http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
스마트 팜 환경에서 보안 위협 및 대응 방안에 관한 연구
김선집 한국사물인터넷학회 2024 한국사물인터넷학회 논문지 Vol.10 No.1
4차 산업혁명의 핵심 기술인 IoT, Big-data, AI, Cloud 기술들이 최근 다양한 분야에서 신성장 동력의 핵심기반 기술로 활용되고 있다. 이에 농업 분야에도 예외 없이 이러한 핵심 기술들이 적용되어 시공간의 제약 없이 원격및 생산의 자동화를 통해 농업 분야의 문제점인 노동력 부족 현상 해결, 생산비 절감, 환경 부담 절감 등에 기여하고있다. 그러나 이러한 핵심 기술을 활용함에 따라 농업 분야에도 보안 사고 사례가 발생하고 있다. 이에 본 연구에서는스마트 팜을 기초, 중간, 고도의 3단계로 구분하여 단계별 특성, 보안 위협 및 대응 방안을 제시하고자 한다. 특히 클라우드 플랫폼하에서 컨테이너 기반 다양한 서비스 및 연구가 증대됨에 따라 이에 대한 보안 위협을 중심으로 대응 방안을 제시하고자 한다. IoT, Big-data, AI, and Cloud technologies, which are core technologies of the 4th Industrial Revolution, have recently been applied to various fields and are being used as core technologies for new growth engines. Accordingly, these core technologies are applied to the agricultural field without exception, contributing to solving the problem of labor shortage, reducing production costs, and reducing environmental burden through remote and automated production without time and space constraints. However, as these core technologies are utilized, security incidents are occurring in the agricultural field as well. Accordingly, this study divides smart farms into three stages(Basic, Middle, and High) and presents the characteristics and security threats of each stage. In particular, as the number of container-based services and research increases under cloud platforms, we would like to suggest countermeasures focusing on security threats.
김선집 건국대학교 1989 論文集 Vol.5 No.-
Two Anaerobic Digesters were operated for a Study on the "Effect of Temperature on Dewatering Characteristics of Anaerobic Digested Sludge". Artificial substrate which include a lot of settleable organic solids and which can maintain the uniformity of particle size and constituents was used as a feed sludge. Design feed rate was 1.8kg/m3/day of TS or 1.5kg/m3/day of VS with a detention time of 20days. When the reaction was at a steady state, digestion chatacteristics and specific restsrance of digested sludge were andlysed. In general, the sludge properties and the amount of gas production were nearly constant without regard to temperature variation. But the settled sledge volume was decreased according to the increase of temperature. At 55℃-digestion, ultimate settled sludge volume was only 40% of 35℃. And at the initial stage of linear phase, the settling velocity of 55℃-digested sludge was faster about 6 times than 35℃. As the increase of digestion temperature, the dewatering characteristics was improved. The dewater ability of 55℃-digested sludge without conditioning was better about 2 times than 35℃. and about 6 times of 45% FeCl3. The specific resistance reduction rate according to increase of FeCl3 contents at 55℃-digestion wart greater 1.6. The COD of filtrate was similar on the whole digestion temperature.
공공 IaaS 클라우드 인증제도에 적용할 위험분석 방법에 대한 연구
김선집,김기영 한국융합보안학회 2015 융합보안 논문지 Vol.15 No.5
클라우드 컴퓨팅은 서버의 추가 구축에 대한 비용절감, 데이터 스토리지 확대에 대한 비용 절감, 컴퓨터 자원에 대한공유, 새로운 기술의 적용에 대한 편의성 등의 장점을 가지고 있다. 그러나 서비스 모델의 다양성으로 인하여 새로운보안의 우려사항이 높아지고 있어, 이용자가 서비스의 안정성을 신뢰할 수 있도록 인증제도가 운영되고 있다. 이에 본논문에서는 인증제도의 신뢰성을 확보하기 위해 기존 IT환경에서 적용되던 위험 분석 방법과 달리 공공IaaS(Infrastructure as a Service) 클라우드 서비스 특징을 고려, 새로운 위험분석 방법을 제안한다. Cloud computing has emerged with promise to decrease the cost of server additional cost and expanding the data storage and ease for computer resource sharing and apply the new technologies. However, Cloud computing also raises many new security concerns due to the new structure of the cloud service models. Therefore, several cloud service certification system were performed in the world in order to meet customers need which is the safe and reliable cloud service. This paper we propose the new risk analysis method different compare with existing method for secure the reliability of certification considering public IaaS(Infrastructure as a Service) cloud service properties.
A Research on IoT Security Technology based on Blockchain and Lightweight Cryptographic Algorithms
김선집 국제문화기술진흥원 2023 International Journal of Advanced Culture Technolo Vol.11 No.1
As the IoT market continues to grow, security threats to IoT devices with limited resources are also increasing. However, the application of security technology to the existing system to IoT devices with limited resources is impossible due to the inherent characteristics of IoT devices. Various methods for solving related problems have been studied in existing studies to solve this problem. Therefore, this study analyzes the characteristics of domestic IoT authentication standards and existing research to propose an algorithm that applies blockchain-based authentication and lightweight encryption algorithms to IoT equipment with limited resources. In this study, a key generation method was applied using a Lamport hash-chain and data integrity between IoT devices were provided using a Merkle Tree, and an LEA encryption algorithm was applied using confidentiality in data communication. In the experiment, it was verified that the efficiency is high when the LEA encryption algorithm, which is a lightweight encryption algorithm, is applied to IoT devices with limited resources.