• Title/Summary/Keyword: Cyber Operation

Search Result 253, Processing Time 0.028 seconds

A Study on Constructing a RMF Optimized for Korean National Defense for Weapon System Development (무기체계 개발을 위한 한국형 국방 RMF 구축 방안 연구)

  • Jung keun Ahn;Kwangsoo Cho;Han-jin Jeong;Ji-hun Jeong;Seung-joo Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.827-846
    • /
    • 2023
  • Recently, various information technologies such as network communication and sensors have begun to be integrated into weapon systems that were previously operated in stand-alone. This helps the operators of the weapon system to make quick and accurate decisions, thereby allowing for effective operation of the weapon system. However, as the involvement of the cyber domain in weapon systems increases, it is expected that the potential for damage from cyber attacks will also increase. To develop a secure weapon system, it is necessary to implement built-in security, which helps considering security from the requirement stage of the software development process. The U.S. Department of Defense is implementing the Risk Management Framework Assessment and Authorization (RMF A&A) process, along with the introduction of the concept of cybersecurity, for the evaluation and acquisition of weapon systems. Similarly, South Korea is also continuously making efforts to implement the Korea Risk Management Framework (K-RMF). However, so far, there are no cases where K-RMF has been applied from the development stage, and most of the data and documents related to the U.S. RMF A&A are not disclosed for confidentiality reasons. In this study, we propose the method for inferring the composition of the K-RMF based on systematic threat analysis method and the publicly released documents and data related to RMF. Furthermore, we demonstrate the effectiveness of our inferring method by applying it to the naval battleship system.

Research on Basic Concept Design for Digital Twin Ship Platform (디지털트윈 선박 플랫폼 설계를 위한 연구)

  • Yoon, Kyoungkuk;Kim, Jongsu;Jeon, Hyeonmin;Lim, Changkeun
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.28 no.6
    • /
    • pp.1086-1091
    • /
    • 2022
  • The International Maritime Organization is establishing international agreements on maritime safety and security to prepare for the introduction of autonomous ships. In Korea, the industry is focusing on autonomous navigation system technology development, and to reduce accidents involving coastal ships, research on autonomous ship technology application plans for coastal ships is in progress. Interest in autonomously operated ships is increasing worldwide, and maritime demonstrations for verification of developed technologies are being pursued. In this study, a basic investigation was conducted on the design of a demonstration ship and an onshore platform (remote support center) using digital twin technology for application to coastal ships. To apply digital twin technology, an 8-m small battery-powered electric propulsion ship was selected as the target. The basic design of the twin-integrated platform was developed. The ship navigation and operation data were stored on a server system, and remote-control commands of the electric propulsion ship was achieved through communication between the ship and the onshore platform. Ship performance management, operation and operation optimization, and predictive control are possible using this digital twin technology. This safe and economical digital twin technology is applicable to ships responding to crisis scenarios.

Multi-Objective Onboard Measurement from the Viewpoint of Safety and Efficiency (안전성 및 효율성 관점에서의 다목적 실선 실험)

  • Sang-Won Lee;Kenji Sasa;Ik-Soon Cho
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.11a
    • /
    • pp.116-118
    • /
    • 2023
  • In recent years, the need for economical and sustainable ship routing has emerged due to the enforced regulations on environmental issues. Despite the development of weather forecasting technology, maritime accidents by rough waves have continued to occur due to incorrect weather forecasts. In this study, onboard measurements are conducted to observe the acutal situation on merchant ships in operation encountering rough waves. The types of measured data include information related to navigation (Ship's position, speed, bearing, rudder angle) and engine (engine revolutions, power, shaft thrust, fuel consumption), weather conditions (wind, waves), and ship motions (roll, pitch, and yaw). These ship experiments was conducted to 28,000 DWT bulk carrier, 63,000 DWT bulk carrier, 20,000 TEU container ship, and 12,000 TEU container ship. The actual ship experiment of each ship is intended to acquire various types of data and utilize them for multi-objective studies related to ship operation. Additionally, in order to confirm the sea conditions, the directional wave spectrum was reproduced using a wave simulation model. Through data collection from ship experiments and wave simulations, various studies could be proceeding such as the measurement for accurate wave information by marine radar and analysis for cargo collapse accidents. In addition, it is expected to be utilized in various themes from the perspective of safety and efficiency in ship operation.

  • PDF

A Study on the Product Design Process in I-Business Environment Focusing on Development of the Internet-based Design Process - (e-비지니스환경에서의 제품디자인 프로세스에 관한 기초연구-인터넷기반의 디자인 프로세스 개발을 중심으로-)

  • 이수봉;이돈희
    • Archives of design research
    • /
    • v.16 no.1
    • /
    • pp.181-198
    • /
    • 2003
  • The purpose of this study is to develop a on-line design tool for effectively coping with e-Business environment, or product design process into a Cyber model for traditional manufacturers which attempts new product development under such environment. It was finally developed as a model named $\ulcorner$Design Vortal Site; e-BVDS) that was based on the structure and style of internet web site. Results of the study can be described as follows ; \circled1 e-Business is based on the Internet. All processes in the context of e-Business require models whose structure and method of use are on-line styles. \circled2 In case that a traditional manufacturing business is converted into e-Business, it is better to first consider Hybrid Model that combines resources and advantages of both such traditional and digital businesses. \circled3 The product design process appropriate for e-Business environment has to have a structure and style that ensure utilization of the process as an Internet web site, active participation by product developers and interactive communication between participants in designing and designers. \circled4 $\ulcorner$e-BDVS) makes possible the use of designers around the wend like in-house designers, overcoming lack in creativity, ideas and human resources traditional business organizations face. However, the operation of $\ulcorner$e-BDVS$\lrcorner$ requires time and budget investments in securing related elements and conditions. \circled5 Cyber designers under $\ulcorner$e-BDVS$\lrcorner$ can easily perform all design projects in cyber space. But they have some limits in playing a role as designers and they have difficulty in getting rewards if such projects completed by them are not finally accepted. \circled6 $\ulcorner$e-BDVS) ensures the rapid use of a wide range of design information and data, reception of a variety of solutions and ideas and effective design development, all of which are not possible through traditional processes. However, this process may not be suitable to be used routine process or tool. \circled7 $\ulcorner$e-BDVS$\lrcorner$ makes it possible for out-sourcing or partners businesses to overcome restrictions in time and space and improve productivity and effectiveness. But such they may have to continue off-line works that can not be treated on-line.

  • PDF

Ransomware Prevention and Steganography Security Enhancement Technology Using Format Preserving Encryption (형태보존암호화를 이용한 랜섬웨어 방지 및 스테가노그래피 보안강화기술)

  • Lim, Ji-hwan;Na, Gwan-Woo;Woo, Jae-Min;Seo, Hwa-joeng
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.5
    • /
    • pp.805-811
    • /
    • 2018
  • Recently, Format-Preserving-Encryption (FEA) was suggested by the National Security Research institute (NSR) as an encryption method while maintaining the format without a distortion to the intended information to be encrypted. In this paper, we propose a scheme to solve conventional cyber security problems by using FEA scheme. First, we present the method to encrypt signatures and extensions with FEA in order to effectively defend against Ransomeware attacks. This technique can mitigate the exposure to the Ransomeware by encrypting the minimum information. Second, in order to reduce the secret information for Steganography, we introduce a new way to minimize the secret information with FEA. Finally, we compare the operation speed by encryption with FEA and Lightweight Encryption Algorithm (LEA), furthermore when we optimize FEA we want to compare with the performance improvement accompanying with it.

Development of Information Technology for Smart Defense (Smart Defense 를 위한 IT 기술 개발)

  • Chung, Kyo-Il;Lee, So Yeon;Park, Sangjoon;Park, Jonghyun;Han, Sang-Cheol
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.38 no.3
    • /
    • pp.323-328
    • /
    • 2014
  • Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication & Computer, Intelligence), ISR(Intelligence, Surveillance & Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation.

Using Skip Lists for Managing Replying Comments Posted on Internet Discussion Boards (스킵리스트를 이용한 인터넷 토론 게시판 댓글 관리)

  • Lee, Yun-Jung;Kim, Eun-Kyung;Cho, Hwan-Gue;Woo, Gyun
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.8
    • /
    • pp.38-50
    • /
    • 2010
  • In recent years, the number of users who are actively express their opinions about Internet articles is more and more growing up, as the use of cyber community such as weblog or Internet discussion board increases. In fact, it is not difficult to find an article with hundreds of comments in famous Internet discussion boards. Most of the weblogs or Internet discussion boards present comments in the form of list and do not yet support even the basic operation such as searching comments. In this paper, we analysed large sets of comments in Internet discussion board named AGORA. It was found that from the result that the distribution of comment writers follows power-law. So we suppose a new search structure of comments using skip lists. The main idea of our approach is to reflect the probabilistic distribution properties of the commenters following the power-law to the data structure. Our empirical results show that the proposed method performs more efficient in searching the nodes with fewer number of comparison operations than logN, which is the theoretical time complexity of general indexed structure such as B-trees or typical skip lists.

Photovoltaic Generation System Control Using Space Vector PWM Method (공간벡터 PWM 방식을 이용한 태양광 발전 시스템 제어)

  • Cho, Moon-Taek;Choi, Hae-Gill;Lee, Chung-Sik;Baek, Jong-Mu
    • Journal of the Korean Society of Radiology
    • /
    • v.4 no.3
    • /
    • pp.31-37
    • /
    • 2010
  • In this paper, a photovoltaic system is designed with PWM(Pulse Width Modulation) voltage source inverter. Proposed synchronous signal and control signal was processed by 56F8323 microprocessor for stable modulation. The PWM voltage source inverter using inverter consists of complex type of electric power converter to compensate for the defect, that is solar cell cannot be developed continuously by connecting with the source of electric power for ordinary use. It can cause the effect of saving electric power, from 10 to 20[%]. The PWM voltage source inverter operates in situation that its output voltage is in same phase with the utility voltage. In addition, I connected extra power to the system through operation the system voltage and inverter power in a synchronized way by extracting the system voltage so that the phase of the system and PWM voltage inverter can be synchronized. In the system of this research showed good results after being controlled in order to provide stable power to the load and the system through maintaining and low output power of harmonics.

Measurement of Channel Impedance Characteristics for Indoor Power Line Communications (옥내 전력선 통신 채널 임피던스 특성 측정)

  • Heo Yoon-Seok;Kim Chul;Hong Bong-Hwa;Lee Dae-Young;Jun Kye-Suk
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.11
    • /
    • pp.79-86
    • /
    • 2005
  • This paper describe a method for measuring line impedance as a function of frequency for an energized powerline in normal operation. A small sinusoidal signal of a powerline communication utility frequency $30khz\~1Mhz$ band is continuously injected into the line, and a implemented impedance analyzer calculates the indoor powerline channel impedance from the measured magnitude and phase of resulting voltage and current. The impedance measurement is executed over a range of frequencies to produce a wideband impedance versus frequency characteristic. Implemented impedance analyzer can analysis powerline communication environments measuring line impedance due to load caused in indoor. And measured analysis information through the database can use to evaluate performance of modem and to decide test environment standard.

A Mobile OS Integrity Verification Using Bootloader & Physically Independent Storage Device (부트로더와 물리적으로 독립된 저장장치를 이용한 모바일 운영체제 무결성 검증)

  • Park, Jae-Kyung;Lee, Sang-Hun;Kwon, Mi-Young;Kim, Hyo-Nam
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.12
    • /
    • pp.123-132
    • /
    • 2014
  • In this paper, we study the verification techniques for OS integrity that can be more fatal than applications in case of security issues. The dissemination of smartphones is rapidly progressing and there are many similarities of smartphones and PCs in terms of security risks. Recently, in mobile network environment, there is a trend of increasing damages and now, there are active researches on a system that can comprehensively respond to this. As a way to prevent these risks, integrity checking method on operation system is being researched. As most integrity checking algorithms are classified by verification from the levels before booting the OS and at the time of passing on the control to the OS, in which, there are minor differences in the definitions of integrity checking or its methods. In this paper, we suggests the integrity verification technique of OS using a boot loader and a physically independent storing device in the mobile device.