• Title/Summary/Keyword: Industrial Security Equipment

Search Result 76, Processing Time 0.023 seconds

Development of the framework for quantitative cyber risk assessment in nuclear facilities

  • Kwang-Seop Son;Jae-Gu Song;Jung-Woon Lee
    • Nuclear Engineering and Technology
    • /
    • v.55 no.6
    • /
    • pp.2034-2046
    • /
    • 2023
  • Industrial control systems in nuclear facilities are facing increasing cyber threats due to the widespread use of information and communication equipment. To implement cyber security programs effectively through the RG 5.71, it is necessary to quantitatively assess cyber risks. However, this can be challenging due to limited historical data on threats and customized Critical Digital Assets (CDAs) in nuclear facilities. Previous works have focused on identifying data flows, the assets where the data is stored and processed, which means that the methods are heavily biased towards information security concerns. Additionally, in nuclear facilities, cyber threats need to be analyzed from a safety perspective. In this study, we use the system theoretic process analysis to identify system-level threat scenarios that could violate safety constraints. Instead of quantifying the likelihood of exploiting vulnerabilities, we quantify Security Control Measures (SCMs) against the identified threat scenarios. We classify the system and CDAs into four consequence-based classes, as presented in NEI 13-10, to analyze the adversary impact on CDAs. This allows for the ranking of identified threat scenarios according to the quantified SCMs. The proposed framework enables stakeholders to more effectively and accurately rank cyber risks, as well as establish security and response strategies.

Effect of Shifting the Pole-shoe and Damper-bar Centerlines on the No-load Voltage Waveform of a Tubular Hydro-generator

  • Fan, Zhen-nan;Han, Li;Liao, Yong;Xie, Li-dan;Wen, Kun;Wang, Jun;Dong, Xiu-cheng;Yao, Bing
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.3
    • /
    • pp.1294-1303
    • /
    • 2018
  • This study optimises the no-load voltage waveform of tubular hydro-generators by a simple design scheme. For different centerlines of the pole shoe and damper bar, the optimisation effects on the no-load voltage waveform are investigated in two tubular hydro-generators with different weighted powers (34 MW and 18 MW). The results are compared with those of the traditional stator-slots skewed design. The quality of the no-load voltage waveform was related to the shifting degree, and the different optimisation effects between the integer slot generator (q = 2) and the fractional slot generator (q = 11/2) were analysed. This research can improve the quality of the power output and no-load voltage waveform, and provide an effective reference for improving the industrial design and manufacture level of tubular hydro-generators.

A Design of Access Control Method for Security Enhance based Smart Device (스마트 디바이스 기반의 보안성 강화를 위한 접근제어 기법 설계)

  • Park, Jungoh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.3
    • /
    • pp.11-20
    • /
    • 2018
  • Smart devices refer to various devices and control equipment such as health care devices, imaging devices, motor devices and wearable devices that use wireless network communication (e.g., Wi-fi, Bluetooth, LTE). Commercial services using such devices are found in a wide range of fields, including home networks, health care and medical services, entertainment and toys. Studies on smart devices have also been actively undertaken by academia and industry alike, as the penetration rate of smartphones grew and the technological progress made with the fourth industrial revolution bring about great convenience for users. While services offered through smart devices come with convenience, there is also various security threats that can lead to financial loss or even a loss of life in the case of terrorist attacks. As attacks that are committed through smart devices tend to pick up where attacks based on wireless internet left off, more research is needed on related security topics. As such, this paper seeks to design an access control method for reinforced security for smart devices. After registering and authenticating the smart device from the user's smart phone and service provider, a safe communication protocol is designed. Then to secure the integrity and confidentiality of the communication data, a management process such as for device renewal or cancellation is designed. Safety and security of the existing systems against attacks are also evaluated. In doing so, an improved efficiency by approximately 44% compared to the encryption processing speed of the existing system was verified.

A Study on the Method of Optimizing the Test Order of Explosive Detection System Using Analytic Hierarchy Process and Objective Rating (계층분석방법 및 객관적평가법을 활용한 폭발물탐지장비 시험순서 최적화 방법에 관한 연구)

  • Sun-Ju, Won;Hyun Su, Sim;Yong Soo, Kim
    • Journal of Korean Society for Quality Management
    • /
    • v.50 no.4
    • /
    • pp.793-810
    • /
    • 2022
  • Purpose: As improving the search performance of aviation security equipment is considered essential, this study proposes the need for research on how to find an optimized test sequence that can reduce test time and operator power during the search function test of explosive detection systems. We derive the weights and work difficulty adjustment factor required to find the optimized test order. Methods: First, after setting the test factors, the time of each test and the difficulty scale determined by the worker who performed the test directly were used to derive weights. Second, the work difficulty adjustment coefficient was determined by combining the basic weight adjustment factor and corresponding to the body part used by the test using objective rating. Then the final standard time was derived by calculating the additional weights for the changeability of the test factors. Results: The order in which the final standard time is minimized when 50 tests are performed was defined as the optimized order. 50 tests should be conducted without duplication and the optimal order of tests was obtained when compared to previously numbered tests. As a result of minimizing the total standard time by using Excel's solver parameters, it was reduced by 379.14 seconds, about 6.32 minutes. Conclusion: We tried to express it in mathematical formulas to propose a method for setting an optimized test sequence even when testing is performed on other aviation security equipment. As a result, the optimal test order was derived from the operator's point of view, and it was demonstrated by minimizing the total standard time.

A Study on Performance Improvement of ConTracer Using Taguchi Method (다구찌법을 이용한 컨테이너화물 안전수송장치 ConTracer의 성능향상에 관한 연구)

  • Choi, Hyung-Rim;Kim, Jae-Joong;Kang, Moo-Hong;Shon, Jung-Rock;Shin, Joong-Jo;Lee, Ho-In;Kim, Gwang-Pil;Kim, Chae-Soo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.2
    • /
    • pp.23-31
    • /
    • 2009
  • Since 9.11 terrorist attacks against the USA, the new paradigm for "supply chain security" has been established. And at the same time a lot of researches are being made on supply chain security by many foreign companies or research institutes. However, domestically the terms "supply chain security" themselves are not yet familiar, and the paradigm of security are not being used in the logistics, while little researches are being made on them But recently along with development of "ConTracer," a supply chain security technology, which is to be used as the equipment for container cargo transportation safety based on RF1D technology, related researches have begun to be activated. The key issues for the development of equipment for container transportation safety are to obtain both a high recognition rate and enough recognition distance. To this end, this study has tested the ConTracer (433 MHz type and 2.4 GHz type) by using Taguchi Method. According to our test results, in the case of 433 MHz type, it is a little more effective that the reader faces to the front-right side, and in the case of 2.4 GHz, reader direction does not make difference in the view of sensitivity. The test also has proved that it is better that antenna location, as expected, is to be installed on the outside for both types alike.

Proposed measure for Smart Grid's Personal Information Security Issue (스마트 그리드 개인정보 보안이슈 방안 제시)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.4
    • /
    • pp.41-49
    • /
    • 2016
  • Smart Grid is a next generation of new power growth electrical grid which provide high quality of electrical service by using Information Technologies to increase intelligence and performance. By using Smart Grid system, it can support energy management such as increase quality of electrical power, decrease energy and decrease emissions. However, Smart Grid uses information of energy consumption and when Smart Grid collects information, it will create private information. In this thesis, it will address issues of security private information which caused by Smart Grid for administrative measure and efficiency of Smart Grid in domestic. Also, cryptographic module algorithm, latest security solutions and strong wireless security policy for network environment such as wireless communication Iinternet are require for Smart Grid perform successfully and protect national power network equipment from cyber-attack and can stop leakage of user's personal information. Finally, it is urgent to prepare protection measures of National industrial facilities and power grid which can prepare for a cyber terrorism and penetration attacks and build emergency countermeasure management team for Smart Grid are require for safe Smart Grid environment.

A Study on Effective security threats Defense of Industrial Equipment PC (제조 설비 PC의 효과적인 보안위협 대응 방안 연구)

  • Kim, Byungju
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.655-657
    • /
    • 2015
  • 반도체, 디스플레이 등 제조 분야는 환경적인 요소로 인해 고도화된 보안 위협으로부터 적절한 대응을 하지 못하고 있다. 본 논문은 제조 분야에서 사용되는 제조 설비 PC가 보안 위협에 대해 대응이 어려운 환경적인 요소를 알아보고, Endpoint Level에서 효과적으로 보안 위협을 대응 할 수 있는 방안에 대해 설명한다.

Predictive Maintenance Plan based on Vibration Monitoring of Nuclear Power Plants using Industry 4.0 (4차 산업기술을 활용한 원전설비 진동감시기반 예측정비 방안)

  • Do-young Ko
    • Transactions of the Korean Society of Pressure Vessels and Piping
    • /
    • v.19 no.1
    • /
    • pp.6-10
    • /
    • 2023
  • Only about 10% of selected equipment in nuclear power plants are monitored by wiring to address failures or problems caused by vibration. The purpose is primarily for preventive maintenance, not for predictive maintenance. This paper shows that vibration monitoring and diagnosis using Industrial 4.0 enables the complete predictive maintenance for all vibrating equipments in nuclear power plants with the convergence of internet of things; wireless technology, big data through periodic collection and artificial intelligence. Predictive maintenance using wireless technology is possible in all areas of nuclear power plants and in all systems, but it should satisfy regulatory guides on electromagnetic interference and cyber security.

Comprehensive Survey on Internet of Things, Architecture, Security Aspects, Applications, Related Technologies, Economic Perspective, and Future Directions

  • Gafurov, Khusanbek;Chung, Tai-Myoung
    • Journal of Information Processing Systems
    • /
    • v.15 no.4
    • /
    • pp.797-819
    • /
    • 2019
  • Internet of Things (IoT) is the paradigm of network of Internet-connected things as objects that constantly sense the physical world and share the data for further processing. At the core of IoT lies the early technology of radio frequency identification (RFID), which provides accurate location tracking of real-world objects. With its small size and convenience, RFID tags can be attached to everyday items such as books, clothes, furniture and the like as well as to animals, plants, and even humans. This phenomenon is the beginning of new applications and services for the industry and consumer market. IoT is regarded as a fourth industrial revolution because of its massive coverage of services around the world from smart homes to artificial intelligence-enabled smart driving cars, Internet-enabled medical equipment, etc. It is estimated that there will be several dozens of billions of IoT devices ready and operating until 2020 around the world. Despite the growing statistics, however, IoT has security vulnerabilities that must be addressed appropriately to avoid causing damage in the future. As such, we mention some fields of study as a future topic at the end of the survey. Consequently, in this comprehensive survey of IoT, we will cover the architecture of IoT with various layered models, security characteristics, potential applications, and related supporting technologies of IoT such as 5G, MEC, cloud, WSN, etc., including the economic perspective of IoT and its future directions.

A Study on the Loss Cost of Delayed Weaponization of Weapons System (무기체계 전력화 지연이 미치는 손실비용에 대한 연구)

  • Juhong Park;Myoungjin Choi
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.46 no.4
    • /
    • pp.321-330
    • /
    • 2023
  • The Korean military has sought to build an all-round military force against the national and international security environment and future asymmetric threats as well as the military threats it faces. However, while raising the need for timely electrification, there are few cases of quantitatively evaluating the loss when electrification is delayed, making it difficult for our military to provide a logical basis to support the importance of the electrification period. Therefore, through this study, we tried to analyze the index of loss cost that can support the need for timely electrification with logical and quantitative data and present it as a logical basis. To this end, the loss cost was calculated in terms of combat efficiency, equipment utilization rate, and maintenance requirements, which can be quantitatively calculated based on "combat readiness," a general impact on the military in case of delayed timely electrification.