• Title/Summary/Keyword: Military information security

Search Result 346, Processing Time 0.027 seconds

A Research in Applying Big Data and Artificial Intelligence on Defense Metadata using Multi Repository Meta-Data Management (MRMM) (국방 빅데이터/인공지능 활성화를 위한 다중메타데이터 저장소 관리시스템(MRMM) 기술 연구)

  • Shin, Philip Wootaek;Lee, Jinhee;Kim, Jeongwoo;Shin, Dongsun;Lee, Youngsang;Hwang, Seung Ho
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.169-178
    • /
    • 2020
  • The reductions of troops/human resources, and improvement in combat power have made Korean Department of Defense actively adapt 4th Industrial Revolution technology (Artificial Intelligence, Big Data). The defense information system has been developed in various ways according to the task and the uniqueness of each military. In order to take full advantage of the 4th Industrial Revolution technology, it is necessary to improve the closed defense datamanagement system.However, the establishment and usage of data standards in all information systems for the utilization of defense big data and artificial intelligence has limitations due to security issues, business characteristics of each military, anddifficulty in standardizing large-scale systems. Based on the interworking requirements of each system, data sharing is limited through direct linkage through interoperability agreement between systems. In order to implement smart defense using the 4th Industrial Revolution technology, it is urgent to prepare a system that can share defense data and make good use of it. To technically support the defense, it is critical to develop Multi Repository Meta-Data Management (MRMM) that supports systematic standard management of defense data that manages enterprise standard and standard mapping for each system and promotes data interoperability through linkage between standards which obeys the Defense Interoperability Management Development Guidelines. We introduced MRMM, and implemented by using vocabulary similarity using machine learning and statistical approach. Based on MRMM, We expect to simplify the standardization integration of all military databases using artificial intelligence and bigdata. This will lead to huge reduction of defense budget while increasing combat power for implementing smart defense.

RBAC-based health care service platform for individual recommended health information service (RBAC에 기반한 개인 맞춤형 건강 정보 제공 헬스케어 서비스 플랫폼)

  • Song, Je-Min;Kim, Myung-Sic;Jeong, Kyeong-Ja;Shin, Moon-Sun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.3
    • /
    • pp.1740-1748
    • /
    • 2014
  • In this paper, we propose an RBAC based personalized health care service platform in order to provide smart management of personal health record using smart devices. It helps to guide healthful service and provide useful information according to one's individual health record. Personalized health care services platform supports a healthy lifestyle by measuring personal health information in a hospital clinical, imaging, and drug data, as well as that can be obtained from smart devices. Everyone can enter his health related data in everyday life such as food, sleeping time, mood, movement and exercise so that one can manage his personal health information of modern smart features. In addition, if necessary, personal health information can be provided to the hospital information system and staff with the consent of the individual. It can be contributed to simplify the complex process for remote medical. The proposed platform, which applies role based access control model to protect security and privacy, supports a smart health care services for users by providing personalized health care services through the smart applications.

A Node Scheduling Control Scheme with Time Delay Requirement in Wireless Sensor Actuator Networks (무선 센서 엑츄에이터 네트워크에서의 시간지연을 고려한 노드 스케줄링 제어 기법)

  • Byun, Heejung
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.17-23
    • /
    • 2016
  • Wireless sensor-actuator networks (WSANs) enhance the existing wireless sensor networks (WSNs) by equipping sensor nodes with an actuator. The actuators work with the sensor nodes and perform application-specific operations. The WSAN systems have several applications such as disaster relief, intelligent building, military surveillance, health monitoring, and infrastructure security. These applications require capability of reliable data transfer to act responsively and accurately. Biologically inspired modeling techniques have received considerable attention for achieving robustness, scalability, and adaptability, while retaining individual simplicity. In this paper, an epidemic-inspired algorithm for data dissemination with delay constraints while minimizing energy consumption in WSAN is proposed. The steady states and system stability are analyzed using control theory. Also, simulation results indicate that the proposed scheme provides desirable dissemination delay and energy saving.

Population genetic analysis of special purpose dogs: linkage disequilibrium and effective population size

  • Lee, Doo Ho;Lee, Soo Hyun;Kang, Ji Min;Ju, Ho Young;Lee, Cheol Koo;Choi, Bong Hwan;Lee, Seung Hwan
    • Korean Journal of Agricultural Science
    • /
    • v.44 no.4
    • /
    • pp.549-557
    • /
    • 2017
  • As exchanges between countries become more active, new threats such as drugs, illegal imports of food and medicines, and terrorism are present all over the world. From this, increased border security that protects people's safety is becoming a new issue. The activities of special purpose dogs that detect these threats in advance are becoming very important. One of the obstacles in securing superior individuals is musculoskeletal disorders which interfere with the work of special purpose dogs. In order to search for genes associated with these genetic disorders, we conducted genomic analysis using linkage disequilibrium information and investigated genetic characteristics to know heterozygosity and inbreeding status in the population. In this study, two breeds (Malinois, Shepherd) of army dogs and three breeds (Malinois, Shepherd, Retriever) from public databases were used for comparison. The 170K SNP marker panel was used for this study. In the principal component analysis, it was confirmed that clusters were formed for each breed. The number of effective populations differed for each cultivar, but this was due to the difference in numbers of individuals for each breed used for the analysis. The results of heterozygosity decay analysis showed that heterozygous alleles decreased with each generation. In the army dog group, if the population number is maintained properly, the frequency of allele genotype will not decrease significantly.

A Key Management Scheme for Radio Frequency Communication Environment (저속 무전 통신 환경에 적용 가능한 키 관리 방식)

  • Kim, Song-Yi;Lee, Kwang-Woo;Jeong, Han-Jae;Cho, Young-Jun;Cha, Wook-Jae;Kim, Seung-Joo;Won, Dong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.16C no.4
    • /
    • pp.439-448
    • /
    • 2009
  • The development of wireless communications provides mobility and accessibility to the wire communication users. Wireless sensor network is one of the leading wireless communication techniques. The security mechanism for wired network communication cannot be applied to wireless sensor network because of the limited resource and computing capability of nodes. Furthermore, communication errors frequently occur and the speed is low. Thus, efficient key management scheme is required in low-speed environment. In this paper, we proposed an efficient and secured master key-based scheme compared to the existing scheme. The advantage of our scheme is that establishing and renewing the pair-wise key is possible. In addition, it provides functions such as establishing group keys and renewing it. Furthermore, adding nodes is enabled through our scheme. The master key-based scheme can be applied to military operations and to radio communications for confidential communications.

A Study for Master plan of Infrastructure Establishment of Next Generation Free Flight Concept (우리나라의 차세대 자유비행 인프라구축 전략에 관한 연구)

  • Han, Jae-Hyun;Kim, Chang-Hwan;Kang, Ja-Young
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.16 no.4
    • /
    • pp.54-62
    • /
    • 2008
  • International organizations related to air transport such as ICAO, IATA, ACI are forecasting that the number of passenger will grow about 4.4% annually up to 2015. Therefore, the innovation of given system technology and operation procedure is required in global scale to cope with the increase of air traffic demand. CNS/ATM infrastructure based on satellite is considered to play key role in order to solve the problems due to the dramatic increase of air traffic demand over the world. Free flight concept in the air transport operation has been proved with CNS/ATM infrastructure especially in USA and Europe. Therefore, it is necessary to develop key technologies to overcome technology gap and to secure international competitiveness in Korea. ADS-B is an important issue, and new element technologies should be considered as essential items which were shown in Capstone project. Nowadays, the free flight concept is combined to Air Transport Road Map such as NextGen project in USA, SESAR in Europe. In this process, free flight is included in the concepts such as ATM(Air Traffic Management), aviation security and safety, environmental protection and economy development, wide area weather variable reduction service, information integration and application between the related authorities (civil/military) etc. The purpose of research is to establish mid-term and long-term infrastructure plan and strategy for free flight realization in Korea. The analysis of action target and equipment construction status, phase construction plan of infrastructure has been performed by considering mid-term and long-term free flight plans of USA and Europe.

  • PDF

Detection Probability Improvement Scheme Optimized for Frequency-Hopping Signal Detection (주파수 도약 신호 탐지에 최적화된 탐지 확률 향상 기법)

  • Lee, In-Seok;Oh, Seong-Jun
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.29 no.10
    • /
    • pp.783-790
    • /
    • 2018
  • The frequency-hopping technique is one of the spread-spectrum techniques. Frequency hopping is a communication system in which the carrier frequency channel is hopped within the wideband. Therefore, a frequency-hopping system has such advantages as antijamming and low probability of intercept. This system is often used in military communications. Because frequency-hopping signal detection is difficult, it is an important research issue. A novel detection technique is proposed that can improve detection probability. When the received signal is transformed to a frequency domain sample by fast Fourier transform, spectral leakage lowers the detection probability. This problem can be solved by using the Hamming window, and the detection probability can be increased. However, in a frequency-hopping environment, the windowing technique lowers the detection probability. The proposed method solves this weakness. The simulation results show that the proposed detection technique improves the detection probability by as much as 13 %.

Detection of Abnormal Vessel Trajectories with Convolutional Autoencoder (합성곱 오토인코더를 이용한 이상거동 선박 식별)

  • Son, June-Hyoung;Jang, Jun-Gun;Choi, Bongwan;Kim, Kyeongtaek
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.43 no.4
    • /
    • pp.190-197
    • /
    • 2020
  • Recently there was an incident that military radars, coastal CCTVs and other surveillance equipment captured a small rubber boat smuggling a group of illegal immigrants into South Korea, but guards on duty failed to notice it until after they reached the shore and fled. After that, the detection of such vessels before it reach to the Korean shore has emerged as an important issue to be solved. In the fields of marine navigation, Automatic Identification System (AIS) is widely equipped in vessels, and the vessels incessantly transmits its position information. In this paper, we propose a method of automatically identifying abnormally behaving vessels with AIS using convolutional autoencoder (CAE). Vessel anomaly detection can be referred to as the process of detecting its trajectory that significantly deviated from the majority of the trajectories. In this method, the normal vessel trajectory is gridded as an image, and CAE are trained with images from historical normal vessel trajectories to reconstruct the input image. Features of normal trajectories are captured into weights in CAE. As a result, images of the trajectories of abnormal behaving vessels are poorly reconstructed and end up with large reconstruction errors. We show how correctly the model detects simulated abnormal trajectories shifted a few pixel from normal trajectories. Since the proposed model identifies abnormally behaving ships using actual AIS data, it is expected to contribute to the strengthening of security level when it is applied to various maritime surveillance systems.

A Study on Korea's Countermeasures Through the Analysis of Cyberattack Cases in the Russia-Ukraine War (러시아-우크라이나 전쟁에서의 사이버공격 사례 분석을 통한 한국의 대응 방안에 관한 연구)

  • Lee, Hyungdong;Yoon, Joonhee;Lee, Doeggyu;Shin, Yongtae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.10
    • /
    • pp.353-362
    • /
    • 2022
  • The Russian-Ukraine war is accompanied by a military armed conflict and cyberattacks are in progress. As Russia designated Korea as an unfriendly country, there is an urgent need to prepare countermeasures as the risk of cyberattacks on Korea has also increased. Accordingly, impact of 19 cyberattack cases were analyzed by their type, and characteristics and implications were derived by examining them from five perspectives, including resource mobilization and technological progress. Through this, a total of seven measures were suggested as countermeasures for the Korean government, including strengthening multilateral cooperation with value-sharing countries, securing cyberattack capabilities and strengthening defense systems, and preparing plans to connect with foreign security companies. The results of this study can be used to establish the Korean government's cybersecurity policy.

Possible Continuity and Change of North Korea Though Analysis of, Kim Jong-un's New Year's Message (북한 신년사 분석을 통한 김정은 시대 지속과 변화)

  • Lee, Sung Choon
    • Convergence Security Journal
    • /
    • v.14 no.6_1
    • /
    • pp.75-87
    • /
    • 2014
  • It may be meaningful that analysis of possible continuity and change of North Korea's Kim Jong-un's ruling in its third year. For this analysis, for the application more rational and statistical analysis methods, this study takes advantage of the new years' messages of Kim Il Sung, Kim Jong Il, and Kim Jong-un. In North Korea, the new years' messages are rare enough to give influence to every field of the North Korea's community and the New Year's message performs tutorial role throughout the whole year. The said messages of Il Sung, Kim Jong Il, and Kim Jong-un regimes have been researched and comprehensively summarized. The summarized New Year's Message by Kim Il Sung, Kim Jong Il, and Kim Jong Un are separated, compared and analyzed by the regime by presentation method, configured information, and others followed by New Year message's characteristics and implications of each North Korean regime that have been investigated. Based on the results of this analysis of Kim Jong-un era, possibility of its continuation and change is forecasted. Above all, for possible continuation of the ruling, sticking to the governing socialist way and military-first politics are presented. For possible causes of change, such the four factors as partial opening to overcome economic problems, the North Korean nuclear issue, influx of the nature of capitalism, and Kim Jung-un's control weakness have been presented. Such the factors of possible change and continuation of the North Korea Kim Jung-un ruling are expected to work as a combination of factors. The issue of continuation and change of North Korea Kim Jong-un's control is a key point for us to solve the issues between North and South Koreas. In the situation that the whole people of South Korea have a national consensus in the effort of gathering the public opinion, it is a high time that we needed to have much flexibility to actively cope with the North Korean issues.