• Title/Summary/Keyword: 사고구조 프로토콜

Search Result 22, Processing Time 0.027 seconds

Security Management by Zone Combination in Active Networks (액티브 네트워크에서의 연합을 통한 보안 관리)

  • 장범환;김동수;권윤주;남택용;정태명
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.82-96
    • /
    • 2003
  • The Internet has evolved into the global computer network due to the openness of its protocol, but such evolution brings about new risks and threats. To protect computer networks safely, it is the best way that preventing an attacher from intruding beforehand. However, to provision against all attacks causes the degradation of network performance as well as to prevent unknown attacks is very hard. Secure Combination, the framework which establishes a mutual collaboration and cooperation between the trusted zones, could protect systems from the potential attacks. This frameworks can predict attacks by exchanging security information and cooperating with each zone. It is a dynamic and powerful security architecture that rapidly enables updating security policy and deploying response modules.

User Interface Satisfaction of the Air Traffic Control System (항공교통관제시스템에 대한 사용자 인터페이스 만족도 조사)

  • Song, Chang-Sun;Sohn, Young-Woo;Kwon, Hyuk-Jin
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.22 no.4
    • /
    • pp.1-7
    • /
    • 2014
  • The purpose of study is to investigate the current user interface level of air traffic control system with the usability analysis and satisfaction survey questionnaire on user satisfaction. Think aloud protocol is used to identify not only task analysis, but also the level of user-friendliness of the FIMS and ASDE system, and the user interface questionnaires was conducted by QUIS. We collected data from 6 controllers for Think aloud protocol and 15 controllers for QUIS in Incheon airport. The results showed that the system was the valuable tool for ensuring human performance with the support of memory and the facilitation of decision-making tasks. It helps air traffic controllers perform better and minimize errors in a congested time. The human-computer interface system design, however, was not applied, which led to the increase of workload. Air traffic controller participation in software development provided excellent examples for applications in terms of software in FIMS. Based on these results, the study provided that the usability of system interface was necessary to take into account human factors. The development and design of system was discussed in User Interface environment.

An Energy-Efficient Self-organizing Hierarchical Sensor Network Model for Vehicle Approach Warning Systems (VAWS) (차량 접근 경고 시스템을 위한 에너지 효율적 자가 구성 센서 네트워크 모델)

  • Shin, Hong-Hyul;Lee, Hyuk-Joon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.4
    • /
    • pp.118-129
    • /
    • 2008
  • This paper describes an IEEE 802.15.4-based hierarchical sensor network model for a VAWS(Vehicle Approach Warning System) which provides the drivers of vehicles approaching a sharp turn with the information about vehicles approaching the same turn from the opposite end. In the proposed network model, a tree-structured topology, that can prolong the lifetime of network is formed in a self-organizing manner by a topology control protocol. A simple but efficient routing protocol, that creates and maintains routing tables based on the network topology organized by the topology control protocol, transports data packets generated from the sensor nodes to the base station which then forwards it to a display processor. These protocols are designed as a network layer extension to the IEEE 802.15.4 MAC. In the simulation, which models a scenario with a sharp turn, it is shown that the proposed network model achieves a high-level performance in terms of both energy efficiency and throughput simultaneously.

  • PDF

A Study on Development of the Monitoring Equipment for a Charging System (충전 시스템용 모니터링 장치 개발에 관한 연구)

  • Kim, Byoung-Hoon;Lee, Back-Haeng;Shin, Dong-Hyun;Jeong, Jin-Beom;Song, Hyun-Sik;Heo, Hoon;Kim, Hee-Jun
    • Proceedings of the KIEE Conference
    • /
    • 2009.07a
    • /
    • pp.979_980
    • /
    • 2009
  • 본 논문에서는 PHEV와 EV의 보급 확대에 따른 충전 시스템 사용자 혹은 관리자의 사고 방지 및 효율적인 충전 시스템의 운용을 위해서 차량내 배터리와 충전 시스템의 상태를 모니터링 할 수 있는 충전 모니터링 시스템의 구조와 충전 프로세스 알고리즘을 제안하고자 한다. 충전 모니터링 장치는 유/무선 통신기술을 적용하여 차량을 식별함으로써 효율적인 차량 관리 및 충전 시스템 운용이 가능하며 충전 시스템 내의 정보 교환, 충전 동작/정지 제어 등을 위한 차량과의 인터페이스 기술과 통신 프로토콜 등 다양한 기능이 필요하다. 본 논문에서는 충전 모니터링 장치용 제어기와 충전 전력량 및 상태 표시가 가능한 충전 모니터링 장치와 충전 알고리즘을 제안한다.

  • PDF

Design of Input Output Control System for Power Plant Simulator based on PC (PC기반의 발전소 시뮬레이터용 입출력 제어 시스템의 설계)

  • Cho, Ji-Yong;Gwak, Kwi-Yil;Lee, Jin-Kee
    • Proceedings of the KIEE Conference
    • /
    • 2001.07d
    • /
    • pp.2258-2260
    • /
    • 2001
  • 최근 급속한 하드웨어 및 소프트웨어 기술의 발달로 인하여 PC기반의 분산제어 시스템들이 산업계에 모습을 보이고 있다. 발전소 시뮬레이터는 발전소의 모든 운영을 통제하는 중앙제어실과 똑같은 형태 및 동작특성을 갖춘 설비로 운전원들이 정상적 상황은 물론 가상적인 사고상황에서도 긴급 대응할 수 있도록 훈련에 이용되는 모의훈련 시스템이다. 본 논문에서는 제어 자동화 통신망으로 떠오르고 있는 필드버스와 함께 시뮬레이터 판넬에 설치된 수만개에 달하는 각종 입출력 신호들을 분산된 PC 시스템에서 수집하고 이 신호들을 실시간 통신기술을 이용하여 원격의 현장(시뮬레이션 컴퓨터)까지 송수신해 주는 입출력 제어 시스템의 설계에 관한 내용을 소개한다. 특히 분산된 PC 시스템 구조와 각 시스템에 탑재될 소프트웨어 모듈들 그리고 TCP/IP를 대신하여 사용하고 있는 필드버스 프로토콜 드라이버의 설계에 관한 내용을 중심으로 소개하고자 한다.

  • PDF

Certificate-based SSO Protocol Complying with Web Standard (웹 표준을 준수하는 인증서기반 통합 인증 프로토콜)

  • Yun, Jong Pil;Kim, Jonghyun;Lee, Kwangsu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1466-1477
    • /
    • 2016
  • Public key infrastructure(PKI), principle technology of the certificate, is a security technology providing functions such as identification, non-repudiation, and anti-forgery of electronic documents on the Internet. Our government and financial organizations use PKI authentication using ActiveX to prevent security accident on the Internet service. However, like ActiveX, plug-in technology is vulnerable to security and inconvenience since it is only serviceable to certain browser. Therefore, the research on HTML5 authentication system has been conducted actively. Recently, domestic bank introduced PKI authentication complying with web standard for the first time. However, it still has inconvenience to register a certification on each website because of same origin policy of web storage. This paper proposes the certificate based SSO protocol that complying with web standard to provide user authentication using certificate on several sites by going around same origin policy and its security proof.

A Solution for Reducing Transmission Latency through Distributed Duty Cycling in Wireless Sensor Networks (무선 센서 네트워크에서 수신구간 분산 배치를 통한 전송지연 감소 방안)

  • Kim, Jun-Seok;Kwon, Young-Goo
    • 한국ITS학회:학술대회논문집
    • /
    • v.2007 no.10
    • /
    • pp.225-229
    • /
    • 2007
  • Recently, wireless sensor networks are deployed in various applications range from simple environment monitoring systems to complex systems, which generate large amount of information, like motion monitoring, military, and telematics systems. Although wireless sensor network nodes are operated with low-power 8bit processor to execute simple tasks like environment monitoring, the nodes in these complex systems have to execute more difficult tasks. Generally, MAC protocols for wireless sensor networks attempt to reduce the energy consumption using duty cycling mechanism which means the nodes periodically sleep and wake. However, in the duty cycling mechanism. a node should wait until the target node wakes and the sleep latency increases as the number of hops increases. This sleep latency can be serious problem in complex and sensitive systems which require high speed data transfer like military, wing of airplane, and telematics. In this paper, we propose a solution for reducing transmission latency through distributed duty cycling (DDC) in wireless sensor networks. The proposed algorithm is evaluated with real-deployment experiments using CC2420DBK and the experiment results show that the DDC algorithm reduces the transmission latency significantly and reduces also the energy consumption.

  • PDF

Development and evaluation of training protocols for mass casualty incidents during disaster response (다수사상자사고 대응 실습교육 프로토콜 개발 및 효과성 검증)

  • Ju-Ho, Park;Seung-Woo, Han
    • The Korean Journal of Emergency Medical Services
    • /
    • v.26 no.3
    • /
    • pp.121-135
    • /
    • 2022
  • Purpose: The purpose of this study was to develop a training protocol to standardize the management of mass casualties as part of the disaster response, and to verify the effectiveness of the training protocol. Methods: The study was conducted as a quasi-experimental study with a non-equivalent control group and pretest-posttest design. The protocol was divided into 5 parts, the first for the advance party, the second for the rescue team, the third for the paramedic team, the fourth for the ambulance team, and the fifth for the 119 EMS team. This study was conducted on November 15, 2021 and consisted of 21 subjects in the final experimental group and 23 subjects in the control group. In this study, the prior homogeneity test was analyzed using the χ2-test, intragroup comparisons were analyzed using the paired t-test, and intragroup comparisons were analyzed using the independent t-test. Results: The protocol was developed in five parts: advance party, rescue team, paramedics team, ambulance team, and 119 EMS team. In verifying the effectiveness of the protocol, it was found that there were significant differences in self-efficacy (t=-0.941, p=0.001) and self confidence within the group (t=-0.025, p=0.001) after the implementation of the mass casualty incident response training program. However, there was no significant difference between the experimental and control groups. Conclusion: Based on the findings of this study, it is believed that disaster response personnel can experience lower levels of anxiety and tension in disaster situations if they receive practical and realistic education and training. In the future, it is necessary to enhance protocol based practical education that can improve the knowledge and skills of each team and individual.

Implementation of Digital Document Management DRM System with OMA Structure (OMA 구조를 이용한 안전한 전자문서 관리를 위한 DRM 시스템 구현)

  • Shin Young-Chan;Choi Hyo-Sik;Kim Yong-Goo;Choi Seoko-Jin;Ryou Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.45-54
    • /
    • 2006
  • As widespread of using digital documents in various fields, control the usage of digital document is needed. So, Digital Rights Management(DRM) will become a key component of digital document system, but absence of proper digital document DRM system, there is a real risk to lose important information when a hacker achieved intrusion in important system. This paper designs and implements digital document DRM system based on OMA(Open Mobile Alliance) DRM model and OpenOffice. We considered being a digital document DRM system to contain appropriate solution of security and document compatibility.

Multi-Channel MAC Protocol Based on V2I/V2V Collaboration in VANET (VANET에서 V2I/V2V 협력 기반 멀티채널 MAC 프로토콜)

  • Heo, Sung-Man;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.1
    • /
    • pp.96-107
    • /
    • 2015
  • VANET technologies provide real-time traffic information for mitigating traffic jam and preventing traffic accidents, as well as in-vehicle infotainment service through Telematics/Intelligent Transportation System (ITS). Due to the rapid increasement of various requirements, the vehicle communication with a limited resource and the fixed frame architecture of the conventional techniques is limited to provide an efficient communication service. Therefore, a new flexible operation depending on the surrounding situation information is required that needs an adaptive design of the network architecture and protocol for efficiently predicting, distributing and sharing the context-aware information. In this paper, Vehicle-to-Infrastructure (V2I) based on communication between vehicle and a Road Side Units (RSU) and Vehicle-to-Vehicle (V2V) based on communication between vehicles are effectively combined in a new MAC architecture and V2I and V2V vehicles collaborate in management. As a result, many vehicles and RSU can use more efficiently the resource and send data rapidly. The simulation results show that the proposed method can achieve high resource utilization in accordance. Also we can find out the optimal transmission relay time and 2nd relay vehicle selection probability value to spread out V2V/V2I collaborative schedule message rapidly.