• Title/Summary/Keyword: Connected vehicles

Search Result 227, Processing Time 0.031 seconds

Measures for Automaker's Legal Risks from Security Threats in Connected Car Development Lifecycle

  • Kim, Dong Hee;Baek, Seung Jo;Lim, Jongin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.865-882
    • /
    • 2017
  • To improve passenger convenience and safety, today's vehicle is evolving into a "connected vehicle," which mounts various sensors, electronic control devices, and wired/wireless communication devices. However, as the number of connections to external networks via the various electronic devices of connected vehicles increases and the internal structures of vehicles become more complex, there is an increasing chance of encountering issues such as malfunctions due to various functional defects and hacking. Recalls and indemnifications due to such hacking or defects, which may occur as vehicles evolve into connected vehicles, are becoming a new risk for automakers, causing devastating financial losses. Therefore, automakers need to make voluntary efforts to comply with security ethics and strengthen their responsibilities. In this study, we investigated potential security issues that may occur under a connected vehicle environment (vehicle-to-vehicle, vehicle-to-infrastructure, and internal communication). Furthermore, we analyzed several case studies related to automaker's legal risks and responsibilities and identified the security requirements and necessary roles to be played by each player in the automobile development process (design, manufacturing, sales, and post-sales management) to enhance their responsibility, along with measures to manage their legal risks.

Certificate Revocation in Connected Vehicles

  • Sami S. Albouq
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.13-20
    • /
    • 2023
  • In connected vehicles, drivers are exposed to attacks when they communicate with unauthenticated peers. This occurs when a vehicle relies on outdated information resulting in interactions with vehicles that have expired or revoked certificates claiming to be legitimate nodes. Vehicles must frequently receive or query an updated revoked certificate list to avoid communicating with suspicious vehicles to protect themselves. In this paper, we propose a scheme that works on a highway divided into clusters and managed by roadside units (RSUs) to ensure authenticity and preserve hidden identities of vehicles. The proposed scheme includes four main components each of which plays a major role. In the top hierarchy, we have the authority that is responsible for issuing long-term certificates and managing and controlling all descending intermediate authorities, which cover specific regions (e.g., RSUs) and provide vehicles with short-term pseudonyms certificates to hide their identity and avoid traceability. Every certificate-related operation is recorded in a blockchain storage to ensure integrity and transparency. To regulate communication among nodes, security managers were introduced to enable authorization and access right during communications. Together, these components provide vehicles with an immediately revoked certificate list through RSUs, which are provided with publish/subscribe brokers that enable a controlled messaging infrastructure. We validate our work in a simulated smart highway environment comprising interconnected RSUs to demonstrate our technique's effectiveness.

Analysis of Intelligent Vehicle Control Methods for CIM at Non-signalized Intersections (비 신호 교차로에서 CIM을 위한 지능형 차량 제어기법 분석)

  • Joo, Hyunjin;Lim, Yujin
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.2
    • /
    • pp.33-40
    • /
    • 2018
  • There are lots of literature about connected car system from industry and academia. The connected car is a smart car integrated with IT technology that is connected to people, vehicles and traffic management systems. It is important to V2I (vehicle to infrastructure) communication which is the connection between the vehicle and the infrastructure. CIM (cooperative intersection management) is a device to manage the communication between vehicle and infrastructure. In this paper, we analyze two intelligent vehicle control methods using CIM at non-signalized intersections. In the first method, a vehicle to pass through intersection needs to reserve a resource of intersection. In the second method, trajectory patterns on pre-planned vehicles are classified to pass through intersection. We analyze case studies of two methods to be implemented by DP(dynamic programming) and ACO(ant colony optimization) algorithms. The methods can be reasonably improved by placing importance on vehicles or controlling speeds of vehicles.

Study on Improvement of Connected Vehicles Interface Board and Transition Algorithm of Digital Traffic Signal Controller for Autonomous Vehicles and C-ITS (자율주행차 및 C-ITS 지원을 위한 디지털 교통신호 제어기의 신호정보연계장치 및 전이 알고리즘 개선 연구)

  • Ko, Sejin;Choi, Eunjin;Gho, Gwang-Yong;Han, Eum;Yun, Ilsoo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.20 no.2
    • /
    • pp.15-29
    • /
    • 2021
  • The signal intersection is the most challenging space for autonomous vehicles. To promote the safe driving of autonomous vehicles on urban roads with traffic signals, autonomous vehicles need to receive traffic signal information from infrastructure through V2I communication. Thus, a protocol for providing traffic signal information was added to the standard traffic signal controller specification of the National Police Agency. On the other hand, there are technical limitations when applying this to digital traffic signal controllers because the protocols are defined mainly for analog traffic signal controllers. Therefore, this study proposes developing a signal information linkage module to provide traffic signal information from a digital traffic signal controller to an autonomous vehicle and an algorithm improvement method that can provide accurate traffic signal information at the time of traffic signal transition.

A Development of Semantic Connected Service between Vehicles and Things for IoV (차량 인터넷 기술을 위한 시맨틱 차량-사물 연결 서비스 구현)

  • Ryu, Minwoo;Cha, Siho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.4
    • /
    • pp.27-33
    • /
    • 2018
  • The recent efforts in academia and industry represent a paradigm shift that will extend the IoT from the home environment so that it is interoperable with the Internet of Vehicles (IoV). IoV is a special kind of IoT. It allows to connect between vehicle and things located in infrastructure. Furthermore, IoV enable to create new intelligent services through collaboration with existing various services such as smart city and connected home. In this paper, we develop a service in order to realize IoV. To this end, we design a novel vehicle service platform which could automatical controlling the IoT device according to drivers' voice. To show practical usability of our proposed platform, we develop a prototype service could be call car-to-thing (C2T). We expect that our proposed platform could eventually contribute to realizing IoV.

Tasks to Improve the Legal System in Response to Deployment of Connected Autonomous Vehicles (자율협력주행 상용화촉진을 위한 법제개선 과제)

  • Cho, Yonghyuk;Kim, SunA
    • Journal of Auto-vehicle Safety Association
    • /
    • v.13 no.4
    • /
    • pp.81-91
    • /
    • 2021
  • Last year, the Autonomous Vehicle Act was enacted to respond to deployment of autonomous vehicles. But the Act stipulates the operation of autonomous vehicle pilot zones, In addition, in order to analyze autonomous vehicle accidents and establish a reasonable damage compensation system, the Automobile Damage Compensation Guarantee Act was revised. But, It is necessary to seek plans for institutional development such as detailed concepts of self-driving cars and driving, a security certification system for securing safety of autonomous cooperative driving, and enhancement of the effectiveness of special cases related to personal information processing. I would like to seek ways to improve the legal system to respond reasonably to the deployment of autonomous vehicles.

Development of Radar-enabled AI Convergence Transportation Entities Detection System for Lv.4 Connected Autonomous Driving in Adverse Weather

  • Myoungho Oh;Mun-Yong Park;Kwang-Hyun Lim
    • International journal of advanced smart convergence
    • /
    • v.12 no.4
    • /
    • pp.190-201
    • /
    • 2023
  • Securing transportation safety infrastructure technology for Lv.4 connected autonomous driving is very important for the spread of autonomous vehicles, and the safe operation of level 4 autonomous vehicles in adverse weather has limitations due to the development of vehicle-only technology. We developed the radar-enabled AI convergence transportation entities detection system. This system is mounted on fixed and mobile supports on the road, and provides excellent autonomous driving situation recognition/determination results by converging transportation entities information collected from various monitoring sensors such as 60GHz radar and EO/IR based on artificial intelligence. By installing such a radar-enabled AI convergence transportation entities detection system on an autonomous road, it is possible to increase driving efficiency and ensure safety in adverse weather. To secure competitive technologies in the global market, the development of four key technologies such as ① AI-enabled transportation situation recognition/determination algorithm, ② 60GHz radar development technology, ③ multi-sensor data convergence technology, and ④ AI data framework technology is required.

A Bidirectional Three-level DC-DC Converter with a Wide Voltage Conversion Range for Hybrid Energy Source Electric Vehicles

  • Wang, Ping;Zhao, Chendong;Zhang, Yun;Li, Jing;Gao, Yongping
    • Journal of Power Electronics
    • /
    • v.17 no.2
    • /
    • pp.334-345
    • /
    • 2017
  • In order to meet the increasing needs of the hybrid energy source system for electric vehicles, which demand bidirectional power flow capability with a wide-voltage-conversion range, a bidirectional three-level DC-DC converter and some control strategies for hybrid energy source electric vehicles are proposed. The proposed topology is synthesized from Buck and Boost three-level DC-DC topologies with a high voltage-gain and non-extreme duty cycles, and the bidirectional operation principle is analyzed. In addition, the inductor current ripple can be effectively reduced within the permitted duty cycle range by the coordinated control between the current fluctuation reduction and the non-extreme duty cycles. Furthermore, benefitting from duty cycle disturbance control, series-connected capacitor voltages can also be well balanced, even with the discrepant rise and fall time of power switches and the somewhat unequal capacitances of series-connected capacitors. Finally, experiment results of the bidirectional operations are given to verify the validity and feasibility of the proposed converter and control strategies. It is shown to be suitable for hybrid energy source electric vehicles.

Effect of Harmonics and High-Frequency on OLEV System in Distribution Power System (온라인 전기자동차 시스템의 고조파 및 고주파가 배전계통에 미치는 영향에 관한 연구)

  • Choi, Seong-Ho;Huh, Jae-Sun;Han, Woon-Ki;Kim, Jae-Chul
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.63 no.6
    • /
    • pp.738-745
    • /
    • 2014
  • Recently, various measures have been discussed for overcoming depletion of fossil fuels and environmental pollution. One of the measures is electric vehicles. But electric vehicles has some limitations from high cost of battery and low efficiency, so operation distance of electric cars is limited. Also there are difficulties that charging lines should be connected by an electric car whenever it charges. Thus, many studies have been conducted to overcome the limitation using conventional batteries of electric vehicles. As a result, the OLEV(On-Line Electric Vehicle) was developed. But the OLEV system is some limitations. The OLEV system causes power quality problems when it charges. Power quality problem cannot be ignored because OLEV systems are closely connected by distribution grids. In this paper, the OLEV system is designed by using PSCAD/EMTDC, and the power quality is measured and evaluated. Power quality is divided by two cases; harmonics and high-frequency. Harmonics were evaluated according to IEEE Std. 519-1992. But the evaluation of High-frequency could not take it because there was no standard. For this reason, the data measured by OLEV system was compared with the EN50065 regulation.

Security Threat Analysis for Remote Monitoring and Control Functions of Connected Car Services

  • Jin Kim;Jinho Yoo
    • Journal of Information Processing Systems
    • /
    • v.20 no.2
    • /
    • pp.173-184
    • /
    • 2024
  • The connected car services are one of the most widely used services in the Internet of Things environment, and they provide numerous services to existing vehicles by connecting them through networks inside and outside the vehicle. However, although vehicle manufacturers are developing services considering the means to secure the connected car services, concerns about the security of the connected car services are growing due to the increasing number of attack cases. In this study, we reviewed the research related to the connected car services that have been announced so far, and we identified the threats that may exist in the connected car services through security threat modeling to improve the fundamental security level of the connected car services. As a result of performing the test to the applications for connected car services developed by four manufacturers, we found that all four companies' applications excessively requested unnecessary permissions for application operation, and the apps did not obfuscate the source code. Additionally, we found that there were still vulnerabilities in application items such as exposing error messages and debugging information.