• Title/Summary/Keyword: 차량 안전 통신

Search Result 519, Processing Time 0.032 seconds

Security Verification of a Communication Authentication Protocol in Vehicular Security System (자동차 보안시스템에서 통신 인증프로토콜의 보안성 검증)

  • Han, Myoungseok;Bae, WooSik
    • Journal of Digital Convergence
    • /
    • v.12 no.8
    • /
    • pp.229-234
    • /
    • 2014
  • Vehicular electronic communication system has continued to develop in favor of high performance and user convenience with the evolution of auto industry. Yet, due to the nature of communication system, concerns over intruder attacks in transmission sections have been raised with a need for safe and secure communication being valued. Any successful intruder attacks on vehicular operation and control systems as well as on visual equipment could result in serious safety and privacy problems. Thus, research has focused on hardware-based security and secure communication protocols. This paper proposed a safe and secure vehicular communication protocol, used the formal verification tool, Casper/FDR to test the security of the proposed protocol against different types of intruder attacks, and verified that the proposed protocol was secure and ended without problems.

Prototype Implementation of Control Board for Vehicle V2X Communication Performance Evaluation (자동차 V2X 통신성능 평가를 위한 제어 보드 프로토타입 구현)

  • Yoowon Kim;Byeongchan Jo;Hyuk Jung
    • Journal of Auto-vehicle Safety Association
    • /
    • v.15 no.2
    • /
    • pp.28-34
    • /
    • 2023
  • The Republic of Korea aims to complete the commercialisation of Level 4+ cooperative autonomous driving in 2027. It also plans to include V2X OBU in the K-NCAP evaluation items. Therefore, communication performance safety evaluation criteria for V2X OBU need to be established, and an OBU with necessary functions is needed to develop V2X communication performance safety evaluation technology for vehicles. In this study, we implemented a V2X OBU control board prototype that can be used to develop a V2X communication performance safety evaluation technology for Level 4+ autonomous vehicles, and confirmed that the control board prototype works normally.

Support for Real-Time Communication Domains on an Automotive Network Gateway (실시간 통신 도메인을 고려한 차량용 네트워크 게이트웨이)

  • Chung, Sung-Moon;Lee, Mu-Youl;Jin, Hyun-Wook
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.63-64
    • /
    • 2009
  • 자동차 내에는 여러 종류의 차량용 네트워크가 사용되고 있다. 자동차에서 요구되는 서비스의 종류가 다양해짐에 따라 차량용 네트워크의 특성 또한 다양해지고 있다. 최근 이들 네트워크 간의 협업이 중요하게 인식되어 차량용 네트워크 게이트웨이가 등장하게 되었으나 서로 다른 특성의 네트워크를 효율적으로 지원하기 위한 방안에 대해서는 아직 충분히 연구되지 않았다. 그 대표적인 예로서 서로 다른 네트워크의 통신 실시간성 요구를 만족하기 위한 효율적인 시스템 소프트웨어의 구조를 들 수 있다. 본 논문에서는 차량운전 및 안전성과 직결되는 전장용 네트워크 도메인과 인포테인먼트 시스템을 위한 네트워크 도메인을 구분하고 전장용 네트워크의 실시간성을 지원하기 위한 리눅스 기반의 차량용 네트워크 게이트웨이를 제안한다. 성능 측정 결과 제안된 게이트웨이는 인포테인먼트 네트워크 도메인의 통신에 영향을 받지 않고 전장용 네트워크 도메인의 실시간성을 보장해줄 수 있음을 보인다.

A improved back-off algorithm using the gaussian model in the vehicular networks (차량 간 통신에서 가우시안 모델을 적용한 개선된 백오프 알고리즘)

  • Oh, Sang-Yeob
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.225-230
    • /
    • 2012
  • When a car accident happened, the accident vehicle should broadcast a safe message to its neighbors in multi-hop. However, the pure flooding is difficult to protect a chain-reaction collision because of the frequent collision and the communication delay. To solve this problem, we proposes a back-off algorithm applied to the estimation of the neighbor node count using the t-distribution. And we proposes a MAC protocol preventing the communication delay by separating the neighbor's count collection channel and data channel. As a result, we show the frame reception success rate of our protocol improved more 10% than the previous protocol.

A Study on Security Evaluation for Secure Software Update Management System in Automotive (안전한 자동차용 SUMS 구축을 위한 보안성 평가기준 도출)

  • Seo, Jaewan;Kwak, Jiwon;Hong, Paul;Cho, Kwangsoo;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1151-1163
    • /
    • 2022
  • As wireless communication functions begin to be installed in vehicles, cyberattacks that exploit vulnerabilities in wireless communication functions are increasing. To respond to this, UNECE enacted the UN R156 regulation to safely distribute the software installed in the vehicle by using the wireless communication function. The regulations specify the requirements necessary to safely distribute the software for vehicles, but only the abstract requirements are presented without information on the components and detailed functions necessary to develop and implement the requirements. Therefore, in this paper, we propose a security evaluation standard that can evaluate whether a safe SUMS is built using threat modeling, a method for systematically analyzing security threats.

Inter-device Mutual Authentication and Formal Verification in Vehicular Security System (자동차 보안시스템에서 장치간 상호인증 및 정형검증)

  • Lee, Sang-Jun;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.205-210
    • /
    • 2015
  • The auto industry has significantly evolved to the extent that much attention is paid to M2M (Machine-to-Machine) communication. In M2M communication which was first used in meteorology, environment, logistics, national defense, agriculture and stockbreeding, devices automatically communicate and operate in accordance with varying situations. M2M system is applied to vehicles, specifically to device-to-device communication inside cars, vehicle-to-vehicle communication, communication between vehicles and traffic facilities and that between vehicles and surroundings. However, communication systems are characterized by potential intruders' attacks in transmission sections, which may cause serious safety problems if vehicles' operating system, control system and engine control parts are attacked. Thus, device-to-device secure communication has been actively researched. With a view to secure communication between vehicular devices, the present study drew on hash functions and complex mathematical formulae to design a protocol, which was then tested with Casper/FDR, a tool for formal verification of protocols. In brief, the proposed protocol proved to operate safely against a range of attacks and be effective in practical application.

Performance Evaluation for IEEE 802.15.4 Based Telematics Transportation Safety System (IEEE 802.15.4 기반 텔레매틱스 교통안전시스템 성능 평가)

  • Kim, Young-Man;Eom, Doo-Seop;Kim, Min-Soo;Kim, Hwan-Sik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.1303-1306
    • /
    • 2005
  • 최근 차량에 설치된 단말기를 통해 길안내 서비스, 교통정보 서비스 등 다양한 정보를 제공하는 텔레매틱스 서비스가 활발하게 연구되고 있다. 하지만 현재 대다수의 텔레매틱스 서비스는 최대 15m의 공간 오차를 가진 GPS 기술을 이용하기 때문에 차량의 정확한 위치정보를 파악하기는 힘들다. 따라서 본 연구에서는 무선 센서 노드를 이용해 GPS보다 정확한 차량의 위치정보와 속도를 감지해 교차로에서 발생할 수 있는 차량 충돌을 예측하고 충돌 위험 정보를 교차로에 근접한 자동차에게 알려주는 텔레매틱스 교통안전시스템을 구성하고 노드 간 통신 프로토콜로서 IEEE 802.15.4[1]를 채택한 후 고정 라우팅 방식으로 차량정보를 베이스 스테이션까지 보내어 교차로 주변차량 전체에 브로드캐스트하는 방식을 취하도록 한다. 빠르게 이동하는 차량의 특성상 교차로 차량 충돌 방지 서비스 구현에 있어서 높은 실시간성과 신뢰성을 갖춘 프로토콜이 요구된다. 따라서 본 차량 충돌 예측을 위한 교통안전시스템의 신뢰성과 실시간성을 평가하기 위하여 Network Simulator 2 (NS/2)[2]를 이용하여 시뮬레이션 한다.

  • PDF

Hacking attack and vulnerabilities in vehicle and smart key RF communication (차량과 스마트키 RF통신에 대한 해킹 공격 및 취약점에 대한 연구)

  • Kim, Seung-woo;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.8
    • /
    • pp.1052-1057
    • /
    • 2020
  • With the development of new ICT technology, smart keys for vehicles are terminals with ICT technology. Therefore, when the vehicle and the smart key communicate with RF, a cyber hacking attack is possible. Cyber-attacks on smart keys can pose a threat to vehicle theft and vehicle control. Therefore, it is necessary to study hacking attacks and vulnerabilities of smart keys for autonomous vehicles. In this paper, we analyze the cyber attack case of RF communication for vehicles and smart keys. In addition, a real RF cyber attack on the smart key is performed, and the vulnerability of radio wave replication in the same frequency band is found. In this paper, we analyze the vulnerability of RF communication between vehicles and smart keys, and propose a countermeasure against cyber security. In the future, plans to strengthen cyber attacks and security through the popularization of autonomous vehicles will become basic data to protect human and vehicle safety.