• Title/Summary/Keyword: 로봇 보안

Search Result 97, Processing Time 0.028 seconds

Robot Navigation Control using Laserscanner to Restrict Human Movement (인간행동제약을 위한 레이저파인더 기반의 로봇주행제어)

  • Jin, Tae-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.5
    • /
    • pp.1070-1075
    • /
    • 2013
  • In this research, we describe a security robot system and ongoing research results to control human's wrong direction in order to forbid human to enter security zone. Proposed robot system surveils a security area with equipped laserscanner sensor usually. When it detect walking human who is for the area, robot calculates his velocity vector, plans own path to forestall and interrupts him who want to head restricted area and starts to move along the estimated trajectory. The walking human is assumed to be a point-object and projected onto an scanning plane to form a geometrical constraint equation that provides position data of the human based on the kinematics of the mobile robot. While moving the robot continues these processes for adapting change of situation. After arriving at an opposite position human's walking direction, the robot advises him not to be headed more and change his course. The experimental results of estimating and tracking of the human in the wrong direction with the mobile robot are presented.

Secure Scheme Between Nodes in Cloud Robotics Platform (Cloud Robotics Platform 환경에서 Node간 안전한 통신 기법)

  • Kim, Hyungjoo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.12
    • /
    • pp.595-602
    • /
    • 2021
  • The robot is developing into a software-oriented shape that recognizes the surrounding situation and is given a task. Cloud Robotics Platform is a method to support Service Oriented Architecture shape for robots, and it is a cloud-based method to provide necessary tasks and motion controllers depending on the situation. As it evolves into a humanoid robot, the robot will be used to help humans in generalized daily life according to the three robot principles. Therefore, in addition to robots for specific individuals, robots as public goods that can help all humans depending on the situation will be universal. Therefore, the importance of information security in the Cloud Robotics Computing environment is analyzed to be composed of people, robots, service applications on the cloud that give intelligence to robots, and a cloud bridge that connects robots and clouds. It will become an indispensable element for In this paper, we propose a Security Scheme that can provide security for communication between people, robots, cloud bridges, and cloud systems in the Cloud Robotics Computing environment for intelligent robots, enabling robot services that are safe from hacking and protect personal information.

A RodSecurityRobot Model (로드경비로봇 모델 연구)

  • Yang, Keyong-ae;Shin, Seung-Jung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.4 no.4
    • /
    • pp.401-406
    • /
    • 2018
  • According to the National Security Service of the National Police Agency, intrusion into empty houses increased form 2013 to 2016. Consequentially this statistics seemed that house intrusion, burglary is increasing. Also according to the statistics of Public Prosecutors'Office, a total 203,573 theft crimes occurered in 2016, of which 18.9% were theft after intruding. By reson of this is most frequent case of intrusion and theft, we have been studing the RodSecurityRobot model to enhance security in many factories to manage. In order to care for security to the high place, we have propsed a road guard robot model which controls the ground in cooperation with the robot that manages the ground by using the drones. The robot and the drone move together to autonomy to avoid objects. And they check time interval. they also goes to the charger to charge when there is no battery.

Robot Development Trend and Prospect (신 성장동력의 로봇개발 동향과 전망)

  • Kim, Sung Woo
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.153-158
    • /
    • 2017
  • The robot imitates humans and recognizes the external environment and judges the situation. The robot is a machine that operates autonomously. Robots are divided into manufacturing robots and service robots. Service robots are classified as professional service robots and personal service robots. Because of the intensified competition of productivity in manufacturing industries, rising safety issues, low birth rate and aging, the robots industry is emerging. Recently, the robot industry is a complex of advanced technology fields, and it is attracting attention as a new industry where innovation potential and growth potential are promising. IT, BT, and NT related elements are fused and implemented, and the ripple effect is very large. Due to changes in social structure and life patterns, social interest in life extension and health is increasing. There is much interest in the medical field. Now the artificial intelligence (AI) industry is growing rapidly. It is necessary to secure global competitiveness through strengthening cooperation between large and small companies. We must combine R&D investment capability and marketing capability, which are advantages of large corporations, and robotic technology. We need to establish a cooperative model and secure global competitiveness through M&A.

Design and Implementation of Robot for Updating Automatically Vulnerability Database (취약성 DB 자동 갱신 로봇의 설계 및 구현)

  • 서혜성;최경희;박승규;정기현;이철원;이남훈;한광택
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.145-147
    • /
    • 2002
  • 컴퓨터 시스템이나 네트워크의 보안을 강화하는 방안으로 보안상 취약성이 발견되는 보안 취약성을 점검 하는 것이 옳다. 그러나 취약성을 파악하기 위하여 국내외 관련 사이트를 수동적 방법으로 검사하는 것은 대단히 어려운 일이다. 따라서 스스로 관련 사이트의 홈 페이지를 검색하고 취약성 정보를 추출한 후 새로운 취약성 관련 정보가 발견되는 대로 이를 취약성 데이터베이스에 기록하는 이른바 취약성 자동 갱신 시스템[1]은 취약성 탐지 시스템의 핵심 기능이다. 본 논문에서 구현한 취약성 자동 갱신 로봇은 웹 페이지 자동 검색프로그램인 스파이더를 활용하여 구현되었으며, ICAT등과 같은 취약점 정보 제공 사이트들로부터 홈페이지를 검색하고 이에 수록된 정보를 수집 및 분석한 후, 취약성 데이터베이스를 자동으로 갱신한다.

  • PDF

Development of AI based Autonomous Driving System for Outdoor Cleaning Robot (실외 청소 로봇를 위한 인공지능기반 자율 주행 시스템 개발에 관한 연구)

  • KO, Kuk Won;LEE, Ji Yeon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.11a
    • /
    • pp.526-528
    • /
    • 2022
  • 실외 자율주행 청소 로봇을 위한 인공지능기반 자율주행 시스템을 개발하였다. 개발된 시스템은 ROS(Robot Operationg System) 기반으로 이루어졌으며, 3D 라이다와, 초음파 센서를 활용하여 주변의 장애물을 감지하고 GPS와 영상을 활용하여 로봇의 위치 인식을 하여 자율 주행을 진행하였다. 자율주행 실험결과 영상과 RTK-GPS를 사용하여 정해진 경로를 ±20cm이내의 오차를 가지고 추종하면서 청소를 진행하였다.

Cleaning Robot Algorithm through Human-Robot Interaction (사람과 로봇의 상호작용을 통한 청소 로봇 알고리즘)

  • Kim, Seung-Yong;Kim, Tae-Hyung
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.5
    • /
    • pp.297-305
    • /
    • 2008
  • We present a cleaning robot algorithm that can be implemented on low-cost robot architecture while the cleaning performance far exceeds the conventional random style cleaning through human-robot interaction. We clarify the advantages and disadvantages of the two notable cleaning robot styles: the random and the mapping styles, and show the possibility how we can achieve the performance of the complicated mapping style under the random style-like robot architecture using the idea of human-aided cleaning algorithm. Experimental results are presented to show the performance.

A Vector-based Cleaning Robot Algorithm for Low-cost Robot Architecture (저비용 로봇 구조를 위한 벡터기반 청소 로봇 알고리즘)

  • Kim, Seung-Yong;Kim, Ki-Duck;Kim, Tae-Hyung
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10b
    • /
    • pp.121-125
    • /
    • 2006
  • 청소 로봇은 지도 작성 및 위치 인식을 기준으로 청소 방법을 랜덤(random)방식과 매핑(mapping)방식으로 분류 할 수 있다. 랜덤방식은 지도를 작성하지 않아 가격경쟁력이 있지만 효율이 떨어진다. 반면, 매핑방식은 지도를 작성하므로 청소 효율이 높지만 상대적인 가격경쟁력이 떨어진다. 그러므로 랜덤방식과 매핑방식의 문제점들을 보안하기 위해 본 논문은 고가의 센서 정보를 사용하지 않고 로봇이 주행 중에 발생되는 벡터(방향과 거리)값을 이용하여 로봇에게 지도 정보를 제공하는 알고리즘을 제안한다.

  • PDF

Smart Device Security Technology for Cyber Defense (사이버 국방을 위한 스마트 단말 보안기술)

  • Son, Iek-Jae;Kim, Il-Ho;Yang, Jong-Hyu;Lee, Nam-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.10
    • /
    • pp.986-992
    • /
    • 2012
  • As the utilization of smart mobile devices such as smartphones increases, the desire to utilize such devices to control and monitor combat situations also arises. As smart mobile devices with various ICT get integrated with various weaponry system, a new phase of future warfare can be introduced. Moreover, smartphone-based real-time information technology for joint battle command system will be converged with surveillance control to become a leading example of convergence of cyber defense and information technology. Furthermore, mobile device security technology ideal for mobile wireless network environments can be applied to military robots. The following paper will give an overview of smart mobile device usage used for military purposes in battle command system, various security threats and the mobile device security technology to correspond to such security threats.