• Title/Summary/Keyword: 안전성 강화

Search Result 1,266, Processing Time 0.026 seconds

Hacking attack and vulnerabilities in vehicle and smart key RF communication (차량과 스마트키 RF통신에 대한 해킹 공격 및 취약점에 대한 연구)

  • Kim, Seung-woo;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.8
    • /
    • pp.1052-1057
    • /
    • 2020
  • With the development of new ICT technology, smart keys for vehicles are terminals with ICT technology. Therefore, when the vehicle and the smart key communicate with RF, a cyber hacking attack is possible. Cyber-attacks on smart keys can pose a threat to vehicle theft and vehicle control. Therefore, it is necessary to study hacking attacks and vulnerabilities of smart keys for autonomous vehicles. In this paper, we analyze the cyber attack case of RF communication for vehicles and smart keys. In addition, a real RF cyber attack on the smart key is performed, and the vulnerability of radio wave replication in the same frequency band is found. In this paper, we analyze the vulnerability of RF communication between vehicles and smart keys, and propose a countermeasure against cyber security. In the future, plans to strengthen cyber attacks and security through the popularization of autonomous vehicles will become basic data to protect human and vehicle safety.

Proposal of SMPC Biometric Authentication System Based on Public Blockchain (퍼블릭 블록체인 기반 SMPC 생체인증 시스템 제안)

  • Ji-Su Doo;Hyeok Kang;Keun-Ho Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.2
    • /
    • pp.77-82
    • /
    • 2023
  • As the method of collecting and utilizing structured and unstructured data develops due to the influence of the Fourth Industrial Revolution, unwanted personal information data is also being collected and utilized, and hackers are attempting various attacks to steal information. As a result, the importance of information protection has increased, and various protection techniques have emerged, among which many studies have been conducted using decentralized techniques of blockchain and various algorithms to strengthen the security of biometric authentication techniques. This paper proposed a public blockchain biometric authentication system that allows users to protect their data in a safer biometric authentication method in the public blockchain and use it in the blockchain through signature with authenticated information.

A study on ways to strengthen the new security system through the stipulation of zero trust : legal improvement under the Electronic Financial Transactions Act (제로 트러스트 명문화를 통한 신 보안체계 강화 방안 연구 - 전자금융거래법상 법적 개선을 중심으로 -)

  • Min-won Lee;Hun-yeong Kwon
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.9-17
    • /
    • 2023
  • Due to COVID-19, the concept of Zero Trust, a safe security in a non-face-to-face environment due to telecomm uting, is drawing attention. U.S. President Biden emphasized the introduction of Zero Trust in an executive order to improve national cybersecurity in May 2021, and Zero Trust is a global trend. However, the most difficulty in introd ucing new technologies such as Zero Trust in Korea is excessive regulation of cloud and network separation, which is based on the boundary security model, but is limited to not reflecting all new information protection controls due to non-face-to-face environments. In particular, in order for the government's policy to ease network separation to b ecome an effective policy, the zero trust name culture is essential. Therefore, this paper aims to study legal improve ments that reflect the concept of zero trust under the Electronic Financial Transactions Act.

A User Authentication Scheme using Blockchain in Smart Grid-based Edge Computing Environments (스마트 그리드 기반 엣지 컴퓨팅 환경에서 블록체인을 이용한 사용자 인증 기법)

  • Hakjun Lee;Youngsook Lee
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.71-79
    • /
    • 2022
  • The smart grid system has emerged to maximize energy efficiency through real-time information exchange between power providers and consumers by combining information technology and power supply systems. The authentication schemes using blockchain in a smart grid system have been proposed, which utilize an edge server's architecture to collect and store electric power-related information and process data between a central cloud server and smart grid-IoT devices. Although authentication schemes are being proposed to enhance security in the smart grid environment, many vulnerabilities are still reported. This paper presents a new mutual authentication scheme to guarantee users' privacy and anonymity in a smart grid based on edge computing using blockchain. In the proposed scheme, we use the smart contract for the key management's efficiency, such as updating and discarding key materials. Finally, we prove that the proposed scheme not only securely establishes a session key between the smart grid-IoT device of the user and the edge server but also guarantees anonymity.

Development of Airline EBT Program Model (항공사 EBT 프로그램 모델 개발)

  • Jihun Choi;Sung-yeob Kim;Hyeon-deok, Kim
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.5
    • /
    • pp.528-533
    • /
    • 2023
  • Airlines tried to introduce training programs in connection with practical work in order to provide more effective education and training. To this end, airlines have been conducting evidence-based training(EBT) to strengthen the practical capabilities of aviation personnel and enhance safety culture. Airlines can systematically evaluate the capabilities and practical capabilities of aviation personnel by analyzing operational data and case studies for effective EBT model development. In addition, EBT models can be constructed by applying technical methods such as crew resource management (CRM) and a holistic approach that includes human factors. Due to the introduction of EBT, airlines will establish diagnostic and feedback systems for pilots' practical work, provide personalized education, and establish an education and training system that verifies the effectiveness of education through educational outcomes.

Development of Android App to Record and Manage Travel Routes for Location Information Protection (위치정보 보호를 위한 이동 경로 기록 및 관리 서비스 앱 개발)

  • Seoyeon Kim;Ah Young Kim;Minjung Oh;Saem Oh;Sungwook Kim
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.10
    • /
    • pp.437-444
    • /
    • 2023
  • Location-based services play a vital role in our daily lives. While these services enhance user convenience, user's privacy is at risk because they lead to a rapid surge in collecting and utilizing location information for a user. In this paper, we design and implement an application that securely records and manages user location information. We enhance the privacy protection aspect concerning location information by providing some features. Utilizing Room DB, we store collected personal location information in the user's local database instead of the server of the location-based service provider. Furthermore, user can initiate and terminate recording at their discretion, thereby enhancing the protection of personal information related to location data. User's unease regarding their movement paths is reduced by empowering them to have control over their own location information.

Experimental Analysis of Physical Signal Jamming Attacks on Automotive LiDAR Sensors and Proposal of Countermeasures (차량용 LiDAR 센서 물리적 신호교란 공격 중심의 실험적 분석과 대응방안 제안)

  • Ji-ung Hwang;Yo-seob Yoon;In-su Oh;Kang-bin Yim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.217-228
    • /
    • 2024
  • LiDAR(Light Detection And Ranging) sensors, which play a pivotal role among cameras, RADAR(RAdio Detection And Ranging), and ultrasonic sensors for the safe operation of autonomous vehicles, can recognize and detect objects in 360 degrees. However, since LiDAR sensors use lasers to measure distance, they are vulnerable to attackers and face various security threats. In this paper, we examine several security threats against LiDAR sensors: relay, spoofing, and replay attacks, analyze the possibility and impact of physical jamming attacks, and analyze the risk these attacks pose to the reliability of autonomous driving systems. Through experiments, we show that jamming attacks can cause errors in the ranging ability of LiDAR sensors. With vehicle-to-vehicle (V2V) communication, multi-sensor fusion under development and LiDAR anomaly data detection, this work aims to provide a basic direction for countermeasures against these threats enhancing the security of autonomous vehicles, and verify the practical applicability and effectiveness of the proposed countermeasures in future research.

Security Threats to Enterprise Generative AI Systems and Countermeasures (기업 내 생성형 AI 시스템의 보안 위협과 대응 방안)

  • Jong-woan Choi
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.9-17
    • /
    • 2024
  • This paper examines the security threats to enterprise Generative Artificial Intelligence systems and proposes countermeasures. As AI systems handle vast amounts of data to gain a competitive edge, security threats targeting AI systems are rapidly increasing. Since AI security threats have distinct characteristics compared to traditional human-oriented cybersecurity threats, establishing an AI-specific response system is urgent. This study analyzes the importance of AI system security, identifies key threat factors, and suggests technical and managerial countermeasures. Firstly, it proposes strengthening the security of IT infrastructure where AI systems operate and enhancing AI model robustness by utilizing defensive techniques such as adversarial learning and model quantization. Additionally, it presents an AI security system design that detects anomalies in AI query-response processes to identify insider threats. Furthermore, it emphasizes the establishment of change control and audit frameworks to prevent AI model leakage by adopting the cyber kill chain concept. As AI technology evolves rapidly, by focusing on AI model and data security, insider threat detection, and professional workforce development, companies can improve their digital competitiveness through secure and reliable AI utilization.

A Study on Obtaining Feedback Function of Disaster Information Management using Information & Communication Technology (ICT기술을 이용한 방재정보 관리의 환류기능 확보에 관한 연구)

  • Ko, Jaesun
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.1
    • /
    • pp.73-88
    • /
    • 2015
  • Due to the cases of recent global warming and unusual weather etc., large-scale natural disasters such as typhoons, floods, snow damage occur frequently across the continents such as Southeast Asia and North America, South America etc. and risks of earthquakes and tsunami are also increasing gradually in Korea which has been regarded as a safe zone and disaster types are also being diversified such as typhoons, floods, heat waves, heavy snow and damage scale is also enlarged. In addition, due to geographical characteristics or lack of infrastructure, disasters tended to occur intensively around a specific region or city in the past but disasters occur throughout the country in recent years so preparation for disaster prevention has emerged as an urgent challenge issue. Therefore, considering that the plan of obtaining the effective feedback function of disaster Information is very important in the proactive and software aspects for disaster reduction, this paper analyzed this three aspects of contents, procedural and contextual aspects and proposed the plan. First, in the content aspect, building disaster prevention information communication Infrastructure, building urban and regional disaster prevention system, obtaining concurrency and sharing of information and second, in the procedural aspect, active utilization of ICT(Information and Communication Technology) of the prevention stage, disaster prevention information collection and analysis reinforcement of the preparation stage, improvement of decision-making structure and field command system of the response stage, recovery system related information promotion of the recovery stage were proposed as alternatives and finally, in the contextual aspect, if disaster prevention information is effectively managed through maintenance of disaster prevention information related systems, obtaining domainality by disaster prevention work, improvement of the ability to judge the situation, obtaining comprehensive and feedback function etc, it is considered to significantly contribute to reducing natural disasters.

Electric Vehicle Wireless Charging Control Module EMI Radiated Noise Reduction Design Study (전기차 무선충전컨트롤 모듈 EMI 방사성 잡음 저감에 관한 설계 연구)

  • Seungmo Hong
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.16 no.2
    • /
    • pp.104-108
    • /
    • 2023
  • Because of recent expansion of the electric car market. it is highly growing that should be supplemented its performance and safely issue. The EMI problem due to the interlocking of electrical components that causes various safety problems such as fire in electric vehicles is emerging every time. We strive to achieve optimal charging efficiency by combining various technologies and reduce radioactive noise among the EMI noise of a weirless charging control module, one of the important parts of an electric vehicle was designed and tested. In order to analyze the EMI problems occurring in the wireless charging control module, the optimized wireless charging control module by applying the optimization design technology by learning the accumulated test data for critical factors by utilizing the Python-based script function in the Ansys simulation tool. It showed an EMI noise improvement effect of 25 dBu V/m compared to the charge control module. These results not only contribute to the development of a more stable and reliable weirless charging function in electric vehicles, but also increase the usability and efficiency of electric vehicles. This allows electric vehicles to be more usable and efficient, making them an environmentally friendly alternative.