• Title/Summary/Keyword: 능동안전시스템

Search Result 155, Processing Time 0.024 seconds

Security Analysis of Diffie-Hellman based Standard Key Agreement Protocols (이산대수 기반 Diffie-Hellman형 표준 키 분배 프로토콜의 안전성 분석에 관한 연구)

  • Kim, Kyung-Jin;Kim, Sung-Duk;Shim, Kyung-Ah;Won, Dong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.9C no.6
    • /
    • pp.799-808
    • /
    • 2002
  • According to the wide-spread of information transmission system over network, the use of cryptographic system to provide the integrity of transmitted message over network is increasing and the importance of that is emphasized. Because the security of the cryptographic system totally relies on the key, key management is a essential part of cryptographic system. A number of key agreement protocols have been proposed to far, but their rigorous security analysis is still open. In this paper, we analyze the features of Diffie-Hellman based standard key agreement protocols and provide the security analysis of those protocols against several kinds of active attacks.

Development of a Safe Manipulator for Positioning a Kiosk Panel (키오스크 패널의 위치 조절을 위한 안전 머니퓰레이터 개발)

  • Kim, Tae-Keun;Kim, Byeong-Sang;Song, Jae-Bok;Kim, Hyo-Joong;Park, Chang-Woo;Kwon, Yong-Kwan
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.36 no.1
    • /
    • pp.73-79
    • /
    • 2012
  • Kiosks are widely used in drive-thru systems in parking lots or on the highway to provide various services to drivers. However, the driver must stop at an exact location to access the kiosk, since its panel is fixed. In order to improve the kiosk accessibility, in this study we developed a manipulator that can adjust the position of the kiosk panel. The number of active joints was minimized to lower the cost, whereas a parallelogram mechanism and passive joints were adopted to increase its convenience for the users. Furthermore, a safety mechanism using springs and a cam was designed to ensure the safety of the user in the case of an emergency. The performance of the position controller and the safety mechanism were verified through various tests. In addition, the proposed collision reaction strategy improved the safety performance of the kiosk system.

Intrusion Situation Classification Model for Intelligent Intrusion Awareness (지능적인 침입 인지를 위한 침입 상황 분류 모델)

  • Hwang, Yoon-Cheol;Mun, Hyung-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.3
    • /
    • pp.134-139
    • /
    • 2019
  • As the development of modern society progresses rapidly, the technologies of society as a whole are progressing and becoming more advanced. Especially in the field of security, more sophisticated and intelligent attacks are being created. Meanwhile, damaging situations are becoming several times larger than before Therefore, it is necessary to re-classify and enhance the existing classification system. It is required to minimize the intrusion damage by actively responding to intelligent intrusions by applying this classification scheme to currently operating intrusion detection systems. In this paper, we analyze the intrusion type caused by intelligent attack We propose a new classification scheme for intrusion situations to guarantee the service safety, reliability, and availability of the target system, We use this classification model to lay the foundations for the design and implementation of a smart intrusion cognitive system capable of early detection of intrusion, the damages caused by intrusion, and more collections active response.

A Study of Improve Power Quality for the Power System interconnected to Photovoltaic System. (태양광 발전의 계통 도입을 고려한 전력품질 개선에 관한 연구)

  • Lee, Tae-Young;Ha, Kwang-Ho;Ko, Yeon-Seong;Yoo, Hyun-Jae;Lee, Jong-Soo;Yoon, Chang-Dae;Shin, Myong-Chul
    • Proceedings of the KIEE Conference
    • /
    • 2008.07a
    • /
    • pp.504-505
    • /
    • 2008
  • 정보통신기기 및 컴퓨터시스템 등은 순간정전, 전압변동, 노이즈, 정전기, 고조파전류 등의 영향을 쉽게 받는다. 따라서 이러한 점을 충분히 고려하여 신뢰성과 안전성을 확보하도록 구성되어야 한다. 전력 품질이 강조되는 이유는 컴퓨터는 물론 각종 가전제품 등이 복잡하고 정밀한 전자회로로 구성되어 있어 조그만 전압변동이나 정전사고에도 전자회로가 오작동을 일으키거나 고장날수 있기 때문이다. 이에 본 논문에서는 분산형 태양광 발전이 계통에 연계되었을 경우 발생할 수 있는 전력품질에 영향을 끼치는 요인 중 하나인 고조파를 저감시키기 위한 능동형 필터 모델을 제안한다. 본 논문에서의 필터 모델은 PSIM을 이용하였으며, 능동형 필터 시스템의 장착 전 후의 고조파 및 잡음성분을 FFT를 이용하여 분석하여 시스템의 적용 가능성과 효용성을 본 논문에서 증명하였다.

  • PDF

Ship Safety Management System based on IoT(Internet of Things) (IoT(Internet of Things)시대의 선박 안전관리시스템 구축 연구)

  • Lim, Sung-Hun;Ko, Young-Kyu;Park, Jin-Soo
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2014.06a
    • /
    • pp.144-145
    • /
    • 2014
  • IoT (Internet of Things) is connected to all things Internet-based people and things, things and objects that communicate information between said intelligent technologies and services. Shipping each of a variety of devices that act independently from each other, but, it is actively interlock with each other is not easy practically days. Ship it within the means of communication, the communication between the ship, the communication between ship and shore configuration, SAN (Ship Area Network), RFID/USN, broadband communications, satellite communications and IT technology to a variety of marine environments for the safe navigation the ship's safety management system for the configuration you want to discuss the plan.

  • PDF

An MIB Access Control Modeling for the Secure Management of Large Networks (대규모 망의 안전한 관리를 위한 관리 정보베이스의 접근 제어 모형화)

  • Seo, Jae-Hyeon;Lee, Chang-Jin;No, Bong-Nam
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.4
    • /
    • pp.581-591
    • /
    • 1995
  • An MIB is the heart of a network management system and it stores all information that is necessary for network management. To operate networks safely, it is essential to control accesses to managed objects. This paper provides three-level architecture of managers so as to perform network management more efficiently in large networks. Moreover, mandatory access control(MAC) policy and role-based access control policy are adopted to ensure the secure access to the MIB. These policies are modeled by using the active object-oriented data model, which makes easy to map these access control models into the active object-oriented database.

  • PDF

Study on a Secure Active network Architecture (안전한 액티브 네트워크 구조에 관한 연구)

  • Hong, Sung-Sik;Han, In-Sung;Ryou, Hwang-Bin
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.4 s.304
    • /
    • pp.17-24
    • /
    • 2005
  • The existing passive networks have the only data-storing and transmission functions. On the other hand, the active network which can do operation jobs on the transmitting packets was introduced at 1990's. However, the advantages of activating processing are obviously more complex than traditional networks and raise considerable security issues. In this paper, we propose the safer structure in Active Networks that is based on the discrete approach which resolves the weak point of the Active Network. The proposed system provides the node management and user management in the Active Networks, and improves the security of Packet transmission with packet cryptography and the session.

A Study on the Warning Characteristics of LDWS using Driver's Reaction Time and Vehicle Type (차량 종류 및 운전자 인지반응 시간을 이용한 LDWS 경고 특성에 관한 연구)

  • Park, Hwanseo;Chang, Kyungjin;Yoo, Songmin
    • Journal of Auto-vehicle Safety Association
    • /
    • v.8 no.1
    • /
    • pp.13-18
    • /
    • 2016
  • More than 80 percent of traffic accidents related with lane departure believed to be the result of crossing the lane due to either negligence or drowsiness of the driver. Lane-departure related accident in the highway usually involve high fatality. Even though LDWS is believed to prevent accident 25% and reduce fatalities by 15% respectively, its effectiveness in performance is yet to be confirmed in many aspects. In this study, the vehicle lateral locations relative to warning zone envelop (earliest and latest warning zone) defined in ISO standard, ECE and NHTSA regulations are compared with respect to various factors including delays, vehicle speed and vehicle heading angle with respect to the lane. Since LDWS is designed to be activated at the speed over 60 km/h, vehicle speed range for the study is set to be from 60 to 100 km/h. The vehicle heading angle (yaw angle) is set to be up to 5 degree away from the lane (abrupt lane change) considering standard for lane change test using double lane-change test specification. The TLC is calculated using factors like vehicle speed, yaw angle and reaction time. In addition, the effect of vehicle type and reaction time have been considered to assess LDWS safety.

Design of PTZ Camera-Based Multiview Monitoring System for Efficient Observation in Vessel Engine Room (선박 기관실의 효율적인 감시를 위한 PTZ 카메라 기반의 멀티뷰 모니터링 시스템 설계)

  • Kim, Heon-Hui;Hong, Sang-Jun;Nam, Taek-Kun
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.27 no.7
    • /
    • pp.1129-1136
    • /
    • 2021
  • A pan-tilt-zoom (PTZ) camera-based monitoring system for efficient monitoring in the engine room of a vessel was designed. A number of places exist where traditional analog instruments are still used in vessel engine rooms, and blind spots closely related to safety exist, for which flooding or fire is a concern. A camera-based monitoring system that guarantees a wide range at a relatively fast cycle for these monitoring points can be an effective alternative to enhance the safety of a vessel. Therefore, a multiview monitoring system is proposed in which the functions of the existing PTZ camera are further strengthened using a software. The monitoring system comprises four modules: camera control, location registration, traversal control, and multiview image reconstruction. The effectiveness of the method was evaluated through a series of experiments in an engine room environment.

Implementation of Rule Management System for Validating Spatial Object Integrity (공간 객체 무결성 검증을 위한 규칙 관리 시스템의 구현)

  • Go, Goeng-Uk;Yu, Sang-Bong;Kim, Gi-Chang;Cha, Sang-Gyun
    • Journal of KIISE:Software and Applications
    • /
    • v.26 no.12
    • /
    • pp.1393-1403
    • /
    • 1999
  • 공간 데이타베이스 시스템을 통하여 공유되는 공간 데이타는 무결성이 적절하게 유지되지 않는 한 전체 응용 시스템의 행위를 예측할 수 없게 되므로 데이타의 무결성 확인 및 유지는 필수적이다. 특히 공공 GIS에 저장된 공간 데이타는 토지 이용도 평가, 도시 계획, 자원 관리, 시설물 관리, 안전 관리, 국방 등 국가 전체 및 지역의 중요한 정책 결정을 위한 다양한 응용 시스템들에 의해 이용되므로 적절한 공간 객체의 무결성 확인이 더욱 더 필요하다. 본 논문에서는 능동(active) DBMS의 능동 규칙(active rule) 기법을 이용하여 공간 객체의 무결성 확인을 지원하기 위한 규칙 관리 시스템을 제시한다. 능동 규칙을 이용한 공간 객체의 무결성 확인은 응용 프로그래머를 무결성 확인에 대한 부담으로부터 자유롭게 할 수 있다. 본 시스템은 특정 DBMS에 종속되지 않는 독립적인 외부 시스템으로 존재하며, 능동 규칙 관리기, 규칙 베이스, 그리고 활성규칙 생성기의 3 부분으로 구성된다. 사용자가 공간 데이타베이스 응용 프로그램을 통해 공간 객체를 조작하고자 할 때, 본 시스템은 데이타베이스 트랜잭션을 단위로 조작되는 모든 공간 객체의 무결성 확인을 위해 응용 프로그램에 삽입될 무결성 제약조건 규칙들을 효율적으로 관리하는 역할을 한다.Abstract It is necessary that the integrity of spatial data shared through the spatial database system is validated and appropriately maintained, otherwise the activity of whole application system is unpredictable. Specially, the integrity of spatial data stored in public GIS has to be validated, because those data are used by various applications which make a decision on an important policy of the region and/or whole nation such as evaluation of land use, city planning, resource management, facility management, risk management/safety supervision, national defense. In this paper, we propose rule management system to support validating the integrity of spatial object, using the technique of active rule technique from active DBMS. Validating data integrity using active rules allows database application programmer to be free from a burden on validation of the data integrity. This system is an independent, external system that is not subject to specific DBMS and consists of three parts, which are the active rule manager, the rule base, and the triggered rule generator. When an user tries to manipulate spatial objects through a spatial database application program, this system serves to efficiently manage integrity rules to be inserted into the application program to validate the integrity constraints of all the spatial objects manipulated by database transactions.