• Title/Summary/Keyword: Transportation security

Search Result 396, Processing Time 0.023 seconds

Designing a Vehicles for Open-Pit Mining with Optimized Scheduling Based on 5G and IoT

  • Alaboudi, Abdulellah A.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.145-152
    • /
    • 2021
  • In the Recent times, various technological enhancements in the field of artificial intelligence and big data has been noticed. This advancement coupled with the evolution of the 5G communication and Internet of Things technologies, has helped in the development in the domain of smart mine construction. The development of unmanned vehicles with enhanced and smart scheduling system for open-pit mine transportation is one such much needed application. Traditional open-pit mining systems, which often cause vehicle delays and congestion, are controlled by human authority. The number of sensors has been used to operate unmanned cars in an open-pit mine. The sensors haves been used to prove the real-time data in large quantity. Using this data, we analyses and create an improved transportation scheduling mechanism so as to optimize the paths for the vehicles. Considering the huge amount the data received and aggregated through various sensors or sources like, the GPS data of the unmanned vehicle, the equipment information, an intelligent, and multi-target, open-pit mine unmanned vehicle schedules model was developed. It is also matched with real open-pit mine product to reduce transport costs, overall unmanned vehicle wait times and fluctuation in ore quality. To resolve the issue of scheduling the transportation, we prefer to use algorithms based on artificial intelligence. To improve the convergence, distribution, and diversity of the classic, rapidly non-dominated genetic trial algorithm, to solve limited high-dimensional multi-objective problems, we propose a decomposition-based restricted genetic algorithm for dominance (DBCDP-NSGA-II).

Analyze Virtual Private Network Vulnerabilities and Derive Security Guidelines Based on STRIDE Threat Modeling (STRIDE 위협 모델링 기반 가상 사설망 취약점 분석 및 보안 요구사항 도출)

  • Kim, Da-hyeon;Min, Ji-young;Ahn, Jun-ho
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.27-37
    • /
    • 2022
  • Virtual private network (VPN) services are used in various environments related to national security, such as defense companies and defense-related institutions where digital communication environment technologies are diversified and access to network use is increasing. However, the number of cyber attacks that target vulnerable points of the VPN has annually increased through technological advancement. Thus, this study identified security requirements by performing STRIDE threat modeling to prevent potential and new vulnerable points that can occur in the VPN. STRIDE threat modeling classifies threats into six categories to systematically identify threats. To apply the proposed security requirements, this study analyzed functions of the VPN and formed a data flow diagram in the VPN service process. Then, it collected threats that can take place in the VPN and analyzed the STRIDE threat model based on data of the collected threats. The data flow diagram in the VPN service process, which was established by this study, included 96 STRIDE threats. This study formed a threat scenario to analyze attack routes of the classified threats and derived 30 security requirements for each element of the VPN based on the formed scenario. This study has significance in that it presented a security guideline for enhancing security stability of the VPN used in facilities that require high-level security, such as the Ministry of National Defense (MND).

Role and Subject of Private Security to Counter-Terrorism (테러방지를 위한 민간경비의 역할과 과제)

  • Kwon, Jeonghoon
    • Journal of the Society of Disaster Information
    • /
    • v.7 no.2
    • /
    • pp.130-139
    • /
    • 2011
  • This paper examined closely on the application of the private securities to the measures for countering terrorism. It is related to the fact that the role of human information comes into the picture nowadays. On closer examination of the application of the private securities to the national facilities, transportation, and multi-use facilities, it was found that having consistent commissioned education through the private-public cooperation and enacting legislation for allowing armed guard to board ships, making private security guards to use sniffer dogs, placing private security guards in each subway station is required, and the active publicity campaign of the government concerned needs to take place for directing and setting up the system for supervising managers of the authorities and changing the way they think of countering terrorism.

Piosk : A Practical Kiosk To Prevent Information Leakage

  • Lee, Suchul;Lee, Sungil;Oh, Hayoung;Han, Seokmin
    • International journal of advanced smart convergence
    • /
    • v.8 no.2
    • /
    • pp.77-87
    • /
    • 2019
  • One of important concerns in information security is to control information flow. It is whether to protect confidential information from being leaked, or to protect trusted information from being tainted. In this paper, we present Piosk (Physical blockage of Information flow Kiosk) that addresses both the problems practically. Piosk can forestall and prevent the leakage of information, and defend inner tangible assets against a variety of malwares as well. When a visitor who carries a re-writable portable storage device, must insert the device into Piosk installed next to the security gate. Then, Piosk scans the device at the very moment, and detects & repairs malicious codes that might be exist. After that, Piosk writes the contents (including sanitized ones) on a new read-only portable device such as a compact disk. By doing so, the leakage of internal information through both insiders and outsiders can be prevented physically. We have designed and prototyped Piosk. The experimental verification of the Piosk prototype implementation reveals that, Piosk can accurately detect every malware at the same detection level as Virus Total and effectively prevent the leakage of internal information. In addition, we compare Piosk with the state-of-the-art methods and describe the special advantages of Piosk over existing methods.

Metaverse Technology and Security Threats and Countermeasures (메타버스 기술과 보안 위협 및 대응방안)

  • Woo, SungHee;Lee, HyoJeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.328-330
    • /
    • 2022
  • Currently, the Metaverse is introduced in various fields, and a virtual convergence economy that uses NFTs for content or item transactions is expected to develop into a 'metaverse environment'. The 'metaverse environment' will lead the changes in our society in the future and it will be fused with AI, big data, cloud, IoT, block chain, and next-generation network technology. However, personal information, device information, and behavior information provided by Metaverse users to use the service are subject to major attacks. Therefore, in order to provide a safe environment for users to use and to expand the business base of related companies, building a public-private cooperation system and developing a security guide are the leading tasks. Therefore, in this study, we compare and analyze metaverse features and technologies, and examine possible security threats and countermeasures.

  • PDF

Analyses of Security, Privacy Issues and Challenges for RFID System

  • Kim, Jung-Tae
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.6
    • /
    • pp.701-705
    • /
    • 2011
  • RFID is a widely adopted in the field of identification technology these days. Radio Frequency IDentification (RFID) has wide applications in many areas including manufacturing, healthcare, and transportation. Because limited resource RFID tags are used, various risks could threaten their abilities to provide essential services to users. A number of RFID protocols have done by researcher in order to protect against some malicious attacks and threat. Existing RFID protocols are able to resolve a number of security and privacy issues, but still unable to overcome other security & privacy related issues. In this paper, we analyses security schemes and vulnerability in RFID application. Considering this RFID security issues, we survey the security threats and open problems related to issues by means of information security and privacy. Neither a symmetric nor an asymmetric cryptographic deployment is necessarily used with light weighted algorithm in the future.

Study on Improving Airport Security to Prevent Air Terrorism (항공테러 방지를 위한 공항보안 개선대책 연구)

  • Kim, Kwanho
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.21 no.4
    • /
    • pp.90-105
    • /
    • 2013
  • As witnessed in September 11 attacks, air terrorism is often the most effective means to achieve their goals, and thereby requires a sophisticated level of security measures. Moreover, considering the nature of air transportation, the prevention of air terrorism demands a wide range of international cooperation and joint efforts such as timely sharing of information related to air terrorism (such as latest terror techniques and list of terrorists) between nations, International Air Transport Association (IATA) and International Civil Aviation Organization (ICAO) As most air terrorism can be effectively prevented through security and search activities in airports, this study has focused on researching security measures and issues in major airports around the world, along with the potential measures to improve them. To achieve this effect, this paper offers solutions to preventing air terrorism by exploring appropriate responses to various type of air terrorism, deployment of advanced security and search equipment, techniques to identify terrorists, R&D on equipments to physically take down terrorists and systematic improvements on airport security search process.

The Verification in Security Protocol for Security Continuity Management (정보보호의 연속성관리를 위한 보안프로토콜 검증)

  • Shin, Seung-Jung;Song, Young-Gyu
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04a
    • /
    • pp.445-448
    • /
    • 2001
  • The objective of this paper was to cope with the verification of the message transfer protocol that integrates the electronic signature and the distribution and authentication of public key in TCP/IP using security continuity management Choquet fuzzy integral compared with fuzzy integral. They were classified into the security technology, the security policy, the electronic document processing, the electronic document transportation and the encryption and decryption keys in its function. The measures of items of the message security protocol were produced for the verification of the implemented document in every function.

  • PDF

A Study on the Establishment of a Security and Customs Cooperation System for Reinforcement of the International Air Cargo Supply Chain Security (국제항공화물 공급망 보안 강화를 위한 보안과 세관의 협조체계 구축방안에 관한 연구)

  • Park, Man-Hui;Hwang, Ho-Won
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.29 no.4
    • /
    • pp.142-152
    • /
    • 2021
  • The International Civil Aviation Organization (ICAO) and the World Customs Organization (WCO) emphasize securing supply chain security through mutual cooperation between aviation security and customs by establishing a standardized security system by regulations, procedures and practices of international air cargo. Accordingly, in accordance with the Aviation Security Act, the known consignors system aims to secure cargo security before loading air cargo into the aircraft, while the customs AEO system is a public-private cooperation program that focuses on simplification of customs clearance procedures. These systems basically have the same purpose of effectively identifying high-risk cargo through a risk-based approach in international air cargo transportation and preventing risks in advance, and the content that a common basic standard for cargo security must be established is also similar. Therefore, it is necessary to establish a cooperation system by simplifying problems such as cumbersome and redundant authentication procedures and on-site verification through coordination of security requirements for mutual recognition between the two systems. As a result, it is necessary to establish a process for coordinating security and customs' supply chain security program and maximize the effect of harmonizing supply chain security by strengthening the linkage between known consignors and AEO.

Implementation of the U.S. Aviation Security Policy and Privacy Protection Problem (미국의 항공보안정책 적용과 프라이버시 문제점)

  • Kang, J.Y.;Kim, C.H.
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.13 no.3
    • /
    • pp.110-116
    • /
    • 2005
  • TSA needs to be more transparent with the new passenger screening system and its functioning to build the citizen trust. The system is needed to be not only effective but supported by Congress and the general public. Until this occurs, skepticism will underlie any discussion about its effectiveness in balancing the protection from terrorism with respect to individual liberties. CAPPS II can be a viable system if it is developed appropriately. The objectives of the study are to introduce the security program in the U.S. aviation security policy and to discuss privacy problems when it applies. Korea also needs to study a harmonious plan with the basis of global approach mind in the case of considering the transferring of passenger information from other states for the purpose of security.

  • PDF