• Title/Summary/Keyword: 안전 관리 네트워크 시스템

Search Result 364, Processing Time 0.032 seconds

A White-box ARIA Implementation (화이트박스 ARIA 구현)

  • Hong Tae Kim
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.69-76
    • /
    • 2024
  • The white-box implementation is a cryptographic technique used to protect the secret key of a cryptographic system. It is primarily employed for digital rights management for music and videos. Since 2002, numerous white-box implementations have been developed to ensure secure digital rights management. These have been applied to AES and DES. ARIA, a 128-bit block cipher with an involution substitution and permutation network (SPN), was selected as a South Korean standard in 2004. In this paper, we propose the first white-box ARIA implementation. Our implementation consists of 7,696 lookup tables, with a total size of 1,984 KB. We demonstrate that it also has considerable white-box diversity and white-box ambiguity from a security perspective.

Development of NORSOK T-100-based telecom management system for off-shore installation (NORSOK T-100 기반의 해양플랜트용 TMS 응용 소프트웨어 개발)

  • Mun, Seong-Mi;Jang, Won-Seok;Park, Su-Hyun
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.40 no.3
    • /
    • pp.210-216
    • /
    • 2016
  • Malfunctioning of telecom systems can have serious implications on the safe navigation and operation of vessels and off-shore plants. Most safety-related accidents incur significant monetary damages and pollution due to complicated arrangements of the working environments and facilities. Therefore, an automated monitoring system that can collect data from configured telecom equipment connected to a network based on IP is required to ensure safe navigation and operation of such crucial institutions. This paper reports a list of such system requirements, system functions, and user-centered requirements based on the NORSOK T-100 (a standard of telecom management system). These findings were made through research with the newly designed and developed telecom management system (TMS). The TMS was tested by a testbed configured with CCTV, PA/GA, and other network equipment.

A Study on the Reading's Metadata of Internet-Based School library Information System (인터넷 기반 학교도서관 정보시스템의 독서 관련 메타데이터에 관한 연구)

  • Lee, Byeong-Ki
    • Journal of the Korean Society for information Management
    • /
    • v.20 no.2
    • /
    • pp.157-175
    • /
    • 2003
  • The Ministry of Education and Human Resources Development is propelling the estabilishment project of Internet-based School Library Information System for prepares a foundation of resource sharing and inter-school library loan, to improvement of DB construction's efficiency and to reduces a maintenance's burden of local information system. This system adapted the Dublin Core based DLS-I metadata to accommodate teh network resources and conventional MARC, it will be able to use easily. But this system does not consider metadata for reading instruction that the important element of school library service. Thus, this study is review to the necessity of description on the reading and reading instruction beside of bibliographic data, extracts a metadata elements of reading and reading school library information system(DLS-I metadata)

A Study on the Operation Plan of the Gangwon-do Disaster Management Resources Integrated Management Center (강원도 재난관리자원 통합관리센터 운영방안에 관한 연구)

  • Hang-Il Jo;Sang-Beom Park;Kye-Won Jun
    • Journal of Korean Society of Disaster and Security
    • /
    • v.17 no.1
    • /
    • pp.9-16
    • /
    • 2024
  • In Korea, as disasters become larger and more complex, there is a trend of shifting from a focus on response and recovery to a focus on prevention and preparedness. In order to prevent and prepare for disasters, each local government manages disaster management resources by stockpiling them. However, although disaster management resources are stored in individual warehouses, they are managed by department rather than by warehouse, resulting in insufficient management of disaster management resources due to the heavy workload of those in charge. In order to intensively manage these disaster management resources, an integrated disaster management resource management center is established and managed at the metropolitan/provincial level. In the case of Gangwon-do, the subject of this study, a warehouse is rented and operated as an integrated disaster management resource management center. When leasing an integrated management center, there is the inconvenience of having to move the location every 1 to 2 years, so it is deemed necessary to build a dedicated facility in an available site. To select a location candidate, network analysis was used to measure access to and use of facilities along interconnected routes of networks such as roads and railways. During network analysis, the Location-Allocation method, which was widely used in the past to determine the location of multiple facilities, was applied. As a result, Hoengseong-gun in Gangwon-do was identified as a suitable candidate site. In addition, if the integrated management center uses our country's logistics system to stockpile disaster management resources, local governments can mobilize disaster management resources in 3 days, and it is said that it takes 3 days to return to normal life after a disaster occurs. Each city's disaster management resource stockpile is 3 days' worth per week, and the integrated management center stores 3 times the maximum of the city's 4-day stockpile.

Hash-based Network Security Protocol For RFID Authentication (RFID 인증을 위한 해쉬함수 기반의 네트워크 보안 프로토콜)

  • Park Jong-Dae;Kim Hyun-Seok;Choi Jin-Young
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06c
    • /
    • pp.298-300
    • /
    • 2006
  • RFID는 무선주파수를 이용하여 부착된 태그의 정보를 얻어올 수 있는 시스템이다. 향후에 바코드를 대체할 RFID는 식품,가전,출판,물류,재고관리,교통 등 우리생활의 전반에 걸쳐 사용될 획기적인 시스템이지만, 개인,상품 등의 프라이버시의 노출로 인한 심각한 문제가 발생될 소지가 있다. 이를 해결하기 위하여 암호화 기법, 해쉬 락 기법, 해쉬 체인 기법 등이 제안되었다. 본 논문에서는 기존에 제시되었던 인증기법들에 대해서 알아보고, 해쉬함수와 공통키를 이용하여 좀더 안전한 방법으로 리더와 태그간의 통신을 인증할 수 있는 프로토콜을 제안한다.

  • PDF

A Study On Information Security Data Collecting System For Security Monitoring Of Education Facilities (교육기관 보안관제를 위한 효율적인 정보보호 수집체계에 관한 연구)

  • KWEON, SEONG-HO;AHN, JAE-HO;YOON, SUNG-JUN
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.597-598
    • /
    • 2009
  • 최근의 국가 민간의 정보시스템을 위협하는 공격들은 점점 더 복잡해지고 정교해지고 있다. 이러한 공격들에 대응하기 위하여 범국가적으로 사이버안전센터들이 설립 운영되고 있다. 그러나 이러한 대량의 정보보호 데이터를 수집 분석 대응하는 것은 여러 가지 어려움들이 존재한다. 그 문제의 본질적인 부분은 바로 방대한 데이터의 양(量)이다. 다수의 보안관제 대상 인프라들의 모든 보안데이터를 수집 하는 것은 사실상 불가능하며, 대부분의 센터들은 네트워크 접점에 중앙관리형 보안인프라를 설치함으로써 그 해결점을 찾고 있지만, 이는 최근의 나타나고 있는 다차원적인 공격에 대응하기에는 한계가 있다. 본 논문에서는 이러한 다차원 분석시스템의 기본데이터가 되는 여러 보안정보를 효과적으로 수집할 수 있는 보안정보 수집체계를 제시하고자 한다.

Analysis of Effects of Autonomous Vehicle Market Share Changes on Expressway Traffic Flow Using IDM (IDM을 이용한 자율주행자동차 시장점유율 변화가 고속도로 교통류에 미치는 영향 분석)

  • Ko, Woori;Park, Sangmin;So, Jaehyun(Jason);Yun, Ilsoo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.20 no.4
    • /
    • pp.13-27
    • /
    • 2021
  • In this study, the impact of traffic flow on the market penetration rate of autonomous vehicles(AV) was analyzed using the data for the year 2020 of the Yongin IC~Yangji IC section of Yeongdong Expressway. For this analysis, a microscopic traffic simulation model VISSIM was utilized. To construct the longitudinal control of the AV, the Intelligent Driver Model(IDM) was built and applied, and the driving behavior was verified by comparison with a normal vehicle. An examination of the study results of mobility and safety according to the market penetration rate of the AV, showed that the network's mobility improves as the market penetration rate increases. However, from the point of view of safety, the network becomes unstable when normal vehicles and AVs are mixed, so there should be a focus on traffic management for ensuring safety in mixed traffic situations.

Design of Autonomous Independent Power System for USN Sensor Node Using Power CT (Power CT를 이용한 USN 센서노드용 자율독립전원 시스템 설계)

  • Son, Won-Kuk;Jeong, Jae-Kee
    • The Journal of Korean Institute of Information Technology
    • /
    • v.16 no.12
    • /
    • pp.101-107
    • /
    • 2018
  • In wireless sensor network technology, which has been applied to various fields, the power supply and the power management of sensors are the most important issues. For this reason, a new concept of power supply and power management device is required. In this paper, we developed an autonomous independent power supply system that supplies the stable power to a sensor node without an additional external input by applying the energy harvesting technology using the electromagnetic induction principle by utilizing the current flowing in the transmission line. The proposed autonomous independent power supply system consists of a power supply using Power CT and a power management system including a charging circuit. The power management device uses a voltage limiter circuit and a monitoring circuit of charging voltage and current to ensure the safety of charging of the battery. In order to verify the performance of the proposed system, we applied it to the SVL diagnostic system and confirmed that it operates stably.

Development of Fender Segmentation System for Port Structures using Vision Sensor and Deep Learning (비전센서 및 딥러닝을 이용한 항만구조물 방충설비 세분화 시스템 개발)

  • Min, Jiyoung;Yu, Byeongjun;Kim, Jonghyeok;Jeon, Haemin
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.26 no.2
    • /
    • pp.28-36
    • /
    • 2022
  • As port structures are exposed to various extreme external loads such as wind (typhoons), sea waves, or collision with ships; it is important to evaluate the structural safety periodically. To monitor the port structure, especially the rubber fender, a fender segmentation system using a vision sensor and deep learning method has been proposed in this study. For fender segmentation, a new deep learning network that improves the encoder-decoder framework with the receptive field block convolution module inspired by the eccentric function of the human visual system into the DenseNet format has been proposed. In order to train the network, various fender images such as BP, V, cell, cylindrical, and tire-types have been collected, and the images are augmented by applying four augmentation methods such as elastic distortion, horizontal flip, color jitter, and affine transforms. The proposed algorithm has been trained and verified with the collected various types of fender images, and the performance results showed that the system precisely segmented in real time with high IoU rate (84%) and F1 score (90%) in comparison with the conventional segmentation model, VGG16 with U-net. The trained network has been applied to the real images taken at one port in Republic of Korea, and found that the fenders are segmented with high accuracy even with a small dataset.

Application and development of radiation worker management program (방사선종사자 관리프로그램의 개발 및 적용)

  • Kim, Jeong-Ho;Yoo, Se-Jong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.11
    • /
    • pp.367-373
    • /
    • 2017
  • The O2O service is an efficient way to operate based on systematic connection of the offline and online states. At present, education, health checkups, and exposure management of radiation workers are separated from offline and online at nuclear-related workplaces. Therefore, we developed a radiation workers management program at the workplace and tried to link online and offline states. After applying the program to the local network, we developed a written employee management system as a computer program and applied it to radiation workers and radiation safety managers at a university hospital in Daejeon using a questionnaire. As a result of the survey, the results of this program can enhance the awareness of safety management and work convenience. There is also a demand for radiation closed workers as well as radiation relative workers. It will be necessary to collect opinions regarding the characteristics of each workplace for the generalization of the radiation workers management program. As a result, real-time radiation safety management and work improvement can be expected through network connections between the workplace, supervisory authority, and related organizations in the future. If a circle structure is formed using the employee management program, development of radiation safety management can be expected.