• Title/Summary/Keyword: Car Security

Search Result 151, Processing Time 0.019 seconds

Security Threat Analysis for Remote Monitoring and Control Functions of Connected Car Services

  • Jin Kim;Jinho Yoo
    • Journal of Information Processing Systems
    • /
    • v.20 no.2
    • /
    • pp.173-184
    • /
    • 2024
  • The connected car services are one of the most widely used services in the Internet of Things environment, and they provide numerous services to existing vehicles by connecting them through networks inside and outside the vehicle. However, although vehicle manufacturers are developing services considering the means to secure the connected car services, concerns about the security of the connected car services are growing due to the increasing number of attack cases. In this study, we reviewed the research related to the connected car services that have been announced so far, and we identified the threats that may exist in the connected car services through security threat modeling to improve the fundamental security level of the connected car services. As a result of performing the test to the applications for connected car services developed by four manufacturers, we found that all four companies' applications excessively requested unnecessary permissions for application operation, and the apps did not obfuscate the source code. Additionally, we found that there were still vulnerabilities in application items such as exposing error messages and debugging information.

A Study on the Trend of Technology Development Related to Smart Car Security ; Based on Patent Analysis (특허분석을 통한 국내외 스마트카 보안 기술개발 동향 연구)

  • Lee Kang Hyun;Jung Yu Han
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.147-159
    • /
    • 2022
  • This study conducted a patent analysis to explore the trend of technology development in the field of smart car security. As a result of the analysis, it was confirmed that along with the growth of the smart car market, the development of smart car security related technology is also increasing. In particular, as related technology development has been rapidly taking place in recent years, it has been confirmed that competition among leading smart car countries and major companies is also expanding due to the commercialization of smart car. This study is meaningful in that it examines trends related to smart car security through quantitative analysis using patent data and presents implications accordingly.

Smart Vehicle Security Vulnerability Analysis and Solution Support (스마트 자동차 네트워크의 보안취약점 분석 및 해결방안 마련)

  • Kim, Jin-Mook;Moon, Jeong-Kyung;Hwang, Deuk-Young
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.69-76
    • /
    • 2018
  • One of the most remarkable technologies in the era of the 4th industrial revolution is the interest in the field of smart cars. In the near future, it will not only be possible to move to a place where you want to ride a smart car, but smart cars, including artificial intelligence elements, can avoid sudden car accidents. However, as the field of smart automobiles develops, the risks are expected to increase. Therefore, based on the understanding of security vulnerabilities that may occur in smart car networks, we can apply safe information security technology using FIDO and attribute-based authorization delegation technique to provide smart car control technology that is safe and secure. I want to. In this paper, we show that the proposed method can solve security vulnerabilities by using secure smart car control technology. We will further study various proposals to solve security vulnerabilities in the field of smart car networks through future research.

  • PDF

A study on detection methodology of threat on cars from the viewpoint of IoT (IoT 관점에서의 차량 위협 탐지 방안)

  • Kwak, Byung Il;Han, Mi Ran;Kang, Ah Reum;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.411-421
    • /
    • 2015
  • These days, a conversion of the fast-advancing ICT (Information and Communications Technologies) and the IoT (Internet of Things) has been in progress. However, these conversion Technology could lead to many of the security threat existing in the ICT environment. The security threats of car in the IoT environment could cause the property damage and casualty. There are the inadequate preparations for the car security and the difficulty of detection for the security threats by itself. In this paper, we proposed the decision-making framework for the anomaly detection and found out what are the threats of car in the IoT environment. The discrimination of the factor, path and type of threats from the attack against the car should take priority over the self-inspection and the swift handling of the attack on control system.

Enhancing of Security Ethics Model base on Scenario in Future Autonomous Vehicle Accident (미래 자율주행 자동차 사고에서 시나리오 기반의 보안 윤리 모델 연구)

  • Park, Wonhyung
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.105-112
    • /
    • 2018
  • Along with the recent technological development, autonomous vehicles are being commercialized. but The accident of autonomous driving car is becoming an issue, and safety problem of autonomous driving car is becoming a hot topic. Also There are currently no specific guidelines for clear laws and security ethics. These guidelines require a lot of information and experience. This study establishes basic guidelines based on cases of accidents from past to present. This study suggests security considerations through case study of security ethics in autonomous car accident.

  • PDF

Analyzing of connected car vulnerability and Design of Security System (커네티트 카의 취약점 분석 및 보안 시스템 설계)

  • Kim, Tae-Hyoung;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.241-243
    • /
    • 2016
  • In the Past, Trend of car security was Physical Something like doorlock system, and The Generation did not have skills connecting External devices. Through Car Development is up, that trend of car security Changed Physical Security to Intelligence Security. This Changes give a chance to hackers to attack this system. This System use CAN(Controller Area Network) Protocol which have three vulnerabilities. First, ID Spoofing, Twice, D - Dos Attack, Third, Android Application Injected Modern cars have many ECU(Electronic Control Unit) to control devices like Engine ON/OFF, Door Lock Handling, and Controlling Handle. Because CAN Protocol spread signal using broadcast, Hackers can get the signal very easily, and Those often use Mobile devices like Android or IOS to attack this system. if bluetooth signal is spread wide, hackers get the signal, and analysis the bluetooth data, so then They makes certain data to attack ECU, they send the data to ECU, and control ECU installed car. so I suggest that I will prevent this attack to make Auth system and prevent this attack in end of Android.

  • PDF

Unveiling a Website Development for Car Inquiry

  • Loay F. Hussein;Islam Abdalla Mohamed Abass;Anis Ben Aissa;Mishaal Hammoud Al-Ruwaili
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.111-125
    • /
    • 2023
  • Due to the car's central role in modern life, the industry has become more fiercely competitive, with each manufacturer doing everything it can to attract buyers with features like plush interiors, comprehensive warranties, and helpful customer service departments. Customers may not have the luxury of buying a new car, so they will have to buy a used car. Nevertheless, in most cases, the customer (car driver) may be deceived about the vehicle information and history and thus will be confused in making his/her decision to purchase. In addition, after all attempts to obtain vehicle information (plate number, model, year of manufacture, number of maintenance times, accidents, etc.), the customer's many attempts may fail. In general, the government records and verifies the information of all cars, even those that pass through their borders. However, there might still be some trouble in obtaining this information. From this standpoint, we will design a website that makes it easier for car drivers, car companies and governments to carry out all the above-mentioned processes. It will also allow users, whether a driver or a car company, to inquire about all vehicle information through detailed and integrated reports on its condition since its entry into the Kingdom of Saudi Arabia until the present time, in addition to information supported by numbers and statistics to ensure the integrity and reliability of the information. This platform will save the trouble of searching for car information for drivers and car companies. It will also help governments keep track of the information of all cars entering and leaving the Kingdom of Saudi Arabia, which will contribute to facilitating the process of viewing the history of any car that has previously entered the Kingdom's borders.

A Study of a Secure Smart Car System using Attribute-based Delegation Method (속성 기반 권한위임 관리 기법을 사용한 스마트 자동차 안전성 검토에 관한 연구)

  • Kim, Jin-Mook;Moon, Jeong-Kyung;Hwang, Deuk-Young
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.71-79
    • /
    • 2019
  • The demand of smart cars is increasing rapidly. International stand organize such as 3GPP and 5GAA are proposing standard communication protocvols for connected-car, and automotive network infrastructure. But Smart car network have many security threats and more dangerous against the existed wire communication network. Typically, peripheral devices of a smart car may disguise their identity and steal location information and personal information about the vehicle. In addition, the infrastructure elements around smart cars can conspire and put driving cars in danger, threatening lives. This is a very serious security threat. Therefore, in order to solve these problems, we proposed a system that is secure from collusion and tampering attacks using attribute-based authorize delegation method and threshold encryption algorithms. We have demonstrated using a semantic safety model that the proposed system can be safe from collusion attack.

Theft Protection using CAN Communication for the CAR AV system (CAN Communication을 이용한 CAR AV System 도난 방지 기능 구현에 관한 연구)

  • Park, Min-Su;Chung, Ki-Hyun
    • Proceedings of the IEEK Conference
    • /
    • 2007.07a
    • /
    • pp.165-166
    • /
    • 2007
  • This paper proposes an algorithm to improve the anti-theft function of the CAR_AV using the CAN(Controller Area Network) communication between CAR AV and cluster. Compare to the typical anti-theft algorithms like security code entering, the proposed one is more secure in most cases. The proposed algorithm is suitable for the recent automobile that employ the CAN network as the communication channel between their devices.

  • PDF

Related Carriage and Facility Management Service Quality Systems (운송 및 시설관리 서비스 관련 품질시스템)

  • Choi, Sung-Woon
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2007.11a
    • /
    • pp.475-480
    • /
    • 2007
  • This paper introduces service quality systems such as furniture removal for households, carriage of parcels, commercial motorcycle carriage service, the service for warehousing, car rental services, exhibition service, security service, and, facility management services. These service quality systems include terminology, process, and, infrastructure.

  • PDF