• Title/Summary/Keyword: 보안장치

Search Result 800, Processing Time 0.032 seconds

An Expanded Small Diamond Search Algorithm for Efficient Security System (확장된 작은 다이아몬드 탐색 알고리즘을 이용한 효율적인 보안 시스템)

  • Kim, Sun-Jae;Oh, Hae-Seok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.126-129
    • /
    • 2009
  • 보안에 대한 관심은 정보통신 기술이 발달함에 따라 나날이 증가하고 있고 개인과 주변 사회의 환경을 급격히 변화시키는 계기가 되었다. 하지만 기존의 보안 장비들은 녹화를 끊임없이 계속해야 함에 따라 저장매체의 용량에 대한 문제와 관리에 따른 부담이 존재하였다. 이에 본 논문에서는 보안 시스템이 기본적으로 갖춰야 하는 모니터링, 녹화, 재생 등의 기능을 제공하고 대규모 저장장치에 대한 필요를 배제하기 위해서 ESDS 알고리즘을 이용하여 기준치 이상의 움직임이 발생했을 때 그 화면을 기록하며 JPEG format 방식을 채택하여 용량에 따른 부담을 줄인 보안 시스템을 설계 및 구현하였다.

A Study on The Development of Container Security Device(CSD) based on Active RFID (능동형 RFID 기반 컨테이너 보안 장치(CSD)의 개발에 관한 연구)

  • Choi, Hyung-Rim;Kim, Jae-Joong;Kang, Moo-Hong;Shin, Joong-Jo;Shon, Jung-Rock;Moon, Young-Sik;Lee, Eun-Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2B
    • /
    • pp.244-251
    • /
    • 2010
  • CSD is Active RFID based Container Security Device which is proposed by the U.S Department of Home Security. It is mounted inside the container to sense opening of the container door. ConTracer is the CSD which is developed in this research whose major features are sensing door opening status as well as history inquiring on internal environment and shock to the container by mounting the temperature/humidity/shock sensors. Moreover, its RFID frequency bandwidth uses 433MHz and 2.4GHz to correspond actively to the radio regulations used by different countries. This paper introduces the development trend of CSD, compares the ConTracer which is developed thru this research and other company's CSD, and introduces CSD System which is designed and established using ConTracer. Finally, the implemented CSD System is verified by applying the demonstration service to container distribution between Korea and China.

Verification of a Function-based Security Authentication Protocol for Implantable Medical Devices (함수 기반의 체내 삽입장치용 보안 인증프로토콜 검증)

  • Bae, WooSik;Han, KunHee
    • Journal of Digital Convergence
    • /
    • v.12 no.5
    • /
    • pp.249-254
    • /
    • 2014
  • Recent advancement of USN technology has lent itself to the evolving communication technology for implantable devices in the field of medical service. The wireless transmission section for communication between implantable medical devices and patients is a cause of concern over invasion of privacy, resulting from external attackers' hacking and thus leakage of private medical information. In addition, any attempt to manipulate patients' medical information could end up in serious medical issues. The present study proposes an authentication protocol safe against intruders' attacks when RFID/USN technology is applied to implantable medical devices. Being safe against spoofing, information exposure and eavesdropping attacks, the proposed protocol is based on hash-function operation and adopts session keys and random numbers to prevent re-encryption. This paper verifies the security of the proposed protocol using the formal verification tool, Casper/FDR.

Present Condition and View of Electronic Interlocking System for Signaling System Implementation on Train (신호설비구현을 위한 전자연동장치의 현황과 전망)

  • Lee, Jung-Geun;Lee, Hyang-Beom
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2007.08a
    • /
    • pp.361-365
    • /
    • 2007
  • 전자연동장치(Interlocking System)는 열차의 안전운행 확보와 함께 수송능력과 보호향상, 정확하고 신속한 운송과 더불어 이용률을 증대하는데 중요한 역할을 한다. 철도 신호보안 설비 중에서 그 핵심을 이루는 연동장치 설비에 첨단기술인 전자, 정보처리 및 정보전송기술을 철도 신호 시스템에 도입하여 신뢰성과 안정성이 확보된 신호설비를 구현하기 위해 최근에는 마이크로프로세서를 이용한 전자연동장치 기술이 개발되었다. 본 논문에서는 전자연동장치의 필요성 및 기존설비(기계 및 계전 연동장치)의 노후화에 따른 장애 및 호환성 결여 등의 문제점들을 해결하기 위하여 전자 연동장치와 기존 계전 연동장치의 차이점을 제시 및 문제 해결방안을 고찰하고, 전자연동장치 동향을 살펴보았다.

  • PDF

Electronic Security Control Center Building Process and Security and Management Measures (시스템경비 관제시설의 구축과 보안 및 경영대책)

  • Ha, Kyung-Su;Cho, Cheol-Kyu;Kim, Pyong-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.5
    • /
    • pp.113-121
    • /
    • 2015
  • This research suggests construction processes and security solutions for security control center as management measures for security management improvement in domestic electronic security companies. Security control center (SCC) is the central nerve of electronic security service, and no matter how well the on-site response system has been built, if SCC ceases to work due to an incident or disaster or security control personnel are harmed, the electronic security system cannot perform its proper functions. It is divided to a spatial structure, the infrastructure, control equipment, control solutions and operating structure in a construction process in the security control center. And a solution can be presented for physical security, information security, and personnel security in the way to security solutions.

Implementation of a security system using image recognition technology (영상인식 기술을 적용한 잠금장치 구현)

  • Park, Soojung;Kim, Daehwan;Jung, Junyoung;Kim, Gibak
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2016.11a
    • /
    • pp.76-77
    • /
    • 2016
  • 본 논문에서는 영상 인식 기술을 적용하여 보안성능을 향상시킨 잠금장치 구현에 대해 설명한다. 사전에 등록된 이미지를 사용자가 기억하고 있다가 등록된 이미지를 포함하고 있는 전체 그림에서 등록된 이미지 부분만을 사용자가 카메라로 캡처하였을 때 비밀번호 입력을 위한 키패드를 스마트기기에 활성화시키는 방법을 적용한다. 이러한 장치는 영상인식 기술, 안드로이드 앱, 아두이노 플랫폼 등을 이용하여 구현하게 된다.

  • PDF

A Study of the Performance Degradation Factors of An Internal Network (내부 네트워크의 성능저하요인에 관한 연구)

  • Jeon, Jeon-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.1B
    • /
    • pp.43-50
    • /
    • 2011
  • Recently, Hacking Attacks are appearing as a various Attack techniques with evolution of the Network and most of the network through a various Security Systems are responding to an attack. In addition, it should be placed adding the Security Systems to protect the Internal Network's Information Assets from External attacks. But, The use of Security Systems and Network deployment inside the network makes a significant impact on Security and Performance. Therefore, In this paper, it will be to analyze the Performance Degradation Factors of the Internal Network according to the Security System's use and placement. In a future, This paper is expected to serve as a valuable information for the Network Performance and Security improvements.

A SCADA Testbed Implementation Architecture for Security Assessment (SCADA 시스템의 보안성 평가를 위한 테스트베드 구성)

  • Lee, Jong-Joo;Kim, Seog-Joo;Kang, Dong-Joo
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.24 no.4
    • /
    • pp.50-56
    • /
    • 2010
  • Supervisory Control and Data Acquisition Systems (SCADAs) is real-time monitor and control systems. SCADA systems are used to monitor or control chemical and transportation processes, in municipal water supply systems, electric power generation, transmission and distribution, gas and oil pipelines, and other distributed processes. SCADA refers to a large-scale distributed system. The supervisory control system is placed on top of a real time control system to control external processes. Emerging security technologies and security devices are decreasing the vulnerability of the power system against cyber threats. Dealing with these threats and analyzing vulnerabilities is an important task for equipment such as RTU, IED and FEP. To reduce such risks, we develop such a SCADA testbed. This paper presents the development of a testbed designed to assess the vulnerabilities SCADA networks(including serial communication).

Inter-device Mutual Authentication and Formal Verification in Vehicular Security System (자동차 보안시스템에서 장치간 상호인증 및 정형검증)

  • Lee, Sang-Jun;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.205-210
    • /
    • 2015
  • The auto industry has significantly evolved to the extent that much attention is paid to M2M (Machine-to-Machine) communication. In M2M communication which was first used in meteorology, environment, logistics, national defense, agriculture and stockbreeding, devices automatically communicate and operate in accordance with varying situations. M2M system is applied to vehicles, specifically to device-to-device communication inside cars, vehicle-to-vehicle communication, communication between vehicles and traffic facilities and that between vehicles and surroundings. However, communication systems are characterized by potential intruders' attacks in transmission sections, which may cause serious safety problems if vehicles' operating system, control system and engine control parts are attacked. Thus, device-to-device secure communication has been actively researched. With a view to secure communication between vehicular devices, the present study drew on hash functions and complex mathematical formulae to design a protocol, which was then tested with Casper/FDR, a tool for formal verification of protocols. In brief, the proposed protocol proved to operate safely against a range of attacks and be effective in practical application.

Security Improvement of User Authentication Protocol for Heterogeneous Wireless Sensor Networks for the Internet of Things Environment (Heterogeneous Wireless Sensor Networks 환경에서의 안전한 사용자 인증 프로토콜)

  • Lee, Young sook
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.55-62
    • /
    • 2021
  • Recently, the use of sensor devices is gradually increasing. As various sensor device emerge and the related technologies advance, there has been a dramatic increase in the interest in heterogeneous wireless sensor networks (WSNs). While sensor device provide us many valuable benefits, automatically and remotely supported services offered and accessed remotely through WSNs also exposes us to many different types of security threats. Most security threats were just related to information leakage and the loss of authentication among the involved parties: users, sensors and gateways. An user authentication protocol for wireless sensor networks is designed to restrict access to the sensor data only to user. In 2019, Chen et al. proposed an efficient user authentication protocol. However, Ryu et al. show that it's scheme still unstable and inefficient. It cannot resist offline password guessing attack and session key attack. In this paper, we propose an improved protocol to overcome these security weaknesses by storing secret data in device. In addition, security properties like session-key security, perfect forward secrecy, known-key security and resistance against offline password attacks are implied by our protocol.