• Title/Summary/Keyword: Transportation security

Search Result 396, Processing Time 0.022 seconds

A Study on the Profiling System in the Aviation Security (항공보안에서의 프로파일링 연구)

  • Hwang, Ho-Won;Lee, Kyu-Hang
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.22 no.2
    • /
    • pp.155-175
    • /
    • 2007
  • As intellectual terror threats increase, we feel the limit in coping with those threats and the things we do are placing traditional X-ray machines & ETD and increasing aviation security staffs. In fact, even if air transportation system is the fast and most efficient transportation methods, it is true that there are many inconveniences to endure due to terror threats. In the name of security, even if we make a lot of efforts and time to screen both good-natured passengers, baggage, cargo and suspicious passengers, it is impossible to screen perfectly and it is not an efficient methods. Therefore, we introduce profiling system that reduce the effort to screen good-natured passengers but focus on screening dangerous passengers and baggages. Profiling system strengthens aviation security, using the concept "Selection & Concentration". Israel started to introduce manual profiling system in aviation security, which is interviewing suspicious passengers and it has been used in crime investigation since 1960. And it has been upgraded and diversified to CAPPS(Computer Assisted Passenger Screening Program) and SPOT(Screening Passenger by Observation). So, this theses is to study on the concept & kind of profiling and profiling methods adopted in airlines. Also it presents the method of introduction of profiling system in Korea and the necessity of making law on it.

  • PDF

A Survey on Security Schemes based on Conditional Privacy-Preserving in Vehicular Ad Hoc Networks

  • Al-Mekhlafi, Zeyad Ghaleb;Mohammed, Badiea Abdulkarem
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.105-110
    • /
    • 2021
  • Contact between Vehicle-to-vehicle and vehicle-to-infrastructural is becoming increasingly popular in recent years due to their crucial role in the field of intelligent transportation. Vehicular Ad-hoc networks (VANETs) security and privacy are of the highest value since a transparent wireless communication tool allows an intruder to intercept, tamper, reply and erase messages in plain text. The security of a VANET based intelligent transport system may therefore be compromised. There is a strong likelihood. Securing and maintaining message exchange in VANETs is currently the focal point of several security testing teams, as it is reflected in the number of authentication schemes. However, these systems have not fulfilled all aspects of security and privacy criteria. This study is an attempt to provide a detailed history of VANETs and their components; different kinds of attacks and all protection and privacy criteria for VANETs. This paper contributed to the existing literature by systematically analyzes and compares existing authentication and confidentiality systems based on all security needs, the cost of information and communication as well as the level of resistance to different types of attacks. This paper may be used as a guide and reference for any new VANET protection and privacy technologies in the design and development.

A Study on Quantitative Risk Assessment Method and Risk Reduction Measures for Rail Hazardous Material Transportation (철도위험물수송에 관한 위험도 정량화방안 및 경감대책 연구)

  • Lee, Sang Gon;Cho, Woncheol;Lee, Tae Sik
    • Journal of Korean Society of societal Security
    • /
    • v.1 no.3
    • /
    • pp.69-76
    • /
    • 2008
  • The object of this study is to develop a tool for quantifying risks related to the rail transportation of hazardous commodities and to present mitigation measures. In this study, the Quantitative Risk Assessment (QRA) is used as a risk analysis tool. Based on the previous explosion history (Iri explosion) and consideration of its high risk, Iksan-si is selected as a model city. The result, expressed as average individual risk for exposed people with various distance, indicates that the model city is considered to be safe according to the nuclear energy standard. Also, the mitigation measures are provided since Societal risk of Iksan-si is set within ALARP. Risk reduction measures include rail car design, rail transportation operation, demage spread control as well as derail prevention and alternative routes for reducing accident frequencies. Finally, it is expected to achieve high level of public safety by appling the risk reduction measures.

  • PDF

Cyber Security Approaches for Industrial Control Networks

  • Dillabaugh, Craig;Nandy, Biswajit;Seddigh, Nabil;Wong, Kevin;Lee, Byoung-Joon (BJ)
    • Review of KIISC
    • /
    • v.26 no.6
    • /
    • pp.42-50
    • /
    • 2016
  • Critical infrastructure (CI) such as the electrical grid, transportation systems and water resource systems are controlled by Industrial Control and SCADA (Supervisory Control and Data Acquisition) networks. During the last few years, cyber attackers have increasingly targeted such CI systems. This is of great concern because successful attacks have wide ranging impact and can cause widespread destruction and loss of life. As a result, there is a critical requirement to develop enhanced algorithms and tools to detect cyber threats for SCADA networks. Such tools have key differences with the tools utilized to detect cyber threats in regular IT networks. This paper discusses key factors which differentiate network security for SCADA networks versus regular IT networks. The paper also presents various approaches used for SCADA security and some of the advancements in the area.

Security and Privacy in Ubiquitous Sensor Networks

  • Perez, Alfredo J.;Zeadally, Sherali;Jabeur, Nafaa
    • Journal of Information Processing Systems
    • /
    • v.14 no.2
    • /
    • pp.286-308
    • /
    • 2018
  • The availability of powerful and sensor-enabled mobile and Internet-connected devices have enabled the advent of the ubiquitous sensor network (USN) paradigm. USN provides various types of solutions to the general public in multiple sectors, including environmental monitoring, entertainment, transportation, security, and healthcare. Here, we explore and compare the features of wireless sensor networks and USN. Based on our extensive study, we classify the security- and privacy-related challenges of USNs. We identify and discuss solutions available to address these challenges. Finally, we briefly discuss open challenges for designing more secure and privacy-preserving approaches in next-generation USNs.

A Study for a Methodology to Analyze Container Delays versus Security (보안대비 컨테이너 지연분석을 위한 방법론적 연구)

  • Yoon, Dae-Gwun
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.13 no.1 s.28
    • /
    • pp.47-54
    • /
    • 2007
  • After September 11, 2001, the United State's Customs and Border Protection (CBP) has set up inspection stations in seaport terminals. The inspection station, however, may directly and indirectly affect delay time in the seaports, increasing by especially high and severe level of security. This paper studies for a methodology to analyze container delays versus security incurring by the various layouts of the inspection station in the United States.

  • PDF

New Approach to Verification in Security Protocol by using Fuzzy Algorithm (퍼지 알고리즘을 이용한 보안 프로토콜 검증)

  • 신승중;박인규
    • Proceedings of the Korea Database Society Conference
    • /
    • 2000.11a
    • /
    • pp.343-349
    • /
    • 2000
  • The objective of this paper was to cope with the verification of the message transfer protocol that integrates the electronic signature and the distribution and authentication of public key in TCP/IP using Choquet fuzzy integral compapred with fuzzy integral. They were classified into the security technology, the security policy, the electronic document processing, the electronic document transportation and the encryption and decryption keys in its function. The measures of items of the message security protocol were produced for the verification of the implemented document in every function.

  • PDF

Reverse engineering of data abstractions on fragmented binary code (단편화된 실행파일을 위한 데이터 구조 역공학 기법)

  • Lee, Jong-Hyup
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.615-619
    • /
    • 2012
  • Reverse engineering via static analysis is an essential step in software security and it focuses on reconstructing code structures and data abstractions. In particular, reverse engineering of data abstractions is critical to understand software but the previous scheme, VSA, is not suitable for applying to fragmented binaries. This paper proposes an enhanced method through dynamic region assignment.

Towards Choosing Authentication and Encryption: Communication Security in Sensor Networks

  • Youn, Seongwook;Cho, Hyun-chong
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.3
    • /
    • pp.1307-1313
    • /
    • 2017
  • Sensor networks are composed of provide low powered, inexpensive distributed devices which can be deployed over enormous physical spaces. Coordination between sensor devices is required to achieve a common communication. In low cost, low power and short-range wireless environment, sensor networks cope with significant resource constraints. Security is one of main issues in wireless sensor networks because of potential adversaries. Several security protocols and models have been implemented for communication on computing devices but deployment these models and protocols into the sensor networks is not easy because of the resource constraints mentioned. Memory intensive encryption algorithms as well as high volume of packet transmission cannot be applied to sensor devices due to its low computational speed and memory. Deployment of sensor networks without security mechanism makes sensor nodes vulnerable to potential attacks. Therefore, attackers compromise the network to accept malicious sensor nodes as legitimate nodes. This paper provides the different security models as a metric, which can then be used to make pertinent security decisions for securing wireless sensor network communication.

An Efficient Anonymous Authentication Scheme with Secure Communication in Intelligent Vehicular Ad-hoc Networks

  • Zhang, Xiaojun;Mu, Liming;Zhao, Jie;Xu, Chunxiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3280-3298
    • /
    • 2019
  • Vehicular ad-hoc networks (VANETs) have become increasingly significant in intelligent transportation systems, they play a great role in improving traffic safety and efficiency. In the deployment of intelligent VANETs, intelligent vehicles can efficiently exchange important or urgent traffic information and make driving decisions. Meanwhile, secure data communication and vehicle's identity privacy have been highlighted. To cope with these security issues, in this paper, we construct an efficient anonymous authentication scheme with secure communication in intelligent VANETs. Combing the ElGamal encryption technique with a modified Schnorr signature technique, the proposed scheme provides secure anonymous authentication process for encrypted message in the vehicle-to-infrastructure communication model, and achieves identity privacy, forward security, and reply attack resistance simultaneously. Moreover, except the trusted authority (TA), any outside entity cannot trace the real identity of an intelligent vehicle. The proposed scheme is designed on an identity-based system, which can remove the costs of establishing public key infrastructure (PKI) and certificates management. Compared with existing authentication schemes, the proposed scheme is much more practical in intelligent VANETs.