• Title/Summary/Keyword: 위협 레벨 조사

Search Result 2, Processing Time 0.019 seconds

Measurement and Analysis of Antenna Induced Voltage for Tactical Mobile Wireless Communication System under HEMP Environment (HEMP 상황 하 전술기동무선통신체계 안테나 유도전압 측정 및 분석)

  • Park, Kyoung-Je;Jeong, Kil-Soo;Kim, Jung-Sup;Park, Yong-Woo;Park, Jae-Hyun
    • Journal of the Korea Society for Simulation
    • /
    • v.30 no.2
    • /
    • pp.33-40
    • /
    • 2021
  • The situation of high-altitude electromagnetic pulses (HEMP) arises from high-altitude nuclear explosions. The HEMP situation can be simulated through the threat level investigation (TLI). In this paper, the induced voltage according to the antenna type of the tactical mobile radio communication system was measured and analyzed by TLI. Under the influence of HEMP, electronic equipment can be paralyzed or damaged. HEMP protection filters are commercially available for power lines and signal lines. However, commercialization of HEMP filters for antennas is insufficient, and even some of them exist for lightning protection. In order to make an appropriate HEMP protection filter according to the frequency and type of the antenna, the induced voltage was measured and the maximum induced voltage was analyzed through extrapolation. It was found that the measured induced voltage decreased as the frequency increased, such as in the HF, VHF and UHF bands of the measurement results.

A Study on IoT Devices Vulnerability and Security (IoT 디바이스 보안위협 및 대응방안 연구)

  • Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.9-17
    • /
    • 2021
  • Numerous IoT devices are connected to a wireless network environment to collect and transmit data without time and space limitations, but many security vulnerabilities are exposed in these process. But IoT security is not easy to create feasible security standards and device authentication due to differences in the approach or implementation of devices and networks. However, it is clear that the improvement and application of the standard framework for enhancing the security level of the device is the starting point to help the most successful security effect. In this study, we investigate the confidentiality, integrity, availability, and access control implementation plans for IoT devices (which are the basic goals of information security), and standardized security evaluation criteria for IoT devices, and study ways to improve them.