• Title/Summary/Keyword: 침입 시나리오

Search Result 65, Processing Time 0.018 seconds

Approximate 3D Localization Mechanism in Wireless Sensor Network (무선 센서 네트워크 환경에서 3차원 근사 위치추적 기법)

  • Shim, Jaeseok;Lim, Yujin;Park, Jaesung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.9
    • /
    • pp.614-619
    • /
    • 2014
  • In WSN (Wireless Sensor Networks) based surveillance system, it needs to know the occurrence of events or objects and their locations, because the data have no meaning without location information. Using traditional 2D localization mechanisms provide good accuracy where altitude is fixed. But the mapping the position estimated by 2D localization to the real world can cause an error. Even though 3D localization mechanisms provide better accuracy than 2D localization, they need four reference nodes at least and high processing overhead. In our surveillance system, it is needed to estimate the height of the detected object in order to determine if the object is human. In this paper, we propose a height estimation mechanism which does not require many reference nodes and high complexity. Finally, we verify the performance of our proposed mechanism through various experiments.

Design of Interrogator for Airspace Surveillance in Multilateration Systems (항공용 다변측정 감시시스템 적용을 위한 질문기 설계)

  • Koh, Young-Mok;Kim, Su-Hong
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.2
    • /
    • pp.108-115
    • /
    • 2015
  • Multilateration systems are used to provide the position of aircraft in flight or on airport runways. In the multilateration systems, the interrogator is an important transmitter that used to interrogate the airplanes with appropriately scenario in surveillance airspace. Whisper-Shout interrogation sequence, which is one of the key functions of the interrogator, can control airport traffic density when intruder airplanes are coming into the surveillance airspace. Therefore collision chance between airplanes could be reduced and also get highly accurate location of incoming airplane in multilateration systems. In this paper, we developed the interrogator that allows it to transmit Mode A/C and Mode S interrogations which is similar to existing secondary surveillance radar. With appropriately controlled Whisper-Shout sequence in the interrogator, the multilateration systems can avoid synchronous garbling and FRUIT phenomenons caused by receiving multiple responses from a number of airplanes.

MARYBLYT Study for Potential Spread and Prediction of Future Infection Risk of Fire Blight on Blossom of Singo Pear in Korea (우리나라 신고배 화상병 꽃감염 확산 가능성 및 미래 감염위험 예측을 위한 MARYBLYT 연구)

  • Kim, Min-Sun;Yun, Sung-Chul
    • Research in Plant Disease
    • /
    • v.24 no.3
    • /
    • pp.182-192
    • /
    • 2018
  • Since fire blight (Erwinia amylovora) firstly broke out at mid-Korea in 2015, it is necessary to investigate potential spread of the invasive pathogen. To speculate environmental factors of fireblight epidemic based on disease triangle, a fire blight predicting program, MARYBLYT, was run with the measured meteorological data in 2014-2017 and the projecting future data under RCP8.5 scenario for 2020-2100. After calculating blossom period of Singo pear from phenology, MARYBLYT was run for blossom blight during the blossom period. MARYBLYT warned "Infection" blossom blight in 2014-15 at Anseong and Cheonan as well as Pyungtak and Asan. In addition, it warned "Infection" in 2016-17 at Naju. More than 80% of Korean areas were covered "Infection" or "High", therefore Korea was suitable for fire blight recently. Blossom blight for 2020-2100 was predicted to be highly fluctuate depending on the year. For 80 years of the future, 20 years were serious with "Infection" covered more than 50% of areas in Korea, whereas 8 years were not serious covered less than 10%. By comparisons between 50% and 10% of the year, temperature and amount of precipitation were significantly different. The results of this study are informative for policy makers to manage the alien pathogen.

Supplementation of the Indoor Location Tracking Techniques Based-on Load-Cells Mechanism (로드셀 기반의 실내 위치추적 보완 기법)

  • YI, Nam-Su;Moon, Seung-Jin
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.1-8
    • /
    • 2016
  • Current indoor intrusion detection and location tracking methods have the weakness in seamless operations in tracking the objective because the object must possess a communicating device and the limitation of the single cell size (approximate $100cm{\times}100cm$) exits. Also, the utilization of CCTV technologies show the shortcomings in tracking when the object disappear the area where the CCTV is not installed or illumination is not enough for capturing the scene (e.g. where the context-awarded system is not installed or low illumination presents). Therefore, in this paper we present an improved in-door tracking system based on sensor networks. Such system is built on a simulated scenario and enables us to detect and extend the area of surveillance as well as actively responding the emergency situation. Through simulated studies, we have demonstrated that the proposed system is capable of supplementing the shortcomings of signal cutting, and of estimating the location of the moving object. We expect the study will improve the better analysis of the intruder behavior, the more effective prevention and flexible response to various emergency situations.

The study of security management for application of blockchain technology in the Internet of Things environment (Focusing on security cases in autonomous vehicles including driving environment sensing data and occupant data) (사물인터넷 환경에서 블록체인 기술을 이용한 보안 관리에 관한 소고(주행 환경 센싱 데이터 및 탑승자 데이터를 포함한 자율주행차량에서의 보안 사례를 중심으로))

  • Jang Mook KANG
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.161-168
    • /
    • 2022
  • After the corona virus, as non-face-to-face services are activated, domain services that guarantee integrity by embedding sensing information of the Internet of Things (IoT) with block chain technology are expanding. For example, in areas such as safety and security using CCTV, a process is required to safely update firmware in real time and to confirm that there is no malicious intrusion. In the existing safe security processing procedures, in many cases, the person in charge performing official duties carried a USB device and directly updated the firmware. However, when private blockchain technology such as Hyperledger is used, the convenience and work efficiency of the Internet of Things environment can be expected to increase. This article describes scenarios in how to prevent vulnerabilities in the operating environment of various customers such as firmware updates and device changes in a non-face-to-face environment. In particular, we introduced the optimal blockchain technique for the Internet of Things (IoT), which is easily exposed to malicious security risks such as hacking and information leakage. In this article, we tried to present the necessity and implications of security management that guarantees integrity through operation applying block chain technology in the increasingly expanding Internet of Things environment. If this is used, it is expected to gain insight into how to apply the blockchain technique to guidelines for strengthening the security of the IoT environment in the future.