• Title/Summary/Keyword: Safety Secure

Search Result 1,419, Processing Time 0.024 seconds

Monitoring and Tracking Model of Logistics Based on ICT network

  • Cho, Sokpal;Chung, Heechang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.489-492
    • /
    • 2016
  • Transportation in the logistics, many business organizations are engaged in monitoring and tracking the vehicles in order to improve logistics services, reduce expenses and secure security in cargo transportation. It is saving time and money by tracking and monitoring vehicles which transport cargo in supply chain of logistics. Therefore the main issue of delivery flow is to improve services, and ensure the safety in transportation system. This article suggests the tracking and monitoring model to keep safety transports on ICT network. It focuses on precise delivery control by monitoring and tracking vehicles to save time and costs. The status of product movement is analyzed for proper decision making. The vehicle embedded with RFID is automatically tracked in the movement process by tracking and monitoring model. The main role keeps safety tracking to reduce costs and to deliver products at proper time and location.

  • PDF

The Effect of Manufacturing Ethics of Agricultural Products Processing Companies on Food Safety and Product Trust - Focusing on Small-scale Agricultural Products Processing Companies in Jeonbuk - (농산물가공업체의 제조윤리가 식품안전과 제품신뢰에 미치는 영향 - 전북의 소규모 농산물 가공업체를 중심으로 -)

  • Gu, Han-Gyeol;Jang, Dong-Heon
    • Korean Journal of Organic Agriculture
    • /
    • v.29 no.3
    • /
    • pp.301-315
    • /
    • 2021
  • This study investigated the effect of the level of ethics in food manufacturing of agricultural products processing companies on food safety and product trust. In general, a company's food manufacturing ethics is complex, includes social responsibility, and has a potential impact on stakeholders. The main implications summarized based on the analysis results are the expansion of the HACCP application of the agricultural product processing system, the production of safe agri-food that fulfills social responsibilities with an ethical awareness, including entrepreneurial awareness, from raw materials to processing, packaging, and distribution from a long-term perspective. It was found that it was necessary to secure product trust and to provide education, consulting and management on ethical awareness.

Implementation and Validation of Traffic Light Recognition Algorithm for Low-speed Special Purpose Vehicles in an Urban Autonomous Environment (저속 특장차의 도심 자율주행을 위한 신호등 인지 알고리즘 적용 및 검증)

  • Wonsub, Yun;Jongtak, Kim;Myeonggyu, Lee;Wongun, Kim
    • Journal of Auto-vehicle Safety Association
    • /
    • v.14 no.4
    • /
    • pp.6-15
    • /
    • 2022
  • In this study, a traffic light recognition algorithm was implemented and validated for low-speed special purpose vehicles in an urban environment. Real-time image data using a camera and YOLO algorithm were applied. Two methods were presented to increase the accuracy of the traffic light recognition algorithm, and it was confirmed that the second method had the higher accuracy according to the traffic light type. In addition, it was confirmed that the optimal YOLO algorithm was YOLO v5m, which has over 98% mAP values and higher efficiency. In the future, it is thought that the traffic light recognition algorithm can be used as a dual system to secure the platform safety in the traffic information error of C-ITS.

A Study on Next-Generation Data Protection Based on Non File System for Spreading Smart Factory (스마트팩토리 확산을 위한 비파일시스템(None File System) 기반의 차세대 데이터보호에 관한 연구)

  • Kim, Seungyong;Hwang, Incheol;Kim, Dongsik
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.1
    • /
    • pp.176-183
    • /
    • 2021
  • Purpose: The introduction of smart factories that reflect the 4th industrial revolution technologies such as AI, IoT, and VR, has been actively promoted in Korea. However, in order to solve various problems arising from existing file-based operating systems, this research will focus on identifying and verifying non-file system-based data protection technology. Method: The research will measure security storage that cannot be identified or controlled by the operating system. How to activate secure storage based on the input of digital key values. Establish a control unit that provides input and output information based on BIOS activation. Observe non-file-type structure so that mapping behavior using second meta-data can be performed according to the activation of the secure storage. Result: First, the creation of non-file system-based secure storage's data input/output were found to match the hash function value of the sample data with the hash function value of the normal storage and data. Second, the data protection performance experiments in secure storage were compared to the hash function value of the original file with the hash function value of the secure storage after ransomware activity to verify data protection performance against malicious ransomware. Conclusion: Smart factory technology is a nationally promoted technology that is being introduced to the public and this research implemented and experimented on a new concept of data protection technology to protect crucial data within the information system. In order to protect sensitive data, implementation of non-file-type secure storage technology that is non-dependent on file system is highly recommended. This research has proven the security and safety of such technology and verified its purpose.

A Study on the Actual Condition of OSH Expenses Appropiation in the Construction Industry (건설업 산업안전보건관리비 계상 방법 실태 조사 연구)

  • Kim, Seung-Han;Kim, Jong-Hyo;Kim, Byung-Suk;Park, Jong-Keun
    • Journal of the Korea Safety Management & Science
    • /
    • v.18 no.3
    • /
    • pp.25-31
    • /
    • 2016
  • Occupational Safety and Health Expenses Law in construction industry was enacted in 1988 by the notification of Ministry of Employment and Labor and 22 revisions have been made since. The fact that revisions have been made almost every year since the first enactment shows that Occupational Safety and Health Expenses can effectively prevent construction accidents and the need for revisions to fit the reality has been raised continuously. Despite the construction industry has undergone various internal and external environmental changes, (such as the changes in the safety and health management techniques and the increase in the construction employees' desire for safety) the appropriation standard of Occupational Safety and Health Expenses has been calculated based on the contract price. The construction industry has constantly suggested that the Occupational Safety and Health Expenses be calculated based on the estimated construction expenses since applying the current method doesn't provide enough money to secure the safety. Also because it has become mandatory to hire a health manager since 2015, the lack of Occupational Safety and Health Expenses is expected to get worse. In this study, we will analyze the usage of Occupational Safety and Health Expenses and propose a more practical and realistic change in setting the appropriation standard of Occupational Safety and Health Expenses.

Security Verification of a Communication Authentication Protocol in Vehicular Security System (자동차 보안시스템에서 통신 인증프로토콜의 보안성 검증)

  • Han, Myoungseok;Bae, WooSik
    • Journal of Digital Convergence
    • /
    • v.12 no.8
    • /
    • pp.229-234
    • /
    • 2014
  • Vehicular electronic communication system has continued to develop in favor of high performance and user convenience with the evolution of auto industry. Yet, due to the nature of communication system, concerns over intruder attacks in transmission sections have been raised with a need for safe and secure communication being valued. Any successful intruder attacks on vehicular operation and control systems as well as on visual equipment could result in serious safety and privacy problems. Thus, research has focused on hardware-based security and secure communication protocols. This paper proposed a safe and secure vehicular communication protocol, used the formal verification tool, Casper/FDR to test the security of the proposed protocol against different types of intruder attacks, and verified that the proposed protocol was secure and ended without problems.

A Design of MAC based SDAP(Secure Data Aggregation Protocol) for security and communication efficiency on VANET (VANET에서 보안과 통신효율을 고려한 MAC기반 SDAP(Secure Data Aggregation Protocol) 설계)

  • Lee, Byung-kwan;Ahn, Heui-hak;Jeong, Eun-hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.650-652
    • /
    • 2013
  • As VANET(Vehicular Ad-hoc NETwork) improves road safety, efficiency, and comfort, and provides a value-added service such as commerce information or internet access. it is the most important technology in ITS(Intelligent Transportation System). But, In VANETs, better communication efficiency can be achieved by sacrificing security and vice versa. VANETs cannot get started without either of them. Therefore, to solve these problems simultaneously, this paper proposes MAC(Message Authentication Code) based SDAP(Secure Data Aggregation Protocol) which removes redundant data or abnormal data between vehicles and verifies the integrity of message. The MAC based SDAP not only improves the efficiency of data delivery but also enhances the security by detecting malicious attacks such as propagation jamming attack, forgery attack, and disguised attack.

  • PDF

A Study on Security Consideration and Utilization of Domestic Encryption Algorithm for Developing Secure Smartphone Applications (안전한 스마트폰 애플리케이션 개발을 위한 보안 고려사항 및 국산암호알고리즘 적용 방안 연구)

  • Kim, Jee Yeon;Jeon, Woong Ryul;Lee, Young Sook;Kim, Mi Joo;Jung, Hyun Chul;Won, Dong Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.1
    • /
    • pp.51-61
    • /
    • 2011
  • A smartphone is a mobile phone that offers more advanced computing ability and connectivity than a contemporary basic feature phone. Unlike feature phone, a smartphone allows the user to install and run more advanced applications based on a specific platform. Smartphones run complete operating system software providing a platform for application developers. A smartphone will become the default computing method for many point activities in the not-too-distant future, such as e-mail, online shopping, gaming, and even video entertainment. For smartphone that contains sensitive information and access the Internet, security is a major issue. In the 1980s, security issues were hardly noticed; however, security is a major issue for users today, which includes smart phones. Because security is much more difficult to address once deployment and implementation are underway, it should be considered from the beginning. Recently our government recognized the importance of smartphone security and published several safety tips for using the smartphone. However, theses tips are user-oriented measures. Maintaining the security of a smartphone involves the active participation of the user. Although it is a important users understand and take full advantage of the facilities afforded by smarphone, it is more important developers distribute the secure smartphone application through the market. In this paper we describe some scenarios in which user is invaded his/her privacy by smartphone stolen, lost, misplaced or infected with virus. Then we suggest the security considerations for securing smartphone applications in respect with developers. We also suggest the methods applying domestic encryption algorithms such as SEED, HIGHT and ARIA in developing secure applications. This suggested security considerations may be used by developers as well as users (especially organizations) interested in enhancing security to related security incidents for current and future use of smartphones.

Implementation of Secure Keypads based on Tetris-Form Protection for Touch Position in the Fintech (핀테크에서 터치 위치 차단을 위한 테트리스 모양의 보안 키패드의 구현)

  • Mun, Hyung-Jin;Kang, Sin-Young;Shin, ChwaCheol
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.8
    • /
    • pp.144-151
    • /
    • 2020
  • User-authentication process is necessary in Fintech Service. Especially, authentication on smartphones are carried out through PIN which is inputted through virtual keypads on touch screen. Attacker can analogize password by watching touched letter and position over the shoulder or using high definition cameras. To prevent password spill, various research of virtual keypad techniques are ongoing. It is hard to design secure keypad which assures safety by fluctuative keypad and enhance convenience at once. Also, to reconfirm user whether password is wrongly pressed, the inputted information is shown on screen. This makes the password easily exposed through high definition cameras or Google Class during recording. This research analyzed QWERTY based secure keypad's merits and demerits. And through these features, creating Tetris shaped keypad and piece them together on Android environment, and showing inputted words as Tetris shape to users through smart-screen is suggested for the ways to prevent password spill by recording.

A Study on Robust Authentication and Privacy in Wireless LAN (무선랜 환경에서 사용자 인증 및 기밀성 강화 방안에 관한 연구)

  • Hong Seong-pyo;Lee Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.8
    • /
    • pp.1768-1773
    • /
    • 2005
  • The IEEE 802.1x standard provides an architectural framework which can be used various authentication methods. But, IEEE 802.1x also has vulnerabilities about the DoS, the session hijacking and the Man in the Middle attack due to the absence of AP authentication. In this paper, we propose a WLAN secure system which can offer a robust secure communication and a user authentications with the IEEE 802.1x framework. The user authentication on the WLAN secure system accomplishes mutual authentications between authentication severs, clients and the AP using PKI and prevents an illegal user from intervening in communication to disguise oneself as a client, the AP or authentication servers. Also, we guarantee the safety of the communication by doing secure communication between clients and the AP by the Dynamic WEP key distribution.