Earticle

현재 위치 Home

한국항공보안학회지 [Journal of Korea Association For Aviation Security]

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    한국항공보안학회 [Korea Association For Aviation Security]
  • pISSN
    2713-3702
  • 간기
    반년간
  • 수록기간
    2019 ~ 2025
  • 등재여부
    KCI 등재
  • 주제분류
    사회과학 > 행정학
  • 십진분류
    KDC 326 DDC 338
Vol. 6 No. 1 (7건)
No

Original Article

1

4,000원

The advancement of ICT (Information and Communication Technology) is driving the development of various industrial technologies, as well as services in communication, transportation, logistics, and aviation. Urban Air Mobility (UAM) is expected not only to alleviate traffic congestion caused by ground traffic but also to provide rapid air cargo and passenger transportation services. Unlike general aviation services, Urban Air Mobility is intended for low-altitude flight operations. To provide seamless communication and reduce the impact of shadow areas, UAM can utilize existing commercial mobile communication base stations, leveraging the mobile communication network to achieve cost-effective infrastructure deployment. However, UAM is exposed to potential threats such as flight interference, obstruction from the ground, cyber threats including exposure, interception, and falsification of aviation information. The current UAM operating system's components (aircraft, pilots, control systems, vertiports, etc.) are vulnerable to unauthorized or illicit use, revealing weaknesses in the safe operation of urban air mobility systems. The operation of UAM using unauthorized objects poses potential threats like flight interference, obstruction, interception, falsification, and hijacking of aviation-related information (CSNi) from the ground. The reality is that the lack of mutual authentication among the components of the current UAM operating system—aircraft, control systems (ATC), vertiports, and their respective operators—exposes vulnerabilities to unauthorized use and security breaches. Therefore, this paper proposes an authentication structure capable of responding to potential cyber threats by enhancing the authenticity and security of the system through mutual authentication based on Public Key Infrastructure (PKI). This approach aims to prevent unauthorized use and control access to objects, thereby increasing resilience against replay attacks and other security threats.

2

4,000원

If the classification system currently used to develop artificial intelligence security search automatic reading technology is used, problems such as data integrity, security, and quick decision-making using data may occur. Using the newly proposed 10-digit classification system, first, it is possible to quickly find and analyze necessary information using systematically structured data. Since it is possible to register data objectively according to the classification system from the time it is registered, the performance of analysis and processing on stored data is improved and time and cost are reduced. In addition, detailed trends by data can be compared and analyzed through continuous management. Second, data consistency, integrity, and security can be improved. Consistency can be maintained in data input because data is stored according to a specific category, and security can be strengthened by limiting access to sensitive or security-requiring data belonging to a specific category. As a result, it is possible to improve the efficiency of database algorithms, and ultimately, the accuracy and speed of product search will be improved by assisting search personnel in security search using AI X-ray.

3

4,200원

Recently, the concept of Smart Airports has become a significant topic in the aviation industry. Smart Airports apply ICT technologies such as AI, robotics, IoT, and big data to enhance operational efficiency and provide a convenient and safe airport experience. Incheon Airport is adopting these smart technologies to strengthen its competitiveness and has declared 2024 as the inaugural year of its digital transformation. In particular, the smartization of the security screening process has emerged as a critical issue, leading Incheon Airport to pursue the implementation of WT (Walk Through) smart security screening technology. This technology can double the airport's capacity by improving passenger convenience, security, and operational efficiency. This study aims to analyze the impact of introducing WT smart security screening technology on increasing airport capacity and economic benefits.

4

5,200원

The impact of the COVID-19 on aviation security is materialized in various areas. While the pandemic and the decline in the number of regular air operations may have temporarily hampered terrorist activity, it is also likely to have resulted in increased security vulnerabilities due to reduced staffing and adjusted procedures. In addition, airport security clearance is the main reason for the creation of a typical bottleneck in the process, an issue that has not been solved yet despite the numerous feedback given by the air travelers. Customs and immigration take long time to process, and the airport authority is looking to resolve this issue to maintain efficiency while not compromising the security as a whole. Waiting in a long line for airport security clearance, one of the top complaints of the travelers, has consistently been one of the main issues that need to be improved. Since long security clearance times remain a persistent issue, airports continually strive for procedures that ensure both safety and efficiency. This research proposes how the airport operator should implement the policies with regard to the airport security measures, and offers some insight into international organization’s role in introducing new technologies while covering the latest trend related to the airport security

5

4,200원

With the development of the aviation industry, hundreds of aircraft fly over our heads every day, and numerous commercial aircraft are responsible for logistics and people's comings and goings. The reason why so many aircraft can operate safely is the development of electronic systems and precision navigation through GPS. As a result, commercial aircraft are exposed to electronic infringement that attacks aircraft systems with electromagnetic waves. Among them, GPS, which calculates the current location based on the information received from three to four satellites, has the disadvantage of being vulnerable to radio disturbance. The first signal transmitted from a satellite with a height of 20,200 km is 25 W, but when received from the ground, it is greatly weakened to -160 dBW. Currently, GPS radio frequency interference has been centered around the region for a long time due to the Ukraine-Russia war and the Israel-Hamas war. For this reason, this paper analyzes the concept of jamming and spoofing belonging to GPS RFI and how it affects the aircraft, reviews countermeasures, and suggests technical and policy measures.

6

4,900원

Through recent instances of satellite hacking threats and the development of satellite security technologies in foreign countries, this study suggests the direction of the development of satellite cybersecurity in the domestic defense sector. Satellites currently operating in Earth's orbit are an important element that cannot be missed out in modern society, and are usually used for various purposes such as communication, transportation, weather forecasting, and military purposes. However, as the space industry becomes active and the number of small satellites increases, the threat to cyber hacking is also on the rise. Here, satellite hacking not only threatens national security and military operations, but it can also have negative effects at the national level, which in turn is directly linked to economic losses. As such, cybersecurity of satellites is very important in the operation of satellites, but the current cybersecurity system relies on a one-way information and communication network, making it difficult to continue patching or upgrading the security system, and security weaknesses also exist due to the absence of a supply chain security management system. Accordingly, we wanted to present a realistic solution to provide confidentiality and stability against satellite hacking threats by describing the direction of development of satellite cybersecurity in our defense field through the development of confidential communication satellite technology using the U.S. Department of Defense's satellite jamming prevention system (OCX), the European Union, and quantum cryptography technology (QKD).

부록

7

한국항공보안학회지 투고 지침 외

한국항공보안학회

한국항공보안학회 한국항공보안학회지 Vol. 6 No. 1 2024.06 pp.77-99

※ 기관로그인 시 무료 이용이 가능합니다.

6,000원

 
페이지 저장