• Title/Summary/Keyword: intelligent security

Search Result 723, Processing Time 0.025 seconds

A Study on Establishment and Connection of Intelligent Security Integrated Platform Elements for Real-Time Crime Response (실시간 범죄대응을 위한 지능형 방범 통합 플랫폼 요소 설정 및 연계방안 연구)

  • Choi, Woo-Chul;Na, Joon-Yeop
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.10
    • /
    • pp.8-15
    • /
    • 2018
  • This article investigates intelligent security integrated platform for real-time crime response and preventive crime prevention. This study analyzed intelligent crime prevention platform elements by analyzing crime prevention system/platform research, intelligent crime prevention research, and case study of municipality integrated operation center crime prevention system. Through this, we developed a practical intelligent security platform, and suggested a linkage with existing municipalities and smart city integrated platform system considering scalability. This enables CCTV monitoring, which is used only for existing post processing, to cope with real-time crime. It is expected that it will be able to solve the incidents in golden-time by grasping the precise position of the complainant not only in the outdoor but also indoors. It is also possible to provide citizen-centered crime-prevention social safety net information sharing service by enhancing citizen participation as well as improving control efficiency. The intelligent security platform has advantages that it is easy to spread the municipality because it is developed considering existing municipal system, smart city integration platform, and linkage and expansion with other security services.

A Study on the Improvement of Security Vulnerabilities in Intelligent Transport Systems (지능형교통시스템의 보안취약점 개선방안에 관한 연구)

  • Jo, Pyoung Hyun;Lim, Jong In;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.531-543
    • /
    • 2013
  • The destruction and prejudice of major infrastructure such as energy, broadcast, communication and transportation could result in a threat to individual rights and liberties, as well as social and economic losses. If a traffic signal control facilities have been violated, the lives of the citizens discomfort as well as causing social disruption such as traffic accident. Because the control system is operating as a closed network and you think it is safe, the information protection system has not been built or security patches and anti-virus updates do not work properly. So, cyber attacks by security vulnerabilities are exposed. Therefore, there is a need to identify the characteristics of the system, and develop appropriate countermeasures in order to prevent cyber attacks and prejudices incidents. This paper examines the vulnerabilities of Intelligent Transport Systems and proposes the improvement of security vulnerabilities.

A Study on the 4th Industrial Revolution and E-Government Security Strategy -In Terms of the Cyber Security Technology of Intelligent Government- (제4차 산업혁명과 전자정부 보안연구 -지능형 정부의 빅데이터 사이버보안기술 측면에서-)

  • Lee, Sang-Yun;Yoon, Hong-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.2
    • /
    • pp.369-376
    • /
    • 2019
  • This paper studies desirable form of future e-government in terms of intelligent government research in response to new intelligent cyber security services in the fourth industrial revolution. Also, the strategic planning of the future e-government has been contemplated in terms of the centralization and intellectualization which are significant characteristics of the fourth industrial revolution. The new system construction which is applied with security analysis technology using big data through advanced relationship analysis is suggested in the paper. The establishment of the system, such as SIEM(Security Information & Event Management), which anticipatively detects security threat by using log information through big data analysis is suggested in the paper. Once the suggested system is materialized, it will be possible to expand big data object, allow centralization in terms of e-government security in the fourth industrial revolution, boost data process, speed and follow-up response, which allows the system to function anticipatively.

Efficient ROI Encryption in HEVC (HEVC 코덱에서 효율적인 관심영역 암호화)

  • Deok-Han Kim;Yujun Kim;Young-Gab Kim
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.142-144
    • /
    • 2023
  • 실생활에서 CCTV가 증가함에 따라 영상에서 개인정보 유출에 대한 관심도 증가하고 있다. CCTV로 녹화된 영상에서는 다양한 개인정보가 노출될 수 있기 때문에, 개인정보를 비식별화할 수 있는 영상 암호화 기술이 필요하다. 현재 다양한 영상녹화 장치에서 효율성을 위해 HEVC가 많이 사용되고 있으며, HEVC 영상에서 관심영역만을 암호화하는 실시간 관심영역 암호화 기술이 연구되고 있다. 기존의 HEVC 영상에서 관심영역 암호화 기법은 모든 프레임의 관심영역에 포함되는 타일을 암호화하므로 많은 연산자원을 필요로 한다. 본 논문에서는 선별된 일부 프레임에서 관심영역에 포함되는 타일을 선택적으로 암호화하여, 모든 프레임에서 관심영역의 비식별화를 유지하며 암호화 성능을 향상하는 방법을 제안한다. 결과적으로 제안한 방법을 사용함으로써 영상 암호화 시 전체 프레임에 대한 비식별화를 유지하면서 기존 방법보다 암호화에 걸리는 시간이 50.4% 감소하였다.

A Self-Adaptive Attribute-Based Access Control Framework for Interoperability between IoT Platforms (사물인터넷 플랫폼 간 상호운용성을 위한 자가적응형 속성기반 접근제어 프레임워크)

  • Ji-Hoon Park;Giluk Kang;Young-Gab Kim
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.92-94
    • /
    • 2023
  • 사물인터넷이 발전함에 따라 사용자에게 여러 서비스를 제공하기 위한 사물인터넷 플랫폼이 활발하게 개발되고 있다. 그러나 각각의 플랫폼은 독자적인 환경에서 개발되고 있어 상호운용성에 어려움이 있다. 특히, 이기종 사물인터넷 플랫폼이 리소스 보호를 위해 동일한 속성기반 접근제어를 사용하더라도 속성을 표현하는 표현법이 상이하여 유효한 속성을 소유하고 있음에도 타 플랫폼의 리소스에 접근할 수 없는 문제가 있다. 이에, 본 논문에서는 속성기반 접근제어를 활용하는 이기종 사물인터넷플랫폼 간의 서로 다른 속성 표현법을 이해하여 상호운용할 수 있는 프레임워크를 제안한다. 본 프레임워크는 자가적응 모듈을 통해 동일한 속성이더라도 표현법의 차이로 발생하는 상호운용의 문제를 해결하여 이기종 플랫폼 간의 리소스 접근이 가능하도록 한다.

An Intelligent Machine Learning Inspired Optimization Algorithm to Enhance Secured Data Transmission in IoT Cloud Ecosystem

  • Ankam, Sreejyothsna;Reddy, N.Sudhakar
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.83-90
    • /
    • 2022
  • Traditional Cloud Computing would be unable to safely host IoT data due to its high latency as the number of IoT sensors and physical devices accommodated on the Internet grows by the day. Because of the difficulty of processing all IoT large data on Cloud facilities, there hasn't been enough research done on automating the security of all components in the IoT-Cloud ecosystem that deal with big data and real-time jobs. It's difficult, for example, to build an automatic, secure data transfer from the IoT layer to the cloud layer, which incorporates a large number of scattered devices. Addressing this issue this article presents an intelligent algorithm that deals with enhancing security aspects in IoT cloud ecosystem using butterfly optimization algorithm.

Secure Cluster Selection in Autonomous Vehicular Networks

  • Mohammed, Alkhathami
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.1
    • /
    • pp.11-16
    • /
    • 2023
  • Vehicular networks are part of the next generation wireless and smart Intelligent Transportation Systems (ITS). In the future, autonomous vehicles will be an integral part of ITS and will provide safe and reliable traveling features to the users. The reliability and security of data transmission in vehicular networks has been a challenging task. To manage data transmission in vehicular networks, road networks are divided into clusters and a cluster head is selected to handle the data. The selection of cluster heads is a challenge as vehicles are mobile and their connectivity is dynamically changing. In this paper, a novel secure cluster head selection algorithm is proposed for secure and reliable data sharing. The idea is to use the secrecy rate of each vehicle in the cluster and adaptively select the most secure vehicle as the cluster head. Simulation results show that the proposed scheme improves the reliability and security of the transmission significantly.

Study on Trusted Models and Intelligent Intrusion Detection Systems for 6G Mobile Networks (6G 환경을 고려한 트러스트 모델 및 지능형 침입 탐지 기술 동향)

  • C.H. Park;K.M. Park;J.H. Song;J.H. Kim;S.H. Kim
    • Electronics and Telecommunications Trends
    • /
    • v.39 no.5
    • /
    • pp.74-85
    • /
    • 2024
  • The advent of 6G mobile communication technologies promises to surpass the capabilities of existing 5G by offering ultra high-speed data transmission, ultra low latency, and extensive connectivity, enabling a new wave of digital transformation across various fields. However, the openness and decentralized nature of 6G systems, which enhance their flexibility and scalability, can expand the attack surface and increase security threats from cyber-attacks. In this article, we analyze the current research trends related to security in the 6G mobile communication landscape.

Development of an Intelligent Security Robot System for Home Surveillance (가정용 지능형 경비 로봇 시스템 개발)

  • Park, Jeong-Ho;Shin, Dong-Gwan;Woo, Chun-Kyu;Kim, Hyung-Chul;Kwon, Yong-Kwan;Choi, Byoung-Wook
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.13 no.8
    • /
    • pp.810-816
    • /
    • 2007
  • A security robot system named EGIS-SR is a mobile security robot through one of the new growth engine project in robotic industries. It allows home surveillance through an autonomous mobile platform using onboard cameras and wireless security sensors. EGIS-SR has many sensors to allow autonomous navigation, hierarchical control architecture to handle lots of situations in monitoring home surveillance and mighty networks to achieve unmanned security services. EGIS-SR is tightly coupled with a networked security environment, where the information of the robot is remotely connected with the remote cockpit and patrol man. It achieved an intelligent unmanned security service. The robot is a two-wheeled mobile robot and has casters and suspension to overcome a doorsill. The dynamic motion is verified through $ADAMS^{TM}$ simulation. For the main controller, PXA270 based hardware platform based on linux kernel 2.6 is developed. In the linux platform, data handling for various sensors and the localization algorithm are performed. Also, a local path planning algorithm for object avoidance with ultrasonic sensors and localization using $StarGazer^{TM}$ is developed. Finally, for the automatic charging, a docking algorithm with infrared ray system is implemented.