• Title/Summary/Keyword: 로봇 보안

Search Result 97, Processing Time 0.02 seconds

The Trends of Embedded Operating System Security Technology (임베디드 운영체제 보안 기술 동향)

  • Jeong, Yeong-Jun;Im, Dong-Hyeok;Seo, Yeong-Bin;Kim, Jae-Myeong
    • Electronics and Telecommunications Trends
    • /
    • v.23 no.1 s.109
    • /
    • pp.1-11
    • /
    • 2008
  • 임베디드 시스템이라 함은 우리가 생활하는 주변에서 흔히 접할 수 있고, 얘기만 들어도 쉽게 이해할 수 있는 PDA, 스마트폰, MP3 플레이어, 셋톱박스 등의 정보가전 기기들을 비롯하여 로봇, 텔레매틱스, 공장자동화, 군사기기와 센서노드에 이르는 디지털 기기들에 컴퓨터가 내장되어 들어가 있는 시스템을 의미한다. 이러한 임베디드 시스템은 도래하고 있는 디지털 컨버전스 시대에서 모바일 및 정보가전기기로 그 사용성이 날로 확대되어 가고 있으며, 현 시점에서도 각 개인이 이미 최소한 하나씩의 임베디드 기기를 휴대하고 있을 정도로 임베디드 기기에 대한 의존도는 상당히 높다고 할 수 있다. 이렇듯 임베디드 기기에 대한 높은 의존성으로 인해 향후 지금보다 더 많은 개인 정보를 임베디드 기기에 저장하게 될 것으로 예상되는데, 이에 따라 갈수록 사용이 많아질 임베디드 기기 내의 개인 정보의 보안성에 대한 관심이 증폭되고 있으며, 본 고에서는 이와 관련된 최근의 임베디드 보안 기술에 대해 설명하도록 한다.

ROS2 공격 기술 동향 분석

  • Jaewoong Heo;Lee Yeji;Hyo Jin Jo
    • Review of KIISC
    • /
    • v.33 no.4
    • /
    • pp.57-63
    • /
    • 2023
  • Industry 4.0의 진행으로 이기종의 IoT 장비들 간의 통신을 위해 다양한 산업용 통신 미들웨어들이 등장했다. 그 중 Robotics 분야에서 활발히 사용되는 Robot Operating System (ROS)는 개발자 커뮤니티와 로봇 개발 도구들을 기반으로 지속적인 시장 점유율 증가세를 보이고 있다. 초기 발표된 ROS1의 경우 보안이 전혀 고려되지 않은 설계로 Packet Injection 공격등의 사이버 보안 위협에 취약했지만, ROS2의 경우 통신 미들웨어인 Data Distribution Service (DDS) 통신규격을 전송 계층에 적용하여 메시지 전송에 대한 보안 기능을 제공하고 있다. 그러나 최근 연구에서는 DDS와 관련된 ROS2 취약점이 발표되고 있다. 따라서 본 논문에서는 DDS와 관련된 ROS2의 공격 기술 동향을 소개한다.

21세기의 사이버 군대와 대리전쟁

  • O, Je-Sang
    • Defense and Technology
    • /
    • no.7 s.257
    • /
    • pp.38-43
    • /
    • 2000
  • 전문가들은 예측하기를 미래의 전장은 적을 육안으로 거의 보지 못하고 싸우게 될 것이라 한다. 그리고 군사적으로 주요 요충지마다 로봇 병사가 지키게 될 것이다. 미래전쟁체계는 컴퓨터를 기반으로 하는 체계들로 구성되어 있기 때문에 컴퓨터 체계자체를 지키는 보안 및 안정성이 중요한 무기로 등장할 것이다. 적군의 컴퓨터 해커가 상대의 컴퓨터를 마비시키는 바이러스, 칩변조, 소프트웨어 변조, 시한폭탄 소프트웨어 바이러스, 허위정보 등을 투입할 수도 있다

  • PDF

Ubiquitous Home Security Robot System based on Sensor Network (센서 네트워크 기반의 홈 보안로봇 시스템 구현)

  • Kim, Yoon-Gu;Lee, Ki-Dong
    • The Journal of Korea Robotics Society
    • /
    • v.2 no.1
    • /
    • pp.71-79
    • /
    • 2007
  • We propose and develop Home Security robot system based on Sensor Network (HSSN) configured by sensor nodes including radio frequency (RF), ultrasonic, temperature, light and sound sensors. Our system can acknowledge security alarm events that are acquired by sensor nodes and relayed in the hop-by-hop transmission way. There are sensor network, Home Security Mobile Robot (HSMR) and Home Server(HS) in this system. In the experimental results of this system, we presented that our system has more enhanced performance of response to emergency context and more speedy and accurate path planning to target position for arriving an alarm zone with obstacle avoidance and acquiring the context-aware information.

  • PDF

A Study on Characteristics of an Terrestrial Magnetism Sensor with Bluetooth (Bluetooth를 이용한 지자기센서의 특성에 관한 연구)

  • Park, Sun-Jin;Jeong, Jung-Su
    • Convergence Security Journal
    • /
    • v.6 no.3
    • /
    • pp.37-47
    • /
    • 2006
  • In this research, We connect the terrestrial magnetism sensor of the Philips to a bluetooth communication system and measured 360 degree of the azimuth change the angle with an incline of 5 degrees to an order direction. The value of the azimuth to be measured sent to the Bluetooth communication system and analyzed the measuring value in the 100m as moved. Using the bluetooth, we could send the measuring value of the azimuth without the bearing error in the plain without an electric wave obstacle within a distance in straight line 100M. We got the value of the azimuth have 98% reliability to maintain at a level with the terrestrial magnetism sensor. Based on this research. We send the measuring value of the azimuth which the accuracy is improved to a mobile intelligent robot moving a land inclined equipped with this system and can track the azimuth of it.

  • PDF

Development Plan of Safety Management on Intelligent Robot (지능형 로봇에 대한 안전관리 발전방안)

  • Ju, Il-Yeop
    • Korean Security Journal
    • /
    • no.26
    • /
    • pp.89-119
    • /
    • 2011
  • The purpose of this study is to progress the development plan of safety management on the intelligent robot through safety analysis on the intelligent robot, major present condition of safety management on the intelligent robot, enforcement method of safety management on the intelligent robot. The following is the result of the study. First, we have to establish the provision or the special legislation to regulate the safety management of the intelligent robot substantially in the intelligent robot development and supply promotion law, the enforcement ordinance, the enforcement regulation. And, we should propel to establish the provision on the safety management of the intelligent robot in the laws related on ethics and safety. Second, we should establish the Robot Ethical Charter through the national and international agreement to give a guarantee against the safety management of the intelligent robot. Furthermore, we have to induces people's interest on the safety management of the intelligent robot through offering the public information of the Robot Ethical Charter for coexistence of human and robot and have to understand about rights of the intelligent robot. Third, the security industry and learned circles have to recognize the important effect that the intelligent robot gets in the security industry and try to grope the safety management and the application plan on the intelligent robot. Also, the security industry and learned circles should concern not only using and managing of the intelligent robot including the military robot, the security robot but also protecting human from the intelligent robot.

  • PDF

Tracking Path Generation of Mobile Robot for Interrupting Human Behavior (행동차단을 위한 이동로봇의 추적경로 생성)

  • Jin, Taeseok
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.23 no.5
    • /
    • pp.460-465
    • /
    • 2013
  • In this paper, we describe a security robot system to control human's behavior in the security area. In order to achieve these goals, we present a method for representing, tracking and human blocking by laserscanner systems in security area, with application to pedestrian tracking in a crowd. When it detects walking human who is for the security area, robot calculates his velocity vector, plans own path to forestall and interrupts him who want to head restricted area and starts to move along the estimated trajectory. While moving the robot continues these processes for adapting change of situation. After arriving at an opposite position human's walking direction, the robot advises him not to be headed more and change his course. The experimental results of estimating and tracking of the human in the wrong direction with the mobile robot are presented.

Hacking attack and vulnerability analysis for unmanned reconnaissance Tankrobot (무인정찰 탱크로봇에 대한 해킹 공격 및 취약점 분석에 관한 연구)

  • Kim, Seung-woo;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.9
    • /
    • pp.1187-1192
    • /
    • 2020
  • The dronebot combat system is a representative model of the future battlefield in the 4th industrial revolution. In dronebot, unmanned reconnaissance tankrobot can minimize human damage and reduce cost with higher combat power than humans. However, since the battlefield environment is very complex such as obstacles and enemy situations, it is also necessary for the pilot to control the tankrobot. Tankrobot are robots with new ICT technology, capable of hacking attacks, and if there is an abnormality in control, it can pose a threat to manipulation and control. A Bluetooth sniffing attack was performed on the communication section of the tankrobot and the controller to introduce a vulnerability to Bluetooth, and a countermeasure using MAC address exposure prevention and communication section encryption was proposed as a security measure. This paper first presented the vulnerability of tankrobot to be operated in future military operations, and will be the basic data that can be used for defense dronebot units.

Improving the Security Policy Based on Data Value for Defense Innovation with Science and Technology (과학기술 중심 국방혁신을 위한 데이터 가치 기반 보안정책 발전 방향)

  • Heungsoon Park
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.109-115
    • /
    • 2023
  • The future outlook for defense faces various and challenging environments such as the acceleration of uncertainty in the global security landscape and limitations in domestic social and economic conditions. In response, the Ministry of National Defense seeks to address the problems and threats through defense innovation based on scientific and technological advancements such as artificial intelligence, drones, and robots. To introduce advanced AI-based technology, it is essential to integrate and utilize data on IT environments such as cloud and 5G. However, existing traditional security policies face difficulties in data sharing and utilization due to mainly system-oriented security policies and uniform security measures. This study proposes a paradigm shift to a data value-based security policy based on theoretical background on data valuation and life-cycle management. Through this, it is expected to facilitate the implementation of scientific and technological innovations for national defense based on data-based task activation and new technology introduction.

Military Issues to Overcome in the 4th Industrial Revolution and the 3rd Offset Strategy (제4차 산업혁명과 제3차 상쇄전략 추진 시 극복해야 될 군사적 이슈)

  • Han, Seung Jo;Shin, Jin
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.145-152
    • /
    • 2019
  • In the era of the 3rd Offset Strategy led by the 4th Industrial Revolution, the use of robots with AI and autonomous abilities is becoming more active in military field. The 3rd Offset Strategy is based on the technology of the 4th Industrial Revolution, and S. Korea is heavily dependent on US military technology and is directly and indirectly influenced by the military revolutionary strategy and the alliance relationship. There are many issues that need to be addressed beyond technical maturity for both strategies to be successfully applied in the military. However, there are few discussions about these limitations in many studies and media reports in comparison with the advantages of the techniques. This research describes robot ethics & technology unbalance, problems of autonomous functions, display fatigue induced by VR/AR/MR, cyber/network security to be solved for successful strategies, also the solutions are addressed.