• 제목/요약/키워드: Smart Defense

검색결과 168건 처리시간 0.022초

다중 플랫폼 지원 실시간 HD급 영상 전송기 개발에 관한 연구 (The Study on the Development of the Realtime HD(High Definition) Level Video Streaming Transmitter Supporting the Multi-platform)

  • 이재희;서창진
    • 전기학회논문지P
    • /
    • 제65권4호
    • /
    • pp.326-334
    • /
    • 2016
  • In this paper for developing and implementing the realtime HD level video streaming transmitter which is operated on the multi-platform in all network and client environment compared to the exist video live streaming transmitter. We design the realtime HD level video streaming transmitter supporting the multi-platform using the TMS320DM386 video processor of T.I company and then porting the Linux kernel 2.6.29 and implementing the RTSP(Real Time Streaming Protocol)/RTP(Real Time Transport Protocol), HLS(Http Live Streaming), RTMP(Real Time Messaging Protocol) that can support the multi-platform of video stream protocol of the received equipments (smart phone, tablet PC, notebook etc.). For proving the performance of developed video streaming transmitter, we make the testing environment for testing the performance of streaming transmitter using the notebook, iPad, android Phone, and then analysis the received video in the client displayer. In this paper, we suggest the developed the Realtime HD(High Definition) level Video Streaming transmitter performance data values higher than the exist products.

Cybersecurity Framework for IIoT-Based Power System Connected to Microgrid

  • Jang, Ji Woong;Kwon, Sungmoon;Kim, SungJin;Seo, Jungtaek;Oh, Junhyoung;Lee, Kyung-ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권5호
    • /
    • pp.2221-2235
    • /
    • 2020
  • Compared to the past infrastructure networks, the current smart grid network can improve productivity and management efficiency. However, as the Industrial Internet of Things (IIoT) and Internet-based standard communication protocol is used, external network contacts are created, which is accompanied by security vulnerabilities from various perspectives. Accordingly, it is necessary to develop an appropriate cybersecurity guideline that enables effective reactions to cybersecurity threats caused by the abuse of such defects. Unfortunately, it is not easy for each organization to develop an adequate cybersecurity guideline. Thus, the cybersecurity checklist proposed by a government organization is used. The checklist does not fully reflect the characteristics of each infrastructure network. In this study, we proposed a cybersecurity framework that reflects the characteristics of a microgrid network in the IIoT environment, and performed an analysis to validate the proposed framework.

Probabilistic Analysis of Code-Reuse Attacks and Defenses in IoT

  • Ho, Jun-Won
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제9권1호
    • /
    • pp.24-28
    • /
    • 2017
  • In the Internet of Things (IoT), resource-limited smart devices communicate with each other while performing sensing and computation tasks. Thus, these devices can be exposed to various attacks being launched and spread through network. For instance, attacker can reuse the codes of IoT devices for malicious activity executions. In the sense that attacker can craft malicious codes by skillfully reusing codes stored in IoT devices, code-reuse attacks are generally considered to be dangerous. Although a variety of schemes have been proposed to defend against code-reuse attacks, code randomization is regarded as a representative defense technique against code-reuse attacks. Indeed, many research have been done on code randomization technique, however, there are little work on analysis of the interactions between code randomization defenses and code-reuse attacks although it is imperative problem to be explored. To provide the better understanding of these interactions in IoT, we analyze how code randomization defends against code-reuse attacks in IoT and perform simulation on it. Both analysis and simulation results show that the more frequently code randomizations occur, the less frequently code-reuse attacks succeed.

Design of Ultra-sonication Pre-Treatment System for Microalgae CELL Wall Degradation

  • Yang, Seungyoun;Mariappan, Vinayagam;Won, Dong Chan;Ann, Myungsuk;Lee, Sung Hwa
    • International journal of advanced smart convergence
    • /
    • 제5권2호
    • /
    • pp.18-23
    • /
    • 2016
  • Cell walls of microalgae consist of a polysaccharide and glycoprotein matrix providing the cells with a formidable defense against its environment. Anaerobic digestion (AD) of microalgae is primarily inhibited by the chemical composition of their cell walls containing biopolymers able to resist bacterial degradation. Adoption of pre-treatments such as thermal, thermal hydrolysis, ultrasound and enzymatic hydrolysis have the potential to remove these inhibitory compounds and enhance biogas yields by degrading the cell wall, and releasing the intracellular algogenic organic matter (AOM). This paper preproposal stage investigated the effect of different pre-treatments on microalgae cell wall, and their impact on the quantity of soluble biomass released in the media and thus on the digestion process yields. This Paper present optimum approach to degradation of the cell wall by ultra-sonication with practical design specification parameter for ultrasound based pretreatment system. As a result of this paper presents, a microalgae system in a wastewater treatment flowsheet for residual nutrient uptake can be justified by processing the waste biomass for energy recovery. As a conclusion on this result, Low energy harvesting technologies and pre-treatment of the algal biomass are required to improve the overall energy balance of this integrated system.

조종날개가 장착된 탄도수정탄의 자이로안정성 및 항력 특성 연구 (Gyroscopic Stability and Drag Characteristics Study of Canard-Installed Course Correction Munition)

  • 배주현
    • 한국군사과학기술학회지
    • /
    • 제20권3호
    • /
    • pp.376-383
    • /
    • 2017
  • This paper describes the gyroscopic stability and the drag characteristics of the smart munition with a course correction fuze(CCF). A ballistic analysis was conducted to figure out the effect of the canards on the gyroscopic stability of the projectile. The analysis used the commercial ammunition performance evaluation software: Projectile Design and Analysis System(PRODAS). In particular, we compared the PRODAS analysis results to real field test results to investigate the influence of the CCF mounted projectile. In addition, some ballistic simulations were carried out to provide the conditions suitable for wind tunnel tests. Experimental results show that the added drag force by the canards is almost uniform regardless of the Mach number when the projectile is at the normal position where the angle of rotation and the angle of attack are both 0 degrees. However, as the angle of attack of the projectile increases, the additional drag force depends on the deflection of the canards.

스마트폰 기반의 사용자 이동상태 판별 알고리즘 (An user moving state discriminant algorithm using a smart-phone)

  • 하동수;안우영;구경완;박성준
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2010년도 제42차 하계학술발표논문집 18권2호
    • /
    • pp.237-240
    • /
    • 2010
  • 본 논문에서는 스마트폰 기반의 사용자 이동 형태 판별 알고리즘에 대해 제안한다. 이 알고리즘은 스마트폰의 자체 내장된 3 축 가속도 센서와 GPS센서의 데이터 정보를 기반으로 하여 현재 사용자의 이동 수단 및 위치를 판단하게 된다. 이때 GPS 센서을 이용해 사용자의 위치와 이동속도를 계산하여 사용자의 이동수단을 판별하는데 이용하게 되고 가속도 센서의 데이터를 분석하여 사용자의 세부적인 이동형태(걷기, 뛰기)를 판별하는데 이용된다. 본 논문에서는 스마트폰의 두 가지 응용 센서(GPS, 가속도계)를 이용하여 사용자 이동상태 판별 알고리즘을 구현하고 테스트를 수행하였다. 실험 내용은 GPS를 통해 받은 데이터를 이용하여 이동속도를 계산하고 가속도 센서의 변화 폭을 측정 이동형태를 판별할 수 있는 속도와 가속도 센서의 기준 값을 실험 데이터를 바탕으로 정의하였다. 실험결과 본 논문에서 제안하는 사용자 이동형태 판별 알고리즘를 이용하여 사용자의 이동형태를 판별 할 수 있었다.

  • PDF

텐서플로우 기반의 기계학습 보안 프로그램 (Machine-Learning Anti-Virus Program Based on TensorFlow)

  • 윤성권;박태용
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2016년도 춘계학술대회
    • /
    • pp.441-444
    • /
    • 2016
  • 최근 북한은 핵실험, 미사일 발사 등 물리적 도발은 물론 고위 공직자에 대한 스마트폰 해킹, 금융권에 대한 디도스(DDoS) 공격 등 사이버 테러를 감행하며 한반도 내 위협의 수위를 높이고 있다. 취약점에 대한 해킹, 악성코드 배포 등을 통해 이루어지는 사이버 공격은 일반적으로 최초의 침입과 공격 징후가 감지된 후 데이터 분석을 통해 백신의 라이브러리 추가 및 업데이트, 보안 취약성을 보완하는 등 소극적인 대응 방법을 취하고 있다. 본 논문에서는 프로그램 스스로 취약점을 분석하고 자가 라이브러리 추가, 보안 취약점 해결 등을 수행하는 구글 텐서플로우(TensorFlow) 기반의 기계학습 능력을 갖춘 보안 프로그램에 관한 개념을 연구하고 제안하였다.

  • PDF

타원곡선 암호시스템에서 랜덤 m-ary 방법을 사용한 전력분석 공격의 대응방법 (A Random M-ary Method-Based Countermeasure against Power Analysis Attacks on ECC)

  • 안만기;하재철;이훈재;문상재
    • 정보보호학회논문지
    • /
    • 제13권3호
    • /
    • pp.35-43
    • /
    • 2003
  • 타원곡선 암호시스템에서 스칼라 곱셈의 랜덤화는 부-채널공격 대응방법의 기본적인 개념 중의 하나이다. 본 논문에서는 랜덤 m-ary 리코딩 알고리듬에 기반한 랜덤 m-ary 방법으로 단순/차분 전력분석 공격의 대응 방법을 제안한다. 제안 방법은 표준의 m-ary 방법보다 부가적인 연산량이 요구되지만 비밀키와 독립적인 소모전력을 생성한다. 따라서 랜덤한 윈도우 사이즈를 이용한 연산 과정이 SPA/DPA 공격에 대응할 수 있으므로 제안하는 대응방법은 스마트카드의 부-채널공격에 향상된 안전성을 제공한다.

Study on Emerging Security Threats and National Response

  • Il Soo Bae;Hee Tae Jeong
    • International Journal of Advanced Culture Technology
    • /
    • 제11권4호
    • /
    • pp.34-41
    • /
    • 2023
  • The purpose of this paper is to consider the expansion of non-traditional security threats and the national-level response to the emergence of emerging security threats in ultra-uncertain VUCA situations. As a major research method for better analysis, the theoretical approach was referred to papers published in books and academic journals, and technical and current affairs data were studied through the Internet and literature research. The instability and uncertainty of the international order and security environment in the 21st century brought about a change in the security paradigm. Human security emerged as the protection target of security was expanded to individual humans, and emerging security was emerging as the security area expanded. Emerging security threatsthat have different characteristicsfrom traditionalsecurity threats are expressed in various ways, such as cyber threats, new infectious disease threats, terrorist threats, and abnormal climate threats. First, the policy and strategic response to respond to emerging security threats is integrated national crisis management based on artificial intelligence applying the concept of Foresight. Second, it is to establish network-based national crisis management smart governance. Third, it is to maintain the agile resilience of the concept of Agilience. Fourth, an integrated response system that integrates national power elements and national defense elements should be established.

A study on the development directions of a smart counter-drone defense system based on the future technological environment

  • Jindong Kim;Jonggeun Choi;Hyukjin Kwon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제18권7호
    • /
    • pp.1929-1952
    • /
    • 2024
  • The development of drones is transforming society as a whole and playing a game-changing role in warfare. However, numerous problems pose threats to the lives and safety of people, and the counter-drone system lags behind the rapid development of drones. Most countries, including South Korea, have not established a reliable counter-drone system in response to the threat posed by numerous drones. Due to budget constraints in each country, an Analytic Hierarchy Process (AHP) analysis was conducted among a group of experts who have been involved in policymaking and research and development related to counter-drone systems. This analysis aimed to determine the priority of building a counter-drone system. Based on various research data, the counter-drone system was analyzed in three stages: detection/identification, governance, and response. The hierarchical design mapped out the existing researched counter-drone technology into a hierarchical model consisting of 31 evaluation criteria. The conclusion provided a roadmap for establishing a counter-drone system based on the prioritization of each element and considering factors such as technological advancement, outlining directions for development in each field.