• Title/Summary/Keyword: Unmanned security

Search Result 174, Processing Time 0.019 seconds

Real-Time Travelling Control of Mobile Robot by Conversation Function Based on Voice Command (대화기능에 의한 모바일로봇의 실시간 주행제어)

  • Shim, Byoung-Kyun;Lee, Woo-Song;Han, Sung-Hyun
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.16 no.4
    • /
    • pp.127-132
    • /
    • 2013
  • We describe a research about remote control of mobile robot based on voice command in this paper. Through real-time remote control and wireless network capabilities of an unmanned remote-control experiments and Home Security / exercise with an unmanned robot, remote control and voice recognition and voice transmission are possible to transmit on a PC using a microphone to control a robot to pinpoint of the source. Speech recognition can be controlled robot by using a remote control. In this research, speech recognition speed and direction of self-driving robot were controlled by a wireless remote control in order to verify the performance of mobile robot with two drives.

A study on Autonomous Travelling Control of Mobile Robot (이동로봇의 자율주행제어에 관한 연구)

  • Lee, Woo-Song;Shim, Hyun-Seok;Ha, Eun-Tae;Kim, Jong-Soo
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.18 no.1
    • /
    • pp.10-17
    • /
    • 2015
  • We describe a research about remote control of mobile robot based on voice command in this paper. Through real-time remote control and wireless network capabilities of an unmanned remote-control experiments and Home Security / exercise with an unmanned robot, remote control and voice recognition and voice transmission are possible to transmit on a PC using a microphone to control a robot to pinpoint of the source. Speech recognition can be controlled robot by using a remote control. In this research, speech recognition speed and direction of self-driving robot were controlled by a wireless remote control in order to verify the performance of mobile robot with two drives.

MURO - Mangpo high school Unmanned Robotic Observatory

  • Kim, Hyunjong;Pak, Soojong;Kim, Youngjong
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.41 no.1
    • /
    • pp.52.1-52.1
    • /
    • 2016
  • We introduce the characteristics and performance of the 0.25m telescope at Mangpo high school Unmanned Robotic Observatory (MURO) which was established in Yangpyeong-gun, Gyeongi-do, KOREA in 2015 January. MURO system included Astrohaven 2.1m non-rotation fiberglass clamshell dome, Paramount MEII mount, Takahashi CCA 0.25m wide field telescope, FLI PL 16803 4K CCD with 7-positions filter wheel system, all sky camera and point grey wide field camera, IR 4 chanel heat sensor camera for security, DAVIS realtime weather cast, and power controled by ARS system. All control softwares are from off-the-shelf products based on Windows 7 OS to be easily operated and maintained. We expect to perform variety of science programs ranging from supernovae follow-up observation to narrow band imaging survey as well as science class activities at Mangpo high school.

  • PDF

Wireless Communication Real-Time Travelling Control of Mobile Robot by Voice Command (음성명령에 의한 모바일로봇의 무선통신 실시간 주행제어)

  • Shim, Byoung-Kyun;Han, Sung-Hyun
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.10 no.6
    • /
    • pp.33-38
    • /
    • 2011
  • We describe a research about remote control of mobile robot based on voice command in this paper. Through real-time remote control and wireless network capabilities of an unmanned remote-control experiments and Home Security / exercise with an unmanned robot, remote control and voice recognition and voice transmission are possible to transmit on a PC using a microphone to control a robot to pinpoint of the source. Speech recognition can be controlled robot by using a remote control. In this research, speech recognition speed and direction of self-driving robot were controlled by a wireless remote control in order to verify the performance of mobile robot with two drives.

A Secure Operating System Architecture Based on Linux against Communication Offense with Root Exploit for Unmanned Aerial Vehicles

  • Koo, KwangMin;Lee, Woo-yeob;Cho, Sung-Ryung;Joe, Inwhee
    • Journal of Information Processing Systems
    • /
    • v.16 no.1
    • /
    • pp.42-48
    • /
    • 2020
  • This paper proposes an operating system architecture for unmanned aerial vehicle (UAV), which is secure against root exploit, resilient to connection loss resulting in the control loss, and able to utilize common applications used in Linux. The Linux-based UAVs are exposed to root exploit. On the other hand, the microkernel-based UAVs are not able to use the common applications utilized in Linux, even though which is secure against root exploit. For this reason, the proposed architecture uses a virtualized microkernel on the Linux operating system to isolate communication roles and prevent root exploit. As a result, the suggested Operating system is secure against root exploit and is able to utilize the common applications at the same time.

Trends in Automotive Ethernet Security Technology (오토모티브 이더넷 보안 기술)

  • Chung, B.H.;Kim, D.W.;Jeon, B.S.;Ju, H.I.;Na, J.C.
    • Electronics and Telecommunications Trends
    • /
    • v.33 no.5
    • /
    • pp.76-85
    • /
    • 2018
  • In recent years, automobiles have evolved from simple transportation to convergence devices, and have combined the Internet of things, high-speed communications, and artificial intelligence technologies to provide people with social and cultural benefits. To provide services such as a smart traffic analysis, autonomous driving, and unmanned driving, automobiles applying these technologies are required to perform various types of sensing and image analyses for vehicle recognition and distance measurements. addition, there has been a rapid increase in the need to introduce an automotive Ethernet, that can provide a wide bandwidth to support. such technologies. In this article, we survey the latest trends in automotive Ethernet based automobiles and their security threats, and analyze the status and prospects of security technologies applied to cope with them.

Configuration of a UxNB Security Testbed for 5G-Advanced (5G-Advanced를 위한 UxNB 보안 테스트베드 구성)

  • Seungchan Woo;Jong-Hyouk Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.389-391
    • /
    • 2024
  • UxNB(Radio Access Node on-board UAV)는 3GPP(3rd Generation Partnership Project)에서 표준화된 기술 용어로서 사용자 단말에 대한 연결성을 제공하는 무선 액세스 노드로 UAV(Unmanned Aerial Vehicle)를 통해 공중에서 이동성을 가지는 기지국을 의미한다. 이는 드론 기지국, 공중 기지국, 플라잉 기지국 등으로 다양하게 언급된다. UxNB는 5G-Advanced 및 6G 환경에서의 초연결성 및 초저지연 요구사항을 충족하기 위한 필수적인 기술이므로 6G 보안 내재화를 위해 UxNB에 관한 보안 연구가 필요한 실정이다. 본 논문은 UxNB 보안에 대해 효율적으로 연구를 수행할 수 있는 UxNB 보안 테스트베드에 대해 설명하며 확장 방안에 관해 제시한다.

The proposal of a cryptographic method for the communication message security of GCS to support safe UAV operations (안정적인 UAV 운영을 위한 GCS의 통신메시지의 암호화 제안)

  • Kim, Byoung-Kug;Hong, Sung-Hwa;Kang, Jiheon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1353-1358
    • /
    • 2021
  • IoT (Internet of Things) emerges from various technologies such as communications, micro processors and embedded system and so on. The IoT has also been used to UAV (Unmanned Aerial Vehicle) system. In manned aircraft, a pilot and co-pilot should control FCS (Flight Control System) with FBW(Fly By Wire) system for flight operation. In contrast, the flight operation in UAV system is remotely and fully managed by GCS (Ground Control System) almost in real time. To make it possible the communication channel should be necessary between the UAV and the GCS. There are many protocols between two systems. Amongst them, MAVLink (Macro Air Vehicle Link) protocol is representatively used due to its open architecture. MAVLink does not define any securities itself, which results in high vulnerability from external attacks. This paper proposes the method to enhance data security in GCS network by applying cryptographic methods to the MAVLink messages in order to support safe UAV operations.

Improve utilization of Drone for Private Security (Drone의 민간 시큐리티 활용성 제고)

  • Gong, Bae Wan
    • Convergence Security Journal
    • /
    • v.16 no.3_2
    • /
    • pp.25-32
    • /
    • 2016
  • Drone refers to an unmanned flying system according to the remote control. That is a remote control systems on the ground or a system that automatically or semi auto-piloted system without pilot on board. Drones have been used and developed before for military purposes. However there are currently utilized in a variety of areas such as logistics and distribution of relief supplies disaster areas, wireless Internet connection, TV, video shooting and disaster observation, tracking criminals etc. Especially it can be actively used in activities such as search or the structure of the disaster site, and may be able to detect the movement of people and an attacker using an infrared camera at night. Drones are very effective for private security.

Design of Context-Aware-Based Drone Control Mechanism by Using Two-Factor (이중요소를 이용한 상황인지 기반 드론 제어 메커니즘 설계)

  • Oh, Yoon-Seok;Kim, Aeyoung;Seo, Seung-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.57-66
    • /
    • 2019
  • Drones, which are used in various fields, are vulnerable to various security threats such as physical deodorization attacks and information leakage attacks because they operate in an unmanned environment and use wireless communication with weak security. In particular, research is needed to prevent damages such as leakage of stored information and unauthorized use due to illegal drone deodorization. In this paper, we propose a context - aware drone control mechanism that protects stored internal information and prevents unauthorized use when the drones are illegally deactivated. We also demonstrated the feasibility of the proposed mechanism as a prototype implementation and experiment.