, which means that all the controlled circuits must be wired to a single control panel. The computers used by these systems are typically dedicated microprocess that perform only lighting control functions. By comparison, modern Building automation systems are distributed control system, which means that their computing hardware and software are distributed as a network that microprocessor-based control modules and standard PC. PLC(Programmable Logic controller) is extensible virtually without limits, so that all the lighting in a facility can be controlled by single, unified system - the same system that also can control and monitor the building's HVAC, security, and manufacturing processed, elevators, and more. A Building automation system can control light using schedules, manual controls, occupancy sensors, and photosensors, either singly or in combination. Building Lighting control and monitoring system will be for a energy saving and efficient building management system.

A Study on Hacking Attack of Wire and Wireless Voice over Internet Protocol Terminals (유무선 인터넷전화 단말에 대한 해킹 공격 연구)

  • Kwon, Se-Hwan;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.299-302
    • /
    • 2011
  • Recently, Voice over Internet protocol(VoIP) in IP-based wired and wireless voice, as well as by providing multimedia information transfer. Wired and wireless VoIP is easy on illegal eavesdropping of phone calls and VoIP call control signals on the network. In addition, service misuse attacks, denial of service attacks can be targeted as compared to traditional landline phones, there are several security vulnerabilities. In this paper, VoIP equipment in order to obtain information on the IP Phone is scanning. And check the password of IP Phone, and log in successful from the administrator's page. Then after reaching the page VoIP IP Phone Administrator Settings screen, phone number, port number, certification number, is changed. In addition, IP Phones that are registered in the administrator page of the call records check and personal information is the study of hacking.

  • PDF

A design on Light-Weight Key Exchange and Mutual Authentication Routing Protocol in Sensor Network Environments (센서네트워크 환경에서 경량화된 키 교환 및 상호인증 라우팅 프로토콜)

  • Lee, Kwang-Hyoung;Lee, Jae-Seung;Min, So-Yeon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.11
    • /
    • pp.7541-7548
    • /
    • 2015
  • Wireless Sensor Networks is the technology which is used in explore role for military purposes, as well as various fields such as industrial equipment management, process management, and leverage available technologies by distributing node into various areas. but there are some limitations about energy, processing power, and memory storage capacity in wireless sensor networks environment, because of tiny hardware, so various routing protocols are proposed to overcome it. however existing routing protocols are very vulnerable in the intercommunication, because they focus on energy efficiency, and they can't use existing encryption for it, Because of sensor's limitations such like processing power and memory. Therefore, this paper propose mutual authentication scheme that prevent various security threats by using mutual authentication techniques and, Key generation and updating system as taking into account energy efficiency.

A study on the integrated management model of the national disaster resources (국가 방재 자원 통합 운영 모델에 관한 연구)

  • Lee, Changyeol;Kim, Taehwan;Park, Giljoo
    • Journal of the Society of Disaster Information
    • /
    • v.9 no.3
    • /
    • pp.358-364
    • /
    • 2013
  • Conventional disaster resources management systems among the several institutes are not mutually connected. In case of NDMS(National Disaster Management System), the data of the system is confined to the resources of the local governments and not connected with any other disaster resource management systems. Therefore, it is difficult to find the needed resources, when the large scale disaster is occurred. In this paper, we developed the integrated model of the distributed resources management framework considering the current resource management environment among the institutes. It is loosely coupling model under the centralized system, called IDRM(Integrated Disaster Resource Manager). The system will be verified with the test sites including Korea Expressway Corporation, JeonBuk local government, and Korea Construction Equipment Association. Via the field testing, the system will be the base of the real available system in the future.

A SES Alarmed Link Encryption Synchronization Method for High-speed Video Data Encryption (고속 영상데이터 암호화에 적합한 SES Alarmed 링크 암호동기 방식)

  • Kim, HyeongRag;Lee, HoonJae;Kwon, DaeHoon;Pak, UiYoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.12
    • /
    • pp.2891-2898
    • /
    • 2013
  • CCSDS Standard is widely used in international space telecommunication area. In this standard, Encryption is realized using a unique hierarchical encryption protocol and satisfied security requirements of communication channels. For synchronization, encryption sync is attached in the beginning of encrypted data. But exceptional case(timing jittering, abnormal system shutdown, etc.) is occurred, receiving equipment cannot decrypt received data. In this paper, we propose a SES Alarmed link encryption synchronization method for sending warning signal to the transmitter when some problems have been occurred during the transmission and we also suggest optimum conditions for SES Alarm signal through performance analysis.

Design and Implementation of a Real Time Access Log for IP Fragmentation Attack Detection (IP Fragmentation 공격 탐지를 위한 실시간 접근 로그 설계 및 구현)

  • Guk, Gyeong-Hwan;Lee, Sang-Hun
    • The KIPS Transactions:PartA
    • /
    • v.8A no.4
    • /
    • pp.331-338
    • /
    • 2001
  • With the general use of network, cyber terror rages throughout the world. However, IP Fragmentation isn\`t free from its security problem yet, even though it guarantees effective transmission of the IP package in its network environment. Illegal invasion could happen or disturb operation of the system by using attack mechanism such as IP Spoofing, Ping of Death, or ICMP taking advantage of defectiveness, if any, which IP Fragmentation needs improving. Recently, apart from service refusal attack using IP Fragmentation, there arises a problem that it is possible to detour packet filtering equipment or network-based attack detection system using IP Fragmentation. In the paper, we generate the real time access log file to make the system manager help decision support and to make the system manage itself in case that some routers or network-based attack detection systems without packet reassembling function could not detect or suspend illegal invasion with divided datagrams of the packet. Through the implementation of the self-managing system we verify its validity and show its future effect.

  • PDF

Design and Implementation of High-Resolution Image Transmission Interface for Mobile Device (모바일용 고화질 영상 전송 인터페이스의 설계 및 구현)

  • Ahn, Yong-Beom;Lee, Sang-Wook;Kim, Eung-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.8
    • /
    • pp.1511-1518
    • /
    • 2007
  • As studies on ubiquitous computing are actively conducted, desire for various services, including image transmission storage, search and remote monitoring. has been expanding into mobile environment as well as to PCs. while CCTV (closed circuit TV) and un DVR (Digital video Recording) are used in places where security service such as intrusion detection system is required, these are high-end equipment. So it is not easy for ordinary users or household and small-sized companies to use them. Besides, they are difficult to be carried and camera solution for mobile device does not support high-quality function and provides low-definition of QVGA for picture quality. Therefore, in this study, design and implementation of embedded system of high-definition image transmission for ubiquitous mobile device which is not inferior to PC or DVR are described. To this end, usage of dedicated CPU for mobile device and design and implementation of MPEG-4 H/W CODEC also are examined. The implemented system showed excellent performance in mobile environment, in terms of speed, picture quality.