• Title/Summary/Keyword: Car Security

Search Result 151, Processing Time 0.03 seconds

Channel Transfer Function estimation based on Delay and Doppler Profiler for 5G System Receiver targeting 500km/h linear motor car

  • Suguru Kuniyoshi;Shiho Oshiro;Gennan Hayashi;Tomohisa Wada
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.121-127
    • /
    • 2023
  • A 500 km/h linear motor high speed terrestrial transportation service is planned to launch 2027 in Japan. In order to support 5G service in the train, the Sub-carrier spacing frequency of 30 kHz is planned to be used instead of common 15 kHz sub-carrier spacing to mitigate Doppler effect in such high-speed transportation. In addition, to increase the cell size of 5G mobile system, plural Base Station antenna will transmit the identical Down Link (DL) signal to form the expanded cell size along the train rail. In this situation, forward and backward antenna signals will be Doppler shifted by reverse direction respectively and the receiver in the train might suffer to estimate accurate Channel Transfer Function (CTF) for its demodulation. In this paper, Delay and Doppler Profiler (DDP) based Channel Estimator is proposed and it is successfully implemented in signal processing simulation system. Then the simulated performances are compared with the conventional Time domain linear interpolated estimator. According to the simulation results, QPSK modulation can be used even under severe channel condition such as 500 km/h, 2 path reverse Doppler Shift condition, although QPSK modulation can be used less than 200 km/h with conventional Channel estimator.

Research of generate a test case to verify the possibility of external threat of the automotive ECU (차량 ECU의 외부 위협성 가능성을 검증하기 위한 테스트 케이스 생성 연구)

  • Lee, Hye-Ryun;Kim, Kyoung-Jin;Jung, Gi-Hyun;Choi, Kyung-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.9
    • /
    • pp.21-31
    • /
    • 2013
  • ECU(Electric Control Unit) on the important features of the vehicle is equipped, ECU between sending and receiving messages is connected to one of the internal network(CAN BUS), but this network easily accessible from the outside and not intended to be able to receive attacks from an attacker, In this regard, the development of tools that can be used in order to verify the possibility of attacks on attacks from outside, However, the time costs incurred for developing tools and time to analyze from actual car for CAN messages to be used in the attack to find. In this paper, we want to solve it, propose a method to generate test cases required for the attack is publicly available tool called Sulley and it explains how to find the CAN messages to be used in the attack. Sulley add the CAN messages data generated library files in provided library file and than Sulley execute that make define and execute file conform to the CAN communication preferences and create message rules. Experiments performed by the proposed methodology is applied to the actual car and result, test cases generated by the CAN messages fuzzing through Sulley send in the car and as a result without a separate tool developed was operating the car.

DSRC Strategy and Future ITS (DSRC 전략과 향후의 ITS)

  • Park In-Gyu
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.9 s.351
    • /
    • pp.105-119
    • /
    • 2006
  • The car navigation system to be accompanied to the car on-board equipment system or the development of mobile communication technique, the demand in information communication which connects an interior and the car outside is coming to be high, As applications, ETC/VISC/AHS classes get deceived supply are advanced. The research of DSRC radio systems actively, with medium of communication between the automobile and road, is advanced. DSRC radio systems are appropriate in massive data transfer, in the case which the traffic accident evasion is urgent, the notarization of the preferential control function which is necessary to a medium of communication, guarantee and security are suitable in the high-speed network. Accompanied to the cellular phone which is to be supplied recently suddenly, By complementing and coexisting each other, and it will be developed simultaneously. However, in a connection of this kind of communication system and high-speed DSRC radio system, Hand-over technique (network, radio transmission hand-over), there is a technical subject of the high-speed transmission techniques against the mobile devices and the realization is expected to be difficult in near, until 2010 year is becoming the plan of putting to practical use. Also as the next generation DSRC with 5.8GHz built-on board equipment and the road-side equipment are expected in near. In this paper DSRC systems which will be developed are discussed.

Design of Area-efficient Feature Extractor for Security Surveillance Radar Systems (보안 감시용 레이다 시스템을 위한 면적-효율적인 특징점 추출기 설계)

  • Choi, Yeongung;Lim, Jaehyung;Kim, Geonwoo;Jung, Yunho
    • Journal of IKEEE
    • /
    • v.24 no.1
    • /
    • pp.200-207
    • /
    • 2020
  • In this paper, an area-efficient feature extractor was proposed for security surveillance radar systems and FPGA-based implementation results were presented. In order to reduce the memory requirements, features extracted from Doppler profile for FFT window-size are used, while those extracted from total spectrogram for frame-size are excluded. The proposed feature extractor was design using Verilog-HDL and implemented with Xilinx Zynq-7000 FPGA device. Implementation results show that the proposed design can reduce the logic slice and memory requirements by 58.3% and 98.3%, respectively, compared with the existing research. In addition, security surveillance radar system with the proposed feature extractor was implemented and experiments to classify car, bicycle, human and kickboard were performed. It is confirmed from these experiments that the accuracy of classification is 93.4%.

An Implementation Method of HB-Family Light-weight Authentication for Device Authentication between ECU (ECU간 기기인증을 위한 HB-Family 경량인증기법의 적용 방법)

  • Kim, Tae Su;Kim, Hyoseung;Woo, Samuel;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.593-607
    • /
    • 2013
  • The In-Vehicle-Networking(IVN) of modern cars is constituted by an small electronic control device called ECU. In the past, there was no way to be able to access the IVN of a driving car. so IVN has been recognized as a closed environment so there is no need to exist authentication protocol between devices which are to configure the internal network and to communicate with other devices. However, constant improvements made it possible to access the IVN in many different ways as the communication technology evolves. This possibility created a need for device authentication in IVN. HB-Family are representative authentication schemes in RFID environment which has similar restrictions to IVN. In this paper, we propose an implementation method of HB-Family for device authentication between ECU considering ECU has low computing power and the message field of CAN protocol has restricted size of 8 bytes. In order to evaluate the efficiency and availability of the authentication schemes adopted our method, we have evaluated the performance based on DSP-28335 device. Further, it was possible to improve the efficiency rate of at lest 10%, up to 36%, and we then analyze this result in various aspects of the IVN.

Implementation of Patient Supervision System Using USN and Healthcare board (USN과 헬스 케어 보드를 이용한 환자 감시 시스템 구현)

  • Lee, Cheol-Hee;Lee, Sand-Hoi
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.141-142
    • /
    • 2008
  • According as USN's application field is magnified, various results are appearing. Efforts to apply this results in life are progressing. In car field, is used in control that level of significance is less. In home network, is used in a household electric appli-ance control and electric lamp control, security etc.. In factory, is used in process control, and is used in various application because is involved with RFID leader recently. In this paper, patient's status monitoring, USN use wish to. Because USN can utilize existent network, it is system that can transmit various data as that change passed information.Wish to send information that get in health-care board. Information that can get in health-care board is blood pressure, blood sugar, stroke, SPO2, ECG, the activity amount, position. Also, wish to forecast use possibility to involved various service, silver industry with database.

  • PDF

Production study of domestic railroad signal checking cycle (국내 철도신호 점검주기의 산출공식 연구)

  • Lee, Nam-Hyung;Lee, Soo-Hwan;Kim, Joung-Sun;Kim, Hyung-Chul;Lee, Gi-Chun
    • Proceedings of the KSR Conference
    • /
    • 2007.05a
    • /
    • pp.1685-1690
    • /
    • 2007
  • Wave and following checking cycle arbor in the mountains form that examine various theories that decide checking cycle and data and application possibility that can acquire actually were presented. If see in standpoint that breakdown detects singularity availability before change happening, problem is advanced how action of device may do ordinary times supervision (monitoring) or checking cycle. In checking cycle decision, situation of latency breakdown that can not know that cause breakdown before device that is using examines can exist. Example such as car examination, faur and equitable spirit health examination, security device etc. can be fatal the time. Therefore, study and examined arbor in the mountains room of family proper checking cycle.

  • PDF

A RF-ID System for Movement Data Collection under Drive (주행 중인 차량 운행 data 수집을 위한 RF-ID System)

  • Kim, Yong-Sang;Kim, Sang-Wook;Kim, Yang-Mo
    • Proceedings of the KIEE Conference
    • /
    • 2004.04a
    • /
    • pp.217-219
    • /
    • 2004
  • In recent years, the smart card is wifely applied for wireless communication, tracking, transportation logistics, diagnostic monitoring, access control and security. RF-ID system is universally applicable. Passive RF-ID system consists from reader and passive tag. The reader transmits energy and simple information to a tag by wireless and the power from the reader is transformed for controller, FRAM and Bluetooth module. in this paper, an analysis and design of smart card for the transmission of the car movement data is presented.

  • PDF

AI 음성인식 기반 차량 인포테인먼트 포렌식 기술 동향

  • Shin, Yeonghun;Kim, Minju;Jeong, Daan;Shon, Taeshik
    • Review of KIISC
    • /
    • v.29 no.6
    • /
    • pp.23-28
    • /
    • 2019
  • 최근의 차량 인포테인먼트 시스템은 모바일 네트워크 및 스마트폰과 연결하여 다양한 서비스를 제공한다. 과거에는 제조사에서 독자적으로 개발한 OEM 인포테인먼트 시스템이 주를 이뤘지만, Android Auto, Apple CarPlay, Amazon Echo Auto 등의 개방형 플랫폼 생태계가 구축됨에 따라 다양한 차량들이 AI 음성인식 기반 차량 인포테인먼트 시스템을 탑재하고 있다. 이러한 차량 내 인포테인먼트 시스템은 스마트폰과 연동되며, 사용자에 대한 방대한 정보를 저장하고 처리함으로써 사용자의 선호도에 따른 On-Demand 서비스 등 다양한 편리성을 제공한다. 하지만 사용자에 대한 다양한 정보를 차량에 연동하여 사용하는 만큼 개인정보 문제로 이어질 수 있다. 그렇기 때문에 차량 인포테인먼트 시스템은 스마트폰과 같이 포렌식 관점에서 많은 증거를 획득할 수 있는 매체가 된다. 더욱이 스마트폰과 연동되는 시스템이기에 기존 모바일 포렌식 기법을 적용할 수 있다. 따라서 본 논문에서는 차량 인포테인먼트 시스템을 대상으로 수행된 포렌식 연구 분석을 통해 기존 연구에서의 포렌식 기법과 보완점을 도출하고자 한다.

ECU Software Development for Encryption Transponder-type Immobilizer (인크립션 트랜스폰더 타입 이모빌라이져 ECU 소프트웨어 개발)

  • Choi, Ho-Jun;Lim, Dong-Jin
    • Proceedings of the KIEE Conference
    • /
    • 1998.07b
    • /
    • pp.669-671
    • /
    • 1998
  • Engine immobilizer is the automobile security system which disables the engine if the secrete code in the transponder embedded in the key knob is not in agreement with the code in ECU of the car. There are many types of immobilizer systems, however, the encryption transponder type system is the most secure system due to the code verification method using an encryption method. As an example of the industry-university cooperation, the software development in the system is introduced in this paper.

  • PDF