• Title/Summary/Keyword: Automation, Security

Search Result 231, Processing Time 0.021 seconds

Information security auditing Framework in Industrial control system (산업제어시스템 정보보안 감리 프레임워크 연구)

  • Lee, Chul-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.139-148
    • /
    • 2008
  • Information technology have led to change the automation of large industrial control system as well as business system and environments. Industrial control system(ICS) is vital components of most nation's critical infrastructures such as electricity, natural gas, water, waste treatment, transportation and communication that are based of national security, safety of citizen and development of national economy According to the change of business environment, organizational management pushed integration all of the system include MIS and ICS. This situation led to use standard information technologies for ICS, this transition has been to expose ICS to the same vulnerabilities and threats that plague business system. Recently government obliged owners of the public information system to audit for safety, efficiency and effectiveness, and also obliged the owners of national infrastructure to improve their system security as a result of vulnerability analysis. But there doesn't prepare a security architecture and information security auditing framework of ICS fur auditing. In this paper, I suggested the security architecture and information security auditing framework for ICS in order to prepare the base of industrial system security auditing.

Security Threats Analysis and Security Requirement for Industrial Wireless Protocols : ISA 100.11a and WirelessHART (ISA 100.11a 및 WirelessHART 기반 보안위협 식별 및 보안요구사항 도출 연구)

  • Jeong, Jae-Han;Kwon, Sung-Moon;Shon, Tae-Shik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1063-1075
    • /
    • 2019
  • In recent years, industrial automation has been established and WISN (Wireless Industrial Sensor Network) has been introduced for efficient system management. By introducing WISN, many engineering costs have been reduced and process processors have been optimized. And communication flow using wireless is increasing. An empirical study on industrial wireless sensor networks is actively conducted, but there are few security studies on them and they are exposed to such threats. If there is a problem with the standard of the wireless communication protocol itself, the device that is certified according to the standard may also be subject to security threats including problems. We analyze security functions and threats of ISA 100.11a and WirelessHART protocol stack based on standards. Procedures for distributing the security key are not provided or it is vulnerable using the Global Data Link key when the device enters the network. This paper presents the problems of the standard itself and presents the security requirements accordingly.

3-D Laser Measurement using Mode Image Segmentation Method

  • Moon Hak-Yong;Park Jong-Chan;Han Wun-Dong;Cho Heung-Gi;Jeon Hee-Jong
    • Proceedings of the KIPE Conference
    • /
    • 2001.10a
    • /
    • pp.104-108
    • /
    • 2001
  • In this paper, the 3-D measurement method of moving object with a laser and one camera system for image processing method is presented. The method of segmentation image in conventional method, the error are generated by the threshold values. In this paper, to improve these problem for segmentation image, the calculation of weighting factor using brightness distribution by histogram of stored images are proposed. Therefore the image erosion and spread are improved, the correct and reliable informations can be measured. In this paper, the system of 3-D extracting information using the proposed algorithm can be applied to manufactory automation, building automation, security guard system, and detecting information system for all of the industry areas.

  • PDF

Remote Monitoring and Control of PLC Using TCP/IP Communication (TCP/IP 통신을 이용한 PLC 원격 감시 및 제어)

  • 고덕현;이순걸
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2000.11a
    • /
    • pp.140-143
    • /
    • 2000
  • This research presents new type of remote monitoring and control solution of PLC that can be used bi-directional and efficient management of factory automation through internet. This system has client/server architect for information handling between PLC and remote computer where a user can control and monitor target PLC. Actually the authors redirect RS232C connection between PLC and server computer into Internet connection between PLC and remote client computer using supplied PLC tool program So user feel like in front of PLC panel when he operates remote PLC through Internet. Each client/server program is constructed with Java language for security. In this paper the internet-based remote control system was proposed and proved validity by being applied to redirection of PLC control for factory automation.

  • PDF

Configuration of Mail Delivery System Based on Reinforcement Learning

  • Morishita, Soichiro;Hiraoka, Kazuyuki;Kobayashi, Hidetsune;Mishima, Taketoshi
    • Proceedings of the IEEK Conference
    • /
    • 2002.07b
    • /
    • pp.830-833
    • /
    • 2002
  • To solve the internal security problem such as human error and bad faith, the automation of computer system management is significant. For this purpose, we focus attention in the automation of Mail Delivery Service. Today, requirement for reliable mail delivery system becomes larger and larger. However, existing systems are too strict about their configuration. Hence, we propose the method based on Reinforcement Learning (RL) to achieve proper MX record ordering. A measure on validity of the design of system, such as network topology number of servers and so on, is also obtained as side benefit. In order to verify the usability of the presented method, we did on a small model of mail delivery system. As a result, we show that RL is available for determination of the proper MX record ordering. Additionally, we suggest that it is also available for comparing validity of setting of MTA and the network design.

  • PDF

Analysis of Trends in Hyper-connected Virtual Infrastructure Management Technology (초연결 가상 인프라 관리 기술 동향 분석)

  • Shim, J.C.;Park, P.K.;Ryu, H.Y.;Kim, T.Y.
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.4
    • /
    • pp.135-148
    • /
    • 2020
  • Virtualisation in cloud computing is vital for maintaining maximum resource utilization and easy access to operation and storage management of components. Platform virtualisation technology has the potential to be easily implemented with the support of scalability and security, which are the most important components for cloud-based services. Virtual resources must be allocated to a centralized pool called the cloud, and it is considered as cloud computing only when the virtual resources are orchestrated through management and automation software. Therefore, research and development on the latest technology for such a virtualisation platform provides both academia and industry the scope to deploy the fastest and most reliable technology in limited hardware resource. In this research, we reviewed and compared the popular current technologies for network and service management and automation technology.

A Study on Home Telemetering System using Power Line Communication (전력선 통신을 이용한 가정용 원격 검침 시스템에 관한 연구)

  • Yu Yung-Ho;Shin Il-Sik
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.29 no.6
    • /
    • pp.678-684
    • /
    • 2005
  • In this Paper telemetering system for home automation is Proposed and implemented. Proposed and developed systems are composed with a home server and a few clients which send metering data of gas electric power water and home security to home server using power line communication. Management computer located in office of apartment complex collects all kinds of measured home data from each home server with multi drop communication by UDP Protocol A simple ASK method is used for power line communication Collected data from each home can be used for issuing the bill of each house and web service. The experiments were carried out under laboratory environment using various kinds of electric home appliances to ascertain the performance.

A study on the application of computer used in a loom (직기에 있어서 Computer의 응용)

  • Jo, Baek-Hui;Kim, Gwang-Yeong;Kim, Jong-Su;Lee, Tae-Se
    • 한국기계연구소 소보
    • /
    • s.19
    • /
    • pp.171-180
    • /
    • 1989
  • The automation of textile machinery in the fabric manufacture is strongly demanded in order to improve the industrial structure related to labour-force and cost curtailment, in addition, to keep step with the various and small production system and the consumption tendency requesting a high quality fabrics. In this thesis, the technology applying the computer to an air jet loom and characteristics obtained from it are derived. To efficently apply an automized and unmanned textile machinery, an air jet loom is equipped with the let-off, take-up and weft insertion device attached a central processing unit(CPU) which can automatically operate according to a program. As a result, an air jet loom is available for the factory automation, which has advantages including productivity promotion, high quality security, energy savings, specification & variety, efficient production control, in fabric manufacturing process.

  • PDF

Secure Connectivity Probability of Multi-hop Clustered Randomize-and-Forward Networks

  • Wang, Xiaowei;Su, Zhou;Wang, Guangyi
    • ETRI Journal
    • /
    • v.39 no.5
    • /
    • pp.729-736
    • /
    • 2017
  • This work investigates secure cluster-aided multi-hop randomize-and-forward networks. We present a hop-by-hop multi-hop transmission scheme with relay selection, which evaluates for each cluster the relays that can securely receive the message. We propose an analytical model to derive the secure connectivity probability (SCP) of the hop-by-hop transmission scheme. For comparison, we also analyze SCPs of traditional end-to-end transmission schemes with two relay-selection policies. We perform simulations, and our analytical results verify that the proposed hop-by-hop scheme is superior to end-to-end schemes, especially with a large number of hops or high eavesdropper channel quality. Numerical results also show that the proposed hop-by-hop scheme achieves near-optimal performance in terms of the SCP.

Implementation Mode Image Segmentation Method for Object Recognition (물체 인식을 위한 개선된 모드 영상 분할 기법)

  • Moon, Hak-Yong;Han, Wun-Dong;Cho, Heung-Gi;Han, Sung-Ryoung;Jeon, Hee-Jong
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.51 no.1
    • /
    • pp.39-44
    • /
    • 2002
  • In this paper, implementation mode image segmentation method for separate image is presented. The method of segmentation image in conventional method, the error are generated by the threshold values. To improve these problem for segmentation image, the calculation of weighting factor using brightness distribution by histogram of stored images are proposed. For safe image of object and laser image, the computed weighting factor is set to the threshold value. Therefore the image erosion and spread are improved, the correct and reliable informations can be measured. In this paper, the system of 3-D extracting information using the proposed algorithm can be applied to manufactory automation, building automation, security guard system, and detecting information system for all of the industry areas.