• Title/Summary/Keyword: Supply Chain Security

Search Result 120, Processing Time 0.037 seconds

A study on DDoS Attack, Detecting and Defence in ubiquitous system (유비쿼터스환경에서의 DDoS의 공격과 탐지, 방어시스템에 관한 연구)

  • Jung, Chang-Duk;Cha, Joo-Won;Hwang, Sun-Il
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2009.11a
    • /
    • pp.544-548
    • /
    • 2009
  • The underlying success of logistics depends on the flow of data and information for effective management. Over the last 30 years, we have seen the power of microprocessors double about every 18months. This continuing trend means that computers will become considerably smaller, cheaper, and more abundant; indeed, they are becoming ubiquitous and are even finding their way into everyday objects, resulting in the creation of smart things. In the long term, ubiquitous technologies will take on great economic significance. Industrial products will become smart because of their integrated information processing capacity, or take on an electronic identity that can be queried remotely, or be equipped with sensors for detecting their environment, enabling the development of innovative products and totally new services. The global marketplace runs on logistics, security, speed, agility and flexibility..In this paper we report that pairing these traditional logistics functions with RFID technology can be a huge value-driver for companies. This winning combination yields increased logistics management effectiveness and more efficient visibility into the supply chain management.

  • PDF

Blockchain Revolution in Healthcare : The Era of Patient-centered Dental Information System

  • Kho, Wookyun
    • International Journal of Oral Biology
    • /
    • v.43 no.1
    • /
    • pp.1-3
    • /
    • 2018
  • Blockchain is at the center of attention recently and it is expected to have a huge impact on healthcare industry including dentistry as well. Blockchain is a fundamental technology behind Bitcoin and itis all about decentralization, security, reliability, and transparency. These characteristics of the technology empower it to disrupt the current healthcare industry in innumerable practices such as supply chain management in pharmaceuticals to prevent the counterfeited medicine, clinical trials to guarantee transparency, healthcare information exchanges or personal health record systems to ensure data integrity and interoperability, etc. It will surely revolutionize the way the current healthcare system works; from provider-oriented to patient-centered. Hence, it is time to seriously consider how we could be a part of this blockchain revolution in dentistry.

Monitoring and Tracking Model of Logistics Based on ICT network

  • Cho, Sokpal;Chung, Heechang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.489-492
    • /
    • 2016
  • Transportation in the logistics, many business organizations are engaged in monitoring and tracking the vehicles in order to improve logistics services, reduce expenses and secure security in cargo transportation. It is saving time and money by tracking and monitoring vehicles which transport cargo in supply chain of logistics. Therefore the main issue of delivery flow is to improve services, and ensure the safety in transportation system. This article suggests the tracking and monitoring model to keep safety transports on ICT network. It focuses on precise delivery control by monitoring and tracking vehicles to save time and costs. The status of product movement is analyzed for proper decision making. The vehicle embedded with RFID is automatically tracked in the movement process by tracking and monitoring model. The main role keeps safety tracking to reduce costs and to deliver products at proper time and location.

  • PDF

Development of Blockchain-based Food Supply Chain Using IoT Sensors (IoT 센서를 이용한 블록체인 기반 식품 공급망 개발)

  • Sim, Jae-Ik;Kim, Wang-Rok;Jeon, Mi-Hyeon;Oh, Dong-Eui;Jeong, Byeong-Gyu;Shin, Sang Uk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.05a
    • /
    • pp.224-227
    • /
    • 2020
  • 현 식품 공급망은 중앙 집중화되어 있고, 투명하지 않으며 복잡한 시스템으로 인해 많은 문제점이 존재한다. 판매자는 싼값에 팔고 소비자는 비싼 값에 구매하는 문제가 지속적으로 대두되고 있으며 유통 과정에서 생기는 문제에 대한 책임 추적이 어렵다. 본 논문에서는 각 유통 단계에서 생성되는 IoT 센서 데이터를 블록체인 기술에 적용하며 이를 활용하는 방안에 대해 제안한다. 제안 모델을 통해 유동 과정과 데이터에 대한 신뢰성을 확보하고 제품의 원산지, 배송 과정, 보관 상태를 비롯한 유통 정보들을 추적할 수 있다.

A Methodology for Integrating Security into the Automotive Development Process (자동차 개발 프로세스에서의 보안 내재화 방법론)

  • Jeong, Seungyeon;Kang, Sooyoung;Kim, Seungjoo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.9 no.12
    • /
    • pp.387-402
    • /
    • 2020
  • Conventional automotive development has mainly focused on ensuring correctness and safety and security has been relatively neglected. However, as the number of automotive hacking cases has increased due to the increased Internet connectivity of automobiles, international organizations such as the United Nations Economic Commission for Europe(UNECE) are preparing cybersecurity regulations to ensure security for automotive development. As with other IT products, automotive cybersecurity regulation also emphasize the concept of "Security by Design", which considers security from the beginning of development. In particular, since automotive development has a long lifecycle and complex supply chain, it is very difficult to change the architecture after development, and thus Security by Design is much more important than existing IT products. The problem, however, is that no specific methodology for Security by Design has been proposed on automotive development process. This paper, therefore, proposes a specific methodology for Security by Design on Automotive development. Through this methodology, automotive manufacturers can simultaneously consider aspects of functional safety, and security in automotive development process, and will also be able to respond to the upcoming certification of UNECE automotive cybersecurity regulations.

Efficient Mutual Authentication Protocol Suitable to Passive RFID System (수동형 RFID 시스템에 적합한 효율적인 상호 인증 프로토콜 설계)

  • Won, Tae-Youn;Chun, Ji-Young;Park, Choon-Sik;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.63-73
    • /
    • 2008
  • RFID(Radio Frequency IDentification) system is an automated identification system that basically consists of tags and readers and Back-End-Databases. Tags and Readers communicate with each other by RF signal. As a reader can identify many tags in contactless manner using RF signal, RFID system is expected to do a new technology to replace a bar-code system in supply-chain management and payment system and access control and medical record and so on. However, RFID system creates new threats to the security of systems and privacy of individuals, Because tags and readers communicate with each other in insecure channel using RF signal. So many people are trying to study various manners to solve these problems against attacks, But they are difficult to apply to RFID system based on EPCglobal UHF Class-1 Generation-2 tags. Recently, Chien and Chen proposed a mutual Authentication protocol for RFID conforming to EPCglobal UHF Class-1 Generation-2 tags. we discover vulnerabilities of security and inefficiency about their protocol. Therefore, We analyze vulnerabilities of their protocol and propose an efficient mutual authentication protocol that improves security and efficiency.

A Study on the Enterprise Application Framework for Developing Efficient RFID Applications (효율적인 RFID 애플리케이션 개발을 위한 엔터프라이즈 애플리케이션 프레임워크에 관한 연구)

  • An, Kyu-Hee;Yang, Seok-Hwan;Chung, Mok-Dong
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.2
    • /
    • pp.269-280
    • /
    • 2008
  • The information flow through RFID techniques such as, standardized EPC and EPCglobal network suggests new change in the method of cooperating and sharing information in the supply chain. Common function should be prepared for communication, security techniques, and business processes based on the EPCglobal standard to introduce efficient RFID techniques. And the standard architecture which can deal with the RFID environment flexibly is quite necessary. Therefore, this paper suggests Enterprise Application Framework (EAF) for developing efficient and secure RFID applications. EAF offers essential services to develop RFID enterprise systems : a communication environment which uses various standard communication protocols, a security function based on PKI, and abstract business services for flexible introduction of RFID businesses. It simplifies the RFID business integration, minimizes the development complexity, and thus EAF is expected to reduce the cost of RFID application development. EAF guarantees constructing secure RFID applications due to PKI-based security mechanism.

  • PDF

Pig production in Africa: current status, challenges, prospects and opportunities

  • Akinyele O. K. Adesehinwa;Bamidele A. Boladuro;Adetola S. Dunmade;Ayodeji B. Idowu;John C. Moreki;Ann M. Wachira
    • Animal Bioscience
    • /
    • v.37 no.4_spc
    • /
    • pp.730-741
    • /
    • 2024
  • Pig production is one of the viable enterprises of the livestock sub-sector of agriculture. It contributes significantly to the economy and animal protein supply to enhance food security in Africa and globally. This article explored the present status of pig production in Africa, the challenges, prospects and potentials. The pig population of Africa represents 4.6% of the global pig population. They are widely distributed across Africa except in Northern Africa where pig production is not popular due to religio-cultural reasons. They are mostly reared in rural parts of Africa by smallholder farmers, informing why majority of the pig population in most parts of Africa are indigenous breeds and their crosses. Pig plays important roles in the sustenance of livelihood in the rural communities and have cultural and social significance. The pig production system in Africa is predominantly traditional, but rapidly growing and transforming into the modern system. The annual pork production in Africa has grown from less than a million tonnes in year 2000 to over 2 million tonnes in 2021. Incidence of disease outbreak, especially African swine fever is one of the main constraints affecting pig production in Africa. Others are lack of skills and technical know-how, high ambient temperature, limited access to high-quality breeds, high cost of feed ingredients and veterinary inputs, unfriendly government policies, religious and cultural bias, inadequate processing facilities as well as under-developed value-chain. The projected human population of 2.5 billion in Africa by 2050, increasing urbanization and decreasing farming population are pointers to the need for increased food production. The production systems of pigs in Africa requires developmental research, improvements in housing, feed production and manufacturing, animal health, processing, capacity building and pig friendly policies for improved productivity and facilitation of export.

An Implementation of a RFID Reader Firmware for EPC Class 1 Generation 2 Specification (EPC Class 1 Generation 2 규격에 적합한 리더 펌웨어 개발)

  • Choi, Il-Ho;Bae, Sung-Woo;Jung, Myung-Sub;Jang, Byung-Jun;Kim, Jun-O;Park, Jun-Seok;Seong, Yeong-Rak;Oh, Ha-Ryoung
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.1063-1066
    • /
    • 2005
  • In this paper, we developed the UHF RFID system for EPC Class1 Generation 2 specification. The RFID is a technique of identifying an object using radio frequency transmission. UHF band RFID system communication between Reader and Tag for provide the power to tag when be active when reader’s command finished the transfer. RFID technology can be applied to the supply chain, security, logistics industry and etc. Especially, UHF RFID is worth noticing because of its relatively long identification rage and commercial UHF RFID systems are under development.

  • PDF

An Implementation of a RFID Reader Firmware for ISO/IEC 18000-6 Type B Specification (ISO/IEC18000-6 Type B 규격에 적합한 리더 펌웨어 개발)

  • Yang, Jing-Gil;Bae, Sung-Woo;Jung, Myung-Sub;Jang, Byung-Jun;Kim, Jun-O;Park, Jun-Seok;Seong, Yeong-Rak;Oh, Ha-Ryoung
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.1039-1042
    • /
    • 2005
  • Recently, a considerable number of studies have been made on the $RFID^{[1-6]}$ systems. RFID is a technique of identifying an object using radio frequency transmission. The technology can be used to identify, track, sort or detect a wide variety of objects. The RFID system is composed of two main elements: a reader and a tag. Tags can either be active (powered by battery) or passive (powered by the reader field). The passive tags communicate back to the reader with a technique called 'backscatter'. RFID technology can be applied to the supply chain, security, logistics industry and etc. Especially, UHF RFID is worth noticing because of its relatively long identification range and commercial UHF RFID systems are under development. In this paper, we designed and implemented a UHF RFID reader firmware for ISO/IEC 18000-6 Type B specification.

  • PDF