• Title/Summary/Keyword: Car Security

Search Result 151, Processing Time 0.024 seconds

Risk Analysis for Protecting Personal Information in IoT Environments (사물인터넷(IoT) 환경에서의 개인정보 위험 분석 프레임워크)

  • Lee, Ae Ri;Kim, Beomsoo;Jang, Jaeyoung
    • Journal of Information Technology Services
    • /
    • v.15 no.4
    • /
    • pp.41-62
    • /
    • 2016
  • In Internet of Things (IoT) era, more diverse types of information are collected and the environment of information usage, distribution, and processing is changing. Recently, there have been a growing number of cases involving breach and infringement of personal information in IoT services, for examples, including data breach incidents of Web cam service or drone and hacking cases of smart connected car or individual monitoring service. With the evolution of IoT, concerns on personal information protection has become a crucial issue and thus the risk analysis and management method of personal information should be systematically prepared. This study shows risk factors in IoT regarding possible breach of personal information and infringement of privacy. We propose "a risk analysis framework of protecting personal information in IoT environments" consisting of asset (personal information-type and sensitivity) subject to risk, threats of infringement (device, network, and server points), and social impact caused from the privacy incident. To verify this proposed framework, we conducted risk analysis of IoT services (smart communication device, connected car, smart healthcare, smart home, and smart infra) using this framework. Based on the analysis results, we identified the level of risk to personal information in IoT services and suggested measures to protect personal information and appropriately use it.

Development of Software-Defined Perimeter-based Access Control System for Security of Cloud and IoT System (Cloud 및 IoT 시스템의 보안을 위한 소프트웨어 정의 경계기반의 접근제어시스템 개발)

  • Park, Seung-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.2
    • /
    • pp.15-26
    • /
    • 2021
  • Recently, as the introduction of cloud, mobile, and IoT has become active, there is a growing need for technology development that can supplement the limitations of traditional security solutions based on fixed perimeters such as firewalls and Network Access Control (NAC). In response to this, SDP (Software Defined Perimeter) has recently emerged as a new base technology. Unlike existing security technologies, SDP can sets security boundaries (install Gateway S/W) regardless of the location of the protected resources (servers, IoT gateways, etc.) and neutralize most of the network-based hacking attacks that are becoming increasingly sofiscated. In particular, SDP is regarded as a security technology suitable for the cloud and IoT fields. In this study, a new access control system was proposed by combining SDP and hash tree-based large-scale data high-speed signature technology. Through the process authentication function using large-scale data high-speed signature technology, it prevents the threat of unknown malware intruding into the endpoint in advance, and implements a kernel-level security technology that makes it impossible for user-level attacks during the backup and recovery of major data. As a result, endpoint security, which is a weak part of SDP, has been strengthened. The proposed system was developed as a prototype, and the performance test was completed through a test of an authorized testing agency (TTA V&V Test). The SDP-based access control solution is a technology with high potential that can be used in smart car security.

A Study on Reliability Improvement of Traffic Information by Integrating Security and Traffic AVI Data (방범-교통 AVI의 통합 DB를 활용한 교통정보 신뢰성 개선방안 연구)

  • Park, Han-Young;Kim, Gyeong-Seok;Kang, So-Jeong
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.11 no.5
    • /
    • pp.78-88
    • /
    • 2012
  • AVIs on the road are installed for (1) security (2) and for traffic, and they are various managed by (1) police department, (2) local government, (3) national highway management, (4) Korean highway corporation. But although the collected data of the plate number, the travel time, the picture of the car are same, they are used in purposes of its installation because the managements are different and the data are difficult to be connected with each other. For this reason, this study is to appraise the application for creating traffic information by integrating these data, and to suggest the introduction of spatial detection system which integrated security-traffic AVI DB for the purpose of reliability improvement of center's velocity. The estimating sections of link travel information seems to be expanded, and the error rate between the center's velocity and the experimental value will be reduced if integrated DB of traffic and security AVIs is used for creating traffic information. Also, the crime prevention and arrest rate is expected to rise in the future.

A Suggestion on the Traffic Flagger System in Japan (일본 교통유도 경비제도의 시사점)

  • Kim, Il-Gon
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2010.05a
    • /
    • pp.200-203
    • /
    • 2010
  • The obstructive factors of the smoothly running traffic are street improvement, major commercial buildings like department stores, the large markets, the stadiums, the concert buildings, a lot of steady cars for using parking lot. The accident of cost many lives and traffic congestion from these factors cause the result that it enables to pay the enormous expenditure socially and financially. For solving these problems, Japan adopts the Traffic Flagger System in 1972. This task has the effects of improving traffic flow in the traffic jam and mitigating risk of car accidents as leading pedestrians and vehicles thereby the task carries into effect in the area where the accident took place. Moreover, this security task is rapid growth after adopting and 59.6%(5,317) of the whole security company 8,924 in Japan based on December 2009 registered as the traffic leading security business. While South Korea is demanded of the measures about obstructive factors of the smoothly running traffic, it represents the limitation of the system and the safety management. Thus the current study suggests the we will analyze South Korea's actual condition and then discuss the law and education system for a realizable plan reached the public-Private cooperation for adopting Japan's Traffic Leading Security System.

  • PDF

Proposal of New Data Processing Function to Improve the Security of Self-driving Cars' Systems (자율주행 자동차의 시스템 보안 향상을 위한 새로운 데이터처리 기능 제안)

  • Jang, Eun-Jin;Shin, Seung-Jung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.4
    • /
    • pp.81-86
    • /
    • 2020
  • With the development of the intelligent Internet of Things AIoT that goes beyond the IoT of the Internet of Things, the industry is changing overall. In addition, with the advent of the 4th Industrial Revolution, revolutionary changes and developments are also taking place in the automobile industry. A representative example is "autonomous driving vehicle". Because the domestic and foreign interests in autonomous vehicles have increased, many developments have been made, and although limited, they have developed into the commercialization stage. However, the structure of the autonomous vehicle that collects, analyzes, and controls data using various sensors installed in the vehicle, not the driver, is often insufficiently exposed to hacking due to the lack of multiplexed devices for security. In this case, as this can be a threat not only to the driver, but also to the surrounding environment, this paper proposes a new data processing function to improve the system security of autonomous vehicles.

Analysis of Residential Location Preference Factors by Characteristics of Households in the Case of Daegu.Gyeongbuk Households (대구.경북 가구의 가구특성별 주거입지 선호요인 분석)

  • Park, Wonseok
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.17 no.4
    • /
    • pp.702-717
    • /
    • 2014
  • The purpose of this paper is to analyze the residential location preference factors by households' characteristics in the case of Daegu Gyeongbuk households. Under this research purpose, firstly, questionnaire survey of Daegu Gyeongbuk was done, and nextly, AHP(Analytic Hierachy Process) with questionnaire survey results was analyzed. The main results of this study are as follows. Firstly, residential location factors most preferred by Daegu Gyeongbuk households is capital gain, followed by living environment, accessibility of public transportation, accessibility of private car traffic and security. Therefore, we can see Daegu Gyeongbuk households prefer investment value and living amenity together as residential location factors. Secondly, according to the results of AHP by age, below 30th prefer accessibility factors, 40th prefer capital gain and school district factors, and above 50th prefer living environment, natural environment and security factors, relatively. Thirdly, according to the results of AHP by household income, low income households prefer living environment and accessibility factors, middle income households prefer capital gain and accessibility factors, and high income households prefer security, accessibility of private car traffic and view/sunlight factors, relatively.

  • PDF

A Privacy Preserving Efficient Route Tracing Mechanism for VANET (VANET에서 프라이버시를 보호하는 효율적인 경로 추적 방법)

  • Lee, Byeong-Woo;Kim, Sang-Jin;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.53-62
    • /
    • 2010
  • In VANETs (Vehicular Ad hoc NETwork), conditional anonymity must be provided to protect privacy of vehicles while enabling authorities to identify misbehaving vehicles. To this end, previous systems provide a mechanism to revoke the anonymity of individual messages. In VANET, if we can trace the movement path of vehicles, it can be useful in determining the liability of vehicles in car accidents and crime investigations. Although route tracing can be provided using previous message revocation techniques, they violate privacy of other vehicles. In this paper, we provide a route tracing technique that protects privacy of vehicles that are not targeted. The proposed method can be employed independently of the authentication mechanism used and includes a mechanism to prevent authorities from abusing this new function.

Neural Network and Cloud Computing for Predicting ECG Waves from PPG Readings

  • Kosasih, David Ishak;Lee, Byung-Gook;Lim, Hyotaek
    • Journal of Multimedia Information System
    • /
    • v.9 no.1
    • /
    • pp.11-20
    • /
    • 2022
  • In this paper, we have recently created self-driving cars and self-parking systems in human-friendly cars that can provide high safety and high convenience functions by recognizing the internal and external situations of automobiles in real time by incorporating next-generation electronics, information communication, and function control technologies. And with the development of connected cars, the ITS (Intelligent Transportation Systems) market is expected to grow rapidly. Intelligent Transportation System (ITS) is an intelligent transportation system that incorporates technologies such as electronics, information, communication, and control into the transportation system, and aims to implement a next-generation transportation system suitable for the information society. By combining the technologies of connected cars and Internet of Things with software features and operating systems, future cars will serve as a service platform to connect the surrounding infrastructure on their own. This study creates a research methodology based on the Enhanced Security Model in Self-Driving Cars model. As for the types of attacks, Availability Attack, Man in the Middle Attack, Imperial Password Use, and Use Inclusive Access Control attack defense methodology are used. Along with the commercialization of 5G, various service models using advanced technologies such as autonomous vehicles, traffic information sharing systems using IoT, and AI-based mobility services are also appearing, and the growth of smart transportation is accelerating. Therefore, research was conducted to defend against hacking based on vulnerabilities of smart cars based on artificial intelligence blockchain.

Vibration Measurements in the Mining Industry Applying the Software Install Application to the Kosovo Energy Corporation

  • Luzha, Ibush;Baftiu, Naim;Maloku, Betim;Qarkaxhija, Jusuf
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.362-370
    • /
    • 2022
  • The assessment of specific impacts on the environment is a preventive measure for environmental protection which is based on the definition and proposal of measures that can prevent harmful effects, reduce or eliminate them. In the physical sense, vibration is the oscillating motion of an object with the effect of internal or external forces applied to it. People who touch a vibrating surface or object will feel these vibrations. In general, there are two types of vibration exposure. The first are the vibrations of the hands and arms transmitted by the held parts of tools or machinery. The second are whole-body vibrations transmitted from a seat or surface to a motorized car. The risk of injury to workers exposed to vibration varies depending on the size, frequency, type, duration of exposure, and organ affected. The purpose of this paper is to review the measurements of vibrations in the Kosovo Energy Corporation in the mine Sibovc Southwest, where coal with a rotary excavator is exploited and the evaluation of vibrations for working conditions for workers working in that environment and improving working conditions for the measurement of vibrations we have used the device Minimate DS 078, the purpose of such environmental impact assessment is to collect data and predict the harmful impacts on the environment, namely the impact on water, air, soil, life and health of as well as identify and propose measures that could prevent, reduce or eliminate altogether.

Marketing to Competitors' Customers using Agent based Modelling and Simulation Driven Strategy

  • Beyari, Hasan
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.297-304
    • /
    • 2021
  • In a duopoly situation, one firm can gain competitive advantage by attracting the price-sensitive customers from its competitor leading to higher profits through higher sale revenue for the competing company. A simulation study in which there are two electric car manufacturers with agent based modelling was conducted in order to verify this contention. The first step consisted of defining the baseline. Simulations of 1000 times and agent-based modelling were conducted with the assumption that company 1 reduced its price to the maximum of 20% thereby contributing to the switch-over of a maximum of 40% of the price sensitive customers of company 2. The results of 1000 simulations and agent-based modelling highlighted that price reduction by company 1 resulted in a significant increase in the number of customers, presumably due to switch-over from company 2 and there was a corresponding increase in revenues from both of the sales avenues. Thus, Company 1 achieved competitive advantage by marketing its cars to the customers of Company 2 using price reduction strategy to attract them. This study has ramifications for companies that aim to sway the price sensitive customers from a competitor.