• Title/Summary/Keyword: Safe Network

Search Result 601, Processing Time 0.03 seconds

A Design of Authentication Mechanism for Secure Communication in Smart Factory Environments (스마트 팩토리 환경에서 안전한 통신을 위한 인증 메커니즘 설계)

  • Joong-oh Park
    • Journal of Industrial Convergence
    • /
    • v.22 no.4
    • /
    • pp.1-9
    • /
    • 2024
  • Smart factories represent production facilities where cutting-edge information and communication technologies are fused with manufacturing processes, reflecting rapid advancements and changes in the global manufacturing sector. They capitalize on the integration of robotics and automation, the Internet of Things (IoT), and the convergence of artificial intelligence technologies to maximize production efficiency in various manufacturing environments. However, the smart factory environment is prone to security threats and vulnerabilities due to various attack techniques. When security threats occur in smart factories, they can lead to financial losses, damage to corporate reputation, and even human casualties, necessitating an appropriate security response. Therefore, this paper proposes a security authentication mechanism for safe communication in the smart factory environment. The components of the proposed authentication mechanism include smart devices, an internal operation management system, an authentication system, and a cloud storage server. The smart device registration process, authentication procedure, and the detailed design of anomaly detection and update procedures were meticulously developed. And the safety of the proposed authentication mechanism was analyzed, and through performance analysis with existing authentication mechanisms, we confirmed an efficiency improvement of approximately 8%. Additionally, this paper presents directions for future research on lightweight protocols and security strategies for the application of the proposed technology, aiming to enhance security.

Research on Dispersion Prediction Technology and Integrated Monitoring Systems for Hazardous Substances in Industrial Complexes Based on AIoT Utilizing Digital Twin (디지털트윈을 활용한 AIoT 기반 산업단지 유해물질 확산예측 및 통합관제체계 연구)

  • Min Ho Son;Il Ryong Kweon
    • Journal of the Society of Disaster Information
    • /
    • v.20 no.3
    • /
    • pp.484-499
    • /
    • 2024
  • Purpose: Recently, due to the aging of safety facilities in national industrial complexes, there has been an increase in the frequency and scale of safety accidents, highlighting the need for a shift toward a prevention-centered disaster management paradigm and the establishment of a digital safety network. In response, this study aims to provide an information system that supports more rapid and precise decision-making during disasters by utilizing digital twin-based integrated control technology to predict the spread of hazardous substances, trace the origin of accidents, and offer safe evacuation routes. Method: We considered various simulation results, such as surface diffusion, upper-level diffusion, and combined diffusion, based on the actual characteristics of hazardous substances and weather conditions, addressing the limitations of previous studies. Additionally, we designed an integrated management system to minimize the limitations of spatiotemporal monitoring by utilizing an IoT sensor-based backtracking model to predict leakage points of hazardous substances in spatiotemporal blind spots. Results: We selected two pilot companies in the Gumi Industrial Complex and installed IoT sensors. Then, we operated a living lab by establishing an integrated management system that provides services such as prediction of hazardous substance dispersion, traceback, AI-based leakage prediction, and evacuation information guidance, all based on digital twin technology within the industrial complex. Conclusion: Taking into account the limitations of previous research, we used digital twin-based AI analysis to predict hazardous chemical leaks, detect leakage accidents, and forecast three-dimensional compound dispersion and traceback diffusion.

Electronic Roll Book using Electronic Bracelet.Child Safe-Guarding Device System (전자 팔찌를 이용한 전자 출석부.어린이 보호 장치 시스템)

  • Moon, Seung-Jin;Kim, Tae-Nam;Kim, Pan-Su
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.143-155
    • /
    • 2011
  • Lately electronic tagging policy for the sexual offenders was introduced in order to reduce and prevent sexual offences. However, most sexual offences against children happening these days are committed by the tagged offenders whose identities have been released. So, for the crime prevention, we need measures with which we could minimize the suffers more promptly and actively. This paper suggests a new system to relieve the sexual abuse related anxiety of the children and solve the problems that electronic bracelet has. Existing bracelets are only worn by serious criminals, and it's only for risk management and positioning, there is no way to protect the children who are the potential victims of sexual abuse and there actually happened some cases. So we suggest also letting the students(children) wear the LBS(Location Based Service) and USN(Ubiquitous Sensor Network) technology based electronic bracelets to monitor and figure out dangerous situations intelligently, so that we could prevent sexual offences against children beforehand, and while a crime is happening, we could judge the situation of the crime intelligently and take swift action to minimize the suffer. And by checking students' attendance and position, guardians could know where their children are in real time and could protect the children from not only sexual offences but also violent crimes against children like kidnapping. The overall system is like follows : RFID Tag for children monitors the approach of offenders. While an offender's RFID tag is approaching, it will transmit the situation and position as the first warning message to the control center and the guardians. When the offender is going far away, it turns to monitoring mode, and if the tag of the child or the offender is taken off or the child and offender stay at one position for 3~5 minutes or longer, then it will consider this as a dangerous situation, then transmit the emergency situations and position as the second warning message to the control center and the guardians, and ask for the dispatch of police to prevent the crime at the initial stage. The RFID module of criminals' electronic bracelets is RFID TAG, and the RFID module for the children is RFID receiver(reader), so wherever the offenders are, if an offender is at a place within 20m from a child, RFID module for children will transmit the situation every certain periods to the control center by the automatic response of the receiver. As for the positioning module, outdoors GPS or mobile communications module(CELL module)is used and UWB, WI-FI based module is used indoors. The sensor is set under the purpose of making it possible to measure the position coordinates even indoors, so that one could send his real time situation and position to the server of central control center. By using the RFID electronic roll book system of educational institutions and safety system installed at home, children's position and situation can be checked. When the child leaves for school, attendance can be checked through the electronic roll book, and when school is over the information is sent to the guardians. And using RFID access control turnstiles installed at the apartment or entrance of the house, the arrival of the children could be checked and the information is transmitted to the guardians. If the student is absent or didn't arrive at home, the information of the child is sent to the central control center from the electronic roll book or access control turnstiles, and look for the position of the child's electronic bracelet using GPS or mobile communications module, then send the information to the guardians and teacher so that they could report to the police immediately if necessary. Central management and control system is built under the purpose of monitoring dangerous situations and guardians' checking. It saves the warning and pattern data to figure out the areas with dangerous situation, and could help introduce crime prevention systems like CCTV with the highest priority. And by DB establishment personal data could be saved, the frequency of first and second warnings made, the terminal ID of the specific child and offender, warning made position, situation (like approaching, taken off of the electronic bracelet, same position for a certain time) and so on could be recorded, and the data is going to be used for preventing crimes. Even though we've already introduced electronic tagging to prevent recurrence of child sexual offences, but the crimes continuously occur. So I suggest this system to prevent crimes beforehand concerning the children's safety. If we make electronic bracelets easy to use and carry, and set the price reasonably so that many children can use, then lots of criminals could be prevented and we can protect the children easily. By preventing criminals before happening, it is going to be a helpful system for our safe life.

A Study on Estimating Optimal Tonnage of Coastal Cargo Vessels in Korea (우리나라 연안화물선의 적정선복량 추정에 관한 연구)

  • 이청환;이철영
    • Journal of the Korean Institute of Navigation
    • /
    • v.13 no.1
    • /
    • pp.21-53
    • /
    • 1989
  • In the past twenty years, there has been a rapid increase in the volume of traffic in Korea due to the Korean great growth of the Korean economy. Since transformation provides an infrastructure vital to economic growth, it becomes more and more an integral part of the Korea economy. The importance of coastal shipping stands out in particular, not only because of the expansion limit on the road network, but also because of saturation in the capacity of rail transportation. In spite of this increase and its importance, coastal shipping is falling behind partly because it is givenless emphasis than ocean-going shipping and other inland transportation systems and partly because of overcompetition due to excessive ship tonnage. Therefore, estimating and planning optimum ship tonnage is the first take to develop Korean coastal shipping. This paper aims to estimate the optimum coastal ship tonnage by computer simulation and finally to draw up plans for the ship tonnage balance according to supply and demand. The estimation of the optimum ship tonnage is peformed by the method of Origin -Destimation and time series analysis. The result are as follows : (1) The optimum ship tonnage in 1987 was 358, 680 DWT, which is 54% of the current ship tonnage (481 ships, 662, 664DWT) that is equal to the optimum ship tonnage in 1998. this overcapacity result is in excessive competition and financial difficulties in Korea coastal shipping. (2) The excessive ship tonnage can be broken down into ship types as follows : oil carrier 250, 926 DWT(350%), cement carrier 9, 977 DWT(119%), iron material/machinery carrier 25, 665 DWT(117%), general cargo carrier 17, 416DWT(112%). (3) the current total ship crew of 5, 079 is more than the verified optimally efficient figure of 3, 808 by 1271. (4) From the viewpoint of management strategy, it is necessary that excessive ship tonnage be reduced and uneconomic outdated vessels be broken up. And its found that the diversion into economically efficient fleets is urgently required in order to meet increasing annual rate in the amounts of cargo(23, 877DWT). (5) The plans for the ship tonnage balance according to supply and demand are as follows 1) The establishment of a legislative system for the arrangement of ship tonnage. This would involve; (a) The announcement of an optimum tonnage which guides the licensing of cargo vessels and ship tonnage supply. (b) The establishment of an organization that substantially arrangement tonnage in Korea coastal shipping. 2) The announcement of an optimum ship tonnage both per year and short-term that guides current tonnage supply plans. 3) The settlement of elastic tariffs resulting in the protect6ion of coastal shipping's share from other tonnage supply plans. 4) The settlement of elastic tariffs resulting in the protection of coastal shipping's share from other transportation systems. 4) Restriction of ocean-going vessels from participating in coastal shipping routes. 5) Business rationalization of coastal shipping company which reduces uneconomic outdated vessels and boosts the national economy. If we are to achieve these ends, the followings are prerequisites; I) Because many non-licensed vessels are actually operating and threatening the safe voyage of the others in Korea coastal routes, it is necessary that those ind of vessels be controlled and punished by the authorities. II) The supply of ship tonnage in Korean coastal routes should be predently monitored because most of the coastal vessels are to small to be diverted into ocean-going routes in case of excessive supply. III) Every ship type which is engaged in coastal shipping should be specialized according to the characteristics of its routes as soon possible.

  • PDF

Evaluation of Future Water Deficit for Anseong River Basin Under Climate Change (기후변화를 고려한 안성천 유역의 미래 물 부족량 평가)

  • Lee, Dae Wung;Jung, Jaewon;Hong, Seung Jin;Han, Daegun;Joo, Hong Jun;Kim, Hung Soo
    • Journal of Wetlands Research
    • /
    • v.19 no.3
    • /
    • pp.345-352
    • /
    • 2017
  • The average global temperature on Earth has increased by about $0.85^{\circ}C$ since 1880 due to the global warming. The temperature increase affects hydrologic phenomenon and so the world has been suffered from natural disasters such as floods and droughts. Therefore, especially, in the aspect of water deficit, we may require the accurate prediction of water demand considering the uncertainty of climate in order to establish water resources planning and to ensure safe water supply for the future. To do this, the study evaluated future water balance and water deficit under the climate change for Anseong river basin in Korea. The future rainfall was simulated using RCP 8.5 climate change scenario and the runoff was estimated through the SLURP model which is a semi-distributed rainfall-runoff model for the basin. Scenario and network for the water balance analysis in sub-basins of Anseong river basin were established through K-WEAP model. And the water demand for the future was estimated by the linear regression equation using amounts of water uses(domestic water use, industrial water use, and agricultural water use) calculated by historical data (1965 to 2011). As the result of water balance analysis, we confirmed that the domestic and industrial water uses will be increased in the future because of population growth, rapid urbanization, and climate change due to global warming. However, the agricultural water use will be gradually decreased. Totally, we had shown that the water deficit problem will be critical in the future in Anseong river basin. Therefore, as the case study, we suggested two alternatives of pumping station construction and restriction of water use for solving the water deficit problem in the basin.

A Hardware Implementation of the Underlying Field Arithmetic Processor based on Optimized Unit Operation Components for Elliptic Curve Cryptosystems (타원곡선을 암호시스템에 사용되는 최적단위 연산항을 기반으로 한 기저체 연산기의 하드웨어 구현)

  • Jo, Seong-Je;Kwon, Yong-Jin
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.1
    • /
    • pp.88-95
    • /
    • 2002
  • In recent years, the security of hardware and software systems is one of the most essential factor of our safe network community. As elliptic Curve Cryptosystems proposed by N. Koblitz and V. Miller independently in 1985, require fewer bits for the same security as the existing cryptosystems, for example RSA, there is a net reduction in cost size, and time. In this thesis, we propose an efficient hardware architecture of underlying field arithmetic processor for Elliptic Curve Cryptosystems, and a very useful method for implementing the architecture, especially multiplicative inverse operator over GF$GF (2^m)$ onto FPGA and futhermore VLSI, where the method is based on optimized unit operation components. We optimize the arithmetic processor for speed so that it has a resonable number of gates to implement. The proposed architecture could be applied to any finite field $F_{2m}$. According to the simulation result, though the number of gates are increased by a factor of 8.8, the multiplication speed We optimize the arithmetic processor for speed so that it has a resonable number of gates to implement. The proposed architecture could be applied to any finite field $F_{2m}$. According to the simulation result, though the number of gates are increased by a factor of 8.8, the multiplication speed and inversion speed has been improved 150 times, 480 times respectively compared with the thesis presented by Sarwono Sutikno et al. [7]. The designed underlying arithmetic processor can be also applied for implementing other crypto-processor and various finite field applications.

Improvement of Personal Information Protection Laws in the era of the 4th industrial revolution (4차 산업혁명 시대의 개인정보보호법제 개선방안)

  • Choi, Kyoung-jin
    • Journal of Legislation Research
    • /
    • no.53
    • /
    • pp.177-211
    • /
    • 2017
  • In the course of the emergence and development of new ICT technologies and services such as Big Data, Internet of Things and Artificial Intelligence, the future will change by these new innovations in the Fourth Industrial Revolution. The future of this fourth industrial revolution will change and our future will be data-based society or economy. Since there is personal information at the center of it, the development of the economy through the utilization of personal information will depend on how to make the personal information protection laws. In Korea, which is trying to lead the 4th industrial revolution, it is a legal interest that can not give up the use of personal information, and also it is an important legal benefit that can not give up the personal interests of individuals who want to protect from personal information. Therefore, it is necessary to change the law on personal information protection in a rational way to harmonize the two. In this regard, this article discusses the problems of duplication and incompatibility of the personal information protection law, the scope of application of the personal information protection law and the uncertainty of the judgment standard, the lack of flexibility responding to the demand for the use of reasonable personal information, And there is a problem of reverse discrimination against domestic area compared to the regulated blind spot in foreign countries. In order to solve these problems and to improve the legislation of personal information protection in the era of the fourth industrial revolution, we proposed to consider both personal information protection and safe use by improving the purpose and regulation direction of the personal information protection law. The balance and harmony between the systematical maintenance of the personal information protection legislation and laws and regulations were also set as important directions. It is pointed out that the establishment of rational judgment criteria and the legislative review to clarify it are necessary for the constantly controversial personal information definition regulation and the method of allowing anonymization information as the intermediate domain. In addition to the legislative review for the legitimate and non-invasive use of personal information, there is a need to improve the collective consent system for collecting personal information to differentiate the subject and to improve the legislation to ensure the effectiveness of the regulation on the movement of personal information between countries. In addition to the issues discussed in this article, there may be a number of challenges, but overall, the protection and use of personal information should be harmonized while maintaining the direction indicated above.

Permanent Preservation and Use of Historical Archives : Preservation Issues Digitization of Historical Collection (역사기록물(Archives)의 항구적인 보존화 이용 : 보존전략과 디지털정보화)

  • Lee, Sang-min
    • The Korean Journal of Archival Studies
    • /
    • no.1
    • /
    • pp.23-76
    • /
    • 2000
  • In this paper, I examined what have been researched and determined about preservation strategy and selection of preservation media in the western archival community. Archivists have primarily been concerned with 'preservation' and 'use' of archival materials worth of being preserved permanently. In the new information era, preservation and use of archival materials were faced with new challenge. Life expectancy of paper records was shortened due to acidification and brittleness of the modem papers. Also emergence of information technology affects the traditional way of preservation and use of archival materials. User expectations are becoming so high technology-oriented and so complicated as to make archivists act like information managers using computer technology rather than traditional archival handicraft. Preservation strategy plays an important role in archival management as well as information management. For a cost-effective management of archives and archival institutions, preservation strategy is a must. The preservation strategy encompasses all aspects of archival preservation process and practices, from selection of archives, appraisal, inventorying, arrangement, description, conservation, microfilming or digitization, archival buildings, and access service. Those archival functions should be considered in their relations to each other to ensure proper preservation of archival materials. In the integrated preservation strategy, 'preservation' and 'use' should be combined and fulfilled without sacrificing the other. Preservation strategy planning is essential to determine the policies of archives to preserve their holdings safe and provide people with a maximum access in most effective ways. Preservation microfilming is to ensure permanent preservation of information held in important archival materials. To do this, a detailed standardization has been developed to guarantee the permanence of microfilm as well as its product quality. Silver gelatin film can last up to 500 years in the optimum storage environment and the most viable option for permanent preservation media. ISO and ANIS developed such standards for the quality of microfilms and microfilming technology. Preservation microfilming guidelines was also developed to ensure effective archival management and picture quality of microfilms. It is essential to assess the need of preservation microfilming. Limit in resources always put a restraint on preservation management. Appraisal (and selection) of what to be preserved was the most important part of preservation microfilming. In addition, microfilms with standard quality can be scanned to produce quality digital images for instant use through internet. As information technology develops, archivists began to utilize information technology to make preservation easier and more economical, and to promote use of archival materials through computer communication network. Digitization was introduced to provide easy and universal access to unique archives, and its large capacity of preserving archival data seems very promising. However, digitization, i.e., transferring images of records to electronic codes, still, needs to be standardized. Digitized data are electronic records, and st present electronic records are very unstable and not to be preserved permanently. Digital media including optical disks materials have not been proved as reliable media for permanent preservation. Due to their chemical coating and physical character using light, they are not stable and can be preserved at best 100 years in the optimum storage environment. Most CD-R can last only 20 years. Furthermore, obsolescence of hardware and software makes hard to reproduce digital images made from earlier versions. Even if when reformatting is possible, the cost of refreshing or upgrading of digital images is very expensive and the very process has to be done at least every five to ten years. No standard for this obsolescence of hardware and software has come into being yet. In short, digital permanence is not a fact, but remains to be uncertain possibility. Archivists must consider in their preservation planning both risk of introducing new technology and promising possibility of new technology at the same time. In planning digitization of historical materials, archivists should incorporate planning for maintaining digitized images and reformatting them in the coming generations of new applications. Without the comprehensive planning, future use of the expensive digital images will become unavailable. And that is a loss of information, and a final failure of both 'preservation' and 'use' of archival materials. As peter Adelstein said, it is wise to be conservative when considerations of conservations are involved.

A Study on the Selection of Base Port and Establishment of International Cooperation System for Seafarer Rotation In case of Emergency - Focusing on the Service Network of HMM - (비상 시 선원교대를 위한 거점항만 선정과 국제협력 방안 - HMM 정기선을 중심으로 -)

  • Kim, Bo-ram;Lee, Hye-jin
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.27 no.2
    • /
    • pp.275-285
    • /
    • 2021
  • COVID-19 is threatening the safety of ships and seafarers by delaying seafarer rotation. Shipping companies and governments have a blindspot in case of the onboard environment of seafarers. An effective, alternative plan should be devised to eliminate the possibility of human accidents in an emergency that threatens the safety of seafarers. According to the survey of former and current seafarers, the most important factor in boarding life was safety, and the most necessary thing during emergencies was to secure smooth seafarer rotation rather than improve wages and welfare. By analyzing the major routes of national shipping companies by continent, ports with a large number of calls and a high Air Connectivity Index were selected as the base port. In addition, the route was designed for effective, domestic seafarer rotation during international shipping. Other countries must be consulted to establish a travel route linking ships, ports, and airports for the safe return of sailors to their home countries during an emergency. In addition, it is necessary to work together for the seafarers who are in trouble of seafarer rotation through cooperation with the International Maritime Organization(IMO). Starting with this, the government should have a monitoring system for the return and non-return routes as well as the number of seafarers on board. If such a system is established, it will be able to determine the response direction of our country's policy in case of an emergency. Along with the shipping company's ef orts to improve the treatment of seafarers, national and social attention will be needed to review domestic laws and improve awareness about seafarers.

MDP(Markov Decision Process) Model for Prediction of Survivor Behavior based on Topographic Information (지형정보 기반 조난자 행동예측을 위한 마코프 의사결정과정 모형)

  • Jinho Son;Suhwan Kim
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.2
    • /
    • pp.101-114
    • /
    • 2023
  • In the wartime, aircraft carrying out a mission to strike the enemy deep in the depth are exposed to the risk of being shoot down. As a key combat force in mordern warfare, it takes a lot of time, effot and national budget to train military flight personnel who operate high-tech weapon systems. Therefore, this study studied the path problem of predicting the route of emergency escape from enemy territory to the target point to avoid obstacles, and through this, the possibility of safe recovery of emergency escape military flight personnel was increased. based problem, transforming the problem into a TSP, VRP, and Dijkstra algorithm, and approaching it with an optimization technique. However, if this problem is approached in a network problem, it is difficult to reflect the dynamic factors and uncertainties of the battlefield environment that military flight personnel in distress will face. So, MDP suitable for modeling dynamic environments was applied and studied. In addition, GIS was used to obtain topographic information data, and in the process of designing the reward structure of MDP, topographic information was reflected in more detail so that the model could be more realistic than previous studies. In this study, value iteration algorithms and deterministic methods were used to derive a path that allows the military flight personnel in distress to move to the shortest distance while making the most of the topographical advantages. In addition, it was intended to add the reality of the model by adding actual topographic information and obstacles that the military flight personnel in distress can meet in the process of escape and escape. Through this, it was possible to predict through which route the military flight personnel would escape and escape in the actual situation. The model presented in this study can be applied to various operational situations through redesign of the reward structure. In actual situations, decision support based on scientific techniques that reflect various factors in predicting the escape route of the military flight personnel in distress and conducting combat search and rescue operations will be possible.