• Title/Summary/Keyword: IoT standard

Search Result 223, Processing Time 0.022 seconds

A Study on the Automatic Matching Algorithm of Transporter and Working Block for Block Logistics Management (블록 물류 관리를 위한 트랜스포터와 작업 블록 자동 매칭 알고리즘 연구)

  • Song, Jin-Ho;Park, Kwang-Phil;Ok, Jin-Sung
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.59 no.5
    • /
    • pp.314-322
    • /
    • 2022
  • During the shipbuilding process, many blocks are moved between shipyard workshops by block carrying vehicles called a transporter. Because block logistics management is one of the essential factors in enhancing productivity, it is necessary to manage block information with the transporter that moves it. Currently, because a large amount of data per day are collected from sensors attached to blocks and transporters via IoT infrastructure installed in shipyards, automated methods are needed to analyze them. Therefore, in this study, we developed an algorithm that can automatically match the transporter and the working block based on the GPS sensor data. By comparing the distance between the transporter and the blocks calculated from the Haversine formula, the block is found which is moved by the transporter. In this process, since the time of the measured data of moving objects is different, the time standard for calculating the distance must be determined. The developed algorithm was verified using actual data provided by the shipyard, and the correct result was confirmed with the distance based on the moving time of the transporter.

A Study on the Strengthening of Smart Factory Security in OT (Operational Technology) Environment (OT(Operational Technology) 환경에서 스마트팩토리 보안 강화 방안에 관한 연구)

  • Young Ho Kim;Kwang-Kyu Seo
    • Journal of the Semiconductor & Display Technology
    • /
    • v.23 no.2
    • /
    • pp.123-128
    • /
    • 2024
  • Major countries are trying to expand the construction of smart factories by introducing ICT such as the Internet of Things, cloud, and big data into the manufacturing sector to secure national-level manufacturing competitiveness in the era of the 4th industrial revolution. In addition, Germany is pushing for Industry 4.0 to build a fully automatic production system through the Internet of Things, and China is pushing for the expansion of smart factories to enhance the country's industrial competitiveness through Made in China 2025, Japan's intelligent manufacturing system, and the Korean government's manufacturing innovation 3.0. In this study, considering the increasing security connectivity of smart factories, we would like to identify security threats in the external connection part of smart factories and suggest security enhancement measures based on domestic and international standard security models to respond to the identified security threats. Eventually the proposed method can be applied by accurately identifying the smart factory security status, diagnosing vulnerabilities, establishing appropriate improvement plans, and expanding security strategies to respond to security threats.

  • PDF

A study of Big-data analysis for relationship between students (공장자동화 시스템의 생산성 향상을 위한 SEB 시스템 설계 및 제작)

  • Choi, Ho-Sung;Jung, Jin-Young;Kim, Jin-Mook;Park, Koo-Rack
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.87-93
    • /
    • 2016
  • An Interest and development of an automation of the manufactory technology has been attempted actively in domestic and outside country. In particular, small and medium-sized manufactory are striving for the improvement of productivity through the automation of the plant. And manufactories to comply with the German's Industry 4.0 standard has attempted worldwide recently. But, This is not performed because a substantial investment-cost and development-cost and high efforts. Therefore, we attempted to design and mockup the SEB to enhance the productivity of the factory automation system. SEB, in conjunction with RFID and WiFi networks, expanding the communication range than the automation system of the existing plant, the transfer speed was also improved rapidly. And to be able to solve the existing factory automation system of vulnerability security of the problem, it can be solved by adding a section for user authentication.

A Study on Smartphone Evacuation Guidance Map Criteria through Analysis of Decision-making Time (의사결정시간 분석을 통한 스마트폰 피난안내도 구성요소별 작성기준에 관한 연구)

  • Jeon, Eun-Goo;Bae, Young-Hoon;Jee, Ho-Joon;Son, Jong-Yeong;Park, Joongoo;Hong, Won-Hwa
    • Fire Science and Engineering
    • /
    • v.33 no.5
    • /
    • pp.86-93
    • /
    • 2019
  • Previous studies related to evacuation guidance systems are focused on the system construction, and research on manual of the standard evacuation map is insufficient. Therefore, this research is a basic study to establish the standard evacuation map, and analyzed the decision-making time according to the type and size for each component of the evacuation map. Experimental elements were derived through the review of previous studies and legal regulations. After that, decision-making time was analyzed according to the type and size of the component display method. An experiment was conducted to analyze the decision-making time according to the type and size of the component display method. Afterwards, through the statistical test, the evacuation map guidelines for smartphones were proposed.

Blockchain (A-PBFT) Based Authentication Method for Secure Lora Network (안전한 Lora 네트워크를 위한 블록체인(A-PBFT) 기반 인증 기법)

  • Kim, Sang-Geun
    • Journal of Industrial Convergence
    • /
    • v.20 no.10
    • /
    • pp.17-24
    • /
    • 2022
  • Lora, a non-band network technology of the long-distance wireless standard LPWAN standard, uses ABP and OTTA methods and AES-128-based encryption algorithm (shared key) for internal terminal authentication and integrity verification. Lora's recent firmware tampering vulnerability and shared-key encryption algorithm structure make it difficult to defend against MITM attacks. In this study, the consensus algorithm(PBFT) is applied to the Lora network to enhance safety. It performs authentication and PBFT block chain creation by searching for node groups using the GPS module. As a result of the performance analysis, we established a new Lora trust network and proved that the latency of the consensus algorithm was improved. This study is a 4th industry convergence study and is intended to help improve the security technology of Lora devices in the future.

Analyzes the Changes in the Curricula of Computer and Software-Related Majors in Line with the Fourth Industrial Revolution, Comparing the Periods Before and After the COVID-19 Pandemic in KOREA. (코로나19 펜데믹 전후 컴퓨터 및 소프트웨어 관련 전공의 제4차 산업혁명중심 교과과정 변화 분석)

  • Jin-Il Choi;Chul-Jae Choi
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.3
    • /
    • pp.625-632
    • /
    • 2024
  • This paper analyzed the changes in the curriculum of computer and software-related majors that educate the core ICT technologies needed for the 4th Industrial Revolution, before and after the COVID-19 pandemic. According to the standard classification of university education units, 172 majors classified into Applied Software Engineering, Computer Science·Computer Engineering, and Artificial Intelligence Engineering were targeted, and the curricula of 2023 and 2019 were compared and analyzed. As a result of the analysis, the introduction of the related curriculum for each curriculum group increased by about 2.6%p before and after the COVID-19 pandemic (2023 84.2%, 2019 81.6%). and the 4th Industrial Revolution response index increased by 9.5 points (37.0 in 2023, 27.5 in 2019)

A Design of PRESENT Crypto-Processor Supporting ECB/CBC/OFB/CTR Modes of Operation and Key Lengths of 80/128-bit (ECB/CBC/OFB/CTR 운영모드와 80/128-비트 키 길이를 지원하는 PRESENT 암호 프로세서 설계)

  • Kim, Ki-Bbeum;Cho, Wook-Lae;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.6
    • /
    • pp.1163-1170
    • /
    • 2016
  • A hardware implementation of ultra-lightweight block cipher algorithm PRESENT which was specified as a standard for lightweight cryptography ISO/IEC 29192-2 is described. The PRESENT crypto-processor supports two key lengths of 80 and 128 bits, as well as four modes of operation including ECB, CBC, OFB, and CTR. The PRESENT crypto-processor has on-the-fly key scheduler with master key register, and it can process consecutive blocks of plaintext/ciphertext without reloading master key. In order to achieve a lightweight implementation, the key scheduler was optimized to share circuits for key lengths of 80 bits and 128 bits. The round block was designed with a data-path of 64 bits, so that one round transformation for encryption/decryption is processed in a clock cycle. The PRESENT crypto-processor was verified using Virtex5 FPGA device. The crypto-processor that was synthesized using a $0.18{\mu}m$ CMOS cell library has 8,100 gate equivalents(GE), and the estimated throughput is about 908 Mbps with a maximum operating clock frequency of 454 MHz.

The Improvement Plan for Indicator System of Personal Information Management Level Diagnosis in the Era of the 4th Industrial Revolution: Focusing on Application of Personal Information Protection Standards linked to specific IT technologies (제4차 산업시대의 개인정보 관리수준 진단지표체계 개선방안: 특정 IT기술연계 개인정보보호기준 적용을 중심으로)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.12
    • /
    • pp.1-13
    • /
    • 2021
  • This study tried to suggest ways to improve the indicator system to strengthen the personal information protection. For this purpose, the components of indicator system are derived through domestic and foreign literature, and it was selected as main the diagnostic indicators through FGI/Delphi analysis for personal information protection experts and a survey for personal information protection officers of public institutions. As like this, this study was intended to derive an inspection standard that can be reflected as a separate index system for personal information protection, by classifying the specific IT technologies of the 4th industrial revolution, such as big data, cloud, Internet of Things, and artificial intelligence. As a result, from the planning and design stage of specific technologies, the check items for applying the PbD principle, pseudonymous information processing and de-identification measures were selected as 2 common indicators. And the checklists were consisted 2 items related Big data, 5 items related Cloud service, 5 items related IoT, and 4 items related AI. Accordingly, this study expects to be an institutional device to respond to new technological changes for the continuous development of the personal information management level diagnosis system in the future.

A Study on CPPS Architecture integrated with Centralized OPC UA Server (중앙 집중식 OPC UA 서버와 통합 된 CPPS 아키텍처에 관한 연구)

  • Jo, Guejong;Jang, Su-Hwan;Jeong, Jongpil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.3
    • /
    • pp.73-82
    • /
    • 2019
  • In order to build a smart factory, building a CPPS (Cyber Physical Product System) is an important system that must be accompanied. Through the CPPS, it is the reality of smart factories to move physical factories to a digital-based cyber world and to intelligently and autonomously monitor and control them. But The existing CPPS architectures present only an abstract modeling architecture, and the research that applied the OPC UA Framework (Open Platform Communication Unified Architecture), an international standard for data exchange in the smart factory, as the basic system of CPPS It was insufficient. Therefore, it is possible to implement CPPS that can include both cloud and IoT by collecting field data distributed by CPPS architecture applicable to actual factories and concentrating data processing in a centralized In this study, we implemented CPPS architecture through central OPC UA Server based on OPC UA conforming to central processing OPC UA Framework, and how CPPS logical process and data processing process are automatically generated through OPC UA modeling processing We have proposed the CPPS architecture including the model factory and implemented the model factory to study its performance and usability.

Relative Importance Analysis of Management Level Diagnosis for Consignee's Personal Information Protection (수탁사 개인정보 관리 수준 점검 항목의 상대적 중요도 분석)

  • Im, DongSung;Lee, Sang-Joon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.2
    • /
    • pp.1-11
    • /
    • 2018
  • Recently ICT, new technologies such as IoT, Cloud, and Artificial Intelligence are changing the information society explosively. But personal information leakage incidents of consignee's company are increasing more and more because of the expansion of consignment business and the latest threats such as Ransomware and APT. Therefore, in order to strengthen the security of consignee's company, this study derived the checklists through the analysis of the status such as the feature of consignment and the security standard management system and precedent research. It also analyzed laws related to consignment. Finally we found out the relative importance of checklists after it was applied to proposed AHP(Analytic Hierarchy Process) Model. Relative importance was ranked as establishment of an internal administration plan, privacy cryptography, life cycle, access authority management and so on. The purpose of this study is to reduce the risk of leakage of customer information and improve the level of personal information protection management of the consignee by deriving the check items required in handling personal information of consignee and demonstrating the model. If the inspection activities are performed considering the relative importance of the checklist items, the effectiveness of the input time and cost will be enhanced.