• Title/Summary/Keyword: 보안장치

Search Result 805, Processing Time 0.025 seconds

자율운항선박의 원격제어에서 통신 메시지 가시화 방법에 관한 기초연구

  • 김홍진;임정빈
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2022.11a
    • /
    • pp.89-91
    • /
    • 2022
  • 선원이 탑승한 선박을 육상 원격 제어자가 조종할 경우 현장의 항해사에게도 원격제어 상황이 공유될 필요가 있다. 이를 위해 육상에서 선박으로 전송되는 원격제어 명령을 가시화하는 방안에 관한 기초연구를 하였다.

  • PDF

The Development of IEC62056 based Energy Information Concentrator for DLMS Meters (DLMS 계량기를 위한 IEC62056기반의 Energy Information 중계장치 개발)

  • Im, Chang-Jun;Jang, Seong-Jin;Hahn, Kwang-Soo;Kim, Byung-Seop;Jung, Nam-Joon
    • Proceedings of the KIEE Conference
    • /
    • 2007.11b
    • /
    • pp.54-56
    • /
    • 2007
  • DLMS(Device Language Message Specification) 메시지 규약과 COSEM(Companion Specification for Energy Metering) 오브젝트 모델링 기법을 채택한 계량기 통신 및 오브젝트 모델 표준인 IEC62056은 계량기의 상호 운용, 관리, 보안 그리고 계략 데이터 모델링에 대한 방법 등을 기술하고 있으며 TCP-UDP, GPRS, PSTN등의 원격 접속을 위한 프로파일을 지원하고 있다. 본 논문에서는 DLMS계량기의 계량 데이터를 수집 및 관리하는 IEC6056 기반의 energy information concentrator(이하 EIC)를 제안한다 이 중계장치는 COSEM 오브젝트로 구성되어 있는 DLMS 계량기를 EIC의 논리장치로 모델링하여 등록 관리하는 새로운 개념의 DLMS 중계장치이다. 쉽게 말해서 IEC62056을 따르는 DLMS 클라이언트에서 EIC를 바라볼 때 여러 개의 논리 장치를 가지는 DLMS 장치로 인식이 된다. EIC는 특성상 기능적으로 크게 두 부분으로 나누어지는데, 상위 시스템과의 인터페이스를 담당하는 서버부분과 계량기로부터 데이터를 수집하는 클라이언트 부분이다. 서버 부분은 계량 데이터 오브젝트 관리 모듈 부분과 TCP/IP서버 모듈로 나누어지며 클라이언트 부분은 DLMS 계량기 스케줄링 부분과 DLMS 클라이언트 부분으로 나누어진다. 개발된 EIC는 최대 111대까지의 계량기를 지원 관리할 수 있으며, 각 1Mbit 용량의 오브젝트를 구성 할 수 있다.

  • PDF

A Study of Carbon Dioxide Emissions due to the Performance Degradation Factors of An Inner Network (내부 네트워크의 성능저하요인에 따른 이산화탄소 배출에 관한 연구)

  • Jeon, Jeon-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.11B
    • /
    • pp.1315-1322
    • /
    • 2011
  • Recently, The Problem of Global Warming around the world, is emerging as a very serious environmental problems, and as a way to fix it 'Green IT' is becoming an Issue. In these situations the evolution of network technologies with a various attacks, it appears, add the different security devices and systems are deployed. But, Deployment methods such a network, the performance and security of the internal network will affect on the greater and it will be increase Carbon Dioxide emissions. Therefore, In this paper, it will be to analyze Carbon Dioxide Emissions due to the Performance Degradation Factors of An Inner Network. and In a future, This paper is expected to serve as a valuable Information for the Network Performance and Security improvements and to reduce Carbon Emissions in the Field of IT.

A Study of an Anomalous Event Detection using White-List on Control Networks (제어망에서 화이트 리스트 기법을 이용한 이상 징후 탐지에 관한 연구)

  • Lee, DongHwi;Choi, KyongHo
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.77-84
    • /
    • 2012
  • The control network has been operated in a closed. But it changes to open to external for business convenience and cooperation with several organizations. As the way of connecting with user extends, the risk of control network gets high. Thus, in this paper, proposed the technique of an anomalous event detection using white-list for control network security and minimizing the cyber threats. The proposed method can be collected and cataloged of only normal data from traffic of internal network, control network and field devices. Through way to check the this situation, we can separate normal and abnormal behavior.

Design of One-Time-Pad based on PKI Coordinates Technique for a Safe Key Transmission in E-Commerce Applications (전자상거래 응용에서 안전한 키 전송을 위한 PKI 좌표기법 One-Time-Pad의 설계)

  • Lee, Kil-Hun;Jun, Moon-Seok;Choi, Do-Hyeon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.5
    • /
    • pp.51-60
    • /
    • 2015
  • As electronic commerce service became more popular, information equivalent to currency prevails in network. Accordingly, hacking into network often occurs and thus OTP (One-Time-Password) has emerged as an alternative secondary security system. However, weakness has been found in even existing One-Time Password that used to be considered 'perfect'. Therefore, it becomes very urgent to have an additional security countermeasure. As security recommendation is not considered as solution anymore, more specific plan becomes necessary. The present study proposes PKI coordinates technique-based OTP (One-Time-Pad) for a safe key transmission in E-commerce.

Study On Integrating Internet and Intranet based on IPSec and IMA Technology (IPSec과 IMA를 이용한 인터넷과 내부 망 통합에 관한 연구)

  • Cho, Yong-Gun
    • Convergence Security Journal
    • /
    • v.8 no.2
    • /
    • pp.71-78
    • /
    • 2008
  • This research is on the study of integrating internet and intranet that was built for their own enterprise into one network system that promises a more economic and secure use. Compared to this system, the traditional network conversion device not only has its mechanical limits, but also requires a separate network set up. This raises both interoperability and security problems and results in a higher cost. Therefore, I propose dual defence system based on the inverse multiplexing of ATM Forum and IPSec to improve network ability and deliver enhanced system reliability while reducing cost. Furthermore, I also addressed some of the weaknesses of the Scanning Attacking Method, SNMP and Spooler Port and proposed counter measures that will deal with these weakness at the dual defence system.

  • PDF

Enhancing Mobile Platform Security with Virtualization Technologies (가상화를 이용한 모바일 플랫폼 보안성 향상 기술)

  • Kim, Jung-Han;Kim, Jee-Hong;Shin, Eun-Hwan;Eom, Young-Ik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.201-212
    • /
    • 2011
  • Smartphone devices are widely used because of recent improvements in hardware device, network infrastructure, and emergences in open mobile platforms. These changes provide various advantages and cause security problems. One of the solutions to prevent these problems is that applying of the virtualization technology to mobile environment ha., attracted attention. In this paper, we proposed the virtualization technology which is based on security-enhanced mobile platform scheme, for secure mobile environment based on the secure execution and process concealing technology.

Analysis of IoT Open-Platform Cryptographic Technology and Security Requirements (IoT 오픈 플랫폼 암호기술 현황 및 보안 요구사항 분석)

  • Choi, Jung-In;Oh, Yoon-Seok;Kim, Do-won;Choi, Eun Young;Seo, Seung-Hyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.7
    • /
    • pp.183-194
    • /
    • 2018
  • With the rapid development of IoT(Internet of Things) technology, various convenient services such as smart home and smart city have been realized. However, IoT devices in unmanned environments are exposed to various security threats including eavesdropping and data forgery, information leakage due to unauthorized access. To build a secure IoT environment, it is necessary to use proper cryptographic technologies to IoT devices. But, it is impossible to apply the technologies applied in the existing IT environment, due to the limited resources of the IoT devices. In this paper, we survey the classification of IoT devices according to the performance and analyze the security requirements for IoT devices. Also we survey and analyze the use of cryptographic technologies in the current status of IoT open standard platform such as AllJoyn, oneM2M, IoTivity. Based on the research of cryptographic usage, we examine whether each platform satisfies security requirements. Each IoT open platform provides cryptographic technology for supporting security services such as confidentiality, integrity, authentication an authorization. However, resource constrained IoT devices such as blood pressure monitoring sensors are difficult to apply existing cryptographic techniques. Thus, it is necessary to study cryptographic technologies for power-limited and resource constrained IoT devices in unattended environments.

A study on Communication Robustness Testing for Industrial Control Devices (산업용 제어기기의 통신 견고성 시험 방안 연구)

  • Park, Kyungmi;Shin, Donghoon;Kim, WooNyon;Kim, SinKyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1099-1116
    • /
    • 2019
  • Industrial control systems(ICS) are widely used in various industrial area and critical infrastructure. To mitigate security threats on ICS, the security assurance test for industrial control devices has been introduced and operating. The test includes testing of the security function of the device itself and testing of communication robustness. In this paper, we describe the security requirements of EDSA, Achilles, and Korea's TTA standard(security requirements for ICS). And also, we analyzed the characteristics of communication robustness test(CRT) of each certification. CRT verifies the device's operation of essential function while transmitting fuzzing and stress packets. Existing test methods are mostly focused on the embedded devices and are difficult to apply to various devices. We propose a method to test communication robustness which reflect the characteristics of control H/W, control S/W, field devices and network devices in ICS. In the future, we will apply the proposed communication robustness test to actual products and present solutions for arising issues.

A Study on Creation of Secure Storage Area and Access Control to Protect Data from Unspecified Threats (불특정 위협으로부터 데이터를 보호하기 위한 보안 저장 영역의 생성 및 접근 제어에 관한 연구)

  • Kim, Seungyong;Hwang, Incheol;Kim, Dongsik
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.4
    • /
    • pp.897-903
    • /
    • 2021
  • Purpose: Recently, ransomware damage that encrypts victim's data through hacking and demands money in exchange for releasing it is increasing domestically and internationally. Accordingly, research and development on various response technologies and solutions are in progress. Method: A secure storage area and a general storage area were created in the same virtual environment, and the sample data was saved by registering the access process. In order to check whether the stored sample data is infringed, the ransomware sample was executed and the hash function of the sample data was checked to see if it was infringed. The access control performance checked whether the sample data was accessed through the same name and storage location as the registered access process. Result: As a result of the experiment, the sample data in the secure storage area maintained data integrity from ransomware and unauthorized processes. Conclusion: Through this study, the creation of a secure storage area and the whitelist-based access control method are evaluated as suitable as a method to protect important data, and it is possible to provide a more secure computing environment through future technology scalability and convergence with existing solutions.