• Title/Summary/Keyword: 보안장치

검색결과 805건 처리시간 0.789초

신뢰성 있는 해상정보교환을 위한 안전한 AIS 통신 프로토콜

  • Jo, Gwan-Tae;Lee, Byeong-Gil
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 한국항해항만학회 2013년도 춘계학술대회
    • /
    • pp.195-197
    • /
    • 2013
  • 선박자동식별장치(AIS)는 선박의 선명, 제원 등 선박 정보, 운항정보 등을 선박과 선박 간, 선박과 관제센터 간 자동 송수신하는 장치다. 현재 국내에서는 전국 통합망 구축 사업 완료를 통해 AIS와 시스템이 본격적으로 운용되고 있다. 이러한 AIS 정보는 선박 대 선박 간의 충돌회피, 연안국이 불분명한 선박 및 그 화물에 대한 정보 획득, 선박 대 육상간의 통항관제를 위하여 사용된다. 하지만, 어선들은 생계와 관련된 어망의 위치가 노출되기 때문에, AIS 사용을 꺼려한다. 본 논문에서는 어선들의 위치가 노출되지 않도록 위치 정보를 암호화하고 인증하는 신뢰성 있는 AIS 통신 프로토콜을 제안한다.

  • PDF

Design of high power factor induction heating system with 3 phase diode rectifier and buck converter (3상 다이오드 정류기와 벅 컨버터를 사용한 고역률 유도가열 전원장치)

  • Lee, Chang-Woo;Choi, Seung-Soo;Kim, In-Dong;Jung, Jang Han;Seo, Dong Hoan
    • Proceedings of the KIPE Conference
    • /
    • 전력전자학회 2017년도 전력전자학술대회
    • /
    • pp.345-346
    • /
    • 2017
  • 유도가열은 전자기 유도현상을 이용하여 금속체를 직접 가열하는 방식이므로 높은 변환 효율로 전기에너지를 열에너지로 변환시킬 수 있다. 현재 널리 사용되고 있는 단조용 유도 가열 전원 장치는 주로 위상제어 정류기를 이용한다. 하지만 입력단의 저 역률 및 입력전류 THD가 높은 단점을 가진다. 따라서 본 논문에서는 이러한 단점을 보안하기 위한 3상 다이오드 정류기와 벅 컨버터를 사용한 고 역률 유도가열 전원 장치를 제안한다.

  • PDF

Design and Implementation of Secure Document Loss Prevention System by Real-Time Storage Device Packet Analysis (실시간 저장장치 패킷분석을 통한 안전한 문서 유출 방지 시스템의 설계 및 구현)

  • Kim, Hyun-Min;Kim, Su-Hyun;Lee, Sun-Ho;Lee, Im-Yeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 한국정보처리학회 2010년도 추계학술발표대회
    • /
    • pp.1217-1220
    • /
    • 2010
  • 휴대용 저장장치의 발달로 인하여 많은 보안상의 문제점들이 나타나고 있으며, 특히 공공기관 혹은 기업체 내에서 USB메모리 등 보조기억매체를 활용한 정보유출이 갈수록 증가하고 있다. 이에 따라 본 논문에서는 전송이 허가된 문서에 인증패킷의 삽입 후 실시간 패킷분석을 이용하여 휴대용 저장장치로 전송하는 문서의 이동경로 확인 및 허가되지 않은 문서들에 대한 제어가 가능하도록 시스템을 제안하게 되었다.

Software-based Encryption Pattern Bootstrap for Secure Execution Environment (보안 실행 환경을 위한 소프트웨어 기반의 암호화 패턴 부트스트랩)

  • Choi, Hwa-Soon;Lee, Jae-Heung
    • Journal of IKEEE
    • /
    • 제16권4호
    • /
    • pp.389-394
    • /
    • 2012
  • Most current systems have ignored security vulnerability concerned with boot firmware. It is highly likely that boot firmware may cause serious system errors, such as hardware manipulations by malicious programs or code, the operating system corruption caused by malicious code and software piracy under a condition of no consideration of security mechanism because boot firmware has an authority over external devices as well as hardware controls. This paper proposed a structural security mechanism based on software equipped with encrypted bootstrap patterns different from pre-existing bootstrap methods in terms of securely loading an operating system, searching for malicious codes and preventing software piracy so as to provide reliability of boot firmware. Moreover, through experiments, it proved its superiority in detection capability and overhead ranging between 1.5 % ~ 3 % lower than other software security mechanisms.

Analysis on Vulnerability of Secure USB Flash Drive and Development Protection Profile based on Common Criteria Version 3.1 (보안 USB 플래시 드라이브의 취약점 분석과 CC v3.1 기반의 보호프로파일 개발)

  • Jeong, Han-Jae;Choi, Youn-Sung;Jeon, Woong-Ryul;Yang, Fei;Won, Dong-Ho;Kim, Seung-Joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제17권6호
    • /
    • pp.99-119
    • /
    • 2007
  • The USB flash drive is common used for portable storage. That is able to store large data and transfer data quickly and carry simply. But when you lose your USB flash drive without any security function in use, all stored data will be exposed. So the new USB flash drive supported security function was invented to compensate for the problem. In this paper, we analyze vulnerability of 6 control access program for secure USB flash drives. And we show that exposed password on communication between secure USB flash drive and PC. Also we show the vulnerability of misapplication for initialization. Further we develop a protection profile for secure USB flash drive based on the common criteria version 3.1. Finally, we examine possible threat of 6 secure USB flash drives and supports of security objectives which derived from protection profile.

IoT Edge Architecture Model to Prevent Blockchain-Based Security Threats (블록체인 기반의 보안 위협을 예방할 수 있는 IoT 엣지 아키텍처 모델)

  • Yoon-Su Jeong
    • Journal of Internet of Things and Convergence
    • /
    • 제10권2호
    • /
    • pp.77-84
    • /
    • 2024
  • Over the past few years, IoT edges have begun to emerge based on new low-latency communication protocols such as 5G. However, IoT edges, despite their enormous advantages, pose new complementary threats, requiring new security solutions to address them. In this paper, we propose a cloud environment-based IoT edge architecture model that complements IoT systems. The proposed model acts on machine learning to prevent security threats in advance with network traffic data extracted from IoT edge devices. In addition, the proposed model ensures load and security in the access network (edge) by allocating some of the security data at the local node. The proposed model further reduces the load on the access network (edge) and secures the vulnerable part by allocating some functions of data processing and management to the local node among IoT edge environments. The proposed model virtualizes various IoT functions as a name service, and deploys hardware functions and sufficient computational resources to local nodes as needed.

Probability-based IoT management model using blockchain to expand multilayered networks (블록체인을 이용하여 다층 네트워크를 확장한 확률 기반의 IoT 관리 모델)

  • Jeong, Yoon-Su
    • Journal of the Korea Convergence Society
    • /
    • 제11권4호
    • /
    • pp.33-39
    • /
    • 2020
  • Interest in 5G communication security has been growing recently amid growing expectations for 5G technology with faster speed and stability than LTE. However, 5G has so far included disparate areas, so it has not yet fully supported the issues of security. This paper proposes a blockchain-based IoT management model in order to efficiently provide the authentication of users using IoT in 5G In order to efficiently fuse the authentication of IoT users with probabilistic theory and physical structure, the proposed model uses two random keys in reverse direction at different layers so that two-way authentication is achieved by the managers of layers and layers. The proposed model applied blockchain between grouped IoT devices by assigning weights to layer information of IoT information after certification of IoT users in 5G environment is stratified on a probabilistic basis. In particular, the proposed model has better functions than the existing blockchain because it divides the IoT network into layered, multi-layered networks.

Design and Performance Evaluation for GPS/GLONASS Antenna used for Container tracking (컨테이너 위치 추적에 활용되는 GPS/GLONASS 안테나 설계 및 성능 검증)

  • Lee, Eun-Kyu;Choi, Sung-Pill;Moon, Young-Sik;Kim, Jae-Joong;Choi, Hyung-Rim
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • 제17권7호
    • /
    • pp.1544-1550
    • /
    • 2013
  • In recent years, Container Security Device(CSD) using GPS & GLONASS to improve logistics efficiency are being extensively researched. The purpose of this paper is to examine the performance development antenna usable cargo container security transport. Antenna developed by study were optimized to match logistics environment apply to GPS/GLONASS dual frequency for monitering system. The measure of antenna have confirmation about frequency characteristics each 1575.42MHz, 1602MHz and VSWR is 2:1 measured in return loss -9.54dB. Reliability of this antenna has been verified about GPS/GLONASS through test-operation between the south korea and Russia.

A Study on the Analysis and Countermeasures of Security Vulnerabilities in Drone (드론의 보안 취약점 분석 및 대응방안 연구)

  • Son, Chung-Ho;Sim, Jaebum;Cheong, Il-Ahn
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 한국정보통신학회 2016년도 춘계학술대회
    • /
    • pp.355-358
    • /
    • 2016
  • Recently, As the interest of the drone has increased the fields such as broadcasting, disaster site and leisure which uses the drone has been constantly expanded. However, an invasion of a person's privacy and a threat of hacking attack also have increased as population of drone. High-resolution cameras mounted on drones can take a photo or real-time video anytime and anywhere. It causes the invasion of privacy from private houses, buildings, and hotels. In this paper, we perform a security vulnerability assessment tests on the camera's from common commercial drones and we propose the countermeasures to protect the drones against unauthorized attacker who attempts to access the drone's camera from internal or external. Through this research, we expect the Aviation Act and legislation accept the concept of security and provide the polices such as drones equipped with security devices from the production stage to promote drone industry.

  • PDF

Flexible Crypto System for IoT and Cloud Service (IoT와 클라우드 서비스를 위한 유연한 암호화 시스템)

  • Kim, SeokWoo
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • 제9권1호
    • /
    • pp.15-23
    • /
    • 2016
  • As various IoT devices appear recently, Cloud Services such as DropBox, Amazon S3, Microsoft Azure Storage, etc are widely use for data sharing across the devices. Although, cryptographic algorithms like AES is prevalently used for data security, there is no mechanisms to allow selectively and flexibly use wider spectrum of lightweight cryptographic algorithms such as LEA, SEED, ARIA. With this, IoT devices with lower computation power and limited battery life will suffer from overly expensive workload and cryptographic operations are slower than what is enough. In this paper, we designed and implemented a CloudGate that allows client programs of those cloud services to flexibly select a cryptographic algorithms depending on the required security level. By selectively using LEA lightweight algorithms, we could achieve the cryptographic operations could be maximum 1.8 faster and more efficient than using AES.