• Title/Summary/Keyword: cyber physical systems

Search Result 183, Processing Time 0.021 seconds

A Study on Structuring of Information Sharing Platforms Based on Risk Communication Theory (위험커뮤니케이션 이론에 기반을 둔 정보공유 플랫폼 구조화 연구)

  • Yoo, Ji-Yeon;Park, Hyang-Mi
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.59-72
    • /
    • 2019
  • In this day and age physical and cyber boundaries have converged due to the development of new technologies, such as the Internet of Things (IoT) and the Cyber Physical System (CPS). As the relationship between physical system and cyber technology strengthens, more diverse and complex forms of risk emerge. As a result, it is becoming difficult for single organization or government to fully handle this situation alone and cooperation based on information sharing and the strengthening of active defense systems are needed. Shifting to a system in which information suitable for various entities can be shared and automatically responded to is also necessary. Therefore, this study tries to find improvements for the current system of threat information collecting and sharing that can actively and practically maintain cyber defense posture, focusing particularly on the structuring of information sharing platforms. To achieve our objective, we use a risk communication theory from the safety field and propose a new platform by combining an action-oriented security process model.

Vehicular Cyber-Physical Systems for Smart Road Networks

  • Jeong, Jaehoon Paul;Lee, Eunseok
    • Information and Communications Magazine
    • /
    • v.31 no.3
    • /
    • pp.103-116
    • /
    • 2014
  • This paper proposes the design of Vehicular Cyber-Physical Systems (called VCPS) based on vehicular cloud for smart road networks. Our VCPS realizes mobile cloud computing services where vehicles themselves or mobile devices (e.g., smartphones and tablets of drivers or passengers in vehicles) play a role of both cloud server and cloud client in the vehicular cloud. First, this paper describes the architecture of vehicular networks for VCPS and the delay modeling for the event prediction and data delivery, such as a mobile node's travel delay along its navigation path and the packet delivery delay in vehicular networks. Second, the paper explains two VCPS applications as smart road services for the driving efficiency and safety through the vehicular cloud, such as interactive navigation and pedestrian protection. Last, the paper discusses further research issues for VCPS for smart road networks.

UAV Path Creation Tool for Wildfire Reconnaissance in CPS Environment (CPS환경에서 산불 정찰을 위한 무인기 비행경로 생성 도구)

  • Ji-Won Jeong;Chang-Hui Bae;EuTeum Choi;SeongJin Lee
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.18 no.6
    • /
    • pp.327-333
    • /
    • 2023
  • Existing studies on the UAV (Unmanned Aerial Vehicle)-based CPS (Cyber Physical System) environment lack forest fire monitoring and forest fire reconnaissance using real-world UAVs. So, it is necessary to monitor forest fires early through CPS based on real-world UAVs with high reliability and resource management efficiency. In this paper presents an MFG (Misstion File Generater) that automatically generates a flight path of an UAV for forest fire monitoring in a CPS environment. MFG generates flight paths based on a hiking trail with a high fire probability due to a true story of an entrant. We have confirmed that the flight path generated by MFG can be applied to the UAV. Also, we have verified that the UAV flies according to the flight path generated by MFG in simulation, with a negligible error rate.

ICS Security Risk Analysis Using Attack Tree (공격 트리를 이용한 산업 제어 시스템 보안 위험 분석)

  • Kim, Kyung-Ah;Lee, Dae-Sung;Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.11 no.6
    • /
    • pp.53-58
    • /
    • 2011
  • There is increasing use of common commercial operation system and standard PCs to control industrial production systems, and cyber security threat for industrial facilities have emerged as a serious problem. Now these network connected ICS(Industrial Control Systems) stand vulnerable to the same threats that the enterprise information systems have faced and they are exposed to malicious attacks. In particular Stuxnet is a computer worm targeting a specific industrial control system, such as a gas pipeline or power plant and in theory, being able to cause physical damage. In this paper we present an overview of the general configuration and cyber security threats of a SCADA and investigate the attack tree analysis to identify and assess security vulnerabilities in SCADA for the purpose of response to cyber attacks in advance.

Improving the Cyber Security over Banking Sector by Detecting the Malicious Attacks Using the Wrapper Stepwise Resnet Classifier

  • Damodharan Kuttiyappan;Rajasekar, V
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1657-1673
    • /
    • 2023
  • With the advancement of information technology, criminals employ multiple cyberspaces to promote cybercrime. To combat cybercrime and cyber dangers, banks and financial institutions use artificial intelligence (AI). AI technologies assist the banking sector to develop and grow in many ways. Transparency and explanation of AI's ability are required to preserve trust. Deep learning protects client behavior and interest data. Deep learning techniques may anticipate cyber-attack behavior, allowing for secure banking transactions. This proposed approach is based on a user-centric design that safeguards people's private data over banking. Here, initially, the attack data can be generated over banking transactions. Routing is done for the configuration of the nodes. Then, the obtained data can be preprocessed for removing the errors. Followed by hierarchical network feature extraction can be used to identify the abnormal features related to the attack. Finally, the user data can be protected and the malicious attack in the transmission route can be identified by using the Wrapper stepwise ResNet classifier. The proposed work outperforms other techniques in terms of attack detection and accuracy, and the findings are depicted in the graphical format by employing the Python tool.

센서 네트워크를 넘어 사이버-물리시스템으로: 응용 사례

  • Yu, Jun-Hyeok
    • ICROS
    • /
    • v.18 no.3
    • /
    • pp.33-36
    • /
    • 2012
  • 최근 컴퓨터, 정보통신, 제어 기술이 융합된 Cyber-Physical Systems 기술에 대해 많은 연구자들의 관심이 증가하고 있고, 이에 대한 연구가 선진국을 중심으로 활발히 진행되고 있다. 이와 관련하여 본 논문에서는 센서네트워크를 사이버-물리시스템 또는 다양한 응용서비스 분야에 적용한 사례를 중심으로 소개한다.

Cyber Threat and Vulnerability Analysis-based Risk Assessment for Smart Ship

  • Jeoungkyu Lim;Yunja Yoo
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.30 no.3
    • /
    • pp.263-274
    • /
    • 2024
  • The digitization of ship environments has increased the risk of cyberattacks on ships. The smartization and automation of ships are also likely to result in cyber threats. The International Maritime Organization (IMO) has discussed the establishment of regulations at the autonomous level and has revised existing agreements by dividing autonomous ships into four stages, where stages 1 and 2 are for sailors who are boarding ships while stages 3 and 4 are for those not boarding ships. In this study, the level of a smart ship was classified into LEVELs (LVs) 1 to 3 based on the autonomous levels specified by the IMO. Furthermore, a risk assessment for smart ships at various LVs in different risk scenarios was conducted The cyber threats and vulnerabilities of smart ships were analyzed by dividing them into administrative, physical, and technical security; and mitigation measures for each security area were derived. A total of 22 cyber threats were identified for the cyber asset (target system). We inferred that the higher the level of a smart ship, the greater the hyper connectivity and the remote access to operational technology systems; consequently, the greater the attack surface. Therefore, it is necessary to apply mitigation measures using technical security controls in environments with high-level smart ships.

Connectivity Management of a Pedestrian Smartphone App in the Cyber-Physical Intersection Systems (CPIS) (사이버-물리 교차로 시스템에서 보행자를 위한 스마트폰 앱의 연결성 관리)

  • Jeong, Han-You;Suramardhana, Tommy Adhyasa;Nguyen, Hoa-Hung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.9
    • /
    • pp.578-589
    • /
    • 2014
  • In this paper, we introduce the concept of cyber-physical intersection systems (CPIS) which interconnects roadside units (RSU) located at the intersection, on-board units (OBU) of moving vehicles, and the smartphone apps, named the Smartphone Agent (SA). At the pedestrian mode of the SA, the connectivity management schemes, such as a location update and a handover control algorithm, are proposed to better support the CPIS services while minimizing the power consumption of the pedestrian's smartphone. We develop a real prototype of the CPIS, including RSU, OBU, and the SA. Based on the numerical results collected from a pedestrian moving around the Pusan National University campus, we validate that the proposed connectivity management schemes can improve not only the power efficiency of the pedestrian's smartphone, but also the quality of the CPIS services.

Design and Implementation of Kernel-Level Split and Merge Operations for Efficient File Transfer in Cyber-Physical System (사이버 물리 시스템에서 효율적인 파일 전송을 위한 커널 레벨 분할 및 결합 연산의 설계와 구현)

  • Park, Hyunchan;Jang, Jun-Hee;Lee, Junseok
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.14 no.5
    • /
    • pp.249-258
    • /
    • 2019
  • In the cyber-physical system, big data collected from numerous sensors and IoT devices is transferred to the Cloud for processing and analysis. When transferring data to the Cloud, merging data into one single file is more efficient than using the data in the form of split files. However, current merging and splitting operations are performed at the user-level and require many I / O requests to memory and storage devices, which is very inefficient and time-consuming. To solve this problem, this paper proposes kernel-level partitioning and combining operations. At the kernel level, splitting and merging files can be done with very little overhead by modifying the file system metadata. We have designed the proposed algorithm in detail and implemented it in the Linux Ext4 file system. In our experiments with the real Cloud storage system, our technique has achieved a transfer time of up to only 17% compared to the case of transferring split files. It also confirmed that the time required can be reduced by up to 0.5% compared to the existing user-level method.

Development of Smart Factory-Based Technology Education Platform Linking CPPS and VR (CPPS 및 VR을 연계한 스마트팩토리 기반 기술 교육 플랫폼 개발)

  • Lee, Hyun
    • Journal of Practical Engineering Education
    • /
    • v.13 no.3
    • /
    • pp.483-490
    • /
    • 2021
  • In this paper, we proposed the development of a smart factory intergrated technology education platform using smart factory based CPPS (Cyber Physical Production System) and VR (Vitrual Reality) technology and educational methods using the platform. A platform has been developed to learn how to integrate 3D digital twin and BOP (Bill of Process)-based manufacturing processes. In addition, Digital Twin established a smart factory-based integrated education platform by linking mechanical systems, digital twins, and virtual reality through the OPC-UA server. Based on this platform, the smart factory integration platform is proposed to have individual elements of the smart factory integration platform through BOP-based digital twin simulation, OPC-UA integration, MES system, SCADA system, and VR interworking.