• 제목/요약/키워드: network security equipment

검색결과 207건 처리시간 0.026초

VERIFICATION OF ELECTROMAGNETIC EFFECTS FROM WIRELESS DEVICES IN OPERATING NUCLEAR POWER PLANTS

  • YE, SONG-HAE;KIM, YOUNG-SIK;LYOU, HO-SUN;KIM, MIN-SUK;LYOU, JOON
    • Nuclear Engineering and Technology
    • /
    • 제47권6호
    • /
    • pp.729-737
    • /
    • 2015
  • Wireless communication technologies, especially smartphones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs) because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smartphones (Wi-Fi standard), Internet Protocol (IP) phones, personal digital assistant (PDA) for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI) from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs.

초음파를 이용한 모바일 비파괴 검사 시스템 (Mobile NDT Inspection System Using Ultrasonic)

  • 권성근;이석환
    • 한국멀티미디어학회논문지
    • /
    • 제19권2호
    • /
    • pp.105-111
    • /
    • 2016
  • In order to inspect the quality of spot welding, inefficient destructive test and NDT (non destructive testing) utilizing expensive foreign ultrasonic inspection are being conducted in the automobile production lines, but NDT will be difficult to be used in the domestic automobile production due to complexity of the waveform analysis and lack of mobility. In this paper, NDT system inspecting the quality of spot welding based on mobile network is proposed to complement drawbacks of the conventional inefficient destructive testing and NDT inspecting the quality of spot welding. Regardless of daily condition of NDT tester, the proposed NDT system can determine the quality of spot welding automatically and transmit the information of NDT quality to smart devices of field workers in real-time so that convenience of NDT and productivity of automobile production will be improved. Several specimens with a variety of welding quality was produced to evaluate the performance of the proposed mobile ultrasonic NDT system and the conventional foreign equipment, through this experiments, the proposed mobile ultrasonic NDT system indicate the superior properties compared to the conventional equipment in terms of convenience, productivity, and economic.

Comprehensive Survey on Internet of Things, Architecture, Security Aspects, Applications, Related Technologies, Economic Perspective, and Future Directions

  • Gafurov, Khusanbek;Chung, Tai-Myoung
    • Journal of Information Processing Systems
    • /
    • 제15권4호
    • /
    • pp.797-819
    • /
    • 2019
  • Internet of Things (IoT) is the paradigm of network of Internet-connected things as objects that constantly sense the physical world and share the data for further processing. At the core of IoT lies the early technology of radio frequency identification (RFID), which provides accurate location tracking of real-world objects. With its small size and convenience, RFID tags can be attached to everyday items such as books, clothes, furniture and the like as well as to animals, plants, and even humans. This phenomenon is the beginning of new applications and services for the industry and consumer market. IoT is regarded as a fourth industrial revolution because of its massive coverage of services around the world from smart homes to artificial intelligence-enabled smart driving cars, Internet-enabled medical equipment, etc. It is estimated that there will be several dozens of billions of IoT devices ready and operating until 2020 around the world. Despite the growing statistics, however, IoT has security vulnerabilities that must be addressed appropriately to avoid causing damage in the future. As such, we mention some fields of study as a future topic at the end of the survey. Consequently, in this comprehensive survey of IoT, we will cover the architecture of IoT with various layered models, security characteristics, potential applications, and related supporting technologies of IoT such as 5G, MEC, cloud, WSN, etc., including the economic perspective of IoT and its future directions.

SIP(Session Initiation Protocol) 기반의 VoIP 보안 대책 연구 (A Study on the VoIP Security Countermeasure of SIP-based)

  • 장원태;곽진석
    • 한국항행학회논문지
    • /
    • 제17권4호
    • /
    • pp.421-428
    • /
    • 2013
  • 인터넷 응용 기술 중 TCP/IP 기반으로 Voice 통화를 가능하게 하는 VoIP(Voice over Internet Protocol)기술은 기존의 아날로그 전화보다 통신비용이 저렴하고 인터넷이 이용 가능한 곳 어디서든지 전화 통화가 가능한 장점으로 VoIP 전화 통화 서비스가 활성화되고 있는 추세이다. 현재 VoIP 기술에 구현되고 있는 Protocol에는 SIP(Session Initiation Protocol), H.323, MGCP, Megaco/H.248 등이 있으며, 이러한 프로토콜 중 SIP로 동일한 LAN에서 Asterisk IP-PBX를 이용한 SIP Server구성으로 VoIP 서비스 시스템 구현이 가능하다. 또한 VoIP 서비스를 이용하기 위한 단말로는 SmartPhone의 Application, PC의 SoftPhone 등을 오픈 마켓 혹은 인터넷에서 다운하여 사용 할 수 있다. 그러나 이러한 SIP Server, 프로그램들만 이용할 경우 VoIP에 대한 공격을 피할 수는 없다. 이에 본 논문에서는 Asterisk를 이용하여 SIP server를 구현하고, VoIP 공격 방법 중 대표적인 도청 Test를 실시하여 도청 가능 여부에 대해 기술한다. 이에 도청 공격에 대한 보안 방법으로 TLS를 적용하여 도청 가능 여부를 판별하고, 보안 대책에 대해 연구하여 기술한다.

효율적인 국방 영상정보 전송을 위한 확장비디오코딩(SVC) 및 균형선택 알고리즘 기반의 피투피(P2P) 비디오 스트리밍 기법 연구 (A Scalable Video Coding(SVC) and Balanced Selection Algorithm based P2P Streaming Technique for Efficient Military Video Information Transmission)

  • 신규용;김경민;이종관
    • 융합보안논문지
    • /
    • 제19권4호
    • /
    • pp.87-96
    • /
    • 2019
  • 최근 영상 장비와 기술이 발전함에 따라 우리 군에서도 작전지역에 대한 정보를 획득하고, 효율적인 지휘통제에 활용하기 위해 수많은 영상정보가 생산되어 활용되고 있다. 이때 현재 군내에서 활용하고 있는 영상 재생장비는 저성능의 전술용 다기능 단말기(TMFT)로부터 고성능의 영상서버에 이르기까지 매우 다양하고, 영상이 전송되는 네트워크 또한 저속의 전술정보통신체계(TICN)로부터 초고속의 국방광대역통합망(M-BcN)에 이르기까지 다양하다. 따라서 이기종(異機種) 통신장비 및 네트워크 환경에서 국방 영상정보를 효율적으로 전송할 수 있는 스트리밍 기법이 필요하다. 이 문제를 해결하기 위해 본 논문에서는 확장비디오코딩(SVC) 및 균형선택 알고리즘 기반의 피투피(P2P) 스트리밍 기법을 제안한다. 비토렌트 기반의 시뮬레이터를 활용한 성능분석결과 우리가 제안하는 균형선택 알고리즘 기반의 스트리밍 기법은 순차선택이나 희소선택 알고리즘에 비해 우수한 성능을 보였다.

BlueTooth Snarfing 공격 및 보안측면 (BlueTooth Snarfing attacks and security aspects)

  • 박현욱;김현수;김기환;이훈재
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2015년도 춘계학술대회
    • /
    • pp.811-814
    • /
    • 2015
  • 현대사회는 많은 디지털 제품을 이용하여 일상생활에 편리함을 주고 있는 가운데, 그 중 하나인 블루투스는 사용자들이 많이 이용하게 된다. 블루투스(IEEE 802.15.1)란 기기 간에 근거리에서 저 전력으로 무선 통신을 사용하기 위한 표준연결 기술이다. 현재는 블루투스 이어폰, 블루투스 스피커, 웨어러블이 탑재된 기기에서도 많이 사용되기 때문에 이를 악용하여 이득을 취하는 사람이 생기게 되었고 그로 인하여 사용자의 피해가 커지고 있는 상황이다. 그래서 사용자의 피해를 줄이고 더 나아가 완전히 막을 수 있는 보안기법에 대해서 연구 하게 되었다. 그 많은 블루투스 해킹 기법 가운데, 블루투스 장치의 펌웨어 취약점을 이용하여 장치 내에 저장된 데이터에 대한 접근을 허용하여 공격하는 BlueTooth Snarfing을 분석 하고자한다.

  • PDF

A Watermarking Technique for User Authentication Based on a Combination of Face Image and Device Identity in a Mobile Ecosystem

  • Al-Jarba, Fatimah;Al-Khathami, Mohammed
    • International Journal of Computer Science & Network Security
    • /
    • 제21권9호
    • /
    • pp.303-316
    • /
    • 2021
  • Digital content protection has recently become an important requirement in biometrics-based authentication systems due to the challenges involved in designing a feasible and effective user authentication method. Biometric approaches are more effective than traditional methods, and simultaneously, they cannot be considered entirely reliable. This study develops a reliable and trustworthy method for verifying that the owner of the biometric traits is the actual user and not an impostor. Watermarking-based approaches are developed using a combination of a color face image of the user and a mobile equipment identifier (MEID). Employing watermark techniques that cannot be easily removed or destroyed, a blind image watermarking scheme based on fast discrete curvelet transform (FDCuT) and discrete cosine transform (DCT) is proposed. FDCuT is applied to the color face image to obtain various frequency coefficients of the image curvelet decomposition, and for high frequency curvelet coefficients DCT is applied to obtain various frequency coefficients. Furthermore, mid-band frequency coefficients are modified using two uncorrelated noise sequences with the MEID watermark bits to obtain a watermarked image. An analysis is carried out to verify the performance of the proposed schema using conventional performance metrics. Compared with an existing approach, the proposed approach is better able to protect multimedia data from unauthorized access and will effectively prevent anyone other than the actual user from using the identity or images.

Designing a Vehicles for Open-Pit Mining with Optimized Scheduling Based on 5G and IoT

  • Alaboudi, Abdulellah A.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권3호
    • /
    • pp.145-152
    • /
    • 2021
  • In the Recent times, various technological enhancements in the field of artificial intelligence and big data has been noticed. This advancement coupled with the evolution of the 5G communication and Internet of Things technologies, has helped in the development in the domain of smart mine construction. The development of unmanned vehicles with enhanced and smart scheduling system for open-pit mine transportation is one such much needed application. Traditional open-pit mining systems, which often cause vehicle delays and congestion, are controlled by human authority. The number of sensors has been used to operate unmanned cars in an open-pit mine. The sensors haves been used to prove the real-time data in large quantity. Using this data, we analyses and create an improved transportation scheduling mechanism so as to optimize the paths for the vehicles. Considering the huge amount the data received and aggregated through various sensors or sources like, the GPS data of the unmanned vehicle, the equipment information, an intelligent, and multi-target, open-pit mine unmanned vehicle schedules model was developed. It is also matched with real open-pit mine product to reduce transport costs, overall unmanned vehicle wait times and fluctuation in ore quality. To resolve the issue of scheduling the transportation, we prefer to use algorithms based on artificial intelligence. To improve the convergence, distribution, and diversity of the classic, rapidly non-dominated genetic trial algorithm, to solve limited high-dimensional multi-objective problems, we propose a decomposition-based restricted genetic algorithm for dominance (DBCDP-NSGA-II).

A Portable IoT-cloud ECG Monitoring System for Healthcare

  • Qtaish, Amjad;Al-Shrouf, Anwar
    • International Journal of Computer Science & Network Security
    • /
    • 제22권1호
    • /
    • pp.269-275
    • /
    • 2022
  • Public healthcare has recently become an issue of great importance due to the exponential growth in the human population, the increase in medical expenses, and the COVID-19 pandemic. Speed is one of the crucial factors in saving life, particularly in case of heart attack. Therefore, a healthcare device is needed to continuously monitor and follow up heart health conditions remotely without the need for the patient to attend a medical center. Therefore, this paper proposes a portable electrocardiogram (ECG) monitoring system to improve healthcare for heart attack patients in both home and ambulance settings. The proposed system receives the ECG signals of the patient and sends the ECG values to a MySQL database on the IoT-cloud via Wi-Fi. The signals are displayed as an ECG data chart on a webpage that can be accessed by the patient's doctor based on the HTTP protocol that is employed in the IoT-cloud. The proposed system detects the ECG data of the patient to calculate the total number of heartbeats, number of normal heartbeats, and the number of abnormal heartbeats, which can help the doctor to evaluate the health status of the patient and decide on a suitable medical intervention. This system therefore has the potential to save time and life, but also cost. This paper highlights the five main advantages of the proposed ECG monitoring system and makes some recommendations to develop the system further.

Adopting the Electronic Services in the Light of Coved 19 from Employees' Perceptive in Karak University College

  • Allahawiah, Sattam;Altarawneh, Haroon;nawaiseh, Kafa al
    • International Journal of Computer Science & Network Security
    • /
    • 제22권10호
    • /
    • pp.389-399
    • /
    • 2022
  • This study aims to investigate and analyze the impact of the COVID-19 pandemic on the adopt electronic services in education sector in Jordan, where the COVID-19 pandemic has left huge threats in terms of health and led to a significant decrease in economic output and a rise in unemployment. This study also aims to know the steps taken by the Jordanian governments and higher education ministry and universities to overcome this crisis and mitigate the economic and financial impacts that would enhance the resilience of the education sector. To achieve the goal of the study, both methods of deductive and inductive analysis were used, which helped us to systematically consider the economic and other consequences of the COVID-19 pandemic, such as statistical analyses and other tools that helped us in this study. The results of this study, showed that the COVID-19 pandemic led to a significant increase in adopt electronic services in education sector in Jordan, and decline in economic growth, a significant rise in unemployment, an increase in market instability, and a decrease in the financial position of companies. The recommendations concluded that Jordan should begin to change its policies according to the new data, and take Measures to advance the education sector by relay on electronic services and directing investment in education sector through saving policies and infrastructure equipment in parallel with the population boom in Jordan.