• Title/Summary/Keyword: Flight Security

Search Result 101, Processing Time 0.036 seconds

Study on UAV Flight Patterns and Simulation Modelling for UTM (저고도 무인기 교통관리 체계에서 무인기 비행패턴 분류 및 시뮬레이션 모형 개발)

  • Jung, Kyu-sur;Kim, Se-Yeon;Lee, Keum-Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.1
    • /
    • pp.13-19
    • /
    • 2018
  • In this paper, we classified a flight pattern of unmanned aerial vehicle(UAV) which will be operating in UTM system and analyzed its flight pattern by purpose of use. Flight patterns of UAV are sorted into three patterns which are circling, monitoring and delivery. We considered four cases of industry areas using UAV which are agriculture, infrastructure monitoring, public safety & security(p.s.s) and delivery. It is necessary to build a simulation model as a verification tool for applying the flight pattern according to the use of UAV to the real UTM system. Therefore, we propose the simulation model of UAV with updating states over time. We applied simulation to UAV monitoring flight pattern, and confirmed that the flight was done by the given input data. The simulation model will be used in the future to verify that the UAV has various flight patterns and can operate safely and efficiently for the intended use.

Standardization of Enhanced Flight Termination System in the U.S. (미국의 차세대 비행종단시스템 표준화 동향)

  • Bae, Young-Jo;Oh, Chang-Yul;Lee, Hyo-Keun
    • Current Industrial and Technological Trends in Aerospace
    • /
    • v.8 no.1
    • /
    • pp.86-95
    • /
    • 2010
  • Flight termination system(FTS) is used to terminate safely the launch vehicle's flight when it faces an emergency situation by transmitting termination command from ground FTS. RCC standard IRIG tone method has been used widely for FTS commands method in foreign ranges and Naro Space Center, but this method has a weakness for security of command signal. Therefore RCC had studied more secured EFTS standard and chose CPFSK digital modulation method. This paper describes basic concept and types of FTS and FTS types which foreign ranges had applied and describes standardization of EFTS in the U.S. based on RCC EFTS study reports.

  • PDF

Deregulation Necessity for the Invigoration of Drone Utilization in the Geospatial Information Field

  • Heo, Joonghyeok;Park, Joonkyu
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.40 no.4
    • /
    • pp.351-357
    • /
    • 2022
  • In this study, a direction for deregulation that can increase the use of drones in the field of spatial information is presented. Regulations and administrative procedures for drone operation showed similar procedures in Japan, the United States, and Korea, such as reporting flight equipment, driver's license, and prohibition of flying within a specific flight zone. In the United States, policies to encourage the use of commercial drones have been implemented, and Japan has slightly tightened regulations on drone operation to protect the Olympics and important national facilities. As a result of the study, in the area where drone operation is restricted for geospatial data construction, Korea was setting the largest area, and GIS analysis showed that Korea's drone flight restricted area was more than 19.4% of the country's land area. In order to increase the utilization of drones in the construction and utilization of spatial information in the future, it is necessary to reset the drone flight restriction zone and reduce the area of the drone flight restriction zone. In addition, it was found that Korea is the only country that has formal and specific regulations on geospatial information security management. In order to increase the construction of geospatial information using drones, it is necessary to ease GSD (Ground Sample Distance)regulations.

Development of Unmanned Aircraft in the Fourth Industrial Revolution (4차 산업혁명시대 우리나라 드론의 발전 방향)

  • Lee, Young Uk
    • Convergence Security Journal
    • /
    • v.18 no.5_2
    • /
    • pp.3-10
    • /
    • 2018
  • The drone is an unmanned aircraft that can be steered and controlled using radio waves on the ground, and the pilot moves unmanned without boarding. The history of the unmanned airplane began with military use, and the first unmanned aerial flight was the first successful flight of the 'Sperry Aerial Torpedo' drones built in the United States in 1917 with a bomb. With the development of unmanned aerial technology, the use of military drones has expanded to a wider field. Recently, the use of drones has been utilized in various fields such as agriculture, industry, logistics, broadcasting, and safety, and the scale of the market is also expanding. Although the drones are becoming indispensable to penetrate our lives, they can be used for bad purposes depending on the intended use of the user, but the risk factors are overlooked. Therefore, technical defects related to drones and accidents caused by operator's mistakes can not be completely prevented. However, privacy infringement, security leakage, and terrorism, which may be caused by illegal use of drones, It will not be inhibited and will accelerate.

  • PDF

The proposal of a cryptographic method for the communication message security of GCS to support safe UAV operations (안정적인 UAV 운영을 위한 GCS의 통신메시지의 암호화 제안)

  • Kim, Byoung-Kug;Hong, Sung-Hwa;Kang, Jiheon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1353-1358
    • /
    • 2021
  • IoT (Internet of Things) emerges from various technologies such as communications, micro processors and embedded system and so on. The IoT has also been used to UAV (Unmanned Aerial Vehicle) system. In manned aircraft, a pilot and co-pilot should control FCS (Flight Control System) with FBW(Fly By Wire) system for flight operation. In contrast, the flight operation in UAV system is remotely and fully managed by GCS (Ground Control System) almost in real time. To make it possible the communication channel should be necessary between the UAV and the GCS. There are many protocols between two systems. Amongst them, MAVLink (Macro Air Vehicle Link) protocol is representatively used due to its open architecture. MAVLink does not define any securities itself, which results in high vulnerability from external attacks. This paper proposes the method to enhance data security in GCS network by applying cryptographic methods to the MAVLink messages in order to support safe UAV operations.

A Study on Vulnerability of Cyber Electronic Warfare and Analysis of Countermeasures for swarm flight of the NBC Reconnaissance Drones (화생방 정찰 드론의 군집비행 시 사이버전자전 취약점 및 대응방안 분석)

  • Kim, Jee-won;Park, Sang-jun;Lee, Kwang-ho;Jung, Chan-gi
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.133-139
    • /
    • 2018
  • The 5 Game changer means the concepts of the army's operation against the enemy's asymmetric threats so that minimize damage to the public and leads to victory in war in the shortest time. A study of network architecture of Dronebot operation is a key study to carry out integrated operation with integrated C4I system by organically linking several drones battle groups through ICT. The NBC reconnaissance drones can be used instead of vehicles and humans to detect NBC materials and share situations quickly. However, there is still a lack of research on the swarm flight of the NBC reconnaissance drones and the weaknesses of cyber electronic warfare. In this study, we present weaknesses and countermeasures of CBRNs in swarm flight operations and provide a basis for future research.

  • PDF

Application Plan of U.S Aviation Profiling for Prevention of Air Terrorism in Korea (항공테러 예방을 위한 미국 항공프로파일링 기법의 국내 활용방안)

  • Yang, Seung-Don;Yang, Young-Mo
    • Korean Security Journal
    • /
    • no.38
    • /
    • pp.33-56
    • /
    • 2014
  • This study is aim to make use of prevention of air terrorism and strengthen of air security in Korea. To achieve it. searching main feature in U.S aviation profiling. Aviation profiling in U.S used to Secure Flight, Screening Passengers by Observation Technique, Registered Travel Program. Through U.S Aviation Profiling, Prevention of air terrorism in Korea are as in the following. First, Through U.S Aviation Profiling, Information of terrorism constructed in advance and unification of constructed information. Second, Identifiying that institution exclusively for prevention of air terrorism. Third, Identifiying that human rights and privacy invasion to a minimun plan anout U.S aviation profiling. Finally, Identifiying that the spread of research development for prevention of air terrorism and strengthen of air security in Korea.

  • PDF

A Study for Master plan of Infrastructure Establishment of Next Generation Free Flight Concept (우리나라의 차세대 자유비행 인프라구축 전략에 관한 연구)

  • Han, Jae-Hyun;Kim, Chang-Hwan;Kang, Ja-Young
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.16 no.4
    • /
    • pp.54-62
    • /
    • 2008
  • International organizations related to air transport such as ICAO, IATA, ACI are forecasting that the number of passenger will grow about 4.4% annually up to 2015. Therefore, the innovation of given system technology and operation procedure is required in global scale to cope with the increase of air traffic demand. CNS/ATM infrastructure based on satellite is considered to play key role in order to solve the problems due to the dramatic increase of air traffic demand over the world. Free flight concept in the air transport operation has been proved with CNS/ATM infrastructure especially in USA and Europe. Therefore, it is necessary to develop key technologies to overcome technology gap and to secure international competitiveness in Korea. ADS-B is an important issue, and new element technologies should be considered as essential items which were shown in Capstone project. Nowadays, the free flight concept is combined to Air Transport Road Map such as NextGen project in USA, SESAR in Europe. In this process, free flight is included in the concepts such as ATM(Air Traffic Management), aviation security and safety, environmental protection and economy development, wide area weather variable reduction service, information integration and application between the related authorities (civil/military) etc. The purpose of research is to establish mid-term and long-term infrastructure plan and strategy for free flight realization in Korea. The analysis of action target and equipment construction status, phase construction plan of infrastructure has been performed by considering mid-term and long-term free flight plans of USA and Europe.

  • PDF

Evaluation for Incheon International Airport security: passenger satisfaction and significance, using IPA method (IPA기법을 활용한 인천국제공항 이용객의 항공보안서비스 만족도와 중요도 평가)

  • Byeon, A-Reum;Choi, Jin-Young;Choi, Youn-Chul
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.25 no.2
    • /
    • pp.77-82
    • /
    • 2017
  • Currently the international flight passenger visit at Incheon International Airport increased 12.4% compared to January 2017. Such increase affects on the congestion of an airport and the security check is one of the most congested area. There is a prejudice that airport security is not related to the airport service and is only a type of control that limits the quality of service. However, considering the huge impact that airport security agents have on passenger move within the airport, trustworthy, fast and kind service at airport security check is one of the most important part of airport service quality improvement. This research is an importance performance analysis of Incheon International Airport security service passenger satisfaction and its significance using IPA method. This research will contribute to the improvement of airport operation and service quality, by proving the relation between airport security and service.

Report of East Sea Crossing by Underwater Glider (수중 글라이더를 이용한 동해 횡단 사례 보고)

  • Park, Yo-Sup;Lee, Shin-Je;Lee, Yong-Kuk;Jung, Seom-Kyu;Jang, Nam-Do;Lee, Ha-Woong
    • The Sea:JOURNAL OF THE KOREAN SOCIETY OF OCEANOGRAPHY
    • /
    • v.17 no.2
    • /
    • pp.130-137
    • /
    • 2012
  • The underwater glider using conception of Lagrangian method, is a new observation platform to understand the properties of the ocean vertically. In 2011 March, KORDI made a first successful autonomous trip from Hupo to west coast of Uleungdo piloting Littoral Glider of Alaska Native Technology LLC. The journey considered many environmental variables and route vigilantly selected, the glider covered 177 km horizontally and took approximately 6 days (153 hours). Despite the existence of 1 kt eddy current, Sound velocity sampling was conducted from 5 meters and reaching maximum of 200 meters depth at each dive. It successfully collected sound velocity and temperature profile at every 5 seconds totaling up to 1408 profiles using SVT&P sensor. During the flight it was also a mission to check the diverse modes of the glider i.e. spiral, waypoints, heading, drift and hover could function without a defect in a given situation. These modes were thoroughly monitored and it could be considered that the glider handled it well during the flight. As a result of this test flight, it was evident that the given underwater glider could operate under 2kt current environment with users defined heading and depth, also with the payload up to 5 kg without changing internal buoyancy.