• Title/Summary/Keyword: 위험성 제어 방안

Search Result 74, Processing Time 0.025 seconds

Automatic Control for Ship Collision Avoidance Support-II (선박충돌회피지원을 위한 자동제어-II)

  • Im, Nam-Kyun
    • Journal of Navigation and Port Research
    • /
    • v.28 no.1
    • /
    • pp.9-16
    • /
    • 2004
  • The purpose of this study is to examine the algorithm of ship collision avoidance system and to improve its performance. The study on the algorithm of ship collision avoidance system have been carried out by many researchers. We can divide the study according to the adopted theory into two category such as 'collision risk calculation method' and 'risk area method'. It is not so difficult to find heir merit and demerit in the respective method. This study suggested newly modified model, which can overcome a limit in the two method. The suggested model is based on collision risk calculation method and suggests how to solve the threshold value problem, that is, one of the unsolved issues in collision risk calculation method. To solve that problem this study proposed new system under which the users can select appropriate threshold value according to environments such as traffic situations and weathers conditions. Simulation results of new model is schematized using 'risk area method'to examine the relationships between the two method. In addition, in case of 'collision risk method', when TCPA and DCPA are used to determine collision risk, a problem happens, that is, two ships become too close in their stem area, therefore, partial function of 'risk area method'is adopted to solve the problem in suggested model.

A Study of an Anomalous Event Detection using White-List on Control Networks (제어망에서 화이트 리스트 기법을 이용한 이상 징후 탐지에 관한 연구)

  • Lee, DongHwi;Choi, KyongHo
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.77-84
    • /
    • 2012
  • The control network has been operated in a closed. But it changes to open to external for business convenience and cooperation with several organizations. As the way of connecting with user extends, the risk of control network gets high. Thus, in this paper, proposed the technique of an anomalous event detection using white-list for control network security and minimizing the cyber threats. The proposed method can be collected and cataloged of only normal data from traffic of internal network, control network and field devices. Through way to check the this situation, we can separate normal and abnormal behavior.

A Design of GPS based Personal Location Self-Control Software on Android Platform (안드로이드 기반 GPS 개인위치정보 자기제어 구조 설계)

  • Jang, Won-Jun;Lee, Hyung-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.1 no.1
    • /
    • pp.23-29
    • /
    • 2010
  • The various kinds of application is distributed for the Smart phone user recently. There is the advantage that the open source application on Android operating system based Smart phone supports a multi tasking service. Layar, Wikitude, and Sherpa and the other applications using the GPS location information like an a2b etc. were developed in the Smart phone environment. However, the existing Cell-ID based location information can be directly collected by the mobile ISP unit which the mobile carrier installs, the personal privacy problem occurs. Therefore, the personal location information is possible to be exposed publicly without any access control procedure. Therefore, in this research, the self-control mechanism on the GPS location information at the Smart phone is designed and presented. Through this, it is possible to develop diverse applications providing enhanced access control and GPS location management on the Android based Smart Phone.

Trusted Information Sharing Model in Collaborative Systems (협업 환경 내 신뢰할수 있는 정보 공유 모델)

  • Hong, Seng-Phil;Kim, Jae-Hyoun
    • Journal of Internet Computing and Services
    • /
    • v.8 no.1
    • /
    • pp.99-113
    • /
    • 2007
  • In the rapidly changing e-business environment, organizations need to share information, process business transactions, and enhance collaborations with relevant entities by taking advantage of the various technologies. However, there are always the security issues that need to be handled in order for the e-business operations to be run efficiently. In this research, we suggest the new security authorization model for safety flexible supporting the needs of e-business (e-marketplace) in an organization. This proposed model provides the scalable of access control policy among multi-domains, and preservation of flexible authorization management in distributed system environments. For servers to take the access control policy and enforcement decisions, we also describe the feasible authorization architecture is concerned with how they might seek advice and guideline from formal access control model.

  • PDF

Smart Vehicle Security Vulnerability Analysis and Solution Support (스마트 자동차 네트워크의 보안취약점 분석 및 해결방안 마련)

  • Kim, Jin-Mook;Moon, Jeong-Kyung;Hwang, Deuk-Young
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.69-76
    • /
    • 2018
  • One of the most remarkable technologies in the era of the 4th industrial revolution is the interest in the field of smart cars. In the near future, it will not only be possible to move to a place where you want to ride a smart car, but smart cars, including artificial intelligence elements, can avoid sudden car accidents. However, as the field of smart automobiles develops, the risks are expected to increase. Therefore, based on the understanding of security vulnerabilities that may occur in smart car networks, we can apply safe information security technology using FIDO and attribute-based authorization delegation technique to provide smart car control technology that is safe and secure. I want to. In this paper, we show that the proposed method can solve security vulnerabilities by using secure smart car control technology. We will further study various proposals to solve security vulnerabilities in the field of smart car networks through future research.

  • PDF

[Retracted]Cyber Threat Analysis on Network Communication in Power System and Countermeasures Suggestions ([논문철회]전력계통 네트워크 통신방식 변화에 따른 사이버위협 분석 및 대응방안 제시)

  • Il Hwan Ji;Seungho Jeon;Jung Taek Seo
    • Smart Media Journal
    • /
    • v.12 no.2
    • /
    • pp.91-102
    • /
    • 2023
  • The Energy Management System (EMS) communicates with power plants and substations, monitors the substations and plant operational status of the transmission and substation system for stability, continuity, real-time, and economy of power supply, and controls power plants and substations. Currently, the power exchange EMS communicates with power plants and substations based on the serial communication-based Distributed Network Protocol (DNP) 3.0 protocol. However, problems such as the difficulty of supply and demand of serial communication equipment and the lack of installation space for serial ports and modems are raised due to the continuous increase in new facilities to perform communication, including renewable power generation facilities. Therefore, this paper presents a TCP/IP-based communication method instead of the existing serial communication method of the power exchange EMS, and presents a security risk analysis that may occur due to changes in the communication method and a countermeasure to the security risk.

Convergence Security Approach for Motor Vehicle Communication Network Hacking Attack Prevention: Focus on Bluetooth Cases (자동차 내부망 통신네트워크 해킹범죄예방을 위한 융합보안적 대응방안: Bluetooth 활용사례를 중심으로)

  • Choi, Kwan;Kim, Minchi
    • Convergence Security Journal
    • /
    • v.16 no.6_2
    • /
    • pp.99-107
    • /
    • 2016
  • The purpose of this study is to analyse motor vehicle communication network hacking attacks and to provide its prevention. First, the definition of motor vehicle communication network was provided and types of in-vehicle communication network were discussed. Also, bluetooth hacking attack cases were analysed in order to illustrate dangers of hacking attacks. Based on the analysis, two preventive measures were provided. First, Motor Vehicle Safety Standard Law should be revised. Although the law provides the definition of electronic control system and its standards as well as manufacturing and maintenance for safe driving standards, the law does not have standards for electronic control system hacking prevention and defensive security programs or firmware. Second, to protect motor vehicle communication network, it is necessary to create new laws for motor vehicle communication network protection.

A Study on Regulation Improvement of Local Ventilation System (국소배기장치의 규제개선에 관한 연구)

  • kim, Nam Suk;Kim, Young Suk;Woo, In Sung
    • Journal of the Korean Institute of Gas
    • /
    • v.22 no.3
    • /
    • pp.74-83
    • /
    • 2018
  • Anyone who wants to install local ventilation system must obtain a permission from the Ministry of Employment and Labor even if he has permission from the Ministry of Environment. This is because not only the Atmospheric Environmental Protection Act, but also the manufacturing industry's hazardous risk prevention plan under Article 48 Clause 2 of the Industrial Safety and Health Act is to be submitted by 15 days before the construction. Under the current Environmental Protection Act, the Ministry of Environment regulates only the emission of pollutants from local exhaust ventilation systems into the atmosphere and the contents of workers' safety and health within industrial sites are managed by the Ministry of Employment and Labor. Even with the approval of the Ministry of Environment, the number of unsuccessful cases by the Ministry of Employment and Labor has increased, causing a growing discontent among the sites due to production delays and additional costs of improvement. In addition, local exhaust systems that are at greater risk of fire explosion have increased the risk of severe industrial accidents due to fire explosion. This is due to insufficient design of air volume, control speed, return speed, duct size, and risk of fire explosion. This is because the criteria and procedures for approval of local exhaust ventilation systems are similar, but the Industrial Safety and Health Act adds additional screening items for safety and safety of workers and fire and explosion. In this study, the Environment Ministry and the Employment and Labor Ministry seek to find a reasonable way to operate the system by comparing local exhaust ventilation system installation approval standards.

An experimental study on the fire hazard of Sheath Heater (시즈히터의 화재위험성에 관한 실험 연구)

  • Kim, Hakjoong
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.4
    • /
    • pp.511-517
    • /
    • 2014
  • Recently, the fire by sheath heater has been occurred frequently on winter season. The sheath heater has simple internal structure and boils water simply. Therefore, the use of sheath heater has been increased. In this study, found the fire hazard property of sheath heater from understanding the fire mechanism through the experiment to get the measure for decreasing the occurrence of fire. For the analysis of the fire hazard property of the sheath heater, performed the test of temperature change and ignition temperature by using current product. On the result of test, the sheath heaters are the most dangerous appliance to arise fire. Water temperature controller attached to sheath heater is not sufficient to prevent overheating it. The sheath heater should have level switch of water and temperature controller for heater itself to shut off the power supply. Because the cause of fire by sheath heater is overheating itself in the situation of lack water.

A Study on the Application of Variable Speed Limits(VSL) for Preventing Accidents on Freeways (고속도로 교통사고 예방을 위한 가변제한속도 적용방안 연구)

  • Park, Joon-Hyung;Hwang, Hyo-Won;Oh, Cheol;Chang, Myung-Soon
    • Journal of Korean Society of Transportation
    • /
    • v.26 no.4
    • /
    • pp.111-121
    • /
    • 2008
  • Using variable speed limits (VSL) is a key strategy for preventing traffic accidents and alleviating traffic congestion. This study proposes an algorithm to operate VSLs on freeways for traffic safety. The proposed algorithm consists of two components based on accident likelihood estimation and analysis of safe stopping distance under various environmental conditions. A binary logistic regression technique is used for estimating accident likelihood. It is expected that the proposed algorithm would be successfully applied in practice in support of an integrated traffic and environmental condition monitoring system. Technical issues associated with the field implementation are also discussed.