• 제목/요약/키워드: Automation, Security

검색결과 231건 처리시간 0.027초

지능형 홈오토메이션 보안설계에 관한 연구 (Research about Intelligence Home Automation Security Design)

  • 오주영;강순덕
    • 정보학연구
    • /
    • 제8권2호
    • /
    • pp.43-52
    • /
    • 2005
  • Home-Automation which it automates as connection home by network gives human beings to many conveniences but there is problem must solve. Rightly it is an illegal infiltration against the information transmission and a joint ownership of information home appliance machinery and tools. Especially design of Home Automation is necessary for Information Security because the vulnerability is exposed when it is connecting on the mobile communication terminal and the home appliance machinery and tools. In this research, we're going to help to function and efficiency improvement of Korean Home-Automation by Security Design and proposal for a research and development of Korean Home-Automation.

  • PDF

리눅스를 기반으로 한 홈오토메이션 서버의 구현 (An Implementation of a Home Automation Server Based on Linux)

  • 성한용;김규칠;방철원;김용석
    • 산업기술연구
    • /
    • 제22권B호
    • /
    • pp.141-146
    • /
    • 2002
  • It becomes common to use computers to control electronic devices and security facilities in newly constructed buildings and house. There are many home application devices in the market which can be controlled by computers. But they are expensive and managed by specialized companies. This paper is focused on personal computers which are available in most homes and can be used to control home electronic appliances and home security facilities. We implemented a home automation server based on Linux. The standard parallel port of personal computer is used to connect sensors and actuators. Therefore, the cost of the server is very low. Moreover, the server is connected to Internet and anywhere we can control and monitor the home security facilities and home automation systems.

  • PDF

보안을 위한 홈 오토메이션 시스템 개발 (Home Automation System Development for Security)

  • 황병곤
    • 한국산업정보학회논문지
    • /
    • 제13권3호
    • /
    • pp.9-15
    • /
    • 2008
  • 본 논문은 보안이 강화된 홈 오토메이션 분야로서, 비디오 도어폰의 카메라와 캠으로 획득된 영상을 DVR 장치로 보내어 이들을 저장하고 조회하는 기능을 개발하는데 있다. 특히, 외출 중 방문객이 초인종을 누르면 방문객의 영상을 자동 저장함으로써 방문객에 대한 정보를 확인할 수 있다. 한편 각종 센서를 이용하여 부재중 집의 상태를 확인할 수 있다. 이들 정보는 홈 오토메이션 및 웹 기반 시스템을 이용하여 인터넷으로 실시간 확인할 수 있다. 부재중 집에 이상 징후가 발생할 경우 휴대폰으로 집 주인에게 상황을 문자 전송할 수 있는 홈 시큐리티 시스템을 개발하였다.

  • PDF

Designing Rich-Secure Network Covert Timing Channels Based on Nested Lattices

  • Liu, Weiwei;Liu, Guangjie;Ji, Xiaopeng;Zhai, Jiangtao;Dai, Yuewei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권4호
    • /
    • pp.1866-1883
    • /
    • 2019
  • As the youngest branch of information hiding, network covert timing channels conceal the existence of secret messages by manipulating the timing information of the overt traffic. The popular model-based framework for constructing covert timing channels always utilizes cumulative distribution function (CDF) of the inter-packet delays (IPDs) to modulate secret messages, whereas discards high-order statistics of the IPDs completely. The consequence is the vulnerability to high-order statistical tests, e.g., entropy test. In this study, a rich security model of covert timing channels is established based on IPD chains, which can be used to measure the distortion of multi-order timing statistics of a covert timing channel. To achieve rich security, we propose two types of covert timing channels based on nested lattices. The CDF of the IPDs is used to construct dot-lattice and interval-lattice for quantization, which can ensure the cell density of the lattice consistent with the joint distribution of the IPDs. Furthermore, compensative quantization and guard band strategy are employed to eliminate the regularity and enhance the robustness, respectively. Experimental results on real traffic show that the proposed schemes are rich-secure, and robust to channel interference, whereas some state-of-the-art covert timing channels cannot evade detection under the rich security model.

공장 및 생산 자동화에 있어 안드로이드 기반의 보안성이 강화된 모바일장비관리시스템 구현 (In the Automation Environment of Factory and Production, the Implementation of Security-enhanced Mobile Device Management System using Android-based Smart Phones)

  • 유흥식;선기현;김성운
    • 한국전자통신학회논문지
    • /
    • 제9권7호
    • /
    • pp.779-789
    • /
    • 2014
  • 안드로이드 기반의 스마트폰을 공장자동화 및 생산자동화 분야에서의 활용이 중요하게 여겨지고 있다. 일반적으로 OMA DM 표준은 공장자동화 및 생산자동화 환경을 위한 중요한 인프라 구조 기술이다. 본 논문에서는 OMA DM 플랫폼 설계 및 구현에 대해 연구한다. 개발된 프로토타입은 세 가지 모듈 즉 DMS, FUMO 그리고 SCOMO로 구성된다. 그리고 EAP 및 AES 개념을 응용한 보안 모듈도 제시되었다. 제안된 보안 모듈은 공장자동화를 위해 안드로이드 기반의 스마트폰을 활용한 DMS, FUMO 및 SCOMO 모듈 간 통신에서 안전한 통신을 보장하기 위해 적용된다. 시뮬레이션 결과에 의하면 구현된 해당 프로토타입은 공장자동화 환경에서 좋은 성능을 보이며 보안성을 보장하면서 여러 공장자동화, 생산자동화 및 사무자동화 환경에서 활용이 가능하다.

공장자동화 시스템의 생산성 향상을 위한 SEB 시스템 설계 및 제작 (A study of Big-data analysis for relationship between students)

  • 최호성;정진영;김진묵;박구락
    • 융합보안논문지
    • /
    • 제16권5호
    • /
    • pp.87-93
    • /
    • 2016
  • 국내 외에서 공장자동화에 대한 관심과 개발이 활발하게 시도되고 있다. 특히, 중소기업들은 공장자동화를 통한 생산성 향상을 위해서 노력하고 있다. 최근에는 독일의 인더스트리4.0 표준을 준수하고자 하는 노력이 전 세계적으로 시도되고 있다. 하지만 이것은 높은 개발 비용과 설비 비용 때문에 실질적인 투자나 개발은 이루어지지 않고 있다. 그러므로 우리는 공장자동화시스템의 생산성을 높이기 위해서 SEB를 설계 및 제작하고자 시도하였다. SEB는 RFID와 WiFi 네트워크를 연동해서 기존 공장자동화 시스템보다 통신 범위를 넓히고, 전송 속도도 빠르게 개선하였다. 그리고 기존에 공장자동화 시스템에서 취약점인 보안 문제를 해결할 수 있도록 사용자 인증에 대한 부분을 추가로 해결할 수 있다.

Intrusion Detection Scheme Using Traffic Prediction for Wireless Industrial Networks

  • Wei, Min;Kim, Kee-Cheon
    • Journal of Communications and Networks
    • /
    • 제14권3호
    • /
    • pp.310-318
    • /
    • 2012
  • Detecting intrusion attacks accurately and rapidly in wireless networks is one of the most challenging security problems. Intrusion attacks of various types can be detected by the change in traffic flow that they induce. Wireless industrial networks based on the wireless networks for industrial automation-process automation (WIA-PA) standard use a superframe to schedule network communications. We propose an intrusion detection system for WIA-PA networks. After modeling and analyzing traffic flow data by time-sequence techniques, we propose a data traffic prediction model based on autoregressive moving average (ARMA) using the time series data. The model can quickly and precisely predict network traffic. We initialized the model with data traffic measurements taken by a 16-channel analyzer. Test results show that our scheme can effectively detect intrusion attacks, improve the overall network performance, and prolong the network lifetime.

Performance Evaluation of Elderly Home Automation Control (EHAC) IoT System

  • Phua, Karsten Cheng Kai;Goh, Wei Wei;Marjani, Mohsen
    • International Journal of Computer Science & Network Security
    • /
    • 제21권1호
    • /
    • pp.214-219
    • /
    • 2021
  • As the number of elderly increased rapidly every year, many elderly still choose to stay independent despite of difficulties and challenges faced in their daily routine. Elderly has desperate needs for support for their living. Internet of Things helps to support and improve elderly's life in many ways to meet the needs and requirements. Home Automation Control (EHAC) is a research based system that support elderly with controlled automation solution that control and operates various home electrical appliances based on the measurement of heart pulse rate and environment temperature. This paper works on EHAC system to evaluate the performance of the system in elderly's daily routine. This paper presented experiments conducted with approach of IoT testing and discussion on analysis of the results.

Institutional Information Management and Automation System

  • M.Ahmad Nawaz Ul Ghani;Taimour Nazar;Syed Zeeshan Hussain Shah Gellani;Zaman Ashraf
    • International Journal of Computer Science & Network Security
    • /
    • 제23권8호
    • /
    • pp.107-112
    • /
    • 2023
  • World is moving towards digitization at a rapid pace, so the enterprises have developed information systems for management of their business. Empowering educational institutes with information systems are become very important and vital. Doing everything manually is very difficult for students, teachers and staff. Information system can enhance their efficiency and save a lot of time; this research proposed system will solve this issue by providing services like class room reservation, e-library facility, online submission etc. in a secured environment. Up till now limited attention has been paid to utilize robots and drones for automation inside educational institutes. Our proposed system incorporates robots and drones to fill this gap in automation being used in institutes. Through this research, the aim is to improve the efficiency of learning and services in educational institutions or universities.

Metric based Performance Measurement of Software Development Methodologies from Traditional to DevOps Automation Culture

  • Poonam Narang;Pooja Mittal
    • International Journal of Computer Science & Network Security
    • /
    • 제23권6호
    • /
    • pp.107-114
    • /
    • 2023
  • Successful implementations of DevOps practices significantly improvise software efficiency, collaboration and security. Most of the organizations are adopting DevOps for faster and quality software delivery. DevOps brings development and operation teams together to overcome all kind of communication gaps responsible for software failures. It relies on different sets of alternative tools to automate the tasks of continuous integration, testing, delivery, deployment and monitoring. Although DevOps is followed for being very reliable and responsible environment for quality software delivery yet it lacks many quantifiable aspects to prove it on the top of other traditional and agile development methods. This research evaluates quantitative performance of DevOps and traditional/ agile development methods based on software metrics. This research includes three sample projects or code repositories to quantify the results and for DevOps integrated selective tool chain; current research considers our earlier proposed and implemented DevOps hybrid model of integrated automation tools. For result discussion and validation, tabular and graphical comparisons have also been included to retrieve best performer model. This comparative and evaluative research will be of much advantage to our young researchers/ students to get well versed with automotive environment of DevOps, latest emerging buzzword of development industries.