• Title/Summary/Keyword: vehicle security

Search Result 401, Processing Time 0.028 seconds

Manned-Unmanned Teaming Air-to-Air Combat Tactic Development Using Longshot Unmanned Aerial Vehicle (롱샷 무인기를 활용한 유무인 협업 공대공 전술 개발)

  • Yoo, Seunghoon;Park, Myunghwan;Hwang, Seongin;Seol, Hyeonju
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.44 no.3
    • /
    • pp.64-72
    • /
    • 2021
  • Manned-unmanned teaming can be a very promising air-to-air combat tactic since it can maximize the advantage of combining human insight with the robustness of the machine. The rapid advances in artificial intelligence and autonomous control technology will speed up the development of manned-unmanned teaming air-to-air combat system. In this paper, we introduce a manned-unmanned teaming air-to-air combat tactic which is composed of a manned aircraft and an UAV. In this tactic, a manned aircraft equipped with radar is functioning both as a sensor to detect the hostile aircraft and as a controller to direct the UAV to engage the hostile aircraft. The UAV equipped with missiles is functioning as an actor to engage the hostile aircraft. We also developed a combat scenario of executing this tactic where the manned-unmanned teaming is engaging a hostile aircraft. The hostile aircraft is equipped with both missiles and radar. To demonstrate the efficiency of the tactic, we run the simulation of the scenario of the tactic. Using the simulation, we found the optimal formation and maneuver for the manned-unmanned teaming where the manned-unmanned teaming can survive while the hostile aircraft is shot-downed. The result of this study can provide an insight to how manned aircraft can collaborate with UAV to carry out air-to-air combat missions.

Analysis of Forwarding Schemes for Push-based Information Service in Connected Vehicles over NDN (커넥티드 차량 엔디엔 네트워크 안에 푸쉬 기반 정보 서비스를 위한 전달 기법 분석)

  • Lim, Huhnkuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.2
    • /
    • pp.280-285
    • /
    • 2021
  • When VNDN technology is used as a communication technology for infotainment application services of connected vehicles, it is possible to realize data-centric networking technology in which data is the subject of communication.Vehicle security attacks and hacks, performance degradation during long-distance data transmission, and frequent data loss It is possible to innovate the limitations of the current host-oriented Internet-based infotainment application service technology of connected vehicles. The data packet forwarding issue to deliver critical information data that is very sensitive to delay in the VNDN on a push-based basis to RSU (Road Side Unit), etc. is one of the issues to be solved for realizing VNDN-based application services. We comprehensively analyze existing forwarding techniques to support push-based data traffic under the environment, and compare and analyze each technique in terms of performance.

Task offloading scheme based on the DRL of Connected Home using MEC (MEC를 활용한 커넥티드 홈의 DRL 기반 태스크 오프로딩 기법)

  • Ducsun Lim;Kyu-Seek Sohn
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.6
    • /
    • pp.61-67
    • /
    • 2023
  • The rise of 5G and the proliferation of smart devices have underscored the significance of multi-access edge computing (MEC). Amidst this trend, interest in effectively processing computation-intensive and latency-sensitive applications has increased. This study investigated a novel task offloading strategy considering the probabilistic MEC environment to address these challenges. Initially, we considered the frequency of dynamic task requests and the unstable conditions of wireless channels to propose a method for minimizing vehicle power consumption and latency. Subsequently, our research delved into a deep reinforcement learning (DRL) based offloading technique, offering a way to achieve equilibrium between local computation and offloading transmission power. We analyzed the power consumption and queuing latency of vehicles using the deep deterministic policy gradient (DDPG) and deep Q-network (DQN) techniques. Finally, we derived and validated the optimal performance enhancement strategy in a vehicle based MEC environment.

A Study on Citizens' Consciousness of the Establishment of Experience-oriented (안전체험관 설립을 위한 시민의식 조사 연구)

  • Kim, Tae-Hwan
    • Korean Security Journal
    • /
    • no.4
    • /
    • pp.83-117
    • /
    • 2001
  • This study aims at investigating basic safety consciousness as preprocessing of the establishment of experience-oriented safety education center in which citizens can have positive and active experience education, based on the data for which the investigators have investigated and analyzed such citizens' safety consciousness as awareness, consciousness and feedback of national safety accident, systematic prevention of safety accident and necessity of first-aid when safety accident happens, focused on citizens in Seoul and Gyeonggi-do where more than 1/3 of the national population live, for the purpose of establishing experience-oriented education center where citizens can be taught to prevent accidents wisely, picking up experiences of large or small accidents up to now. And the findings from the study support the followings : 1) Ordinary people think that danger factors have prevailed in our entire society, and fear that the danger may come to them directly.2) Ordinary people's consciousness of safety accident is low, that is because selfishness and 'take-it-easy' manner have prevailed in our entire society. 3) Ordinary people have the dread of safety accident individually, but they don't know how to deal with safety accident when it happened. 4) Although most people have taken lessons about safety accident, they still feel the need to have systematic education about safety accident. 5) Children and survey-respondents are highly concerned with prevention of safety accident, but there were few people who sent their children to 'safety accident prevention program by outside institute', still less they didn't participate in the above program. And especially they complained a lot about safety education conducted by school. 6) Most people truly felt the need that they should have experience-oriented safety education center to be able to see, hear and experience. The considerations (or suggestions) resulting from the above findings from the study will turn out that people will need such recreation facilities, rest and play space that the family can enjoy as space for the prevention of safety accident, appliance for field lesson and space for developed program, and in light of visitors' convenience, safer and more convenient vehicle service will have to be offered.

  • PDF

Development of Vision-Based Monitering System Technology for Traffic (교통량 분석 및 감시를 위한 영상 기반 관측 시스템 기술 개발)

  • Hong, Gwang-Soo;Eom, Tae-Jung;Kim, Byung-Gyu
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.59-66
    • /
    • 2011
  • Recently, it is very important to establish and predict a traffic policy for expanding social infra structure like road, because the number of cars is significantly increasing. In this paper, we propose and develop an automated system technology based on vision sensor (CCTV) which can provide an efficient information for the traffic policy establishment and expanding the social infra structure. First, the CCTV image is captured as an input of the developed system. With this image, we propose a scheme for extracting vehicles on the road and classifying small-type, large-type vehicles based on color, motion, and geometric features. Also, we develop a DB (database) system for supplying a whole information of traffic for a specified period. Based on the proposed system, we verify 90.1% of recognition ratio in real-time traffic monitering environment.

The Study on the improvement plan for Military combat power by the future computer (미래형컴퓨터를 이용한 군전투력 발전방안 연구)

  • Heo, Yeong Dae
    • Convergence Security Journal
    • /
    • v.13 no.5
    • /
    • pp.57-66
    • /
    • 2013
  • Predicting pattern of future combat ensures a successful war. It is possible to anticipate the shape of the future combat from the fighting method of US Army in the Iraq War. The fighting method: a series of combat progress by real time information to pinpoint strike using a guided weapon by GPS, an intelligence satellite and unmanned surveillance vehicle (USV), shows that real time unification combat power is key element for decide outcome of a war. The NCW is an organically connected network centric warfare paradigm by networking a factor of operation. In this paper, studied on the improvement plan for combat power by the future computer like a portable computer, an audio-recognized computer and non-keyboard computer. In addition, this paper attempts to establish a comprehensive intelligence network of Korea Marine Corps and to apply to combat or training.

Design and Implementation of CRL download protocol for supporting of WAVE systems (WAVE 시스템 지원을 위한 CRL 다운로드 프로토콜의 설계 및 구현)

  • Yoo, Kwon-Jeong;Seon, Seol-Hee;Choi, Beom-Jin;Kim, Eun-Gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.4
    • /
    • pp.800-806
    • /
    • 2015
  • WAVE(Wireless Access in Vehicular Environments) system is wireless communication technology that vehicle sends and receives packets between vehicles or between vehicles and infrastructure in a high-speed mobile environment. In this study, we have designed and implemented a CRL(Certificate Revocation List) download protocol that is used to verify certificate revocation status of the other party when the vehicles communicate with WAVE system. This protocol operates over UDP. And to support security features, also, ECDSA(Elliptic Curve Digital Signature Algorithm) is used for mutual authentication and ECIES(Elliptic Curve Integrated Encryption Scheme) is used to ensure the confidentiality. Moreover, this protocol ensures the integrity of data by adding MAC(Message Authentication Code) to the end of packet and support the error and flow control mechanisms.

Application of the Small UAV Defense System (무인항공기 대응체계 도입 방안)

  • Park, Jehong
    • Journal of Advanced Navigation Technology
    • /
    • v.21 no.1
    • /
    • pp.145-152
    • /
    • 2017
  • As a popularization of small UAS to have improved flight performance and easiness of controlling, the UAS industry is increased and also small UAS is to be a new threat for airspace security of national strategic infrastructure. Rising the new threat makes the negative side effect of small UAS operation. This phenomena brought to new R&D needs "defense system" for small UAS/UAV - called Anti-Drone. The paper addressed case study of defects, accidents and threats by small UAS/UAV as world wide level, and research and development trend of UAS defense system as each technical category - CONOP (Concept of Operation), identification/recognition method and control/supremacy techniques. As a result, this suggests the direction what and where drone defense system should be applied first and required for Korean society in the view of society system (regime) and a point of view for minimizing side effect as UAS popularization.

A Study on The Measures of Monetary Rewards When Providing The Evidences (범죄증거자료 제보시 범죄신고보상금 지급방안에 관한 연구)

  • Park, Hyung Sik
    • Convergence Security Journal
    • /
    • v.15 no.3_2
    • /
    • pp.43-51
    • /
    • 2015
  • Many of crimes are solved by the report of people. Therefore, countries pay compensation to crime reporter. However, the current system of compensation is focused on the report of criminal fact and criminals arrest, so that there is no compensation on the providing evidence. On the other hand, since the current judicial system adopted the principle of trial by evidence, all the facts are made by the evidence. But it is impossible to obtain all the evidence only by law enforcement agencies. Therefore, it is necessary for people to report the evidence positively. So it is necessary to positively take advantages of smart phones, vehicle black boxes and cctvs. Various incentives such as compensation would be needed to require the evidence of smartphone or black box, cctv. In order to strengthen evidence report, it will be needed the legislation of crime report compensation, smartphone apps development including the provision of various incentives.

A Study on the Fingerprint-based User Authentication Protocol Considering both the Mobility and Security in the Telematics Environment (텔레메틱스 환경에서 이동성과 보안성을 고려한 지문정보를 이용한 사용자 인증 프로토콜에 관한 연구)

  • Kim, Tae-Sub;Oh, Ryong;Lee, Sang-Joon;Lee, Sung-Ju;Kim, Hak-Jae;Chung, Yong-Wha;Cho, Choong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.11A
    • /
    • pp.1128-1137
    • /
    • 2007
  • Recently, according to being advanced internet, mobile communication technique, Telematics environment which users in vehicle can use internet service in LAN(Local Area Network) via mobile device has being realized. In this paper, we propose the remote user authentication protocol to solve these issues. Additionally, we use biometrics(fingerprint) for our user authentication protocol cause it can provide to avoid critical weakness that can be lost, stolen, or forgotten and to make authentication easily. In our user authentication protocol, to protect the biometric we use session key which is generated from master key distributed in our key distribution protocol. In particular, we propose secure protocol between APs considering weakness of security in mobile environment. Based on implementation of our proposed protocol, we conform that our proposed protocols are secure from various attack methods and provide real-time authentication.