• Title/Summary/Keyword: 안전 관리 네트워크 시스템

Search Result 362, Processing Time 0.031 seconds

A Design of Internet-Based Safety Guarantee Global Integrated Logistics Management System Framework (인터넷 기반의 안전보장 글로벌 통합물류관리시스템 프레임워크 설계)

  • Hong, Ho-Seon;Hong, Ki-Sung;Lee, Chulung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.5
    • /
    • pp.103-111
    • /
    • 2013
  • This paper provide a framework for an IGILMS(internet-based global integrated logistics management system) which can access and mediate cargo transportations among small- and medium-sized domestic/international logistics corporations as regards cargo, registration and search for space, public tender and negotiation, contract, payment and safety-guarantee, transportation through the internet, wireless communication means, or smart phone etc. In addition, we describe a model to provide customized services in the B2B e-market for IGILMS and the structure and the control of its fulfillment process, and provide technical architecture of the IGILMS for an internet-based global logistics management system. To validate an efficiency of the proposed system, we develop a simulation model and analyze the performance of the proposed system.

Conception and Implementation Strategies for u-Multi-Functional Administrative City (u-행복도시 구상 및 추진전략)

  • Kim, Jeong-Hun;Choe, Byung-Nam;Sin, Jeong-Yeop;Lee, Mi-Suk
    • 한국공간정보시스템학회:학술대회논문집
    • /
    • 2005.11a
    • /
    • pp.113-120
    • /
    • 2005
  • 최근의 정보통신기술의 급격한 발전으로 인해 향후 도시를 건설할 때 도시운영 및 관리뿐만 아니라 도시민들이 향유할 각종 서비스에 정보통신기술 변화를 반영하여야 할 것이다. 행정중심복합도시를 건설하기 위해서도 이러한 정보기술의 변화를 전망하고, 이를 구현하기 위한 추진방안이 모색되어야 한다. 행정중심복합도시는 과거의 전형적인 도시개발방식에서 탈피하고, 새로운 방식과 모델을 도입하여 21세기의 모범적인 도시를 건설하는 것이 필요하다. 그리고 IT의 비약적인 발전에 따라 도시의 물리적 거리와 시간에 구애받지 않고 무한한 정보를 매체로 새로운 도시공간으로 구현되어야 한다. 또한 이러한 정보기술의 발전을 통해 행정중심복합도시의 가치를 높이고 새로운 비즈니스 기회를 창출할 필요가 있다. 이를 위해 본 연구에서는 u-행복도시의 비전을 '사람과 자연과 기술이 하나되는 세계제일의 지능정보도시'로 정의하고 이러한 비전을 토대로 행적 효율과 시민 편익이 제고되는 전자 행정중심 도시, 자연과 인간이 함께 하는 지능형 환경 도시, 시민 안전을 도모하는 첨단정보관리 도시, 사람과 사물이 연결되는 정보 네트워크 도시에 대한 구현방안을 모색하였다.

  • PDF

An Implementation on CIS Management for Underground Social Infrastructure based on Active RFID (능동형 RFID 기반의 지하 매설물 GIS 관리 구현)

  • Baek, Jang-Mi;Hong, In-Sik
    • Journal of Internet Computing and Services
    • /
    • v.8 no.3
    • /
    • pp.45-56
    • /
    • 2007
  • Recently, much research has been actively conducted for a new kind of network environment ubiquitous computing. This paper will define the smart-tag technology required by a ubiquitous environment. We will describe how to apply smart-tag-related Radio Frequency Identification(RFID) research for GIS in underground social infrastructure, a local-area wireless-communication technology. Application development is important that will be able to materialize a network environment. This research promotes various application developments, such reason currently it establishes the IT 839 from domestic. The geographic information system construction is a part of IT 839. The research which is various becomes accomplished for the ubiquitous of social base facility from domestic. Consequently, in this paper analyzes the geographic information system of existing, researches based RFID underground social infrastructure management system development. The Proposed method is complements the method of existing, and is efficient for underground social infrastructure. This system is new management system for underground social infrastructure, and provides safe administrator function using authentication of active RFID tag. It provides real processing and autonomy of administrator.

  • PDF

The Study on The Key Management Mechanism on 3G LTE and SAE (3G LTE 및 SAE 네트워크에서 키 관리 방법에 관한 연구)

  • Jung, Young-Jun;Yun, Seung-Hwan;Yi, Ok-Yeon;Lim, Joing-In
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2008.02a
    • /
    • pp.99-102
    • /
    • 2008
  • 차세대 이동 통신 서비스 4G는 이동 중 100Mbps, 정지 중 1Gbps급 전송 속도를 제공하는 미래 무선 통신 기술이다. 이것은 현재 상용서비스가 이뤄지고 있는 3G HSDPA(High Speed Packet Access)의 전송속도 14Mbps에 비해 10~100배까지 빠른 속도로 무선 인터넷이 가능함으로 유선으로 인터넷을 사용할 필요가 없어진다. 현재 4G 기술로 진화하기 위한 중간 단계로써 ITU-R, 3GPP, 3GPP2, IEEE 등 세계 각국의 표준 및 기술 단체에서 새로운 무선 이동 통신 기술을 제안하고 있다. 이 중에서 2G의 GSM과 3G의 비동기식 기술 WCDMA의 진화 기술인 3GPP LTE(Long Term Evolution) 및 SAE(System Architecture Evolution)가 유력한 4G 이동 통신 기술 후보로 평가 받고 있다. 본 논문에서는 4G 기술로 주목 받고 있는 3GPP LTE 및 SAE 네트워크에서 3G 시스템 보다 진화된 서비스를 제공하기 위한 목적으로 논의되고 있는 일반적인 요구사항과 이를 만족시키기 위한 기술에 대하여 알아본다. 또한 LTE 표준화와 병행하여 네트워크의 구조를 결정하는 SAE의 구성요소와 프로토콜 구조를 소개하고 LTE 및 SAE 네트워크의 보안위협과 안전한 통신을 위한 키 관리 방법에 대하여 논의한다.

  • PDF

A Design of an AMI System Based on an Extended Home Network for the Smart Grid (스마트 그리드를 위한 확장 홈 네트워크 기반의 AMI 시스템 설계)

  • Hwang, Yu-Jin;Lee, Kwang-Hui
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.7
    • /
    • pp.56-64
    • /
    • 2012
  • A smart grid is the next generation power grid which combines the existing power grid with information technology, so an energy efficient power grid can be provided. In this paper, in order to build an efficient smart grid an AMI system, which gears with the existing home network and provides an user friendly management function, is proposed. The proposed AMI system, which is based on an extended home network, consists of various functional units; smart meters, communication modules, home gateway, security modules, meter data management modules (MDMM), electric power application modules and so on. The proposed home network system, which can reduce electric power consumption and transmit data more effectively, is designed by using IEEE 802.15.4. The extended home gateway can exchange energy consumption information with the outside management system via web services. The proposed AMI system is designed to enable two-way communication between the home gateway and MDMM via the Internet. The AES(Advanced Encryption Standard) algorithm, which is a symmetric block cipher algorithm, is used to ensure secure information exchange. Even though the results in this study could be limited to our experimental environment, the result of the simulation test shows that the proposed system reduces electric power consumption by 4~42% on average compared to the case of using no control.

Introduction to Establishment of the Korea Ocean Satellite Center : Basic Environment and Hardware (해양위성센터 구축 소개 : 기반환경 및 하드웨어 중심)

  • Yang, Chan-Su;Bae, Sang-Soo;Han, Hee-Jeong;Ahn, Yu-Hwan
    • Proceedings of KOSOMES biannual meeting
    • /
    • 2008.05a
    • /
    • pp.191-195
    • /
    • 2008
  • In Ansan (the headquarter of KORDI ; Korea Ocean Research & Development Institute), KOSC(Korea Ocean Satellite Center) is being prepared for acquisition, processing and distribution of sensor data via L-band from GOCI(Geostationary Ocean Color Imager) instrument which is loaded on COMS(Communication, Ocean and Meteorological Satellite); it will be launched in 2009. The basis equipment of KOSC(Electric power, Network, Security) has been constructed in 2007. KOSC is being constructed data processing and management system, GOCI L-band reception system, etc. The final object of KOSC is that maximize the application of GOCI.

  • PDF

A Study on Improvement Methods for Encrytion and Authentication in Batt le Field Management System(C4I) (전장관리체계(C4I)에서의 암호 및 인증방법 개선 방안에 관한연구)

  • Lee, Won Man;Koo, Woo Kwon;Park, Tae Hyeong;Lee, Dong Hoon
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.39-50
    • /
    • 2012
  • Battlefield management systems are operated by the Public Key Infrastructure (PKI) and cryptographic equipment is distributed through the personal delivery to the enemy has deodorizing prone to structure. In addition, Per person each battlefield management system (C4I) encryption key operate and authentication module to manage multiple encryption so, encryption key operating is restrictions. Analysis of the problems of this public key infrastructure(PKI), Identity-Based Cryptosystem(IBC) and Attribute-Based Cryptosystem(ABC) to compare construct the future of encrypt ion and authentication system were studied. Authentication method for the connection between the system that supports data encryption and secure data communication, storage, and communication scheme is proposed.

ID-Based Group Key Management Protocols for Dynamic Peer Groups (피어 그룹을 위한 ID 기반의 그룹키 관리 프로토콜)

  • Park, Young-Ho;Lee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.7
    • /
    • pp.922-933
    • /
    • 2004
  • In recent years, peer-to-peer network have a greate deal of attention for distributed computing or collaborative application, and work of ID-based public key systems have been focusing on the area of cryptography. In this paper, we propose ID-based group key management protocols for secure communication in autonomous peer group. Each member obtains his public/private key pair derived from his identification string from Private Key Generator. No central server participates in group key management protocol instead, all group members share the burden of group key management by the collaboration of themselves, so that our scheme avoids the single point of failure problem. In addition, our scheme considers the nature of dynamic peer group such as frequent joining and leaving of a member.

  • PDF

Mutual Authentication Protocol for Safe Data Transmission of Multi-distributed Web Cluster Model (다중 분산 웹 클러스터모델의 안전한 데이터 전송을 위한 상호 인증 프로토콜)

  • Lee, Kee-Jun;Kim, Chang-Won;Jeong, Chae-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.731-740
    • /
    • 2001
  • Multi-distributed web cluster model expanding conventional cluster system is the cluster system which processes large-scaled work demanded from users with parallel computing method by building a number of system nodes on open network into a single imaginary network. Multi-distributed web cluster model on the structured characteristics exposes internal system nodes by an illegal third party and has a potential that normal job performance is impossible by the intentional prevention and attack in cooperative work among system nodes. This paper presents the mutual authentication protocol of system nodes through key division method for the authentication of system nodes concerned in the registration, requirement and cooperation of service code block of system nodes and collecting the results and then designs SNKDC which controls and divides symmetrical keys of the whole system nodes safely and effectively. SNKDC divides symmetrical keys required for performing the work of system nodes and the system nodes transmit encoded packet based on the key provided. Encryption packet given and taken between system nodes is decoded by a third party or can prevent the outflow of information through false message.

  • PDF

Design and Implementation of Secure DRM System for Contents Streaming (컨텐츠 스트리밍을 위한 안전한 DRM 시스템 설계 및 구현)

  • 이진흥;김태정;박지환
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.177-186
    • /
    • 2003
  • DRM(Digital Rights Management) is a technology that manages secure distributions and copyrights of digital contents on the Internet. It is general giving the rights to use the encrypted contents that are downloaded by a simple authorization process in the existing DRM system. Once this is done you are allowed to access. In this paper, we use RTP(Real-time Transport Protocol) for end-to-end real-time data transmission. And the system is designed to make it Possible to Protect copyrights and to distribute contents with safety through periodic authentication. We implemented DRM system to stand this basis. The proposed system vests only authorized users with authority to access the license. Hence it prevents contents to be distributed and copied illegally on networks.