• Title/Summary/Keyword: Unmanned Security

Search Result 175, Processing Time 0.028 seconds

Accuracy Evaluation and Terrain Model Automation of Reservoir Using Unmanned Aerial Vehicle System (무인항공시스템을 활용한 저수지 지형모델 생성 및 정확도 평가)

  • Kim, Jungmeyon;Park, Sungsik;Kim, Jaehwi;Ahn, Seungwoo;Park, Sungyong;Kim, Yongseong
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.59 no.2
    • /
    • pp.57-67
    • /
    • 2017
  • This study examines methods for creating terrain models of reservoirs and techniques for verifying the accuracy. Such methods and techniques use unmanned aerial vehicles which are capable of capturing high-resolution images repetitively, are highly economic, and capable of surveying wide areas. In addition, this study suggests methods of acquiring data for reservoir safety management, the methods which also employ the unmanned aerial vehicles. Therefore, this study helps solving problems that can arise when National Disaster Management System rebuilds a reservoir management database, such as a shortage of local government manpower. This study also contributes to providing element technology necessary for advancing the database.

The Development of Air Escort Tactics for High-Value Airborne Assets Using Manned-Unmanned Teaming and the Study on Effective Force Disposition Using M&S (유무인 협업을 활용한 고가치 공중 자산의 호위 전술 개발과 M&S를 활용한 효과적인 전력배치 방안 연구)

  • Park, Myunghwan;Yoo, Seunghoon;Oh, Jihyon;Seol, Hyeonju
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.25 no.4
    • /
    • pp.401-411
    • /
    • 2022
  • As the role of high-value air assets(e.g., AWACS, JSTARS, Rivet Joint, E-2) becomes more critical in modern warfare, the air escort for these assets blocking attacks from any potential enemy fighter also becomes vital. Without the escort, the operations of the assets become restricted. However, such an escort is not always possible due to the limited flight time of the escort fighters. In this paper, we introduce an escort tactics for high-value air assets performed by the manned-unmanned teaming composed of a transport aircraft and UAVs(unmanned aerial vehicles). In this tactics, the transport aircraft plays the role of an aircraft carrier, which carries, launches, and retrieves the UAVs. The missions of UAVs in this tactics are to detect and engage enemy fighters. We also introduce the simulation result of this tactics to identify the UAVs' required capabilities and optimal maneuvering.

Implementation of the Intelligent MUX System for Green USN (녹색 유비쿼터스 지능형 다중화장비의 구현)

  • Kang, Jeong-Jin;Chang, Hark-Sin;Lee, Young-Chul
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.1
    • /
    • pp.1-5
    • /
    • 2010
  • Recently emphasizing the importance of security such as national major institutions' facilities or major industrial facilities for the maintenance of security/crime prevention due to specialization of the Green Information Technology(G-IT) and Green Ubiquitous Technology(G-UT) industry fields, The Security System Building linked high technology within the government-related organization, enterprise and army the military is urgently required. This paper is about the green USN intelligent an unmanned guard MUX system that receive the signals, from alarm device within surveillance area, with various ways of communication techniques and then transmit to local control center and remote control server trough TCP/IP network. This study enables the mutual senergy effect by realizing a total solution of an unmanned guard system and also significantly contributes to the global/domestic market expansion. That can be applied to the crime prevention/security fields in the Green Ubiquitous Environment Implemented Business(survalance-Home, Gu-City, Gu-Health, etc.), and will contribute to expand companies with international competitiveness that can provide the Green Ubiquitous Vision(Gu-Vision).

A New Design of Privacy Preserving Authentication Protocol in a Mobile Sink UAV Setting (Mobile Sink UAV 환경에서 프라이버시를 보장하는 새로운 인증 프로토콜 설계)

  • Oh, Sang Yun;Jeong, Jae Yeol;Jeong, Ik Rae;Byun, Jin Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1247-1260
    • /
    • 2021
  • For more efficient energy management of nodes in wireless sensor networks, research has been conducted on mobile sink nodes that deliver data from sensor nodes to server recently. UAV (Unmanned Aerial vehicle) is used as a representative mobile sink node. Also, most studies on UAV propose algorithms for calculating optimal paths and have produced rapid advances in the IoD (Internet of Drones) environment. At the same time, some papers proposed mutual authentication and secure key exchange considering nature of the IoD, which requires efficient creation of multiple nodes and session keys in security perspective. However, most papers that proposed secure communication in mobile sink nodes did not protect end-to-end data privacy. Therefore, in this paper, we propose integrated security model that authentication between mobile sink nodes and sensor nodes to securely relay sensor data to base stations. Also, we show informal security analysis that our scheme is secure from various known attacks. Finally, we compare communication overhead with other key exchange schemes previously proposed.

Security Measures in Response to Future Warfare and Changes in the Network Environment (미래전과 네트워크 환경 변화에 따른 보안대책)

  • Donghan Oh;Kwangho Lee
    • Convergence Security Journal
    • /
    • v.21 no.4
    • /
    • pp.49-57
    • /
    • 2021
  • The 4th industrial revolution will develop the network environment of future warfare through the increase of IoT devices, individual warrior platforms, the operation of manned and unmanned weapon systems, intelligent command post. They are leading to the weapon system combined with hundreds or thousands of sensors will be used for surveillance and reconnaissance, electronic warfare, and deception operations on the battlefield. This change to the environment brings superiority in operational performance on the battlefield, but if the weapon system is exposed to the outside, it will lead to fatal results. In this paper, we analyze the network environment that is changing in the future warfare environment, focusing on the currently used network. In addition, it considers information security issues that must correspond to the evolving network technology and suggests various security measures to suggest the direction our military should take in the future.

A Study about Practical Model of Meteorological Information for Convergence Security Service Science (융합보안 서비스 사이언스를 위한 기상정보 활용모델 연구)

  • Choi, Kyong-Ho;Lee, DongHwi;Kim, Minsu;Kim, JongMin;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.13 no.3
    • /
    • pp.79-84
    • /
    • 2013
  • In this study the improved service innovation model to solve the problems that appear from a vantage point of the providing security services process through the application and appeal process of convergence security technologies proposed. The model was in view of service science to resolves the limitations that facilities management and unmanned security of physical security field through the application of meteorological information on convergence security technologies. The contribution of this research: improved risk management based on convergence security technologies through service innovation management, evaluated the quantitative value of risk management activity using service effects, and development of physical security service providing methodology using meteorological information.

Proposal of Kiosk Payment Security System using Public Blockchain (솔라나 블록체인을 이용한 키오스크 결제 데이터 보안 시스템 제안)

  • Kim, Seong-Heon;Kang, hyeok;Lee, Keun-ho
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.5
    • /
    • pp.55-61
    • /
    • 2022
  • Today's payment systems are becoming unmanned and changing to a way of paying with kiosks. This has the advantage of convenient payment because consumers can select a menu and specify the number of products to be purchased with just a touch of the screen. However, from the point of view of system security, the actual kiosk system has various vulnerabilities. This can hijack the administrator account, gain system privileges, and perform malicious actions. In addition, it is exposed to a number of security threats, such as the possibility of wasting unnecessary resources by abnormally increasing the number of payments, and causing the device to fail to operate normally. Therefore, in this paper, if any node of a participant in the solana blockchain approves an incorrect fork, the stake of the voting nodes is deleted. Also, since all participants can see the transaction history due to the nature of the block chain, I intend to write a thesis on a system that improves the vulnerability of kiosk payments by separating the access rights through the private blockchain.

Attack Datasets for ROS Intrusion Detection Systems (ROS 침입 탐지 시스템을 위한 공격 데이터셋 구축)

  • Hyunghoon Kim;Seungmin Lee;Jaewoong Heo;Hyo Jin Jo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.681-691
    • /
    • 2024
  • In recent decades, research and development in the field of industrial robotics, such as an unmanned ground vehicle (UGV) and an unmanned aerial vehicle (UAV), has been significant progress. In these advancements, it is important to use middleware, which facilitates communication and data management between different applications, and various industrial communication middleware protocols have been released. The robot operating system (ROS) is the most widely adopted as the main platform for robot system development among the communication middleware protocols. However, the ROS is known to be vulnerable to various cyber attacks, such as eavesdropping on communications and injecting malicious messages, because it was initially designed without security considerations. In response, numerous studies have proposed countermeasures to ROS vulnerabilities. In particular, some work has been proposed on generating ROS datasets for intrusion detection systems (IDS), but there is a lack of research in this area. In this paper, in order to contribute to improving the performance of ROS IDSs, we propose a new type of attack scenario that can occur in the ROS and build ROS attack datasets collected from a real robot system and make it available as an open dataset.

Advanced in Algorithms, Security, and Systems for ICT Convergence

  • Park, Ji Su;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.16 no.3
    • /
    • pp.523-529
    • /
    • 2020
  • Future information and communication technology (ICT) is constantly evolving and converging in diverse fields depending on the wireless environment, and the trend is being further developed to increase the speed of wireless networks. Future ICT is needed in many areas such as active senior & solo-economy, hyper-connected society, intelligent machine, industrial boundary collapse, secured self, and the sharing economy. However, a lot of research is needed to solve problems such as machine learning, security, prediction, unmanned technology, etc. Therefore, this paper describes some technologies developed in the areas of blockchain, fault diagnosis, security, agricultural ICT, cloud, life safety and care, and climate monitoring in order to provide insights into the future paradigm.

Legal Institutional Considerations of UAV-based Convergence Services : Privacy Protection (UAV기반 융합서비스에 대한 법·제도적 고찰 - Privacy 보호를 중심으로 -)

  • Noh, Jong-ho;Kwon, Hun-yeong
    • Convergence Security Journal
    • /
    • v.17 no.3
    • /
    • pp.31-40
    • /
    • 2017
  • UAV (Unmanned Aerial Vehicle) is increasingly used in diverse fields such as disaster, distributi on, and logistics, but it is pointed out that the inadequacy of related laws and invasion of privacy is an obstacle to industrial growth. The regulatory framework for UAV convergence services is pr oposed based on the regulatory framework. From the technical point of view, regulation on archite ctural design, from the market point of view, concurrent operation of services in a limited area, a l egal evaluation based on post-evaluation rather than a pre-regulation under the legislation of visua l information protection law and a social consensus will contribute to the early settlement of UAV -based convergence services.