• Title/Summary/Keyword: cyber-physical system

Search Result 225, Processing Time 0.024 seconds

Masking-Based Block Cipher LEA Resistant to Side Channel Attacks (부채널 공격에 대응하는 마스킹 기반의 블록 암호 LEA)

  • Park, Eunsoo;Oh, Soohyun;Ha, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1023-1032
    • /
    • 2017
  • When a cryptographic device such as smart card performs an encryption for a plain text, an attacker can extract the secret key in it using side channel information. Especially, many researches found some weaknesses for side channel attack on the lightweight block cipher LEA designed to apply in IoT environments. In this paper, we survey several masking countermeasures to defeat the side channel attack and propose a novel masking conversion method. Even though the proposed Arithmetic-to-Boolean masking conversion method requires storage memory of 256 bytes, it can improve the LEA encryption speed up to 17 percentage compared to the case adopted the previous masking method.

Analysis of Health Promoting Schools: Focusing on Large-sized Elementary Schools in Urban Areas (건강증진모델학교 분석: 도시 지역 대규모 초등학교를 중심으로)

  • Kim, Miju
    • Journal of the Korean Society of School Health
    • /
    • v.30 no.3
    • /
    • pp.306-316
    • /
    • 2017
  • Purpose: The purpose of this study was to investigate the operational status and operational problems of health promoting model schools, particularly of the large-sized elementary schools in urban areas. Methods: The study analyzed the data of 14 large-sized elementary schools in urban areas selected from 85 health promoting model schools, an initiative led by the Ministry of Education from 2012 to 2014. Results: The study examined the operation process of health promoting schools in five stages; system development, needs survey & current status survey, school health policy development, program development & execution, and evaluation. In addition, the study discovered three key factors in operating health promoting schools and examined the status of each factor; connection with the curriculum, connection with the community, and consensus among members. Four problems were identified as operational problems: lack of research on faculty health issues, school physical environment and community resources, inadequate presentation of performance indicators, no close coordination in core task development and lack of linkage with the curriculum. Conclusion: It turned out the concept of health promoting school suggested by WHO was relatively faithfully realized in this study. Compared to small-sized elementary schools in rural areas, health promoting schools in this study showed better aspects overall. The connection with the community was good, but the connection with the curriculum was poor.

Direction of Next-Generation Internet of Things (차세대 사물인터넷에 대한 고찰)

  • Park, J.H.;Son, Y.S.;Park, D.H.;Kim, H.;Hwang, S.K.
    • Electronics and Telecommunications Trends
    • /
    • v.34 no.1
    • /
    • pp.1-12
    • /
    • 2019
  • The role of Internet of Things (IoT) has been evolving from connectivity to intelligent and autonomous functions. The increase in the number of connected things and the volume of data has revealed the limit of cloud-based intelligent IoT. Meanwhile, the development of microprocessors for the IoT has enabled their intelligent decision making and reactions without the intervention of the cloud; this phase is referred to as the "autonomous IoT era." However, intelligence is not the only function of the IoT. When a cyber physical system (CPS) is running on the cloud, the real-time synchronization between the real and virtual worlds cannot be guaranteed. If a CPS is running on the IoT, both the worlds can be synchronized closely enough for a zero- time gap, i.e., achieving the goals of autonomous IoT. ETRI implements intelligence into the role of IoT and collaborates their decision making and reactions without the intervention of humans. Then, we focus on the development of a new IoT computing paradigm that enables human-like discussions.

Gerontological Nursing in the Era of the Fourth Industrial Revolution (4차 산업혁명시대 노인 간호)

  • Tak, Sunghee H
    • Journal of Korean Gerontological Nursing
    • /
    • v.20 no.sup1
    • /
    • pp.160-165
    • /
    • 2018
  • Purpose: There is a need to examine changes in the health care environment and the impact on gerontological nursing care in the era of the Fourth Industrial Revolution. In this article recent healthcare paradigm changes, gerontechnology, high tech and high touch, person-centered approaches are discussed. Methods: A narrative review was used. Results: Cyber physical system, artificial intelligence, advance and convergence of bioengineering, and information communication technology are changing the health care paradigm to "precision", "prediction" and "personalization". Entry into the global aging society and the surge in the elderly population worldwide has led to searches for a new means to prepare for projected demands of this growing population. Thus, efforts such as gerontechnology have been made to apply and utilize recent innovative science and technology in order to promote the health and life of elders. There is a great emphasis on the convergence of high tech and high touch, in which humanistic and artistic approach are critical in order to assure that technology is beneficial to human beings rather than harmful. Conclusion: Positive healthcare experiences among patients and their families are emphasized by utilizing new technology and employing high touch while providing personalized care with a person-centered approach.

Exploring the dynamic knowledge structure of studies on the Internet of things: Keyword analysis

  • Yoon, Young Seog;Zo, Hangjung;Choi, Munkee;Lee, Donghyun;Lee, Hyun-woo
    • ETRI Journal
    • /
    • v.40 no.6
    • /
    • pp.745-758
    • /
    • 2018
  • A wide range of studies in various disciplines has focused on the Internet of Things (IoT) and cyber-physical systems (CPS). However, it is necessary to summarize the current status and to establish future directions because each study has its own individual goals independent of the completion of all IoT applications. The absence of a comprehensive understanding of IoT and CPS has disrupted an efficient resource allocation. To assess changes in the knowledge structure and emerging technologies, this study explores the dynamic research trends in IoT by analyzing bibliographic data. We retrieved 54,237 keywords in 12,600 IoT studies from the Scopus database, and conducted keyword frequency, co-occurrence, and growth-rate analyses. The analysis results reveal how IoT technologies have been developed and how they are connected to each other. We also show that such technologies have diverged and converged simultaneously, and that the emerging keywords of trust, smart home, cloud, authentication, context-aware, and big data have been extracted. We also unveil that the CPS is directly involved in network, security, management, cloud, big data, system, industry, architecture, and the Internet.

A study on Improving the Performance of Anti - Drone Systems using AI (인공지능(AI)을 활용한 드론방어체계 성능향상 방안에 관한 연구)

  • Hae Chul Ma;Jong Chan Moon;Jae Yong Park;Su Han Lee;Hyuk Jin Kwon
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.19 no.2
    • /
    • pp.126-134
    • /
    • 2023
  • Drones are emerging as a new security threat, and the world is working to reduce them. Detection and identification are the most difficult and important parts of the anti-drone systems. Existing detection and identification methods each have their strengths and weaknesses, so complementary operations are required. Detection and identification performance in anti-drone systems can be improved through the use of artificial intelligence. This is because artificial intelligence can quickly analyze differences smaller than humans. There are three ways to utilize artificial intelligence. Through reinforcement learning-based physical control, noise and blur generated when the optical camera tracks the drone may be reduced, and tracking stability may be improved. The latest NeRF algorithm can be used to solve the problem of lack of enemy drone data. It is necessary to build a data network to utilize artificial intelligence. Through this, data can be efficiently collected and managed. In addition, model performance can be improved by regularly generating artificial intelligence learning data.

A DQN-based Two-Stage Scheduling Method for Real-Time Large-Scale EVs Charging Service

  • Tianyang Li;Yingnan Han;Xiaolong Li
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.3
    • /
    • pp.551-569
    • /
    • 2024
  • With the rapid development of electric vehicles (EVs) industry, EV charging service becomes more and more important. Especially, in the case of suddenly drop of air temperature or open holidays that large-scale EVs seeking for charging devices (CDs) in a short time. In such scenario, inefficient EV charging scheduling algorithm might lead to a bad service quality, for example, long queueing times for EVs and unreasonable idling time for charging devices. To deal with this issue, this paper propose a Deep-Q-Network (DQN) based two-stage scheduling method for the large-scale EVs charging service. Fine-grained states with two delicate neural networks are proposed to optimize the sequencing of EVs and charging station (CS) arrangement. Two efficient algorithms are presented to obtain the optimal EVs charging scheduling scheme for large-scale EVs charging demand. Three case studies show the superiority of our proposal, in terms of a high service quality (minimized average queuing time of EVs and maximized charging performance at both EV and CS sides) and achieve greater scheduling efficiency. The code and data are available at THE CODE AND DATA.

Research Trend on Digital Twin Based on Keyword Frequency and Centrality Analysis : Focusing on Germany, the United States, Korea (키워드 빈도 및 중심성 분석에 기반한 디지털 트윈 연구 동향 : 독일·미국·한국을 중심으로)

  • Lee Taekkyeun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.20 no.2
    • /
    • pp.11-25
    • /
    • 2024
  • This study aims to analyze research trends in digital twin focusing on Germany, the US, and Korea. In Elsevier's Scopus, we collected 4,657 papers about digital twin published in from 2019 to 2023. Keyword frequency and centrality analysis were conducted on the abstracts of the collected papers. Through the obtained keyword frequencies, we tried to identify keywords with high frequency of occurrence and through centrality analysis, we tried to identify central research keywords for each country. In each country, 'digital_twin', 'machine_learning', and 'iot' appeared as research keywords with the highest interest. As a result of the centrality analysis, research on digital twin, simulation, cyber physical system, Internet of Things, artificial intelligence, and smart manufacturing was conducted as research with high centrality in each country. The implication for Korea is that research on virtual reality, digital transformation, reinforcement learning, industrial Internet of Things, robotics, and data analysis appears to have been conducted with low centrality, and intensive research in related areas appears to be necessary.

Next Generation Convergence Security Framework for Advanced Persistent Threat (지능형 지속 위협에 대한 차세대 융합 보안 프레임워크)

  • Lee, Moongoo;Bae, Chunsock
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.9
    • /
    • pp.92-99
    • /
    • 2013
  • As a recent cyber attack has a characteristic that is intellectual, advanced, and complicated attack against precise purpose and specified object, it becomes extremely hard to recognize or respond when accidents happen. Since a scale of damage is very large, a corresponding system about this situation is urgent in national aspect. Existing data center or integration security framework of computer lab is evaluated to be a behind system when it corresponds to cyber attack. Therefore, this study suggests a better sophisticated next generation convergence security framework in order to prevent from attacks based on advanced persistent threat. Suggested next generation convergence security framework is designed to have preemptive responses possibly against APT attack consisting of five hierarchical steps in domain security layer, domain connection layer, action visibility layer, action control layer and convergence correspondence layer. In domain connection layer suggests security instruction and direction in domain of administration, physical and technical security. Domain security layer have consistency of status information among security domain. A visibility layer of Intellectual attack action consists of data gathering, comparison, decision, lifespan cycle. Action visibility layer is a layer to control visibility action. Lastly, convergence correspond layer suggests a corresponding system of before and after APT attack. An introduction of suggested next generation convergence security framework will execute a better improved security control about continuous, intellectual security threat.

A Study on the Cyber Museum Organization System for Intangible Cultural Properties I - Focused on the Information system and classification code anger - (무형문화재를 위한 사이버뮤지엄 구성체계에 관한 연구 I - 정보체계 및 분류코드화를 중심으로 -)

  • 한영호;장중식;정용섭;황복득
    • Korean Institute of Interior Design Journal
    • /
    • no.38
    • /
    • pp.266-273
    • /
    • 2003
  • The culture is a product of the century, and so a worldwide-recognized cultural legacy is like an incorporeal property owned by a country. It is a new legacy created In new environment conditions among countries. The meaning of this study is to give wider publicity to our intangible cultural properties through active database research. There are a significant number of museums that manage tangible cultural properties at a national level, but we can find that most stay very superficial in the aspects of database protection, classification system, and demonstration method. This is a critical physical factor that makes it difficult to create an information-oriented management system, or to manage intangible cultural properties as incorporeal entities. The preservation of tangible cultural properties may be a more proper approach of handing down valuable national characteristics to posterity In that they can show those characteristics more readily. Unlike tangible cultural properties, the preservation of intangible cultural properties requires a different approach and process. They are treated as a category of human cultural assets because of their incorporeity and formlessness. Since those intangible cultural properties to be preserved and quantified at a national level, it is an important consideration in the study on cultural properties. The objectives of this study are to present the intangible products by making the best use of the information society's merits; rediscover human elements constituting those products; ultimately help promote our cultural succession and development by databasing such human elements.