• Title/Summary/Keyword: 차량내부네트워크

Search Result 81, Processing Time 0.027 seconds

Embedded System Design of Automotive Media Server Platform with the MOST Interface (MOST 인터페이스를 갖는 차량용 미디어 서버 플랫폼에 대한 임베디드 시스템 설계)

  • Kwak, Jae-Min;Park, Pu-Sik
    • Journal of Advanced Navigation Technology
    • /
    • v.10 no.3
    • /
    • pp.262-267
    • /
    • 2006
  • For growing need for the multimedia application in the vehicles, the MOST protocol has been focused on. The MOST protocol supports three kinds of communication modes; short control message, asynchronous packets, and reserved synchronous stream data. Because of a variety of transportation, the MOST is suitable for various applications in vehicle environment. In this paper, we implemented embedded system which is MOST-enabled AMS platform and tested the network communication operation through the control port and the synchronous channel of the source port. We implemented the prototype platforms which communicate each other on the MOST's POF network. Moreover we implemented the DivX decoder attached AMS platform and verified the operation by transferring the video stream and the control messages through the MOST network.

  • PDF

A Study on Dynamic Behavior and Power Management Method of MOST Network Devices (MOST 네트워크 장치의 동적 행동과 전원 관리 방법에 관한 연구)

  • Jeon, Young-Joon;Jang, Si-Woong;Yu, Yun-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.761-764
    • /
    • 2010
  • Interest in vehicle infotainment system, that provides both entertainment of driving and information for safe and convenient driving, has been recently increased. MOST is defined as the network transmitting high-bandwidth infortainment data to vehicle, and it has been standardized as MOST150. In this research, dynamic behavior method that deals with roles and functions of each devices connected to MOST150 Network, and Power Management Method was studied. MOST Network consists of a master device, including function block 'NetworkMaster', and all other devices called slave devices. The purpose of this study is to apply the analysis of the methods of operating and power management based on condition of master device and slave devices on MOST150 network to the future development of MOST150 devices.

  • PDF

Analysis of Resonant Characteristics in High Voltage Windings of Main Transformer for Railway Vehicle using EMTP (EMTP를 이용한 철도차량용 주변압기 고압권선의 공진특성 분석)

  • Jeong, Ki-Seok;Jang, Dong-Uk;Chung, Jong-Duk
    • Journal of the Korean Society for Railway
    • /
    • v.19 no.4
    • /
    • pp.436-444
    • /
    • 2016
  • The primary windings of the main transformer for rolling stock have several natural frequencies that can occur internal resonance with transient voltages induced on a high voltage feeding line. Factory testing is limited in its ability to determine whether or not transient voltage with various shape and duration can be excitable. This study presents the design of a high voltage windings model and simulation and analysis of the internal resonant characteristics in terms of the initial voltage distribution and voltage-frequency relationship using the electromagnetic transients program (EMTP). Turn-based lumped-parameters are calculated using the geometry data of the transformer. And, sub-models, being grouped into the total number of layers, are composed using a ladder-network model and implemented by the library function of EMTP. Case studies are used to show the layer-based voltage-frequency relationship characteristics according to the frequency sweep and the voltage escalation and distribution aspects in time-domain simulation.

GAN Based Adversarial CAN Frame Generation Method for Physical Attack Evading Intrusion Detection System (Intrusion Detection System을 회피하고 Physical Attack을 하기 위한 GAN 기반 적대적 CAN 프레임 생성방법)

  • Kim, Dowan;Choi, Daeseon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1279-1290
    • /
    • 2021
  • As vehicle technology has grown, autonomous driving that does not require driver intervention has developed. Accordingly, CAN security, an network of in-vehicles, has also become important. CAN shows vulnerabilities in hacking attacks, and machine learning-based IDS is introduced to detect these attacks. However, despite its high accuracy, machine learning showed vulnerability against adversarial examples. In this paper, we propose a adversarial CAN frame generation method to avoid IDS by adding noise to feature and proceeding with feature selection and re-packet for physical attack of the vehicle. We check how well the adversarial CAN frame avoids IDS through experiments for each case that adversarial CAN frame generated by all feature modulation, modulation after feature selection, preprocessing after re-packet.

Commercial ECU-Based Test-Bed for LIN-CAN Co-Analysis and Proof on Ultrasonic Sensors through Physical Error Injection (실차기반 LIN-CAN 연계 통합 분석 테스트베드 개발과 초음파센서 물리적 오류주입 및 분석을 통한 효용성 검증)

  • Yoon-ji Kim;Ye-ji Koh;In-su Oh;Kang-bin Yim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.325-336
    • /
    • 2023
  • With the development of autonomous driving technology, the number of external contact sensors mounted on vehicles is increasing, and the importance is also rising. The vehicular ultrasonic sensor uses the LIN protocol in the form of a bus topology and reports a status message about its surroundings through the vehicle's internal network. Since ultrasonic sensors are vulnerable to various threats due to poor security protocols, physical testing on actual vehicle is needed. Therefore, this paper developed a LIN-CAN co-analysis testbed with a jig for location-specific distance test to examine the operational relation between LIN and CAN caused by ultrasonic sensors.

Checksum Signals Identification in CAN Messages (CAN 통신 메시지 내의 Checksum Signal 식별 방법 연구)

  • Gyeongyeon Lee;Hyunghoon Kim;Dong Hoon Lee;Wonsuk Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.747-761
    • /
    • 2024
  • Recently, modern vehicles have been controlled by Electronic Control Units (ECUs), by which the safety and convenience of drivers are highly improved. It is known that a luxury vehicle has more than 100 ECUs to electronically control its function. However, the modern vehicles are getting targeted by cyber attacks because of this computer-based automotive system. To address the cyber attacks, automotive manufacturers have been developing some methods for securing their vehicles, such as automotive Intrusion Detection System (IDS). This development is only allowed to the automotive manufacturers because they have databases for their in-vehicle network (i.e., DBC Format File) which are highly confidential. This confidentiality poses a significant challenge to external researchers who attempt to conduct automotive security researches. To handle this restricted information, in this paper, we propose a method to partially understand the DBC Format File by analyzing in-vehicle network traffics. Our method is designed to analyze Controller Area Network (CAN) traffics so that checksum signals are identified in CAN Frame Data Field. Also, our method creates a Lookup Set by which a checksum signal is correctly estimated for a given message. We validate our method with the publicly accessible dataset as well as one from a real vehicle.

Usage Techniques of a Truncated Message Authentication Code for In-Vehicle Controller Area Network (자동차 내부 네트워크를 위한 경량 메시지 인증 코드 사용기법)

  • Woo, Samuel;Lee, Sang-Bum
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.6
    • /
    • pp.127-135
    • /
    • 2017
  • Recently, the most brand new vehicles contain a lot of ECU for comfortable and safety driving environments. For efficient communication network among ECUs, almost car manufactures use CAN protocol which enables to decrease the number of communication lines dramatically and ensures higher data transmission reliability. However, CAN dose not ensure authentication of CAN data frame. So it is vulnerable to replay-attack on CAN data frame. This paper proposes the practical message authentication technique for In-vehicle CAN. To transmit data and MAC together, it is very useful to use the short length of MAC after considering limited space of CAN data frame. However to ensure safety of MAC, additional technique is required. We suggested a message authentication technique that can be usefully applied to build a safety network inside the vehicle because it considers limited data payload of CAN.

Vehicle Dynamics and Road Slope Estimation based on Cascade Extended Kalman Filter (Cascade Extended Kalman Filter 기반의 차량동특성 및 도로종단경사 추정)

  • Kim, Moon-Sik;Kim, Chang-Il;Lee, Kwang-Soo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.9
    • /
    • pp.208-214
    • /
    • 2014
  • Vehicle dynamic states used in various advanced driving safety systems are influenced by road geometry. Among the road geometry information, the vehicle pitch angle influenced by road slope and acceleration-deceleration is essential parameter used in pose estimation including the navigation system, advanced adaptive cruise control and others on sag road. Although the road slope data is essential parameter, the method measuring the parameter is not commercialized. The digital map including the road geometry data and high-precision DGPS system such as DGPS(Differential Global Positioning System) based RTK(Real-Time Kinematics) are used unusually. In this paper, low-cost cascade extended Kalman filter(CEKF) based road slope estimation method is proposed. It use cascade two EKFs. The EKFs use several measured vehicle states such as yaw rate, longitudinal acceleration, lateral acceleration and wheel speed of the rear tires and 3 D.O.F(Degree Of Freedom) vehicle dynamics model. The performance of proposed estimation algorithm is evaluated by simulation based on Carsim dynamics tool and T-car based experiment.

Performance Analysis on Next Generation Korea Radio Train Control System Network (한국형 차세대 무선통신 열차제어시스템 네트워크 성능평가)

  • Bang, June-Ho;Chae, Sung-Yoon;Kim, Hyung-Jin;Park, Seong-Joon;Cho, Young-Jong;Oh, Seh-Chan;Yoon, Yong-Ki;Kim, Yong-Kyu
    • Journal of the Korea Society for Simulation
    • /
    • v.23 no.1
    • /
    • pp.11-20
    • /
    • 2014
  • In this paper, we analyze the performance and reliability of the next-generation KRTCS (Korea Radio Train System) network. The KRTCS has been designed to manage and control the overall status of trains including location, speed, stop position, door open/close status and interior monitoring and so forth. System faults of the KRTCS operation can lead to the disruption of smooth train flow, even to terrible traffic accident. Prior to installation we need to assure the reliability of the designed KRTCS system. For this purpose, we simulated and analyzed the KRTCS network using QualNet simulator, assuming the various environmental operation data of train flows and communication faults that can be found in real telecommunication networks.

Verification of a Communication Method Secure against Attacks Using Convergence Hash Functions in Inter-vehicular Secure Communication (차량간 보안 통신에서 융합 해시함수를 이용하여 공격에 안전한 통신방법 검증)

  • Lee, Sang-Jun;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.9
    • /
    • pp.297-302
    • /
    • 2015
  • The increase in applying IT to vehicles has given birth to smart cars or connected cars. As smarts cars become connected with external network systems, threats to communication security are on the rise. With simulation test results supporting such threats to Convergence security in vehicular communication, concerns are raised over relevant vulnerabilities, while an increasing number of studies on secure vehicular communication are published. Hacking attacks against vehicles are more dangerous than other types of hacking attempts because such attacks may threaten drivers' lives and cause social instability. This paper designed a Convergence security protocol for inter-vehicle and intra-vehicle communication using a hash function, nonce, public keys, time stamps and passwords. The proposed protocol was tested with a formal verification tool, Casper/FDR, and found secure and safe against external attacks.