• Title/Summary/Keyword: Logistics security

Search Result 233, Processing Time 0.026 seconds

An Overview of Blockchain Technology: Concepts, Consensus, Standardization, and Security Threats (블록체인 기술 동향에 관한 연구)

  • Park, Roy C.;Lee, Young Sil
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.20 no.4
    • /
    • pp.218-225
    • /
    • 2019
  • Since the publication of Satoshi Nakamoto's white paper on Bitcoin in 2008, blockchain is in the spotlight as one of the core technologies of the Fouth Industrial Revolution, which can be used in various industries beyond simple cryptocurrency. various researches and developments are being conducted worldwide to utilize blockchain technology, and a global blockchain consortium is formed. In addition, attempts are being made to apply to various industries such as logistics, distribution, and medical care as well as the financial sector. However, blockchain tecnology developments still do not reach the level that meets these concerns and expectations. In this paper, we presents a comprehensive overview of blockchain technology by giving its brief concepts, consensus algorithms, standardization, and security threats.

Development of Unmanned Aircraft in the Fourth Industrial Revolution (4차 산업혁명시대 우리나라 드론의 발전 방향)

  • Lee, Young Uk
    • Convergence Security Journal
    • /
    • v.18 no.5_2
    • /
    • pp.3-10
    • /
    • 2018
  • The drone is an unmanned aircraft that can be steered and controlled using radio waves on the ground, and the pilot moves unmanned without boarding. The history of the unmanned airplane began with military use, and the first unmanned aerial flight was the first successful flight of the 'Sperry Aerial Torpedo' drones built in the United States in 1917 with a bomb. With the development of unmanned aerial technology, the use of military drones has expanded to a wider field. Recently, the use of drones has been utilized in various fields such as agriculture, industry, logistics, broadcasting, and safety, and the scale of the market is also expanding. Although the drones are becoming indispensable to penetrate our lives, they can be used for bad purposes depending on the intended use of the user, but the risk factors are overlooked. Therefore, technical defects related to drones and accidents caused by operator's mistakes can not be completely prevented. However, privacy infringement, security leakage, and terrorism, which may be caused by illegal use of drones, It will not be inhibited and will accelerate.

  • PDF

Implementation of Illegal Entry Detection System using Sensor Node and Image Processing (센서 노드와 영상처리 기법을 이용한 불법 침입 감지 시스템 구현)

  • Kim, Kyung-Jong;Jung, Se-Hoon;Sim, Chun-Bo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.741-744
    • /
    • 2009
  • In this paper, we design and implement an illegal entry detection system which efficiently can detect illegal intruders applying image processing technique on the perceived value of the infrared sensor and acquired image from two-way wireless camera(DRC) for prevention of damage caused by theft and the ratio of security in the security of the square such as livestock, agricultural products, and logistics warehouse. At first, the proposed system acquires the image from wireless camera when infrared sensor detect the location of illegal intruders. and then, the system process to determine movement by applying image process technique with acquired image. Finally, we send the detected and analyzed the results and the final image to security company and mobile device of owner.

  • PDF

A Study on System Requirements for the Development of Intelligent Container using QFD (QFD를 활용한 지능형컨테이너의 시스템요구사항 도출)

  • Kim, Chae-Soo;Choi, Hyung-Rim;Kim, Jae-Joong;Hong, Soon-Goo;Kim, Hui-Yun;Kim, Jea-Hwan;Shin, Joong-Jo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.4
    • /
    • pp.64-72
    • /
    • 2008
  • Recently security is being an important issue in almost every field of industry. This situation has affected port logistics industry deeply. Ports are now leaving operational methods that only focus on productivity, and shifting to new ones which focus on safety and customer services on the basis of it. Thus a lot of companies and institutions have offered various solutions as this issue becomes more and more intense. Among them, most typical solutions involve installing special devices to ordinary containers to improve its security, such as CSD (Container Security Device) of GE (General Electric) and eSeal of Savi Networks. On the other hand, these devices focus only on international standards or technical implementation, and this causes inconvenience to actual users like cargo owners, sea carriers, or stevedoring companies. This is considered to be due to lack of sufficient consideration on user demands. This research uses QFD (Quality Function Deployment) method for deducting system requirements in order to solve the problems of previous security devices and to develop a security system that can not only reflect the demands of the users but also considers real-world conditions. According to the QFD results, a total of 21 system CTO's were deducted under 5 categories.

  • PDF

A Study on the Relative Importance of Evaluation Factors for Improvement of Port Security (항만보안 강화를 위한 평가요인과 상대적 중요도 분석)

  • Kang, Min-Gu;Kim, Hwa-Young
    • Journal of Navigation and Port Research
    • /
    • v.43 no.1
    • /
    • pp.49-56
    • /
    • 2019
  • The purpose of this study was to extract the evaluation factors and assess the relative importance between the factors. For this purpose, the evaluation factors were extracted through literature review and the process of brainstorming with experts, who are related to port security. The evaluation factors were then classified into four higher factors and twelve sub- factors through the use of the AHP method. A survey on the classified factors was conducted by experts composed of public officials, port authority employees and education institutions officials. We also carried out statistical tests to determine the perception gap of weights between the groups. As a result of a relative importance analysis of strength, the security operating system factor was highest, followed by improvement of hardware facilities and increase of security personnel. There was a difference in perception among the groups in policy support, facility support and personnel resources budget support. The results of the analysis show that the strength operating system through the establishment of an integrated monitoring system is a priority. It is necessary to understand the difference of perception between groups and build a systematic cooperation system. The evaluation factors extracted from this study can be used for the measurement of port security efficiency in further work.

Classification and Allocation method of e-mail using possibility distribution and prediction (확률 분포와 추론에 의한 이메일 분류 및 정리 방법)

  • Go, Nam-Hyeon;Kim, Ji-Yun;Choi, Man-Kyu
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2016.07a
    • /
    • pp.95-96
    • /
    • 2016
  • 본 논문에서는 디리클레 분포와 베이즈 추론 모델을 활용하여 전자우편을 분류하고 정리하는 방법을 제안한다. 과거 원치 않는 광고성 이메일인 스팸 탐지에서 시작한 전자우편 분류는 지속적인 송수신 량의 증가와 내용의 다양화로 인해 광고성과 정보성의 판단 기준이 모호해진 상태이다. 스팸 탐지와 같은 이분법적 분류 방식이 아닌 내용의 주제 별로 자동 분류할 수 있는 방법이 필요하다. 본 논문에서 다루는 제안 기법은 전자우편의 내용에서 다뤄질 수 있는 주제의 종류를 예측하기 위한 방법을 제공한다. 발신하거나 수신된 전자우편이 속한 주제를 자동으로 정할 수 있다. 본 제안 기법의 활용을 통해 전자우편의 분류만이 아닌 업무 및 시장 동향 분석과 정보보안 분야에서는 악성코드 분류에 사용될 수 있을 것으로 기대된다.

  • PDF

A GPS Based Ship Block Location System for The Ship Block Logistics (선박 블록 물류를 위한 GPS 기반 블록 위치 인식 시스템)

  • Song, Kwon-Soo;Kim, Mi-Sun;Lee, Sang-Don;Cho, Doo-Yeoun
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2012.05a
    • /
    • pp.432-433
    • /
    • 2012
  • 조선 산업 현장에서 선박 건조 공정에서 생산된 선박 블록에 대해 조선소 야드 내 위치를 식별하는 것이 필요하다. 본 논문은 사용자가 3G 무선통신 기반의 모바일 기기를 이용하여 물류상황을 파악하고, 현장에서 직접 블록의 위치를 선박물류시스템에 입력할 수 있는 GPS 기반 위치 인식 시스템을 제안한다.

  • PDF

A RF-ID System for Movement Data Collection under Drive (주행 중인 차량 운행 data 수집을 위한 RF-ID System)

  • Kim, Yong-Sang;Kim, Sang-Wook;Kim, Yang-Mo
    • Proceedings of the KIEE Conference
    • /
    • 2004.04a
    • /
    • pp.217-219
    • /
    • 2004
  • In recent years, the smart card is wifely applied for wireless communication, tracking, transportation logistics, diagnostic monitoring, access control and security. RF-ID system is universally applicable. Passive RF-ID system consists from reader and passive tag. The reader transmits energy and simple information to a tag by wireless and the power from the reader is transformed for controller, FRAM and Bluetooth module. in this paper, an analysis and design of smart card for the transmission of the car movement data is presented.

  • PDF

A study on the matrix-based RFID authentication protocol (행렬기반 RFID 인증 프로토콜에 관한 연구)

  • Shin, Hyo-Young;Jung, Kye-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.800-803
    • /
    • 2012
  • Recently, research on security of RFID system has been conducted actively in order to utilize RFID system in various fields including distribution and logistics. This paper suggests an authentication protocol which supplement the flaws of previous RFID authentication protocols and we improved its performance using matrix-based authentication. The suggested authentication protocol provides mutual authentication, protects from wiretapping attack, replay attack, spoofing attack, and traffic analysis attack and so on, and reduces overload of back-end database so that has efficient performance.

  • PDF

Temperature and Humidity Monitoring Using Ubiquitous Senor Network in Railway Cabin (철도차량 객실 온습도 USN 모니터링 기술)

  • Kwon, Soon-Bark;Cho, Young-Min;Park, Duck-Shin;Park, Eun-Young;Kim, Se-Young;Jung, Mi-Young
    • Proceedings of the KSR Conference
    • /
    • 2008.06a
    • /
    • pp.948-951
    • /
    • 2008
  • Ubiquitous sensor network (USN) based on ZigBee communication protocol has been used in various application fields, such as home-network, intelligent building and machine, logistics, environmental monitoring, military field, security field and etc. The ZigBee is targeted at radio-frequency application that require a low data rate, long battery life and secure network. Especially, the USN system can be applied efficiently to building-indoor where the complex geometry is adopted. In this study, all 90 points of railway cabin indoor were monitored for temperature and humidity using USN technology. All sensors were pre/post-calibrated and the temperature/humidity change were analyzed in a railway cabin in real-time. The results would be useful to develop the cabin heating, ventilating and air conditing (HVAC) system to meet all passengers' thermal comfort regardless of their seat position.

  • PDF