• Title/Summary/Keyword: In-Vehicle Communication

Search Result 1,739, Processing Time 0.03 seconds

Comparison of the Methodologies for Calculating Expressway Space Mean Speed Using Vehicular Trajectory Information from a Radar Detector (레이더검지기의 차량 궤적 정보를 이용한 고속도로 공간평균속도 산출방법 비교)

  • Han, Eum;Kim, Sang Beom;Rho, Jeong Hyun;Yun, Ilsoo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.15 no.3
    • /
    • pp.34-44
    • /
    • 2016
  • This study was initiated to evaluate the performance of methodologies to estimate the space mean speed(SMS) using the time mean speed(TMS) which was collected from the vehicle detection system(VDS) in expressways. To this end, the methodologies presented in prior studies were firstly summarized. It is very hard to achieve exact SMSs and TMSs due to mechanical and communication errors in the field. Thus, a microscopic traffic simulation model was utilized to evaluated the performance. As a result, the harmonic mean and volume-distance weighted harmonic mean were close to the SMS in the case in which the TMSs of individual vehicles were used. However, when the 30-second-interval aggregated TMS were used, the volume-distance weighted harmonic mean was outstanding. In this study, a radar detector was installed in the Joongbu expressway to collect the SMS. The trajectory of individual vehicles collected from the detector were used to calculate the SMS, which was compared with the estimates using other methodologies selected in this study. As a result, the volume-distance weighted mean was turned out to be close to the SMS. However, as the congestion becomes severe. the deviation between the two speed becomes bigger.

An Implementation Method of HB-Family Light-weight Authentication for Device Authentication between ECU (ECU간 기기인증을 위한 HB-Family 경량인증기법의 적용 방법)

  • Kim, Tae Su;Kim, Hyoseung;Woo, Samuel;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.593-607
    • /
    • 2013
  • The In-Vehicle-Networking(IVN) of modern cars is constituted by an small electronic control device called ECU. In the past, there was no way to be able to access the IVN of a driving car. so IVN has been recognized as a closed environment so there is no need to exist authentication protocol between devices which are to configure the internal network and to communicate with other devices. However, constant improvements made it possible to access the IVN in many different ways as the communication technology evolves. This possibility created a need for device authentication in IVN. HB-Family are representative authentication schemes in RFID environment which has similar restrictions to IVN. In this paper, we propose an implementation method of HB-Family for device authentication between ECU considering ECU has low computing power and the message field of CAN protocol has restricted size of 8 bytes. In order to evaluate the efficiency and availability of the authentication schemes adopted our method, we have evaluated the performance based on DSP-28335 device. Further, it was possible to improve the efficiency rate of at lest 10%, up to 36%, and we then analyze this result in various aspects of the IVN.

Security Credential Management & Pilot Policy of U.S. Government in Intelligent Transport Environment (지능형 교통 환경에서 미국정부의 보안인증관리 & Pilot 정책)

  • Hong, Jin-Keun
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.9
    • /
    • pp.13-19
    • /
    • 2019
  • This paper analyzed the SCMS and pilot policy, which is pursued by the U.S. government in connected vehicles. SCMS ensures authentication, integrity, privacy and interoperability. The SCMS Support Committee of U.S. government has established the National Unit SCMS and is responsible for system-wide control. Of course, it introduces security policy, procedures and training programs making. In this paper, the need for SCMS to be applied to C-ITS was discussed. The structure of the SCMS was analyzed and the U.S. government's filot policy for connected vehicles was discussed. The discussion of the need for SCMS highlighted the importance of the role and responsibilities of SCMS between vehicles and vehicles. The security certificate management system looked at the structure and analyzed the type of certificate used in the vehicle or road side unit (RSU). The functions and characteristics of the certificates were reviewed. In addition, the functions of basic safety messages were analyzed with consideration of the detection and warning functions of abnormal behavior in SCMS. Finally, the status of the pilot project for connected vehicles currently being pursued by the U.S. government was analyzed. In addition to the environment used for the test, the relevant messages were also discussed. We also looked at some of the issues that arise in the course of the pilot project.

Research of generate a test case to verify the possibility of external threat of the automotive ECU (차량 ECU의 외부 위협성 가능성을 검증하기 위한 테스트 케이스 생성 연구)

  • Lee, Hye-Ryun;Kim, Kyoung-Jin;Jung, Gi-Hyun;Choi, Kyung-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.9
    • /
    • pp.21-31
    • /
    • 2013
  • ECU(Electric Control Unit) on the important features of the vehicle is equipped, ECU between sending and receiving messages is connected to one of the internal network(CAN BUS), but this network easily accessible from the outside and not intended to be able to receive attacks from an attacker, In this regard, the development of tools that can be used in order to verify the possibility of attacks on attacks from outside, However, the time costs incurred for developing tools and time to analyze from actual car for CAN messages to be used in the attack to find. In this paper, we want to solve it, propose a method to generate test cases required for the attack is publicly available tool called Sulley and it explains how to find the CAN messages to be used in the attack. Sulley add the CAN messages data generated library files in provided library file and than Sulley execute that make define and execute file conform to the CAN communication preferences and create message rules. Experiments performed by the proposed methodology is applied to the actual car and result, test cases generated by the CAN messages fuzzing through Sulley send in the car and as a result without a separate tool developed was operating the car.

Opticla Angle Sensor Using Pseudorandom-code And Geometry-code (슈도 랜덤 코드와 기하학 코드를 이용한 광학적 Angle Sensor)

  • 김희성;도규봉
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.41 no.2
    • /
    • pp.27-32
    • /
    • 2004
  • Absolute optical angle sensor is described that is an essentially digital opto-electronic device. Its purpose is to resolve the relative and absolute angle position of coded disk using Pseudorandom-code and Geometry-code. In this technique, the angular position of disk is determined in coarse sense first by Pseudorandom-code. A further fine angular position data based on Pixel count is obtained by Geometry-code which result 0.006$^{\circ}$ resolution of the system provided that 7 ${\mu}{\textrm}{m}$ line image sensor are used. The proposed technique is novel in a number of aspects, such that it has the non-contact reflective nature, high resolution of the system, relatively simple code pattern, and inherent digital nature of the sensor. And what is more the system can be easily modified to torque sensor by applying two coded disks in a manner that observe the difference in absolute angular displacement. The digital opto-electronic nature of the proposed sensor, along with its reporting of both torque and angle, makes the system ideal for use in intelligent vehicle systems. In this communication, we propose a technique that utilizes Pseudorandom-code and Geometry-code to determine accurate angular position of coded disk. We present the experimental results to demonstrate the validity of the idea.

mSFP: Multicasting-based Inter-Domain Mobility Management Scheme in Sensor-based Fast Proxy Mobile IPv6 Networks (센서기반 FPMIPv6 네트워크에서 멀티캐스팅 기반의 도메인간 이동성관리 기법)

  • Jang, Hana;Jeong, Jongpil
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.1
    • /
    • pp.15-26
    • /
    • 2013
  • IP-based Wireless Sensor Networks (IP-WSNs) are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Because of the energy inefficiency of networks-based mobility management protocols can be supported in IP-WSN. In this paper we propose a network based mobility supported IP-WSN protocol called Multicasting-based inter-Domain Mobility Management Scheme in Sensor-based Fast Proxy Mobile IPv6 Networks (mSFP). Based on [8,20], We present its network architecture and evaluate its performance by considering the signaling and mobility cost. Our analysis shows that the proposed scheme reduces the signaling cost, total cost, and mobility cost. With respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 7% and the total cost by 3%. With respect to the number of hops, the proposed scheme reduces the signaling cost by 6.9%, the total cost by 2.5%, and the mobility cost by 1.5%. With respect to the number of IP-WSN nodes, the proposed scheme reduces the mobility cost by 1.6%.

DVB-S2-based T4 class common data link performance improvement plan for UAV system application (무인기 체계 적용을 위한 DVB-S2 기반 T4급 공용데이터링크 성능 개선방안)

  • Bae, Jongtae;Baek, Seongho;Oh, Jimyung;Lee, Sangpill;Song, Choongho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.12
    • /
    • pp.1846-1854
    • /
    • 2022
  • The sophistication and diversification of mission equipment for surveillance and reconnaissance is leading to a demand for large-capacity public data links. Overseas, a T4 class(274Mbps) common data link was applied to the Global hwak, a high-altitude unmanned aerial vehicle, and various research and development are being conducted in Korea. In this paper, we propose a structure in which pilot is additionally applied to improve SNR performance while minimizing data transmission rate loss in the DVB-S2 frame structure, which is a european satellite broadcasting standard, for high-capacity transmission of T4 class or higher in the common data link. For the performance evaluation of the proposed structure, the performance of the DVB-S2 was compared and analyzed by simulating the UAV data link channel environment. As a result of simulation, 0.15% of transmission rate loss occurred at T4 class transmission rate compared to DVB-S2 in the proposed structure, but improved SNR reception performance of 0.2~0.3dB was confirmed in the UAV channel environment.

Unsupervised Learning-Based Threat Detection System Using Radio Frequency Signal Characteristic Data (무선 주파수 신호 특성 데이터를 사용한 비지도 학습 기반의 위협 탐지 시스템)

  • Dae-kyeong Park;Woo-jin Lee;Byeong-jin Kim;Jae-yeon Lee
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.147-155
    • /
    • 2024
  • Currently, the 4th Industrial Revolution, like other revolutions, is bringing great change and new life to humanity, and in particular, the demand for and use of drones, which can be applied by combining various technologies such as big data, artificial intelligence, and information and communications technology, is increasing. Recently, it has been widely used to carry out dangerous military operations and missions, such as the Russia-Ukraine war and North Korea's reconnaissance against South Korea, and as the demand for and use of drones increases, concerns about the safety and security of drones are growing. Currently, a variety of research is being conducted, such as detection of wireless communication abnormalities and sensor data abnormalities related to drones, but research on real-time detection of threats using radio frequency characteristic data is insufficient. Therefore, in this paper, we conduct a study to determine whether the characteristic data is normal or abnormal signal data by collecting radio frequency signal characteristic data generated while the drone communicates with the ground control system while performing a mission in a HITL(Hardware In The Loop) simulation environment similar to the real environment. proceeded. In addition, we propose an unsupervised learning-based threat detection system and optimal threshold that can detect threat signals in real time while a drone is performing a mission.

Tracking Moving Object using Hierarchical Search Method (계층적 탐색기법을 이용한 이동물체 추적)

  • 방만식;김태식;김영일
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.3
    • /
    • pp.568-576
    • /
    • 2003
  • This paper proposes a moving object tracking algorithm by using hierarchical search method in dynamic scenes. Proposed algorithm is based on two main steps: generation step of initial model from different pictures, and tracking step of moving object under the time-yawing scenes. With a series of this procedure, tracking process is not only stable under far distance circumstance with respect to the previous frame but also reliable under shape variation from the 3-dimensional(3D) motion and camera sway, and consequently, by correcting position of moving object, tracking time is relatively reduced. Partial Hausdorff distance is also utilized as an estimation function to determine the similarity between model and moving object. In order to testify the performance of proposed method, the extraction and tracking performance have tested using some kinds of moving car in dynamic scenes. Experimental results showed that the proposed algorithm provides higher performance. Namely, matching order is 28.21 times on average, and considering the processing time per frame, it is 53.21ms/frame. Computation result between the tracking position and that of currently real with respect to the root-mean-square(rms) is 1.148. In the occasion of different vehicle in terms of size, color and shape, tracking performance is 98.66%. In such case as background-dependence due to the analogy to road is 95.33%, and total average is 97%.

Engineering Characteristics of Liquid Filler Using Marine Clay and In-situ Soil (해양점토와 현장토를 활용한 유동성 채움재의 공학적 특성)

  • Oh, Sewook;Bang, Seongtaek
    • Journal of the Korean GEO-environmental Society
    • /
    • v.21 no.9
    • /
    • pp.25-32
    • /
    • 2020
  • The underground utilities installed under the ground is an important civil engineering structure, such as water supply and sewerage pipes, underground power lines, various communication lines, and city gas pipes. Such underground utilities can be exposed to risk due to external factors such as concentrated rainfall and vehicle load, and it is important to select and construct an appropriate backfill material. Currently, a method mainly used is to fill the soil around the underground utilities and compact it. But it is difficult to compact the lower part of the buried pipe and the compaction efficiency decreases, reducing the stability of the underground utilities and causing various damages. In addition, there are disadvantages such as a decrease in ground strength due to disturbance of the ground, a complicated construction process, and construction costs increase because the construction period becomes longer, and civil complaints due to traffic restrictions. One way to solve this problem is to use a liquid filler. The liquid filler has advantages such as self-leveling ability, self-compaction, fluidity, artificial strength control, and low strength that can be re-excavated for maintenance. In this study, uniaxial compression strength test and fluidity test were performed to characterize the mixed soil using marine clay, stabilizer, and in-situ soil as backfill material. A freezing-thawing test was performed to understand the strength characteristics of the liquid filler by freezing, and in order to examine the effect of the filling materials on the corrosion of the underground pipe, an electrical resistivity test and a pH test were performed.