Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ
ÀÚ·á °Ë»ö°á°ú
Ç¥ÁØÁ¾·ù | Á¤º¸Åë½Å´ÜüǥÁØ(TTAS) | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Ç¥ÁعøÈ£ | TTAK.KO-12.0418 | ±¸ Ç¥ÁعøÈ£ | |||||||||||||||
Á¦°³Á¤ÀÏ | 2024-12-06 | ÃÑ ÆäÀÌÁö | 20 | ||||||||||||||
ÇÑ±Û Ç¥Áظí | ÇöóÀ× ±âÁö±¹ º¸¾È ¿ä±¸»çÇ× | ||||||||||||||||
¿µ¹® Ç¥Áظí | Security Requirements for Flying Base Station | ||||||||||||||||
ÇÑ±Û ³»¿ë¿ä¾à | ÀÌ Ç¥ÁØÀº ÇöóÀ× ±âÁö±¹ÀÇ ½Ã½ºÅÛ ±¸¼º, ±×¿¡ Æ¯ÈµÈ °ø°Ý ¸ðµ¨ ±×¸®°í ÇöóÀ× ±âÁö±¹ ±¸¼º ¿ä¼Ò¿Í ¿î¿µ Ãø¸é¿¡¼ÀÇ º¸¾È ¿ä±¸»çÇ×À¸·Î ±¸¼ºµÈ´Ù. ÇöóÀ× ±âÁö±¹ÀÇ ºñÇà Á¦¾îºÎ¿¡ ´ëÇÑ °ø°ÝÀº ±âÁö±¹ ¼º´ÉÀ» ÀúÇϽÃų ¼ö ÀÖ°í, ¹Ý´ë·Î ±âÁö±¹ ÆÄÆ®¿¡ ´ëÇÑ °ø°ÝÀº ºñÇà Á¦¾îºÎ¿¡ ¾Ç¿µÇâÀ» ³¢Ä¥ ¼ö ÀÖ´Ù. º» Ç¥ÁØ¿¡¼´Â ÀÌ¿Í °°Àº ÇöóÀ× ±âÁö±¹¿¡ Æ¯ÈµÈ Å©·Î½º µµ¸ÞÀÎ °ø°ÝµéÀ» ±¸Ã¼ÀûÀ¸·Î ±â¼úÇÑ´Ù. ±×¸®°í Å©·Î½º µµ¸ÞÀÎ °ø°Ý¿¡ ´ëÀÀÇϱâ À§ÇÑ º¸¾È ¿ä±¸»çÇ×À¸·Î¼, ½Ã½ºÅÛ ±¸¼º Ãø¸é°ú ¿î¿µ Ãø¸é¿¡¼ÀÇ ¿ä±¸»çÇ×µéÀ» ±â¼úÇÑ´Ù. | ||||||||||||||||
¿µ¹® ³»¿ë¿ä¾à | The standard consists of the system configuration of a flying base station, an attack model specialized for it, and security requirements in terms of flying base station components and operations. Attacks on the UAV part of a flying base station can degrade the performance of the base station, and conversely, attacks on the base station part can have a abnormal impact on the UAV flight controls. The standard specifically describes cross-domain attacks specialized for such flying base stations. In addition, as security requirements for responding to cross-domain attacks, requirements in terms of system configuration and operations are described. | ||||||||||||||||
°ü·Ã IPR È®¾à¼ | Á¢¼öµÈ IPR È®¾à¼ ¾øÀ½ | ||||||||||||||||
°ü·ÃÆÄÀÏ |
![]() |
||||||||||||||||
Ç¥ÁØÀÌ·Â |
|