• Title/Summary/Keyword: internet control

Search Result 3,597, Processing Time 0.038 seconds

Study on the Security R&R of OT-IT for Control System Network Boundaries (제어 네트워크 경계에 대한 OT-IT 책임 역할 연구)

  • WOO, Young Han;Kwon, Hun Yeong
    • Journal of Information Technology Services
    • /
    • v.19 no.5
    • /
    • pp.33-47
    • /
    • 2020
  • In recent years, due to the demand for operating efficiency and cost reduction of industrial facilities, remote access via the Internet is expanding. the control network accelerates from network separation to network connection due to the development of IIoT (Industrial Internet of Things) technology. Transition of control network is a new opportunity, but concerns about cybersecurity are also growing. Therefore, manufacturers must reflect security compliance and standards in consideration of the Internet connection environment, and enterprises must newly recognize the connection area of the control network as a security management target. In this study, the core target of the control system security threat is defined as the network boundary, and issues regarding the security architecture configuration for the boundary and the role & responsibility of the working organization are covered. Enterprises do not integrate the design organization with the operation organization after go-live, and are not consistently reflecting security considerations from design to operation. At this point, the expansion of the control network is a big transition that calls for the establishment of a responsible organization and reinforcement of the role of the network boundary area where there is a concern about lack of management. Thus, through the organization of the facility network and the analysis of the roles between each organization, an static perspective and difference in perception were derived. In addition, standards and guidelines required for reinforcing network boundary security were studied to address essential operational standards that required the Internet connection of the control network. This study will help establish a network boundary management system that should be considered at the enterprise level in the future.

The Design and Implementation of Intelligent Internet Outlet for Real-Time Scheduling Control (실시간 스케줄링 제어를 위한 지능형 인터넷 전원 콘센트의 설계 및 구현)

  • Baek, Jeong-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.10
    • /
    • pp.191-200
    • /
    • 2010
  • The "intelligent internet power outlets" realized in this study use Internet environment to connect electrical and electronic products to the Net as well as to enable remote monitoring and control. They also have temperature and light sensors, and even offer scheduling options by means of a universal calendar run by an inner real-time timer. Furthermore, they control 4 outlets handling 4 external input conditions and infrared remote control with easy-to-use functions for home automation control. The user interface is equipped with an embedded Web server and UDP protocol handler, and which also allows special control programs be used with the Web browser. Thus, installing this real-time power control function with optimal scheduling and various communication functions will provide you with energy-efficient power outlets outfitted with the increasingly popular "standby power" electric power efficiency.

Design and Implementation of The Capability Token based Access Control System in the Internet of Things (IoT에서 Capability 토큰 기반 접근제어 시스템 설계 및 구현)

  • Lee, Bum-Ki;Kim, Mi-Sun;Seo, Jae-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.439-448
    • /
    • 2015
  • IoT (Internet of Things) propels current networked communities into a advanced hyper-connected society/world where uniquely identifiable embedded computing devices are associated with the existing internet infrastructure. Therefore, the IoT services go beyond mere M2M (Machine-to-Machine communications) and should be able to empower users with more flexible communication capabilities over protocols, domains, and applications. In addition, The access control in IoT need a differentiated methods from the traditional access control to increase a security and dependability. In this paper, we describe implementation and design of the capability token based system for secure access control in IoT environments. In the proposed system, Authorities are symbolized into concepts of the capability tokens, and the access control systems manage the tokens, creation, (re)delegation and revocation. The proposed system is expected to decrease the process time of access control by using capability tokens.

Weight-based Congestion Control Algorithms for H.264/SVC Streaming (H.264/SVC 스트리밍을 위한 가중치 기반 혼잡 제어 알고리즘)

  • Kim, Nam-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.9-17
    • /
    • 2012
  • Because best-effort Internet provides no guarantees on packet delay and loss, transient network congestion may cause negative effects on H.264/SVC streaming. Thus, the congestion control is required to adjust bit rate by dropping enhancement layers of H.264/SVC streams. This paper differentiates the video streams according to different levels of importance and proposes weighted-based congestion control algorithms to use the rate-distortion characteristics of streams. To maximize the weighted sum of PSNR values of all streams on a bandwidth-constrained node, this paper proposes WNS(Weighted Near-Sighted) and WFS(Weighted Far-Sighted) algorithms to control the number of enhancement layers of streams. Through simulation, this paper shows that weighted-based congestion control algorithm can efficiently adapt streams to network conditions and analyzes the characteristics of congestion control algorithms.

Development of Remote Control Robot-ship for Measuring Water Depth (원격수심측정을 위한 로봇시스템의 개발)

  • Choi, Byoung-Gil;Cho, Kwang-Hee
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.23 no.4
    • /
    • pp.409-417
    • /
    • 2005
  • This study is aimed to develop a remote control robot-ship system using wireless communication and DGPS, which it is an automatic system for measuring exact depth and bed topography of reservoir or dam. Robot-ship is equipped with GPS and echosounder, and it is controled remotely using wireless internet. Robot-ship is consist of frame, each module and control board. Control segment is consisted of a processing system for positioning data and remote control system. A wireless communication system is developed which can communicate interactively between robot-ship and control segment, and it is developed in two channel system of RF modem and wireless internet. The robot-ship could be used acquire economically and exactly the water depth and bed topography of reservoirs, dams, rivers and so on.

A Study on the Internet based Traffic Intersection Control (인터넷 응용 4지교차로제어에 관한 연구)

  • Jin, Hyun-Soo
    • Proceedings of the KAIS Fall Conference
    • /
    • 2008.05a
    • /
    • pp.245-247
    • /
    • 2008
  • Traffic intersection conrol is implemented by the data which is acquired to vechile Loop detector. Traffic intersection control equation is Webster equation, which use passing and delayed vechile number. But webster equation is applied to the spot traffic intersection, it is not used to related traffic intersection network system. There is not the approprate remote traffic intersection control, even if there is, it is high cost local network system. Therefore low cost and expert traffic intersection control is realized by internet referencing next and distant intersection traffic information.

  • PDF

A Study on the Development of Artificial Intelligence Crop Environment Control Framework

  • Guangzhi Zhao
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.144-156
    • /
    • 2023
  • Smart agriculture is a rapidly growing field that seeks to optimize crop yields and reduce risk through the use of advanced technology. A key challenge in this field is the need to create a comprehensive smart farm system that can effectively monitor and control the growth environment of crops, particularly when cultivating new varieties. This is where fuzzy theory comes in, enabling the collection and analysis of external environmental factors to generate a rule-based system that considers the specific needs of each crop variety. By doing so, the system can easily set the optimal growth environment, reducing trial and error and the user's risk burden. This is in contrast to existing systems where parameters need to be changed for each breed and various factors considered. Additionally, the type of house used affects the environmental control factors for crops, making it necessary to adapt the system accordingly. While developing such a framework requires a significant investment of labour and time, the benefits are numerous and can lead to increased productivity and profitability in the field of smart agriculture. We developed an AI platform for optimal control of facility houses by integrating data from mushroom crops and environmental factors, and analysing the correlation between optimal control conditions and yield. Our experiments demonstrated significant performance improvement compared to the existing system.

An Integrated Test of Interaction Effect between Causes and Internet Ethics of Smart Phone Cyber Bullying (스마트폰 이용에서 사이버폭력의 그 원인들 및 인터넷윤리의 통제효과에 대한 통합적 검증 연구)

  • Jang, Ha-Young;Lee, Seong-Sik
    • Informatization Policy
    • /
    • v.26 no.2
    • /
    • pp.46-61
    • /
    • 2019
  • This study constructs an integrated model for university students' smart phone cyber bullying and tests interaction effects between causal and control factors. Causal factors include low self-control, differential association with cyber bullying peers, and victimization experiences; and control factors include internet ethics, perceived certainty of formal punishment, and bond to parents. This study focuses on examining how internet ethics buffers the effect of causal factors in cyber bullying. Results show that both differential association with cyber bullying peers and victimization experiences have significant effects on cyber bullying. And among the control factors, internet ethics only has a negative direct effect on cyber bullying. In addition, it is found that there are significant interaction effects between two causal factors - differential association with cyber bullying peers and victimization experiences - and internet ethics. It is also shown that there is a significant interaction effect between victimization experience and bond to parents, but a perceived formal punishment has no significant control effect. It is revealed that internet ethics is a main control factor in buffering the effects of causal factors in cyber bullying.

Design Features and Control Strategies of a Generic Internet Based Telerobotic System

  • Munasinghe, Sudth R.;Lee, Ju-Jang;Ishida, Yuji;Egashira, Naruto;Namakura, Masatoshi
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1460-1464
    • /
    • 2003
  • This paper describes the design and implementation techniques of a generic Internet based telerobotic system. The purpose is to make precious technical information and hands-on experience of the authors widely available for the research community. The paper is based on the telerobotics system that the authors recently implemented between KAIST and Saga University, Japan. In its current functionality, two control modes can be exercised; high-level supervisory control, and low-level supervisory control.

  • PDF

Sensors Network and Security and Multimedia Enhancement

  • Woo, Seon-mi;Lee, Malrey
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.1
    • /
    • pp.64-68
    • /
    • 2016
  • These fields are integrated to visualize and finalize the proposed development, in simulation environment. SCADA (supervisory control and data acquisition) systems and distributed control systems (DCSs) are widely deployed in all over the world, which are designed to control the industrial infrastructures, in real ways. To supervise and control the various parts of designed systems; trends to require a deep knowledge to understand the overall functional needs of industries, which could be a big challenge. Industrial field devices (or network sensors) are usually distributed in many locations and are controlled from centralized site (or main control center); the communication provides various signs of security issues. To handle these issues, the research contribution will twofold: a method using cryptography is deployed in critical systems for security purposes and overall transmission is controlled from main controller site. At controller site, multimedia components are employed to control the overall transmission graphically, such as system communication, bytes flows, security embedded parameters and others, by the means of multimedia technology.