• Title/Summary/Keyword: Message control

Search Result 800, Processing Time 0.022 seconds

Periodic-and-on-Event Message-Aware Automotive Intrusion Detection System (Periodic-and-on-Event 메시지 분석이 가능한 차량용 침입탐지 기술)

  • Lee, Seyoung;Choi, Wonsuk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.373-385
    • /
    • 2021
  • To provide convenience and safety of drivers, the recent vehicles are being equipped with a number of electronic control units (ECUs). Multiple ECUs construct a network inside a vehicle to share information related to the vehicle's status; in addition, the CAN protocol is normally applied. As the modern vehicles provide highly convenient and safe services, it provides many types of attack surfaces; as a result, it makes them vulnerable to cyber attacks. The automotive IDS (Intrusion Detection System) is one of the promising techniques for securing vehicles. However, the existing methods for automotive IDS are able to analyze only periodic messages. If someone attacks on non-periodic messages, the existing methods are not able to properly detect the intrusion. In this paper, we present a method to detect intrusions including an attack using non-periodic messages. Moreover, we evaluate our method on the real vehicles, where we show that our method has 0% of FPR and 0% of FNR under our attack model.

A Secure Subscription-Push Service Scheme Based on Blockchain and Edge Computing for IoT

  • Deng, Yinjuan;Wang, Shangping;Zhang, Qian;Zhang, Duo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.445-466
    • /
    • 2022
  • As everything linking to the internet, people can subscribe to various services from a service provider to facilitate their lives through the Internet of Things (IoT). An obligatory thing for the service provider is that they should push the service data safely and timely to multiple IoT terminal devices regularly after the IoT devices accomplishing the service subscription. In order to control the service message received by the legal devices as while as keep the confidentiality of the data, the public key encryption algorithm is utilized. While the existing public encryption algorithms for push service are too complicated for IoT devices, and almost of the current subscription schemes based on push mode are relying on centralized organization which may suffer from centralized entity corruption or single point of failure. To address these issues, we design a secure subscription-push service scheme based on blockchain and edge computing in this article, which is decentralized with secure architecture for the subscription and push of service. Furthermore, inspired by broadcast encryption and multicast encryption, a new encryption algorithm is designed to manage the permissions of IoT devices together with smart contract, and to protect the confidentiality of push messages, which is suitable for IoT devices. The edge computing nodes, in the new system architecture, maintain the blockchain to ensure the impartiality and traceability of service subscriptions and push messages, meanwhile undertake some calculations for IoT devices with limited computing power. The legalities of subscription services are guaranteed by verifying subscription tags on the smart contract. Lastly, the analysis indicates that the scheme is reliable, and the proposed encryption algorithm is safe and efficient.

Who is to Blame for Infection?: Emotional Discourse in Editorial Articles during the Emerging Infectious Diseases Epidemics in Korea (감염병과 감정: 신종감염병에 관한 대중매체의 메시지와 공포, 분노 감정)

  • Kim, Jongwoo;Kang, Jiwoong
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.12
    • /
    • pp.816-827
    • /
    • 2021
  • The purpose of this study is to understand the relationship between fear and anger emotions in the discourse produced by the media during the period of major emerging infectious diseases (SARS, Swine Flu, MERS, and COVID-19) that occurred since 2000 in Korea. The researcher collected editorial articles of the major daily newspaper after a significant epidemic of new infectious diseases and analyzed them using the Extended Parallel Processing Model (EPPM) and text mining techniques. In all epidemic times, fear appears stronger than anger, but the smaller the fear, the greater the risk control message is produced. In detail, fear emerges strongly in the discourse of the risk of infectious diseases or the economic crisis. Anger appears strong when the government's quarantine failures, groups where group infections occurred, and concealing information about infectious diseases. In this process, anger is strongly expressed against the factors that threaten the safety of society. Anger is also an emotion that can justify strong quarantine, but it can be the basis for discourse on minority hate. In this respect, anger is a two-sided emotion, so it must be handled carefully in the media.

Review of GPS and Galileo Integrity Assurance Procedure (GPS와 Galileo의 무결성 보장 방법 조사)

  • Namkyu Woo;Gihun Nam;Heonho Choi;Jiyun Lee
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.13 no.1
    • /
    • pp.53-61
    • /
    • 2024
  • Global Navigation Satellite Systems are expected to meet system-defined integrity requirements when users utilize the system for safety critical applications. While the guaranteed integrity performance of GPS and Galileo is publicly available, their integrity assurance procedure and related methodology have not been released to the public in an official document format. This paper summarizes the integrity assurance procedures of Global Positioning System (GPS) and Galileo, which were utilized during their system development, through a literature survey of their integrity assurance methodology. GPS Block II assures system integrity using the following methods: continuous performance monitoring and maintenance on Space Segment (SS) and Control Segment (CS), through a cause and effect analysis of anomalies and a failure analysis. In GPS Block III, to achieve more stringent integrity performance, safety requirements are integrated into the system design and development from its starting phase to the final phase. Galileo's integrity performance is provided in the Integrity Support Message (ISM) format, as Galileo utilizes a Dual Frequency Multi Constellation (DFMC) Satellite Based Augmentation System (SBAS) and Advanced Receiver Autonomous Integrity Monitoring (ARAIM) to serve safety critical applications. The integrity performance of Galileo is ensured by using a methodology similar to GPS Block II (i.e. continuous performance monitoring and maintenance on the system). The integrity assurance procedures reviewed in this paper can be utilized for a new satellite navigation system that will be developed in the near future.

Efficient Sign Language Recognition and Classification Using African Buffalo Optimization Using Support Vector Machine System

  • Karthikeyan M. P.;Vu Cao Lam;Dac-Nhuong Le
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.8-16
    • /
    • 2024
  • Communication with the deaf has always been crucial. Deaf and hard-of-hearing persons can now express their thoughts and opinions to teachers through sign language, which has become a universal language and a very effective tool. This helps to improve their education. This facilitates and simplifies the referral procedure between them and the teachers. There are various bodily movements used in sign language, including those of arms, legs, and face. Pure expressiveness, proximity, and shared interests are examples of nonverbal physical communication that is distinct from gestures that convey a particular message. The meanings of gestures vary depending on your social or cultural background and are quite unique. Sign language prediction recognition is a highly popular and Research is ongoing in this area, and the SVM has shown value. Research in a number of fields where SVMs struggle has encouraged the development of numerous applications, such as SVM for enormous data sets, SVM for multi-classification, and SVM for unbalanced data sets.Without a precise diagnosis of the signs, right control measures cannot be applied when they are needed. One of the methods that is frequently utilized for the identification and categorization of sign languages is image processing. African Buffalo Optimization using Support Vector Machine (ABO+SVM) classification technology is used in this work to help identify and categorize peoples' sign languages. Segmentation by K-means clustering is used to first identify the sign region, after which color and texture features are extracted. The accuracy, sensitivity, Precision, specificity, and F1-score of the proposed system African Buffalo Optimization using Support Vector Machine (ABOSVM) are validated against the existing classifiers SVM, CNN, and PSO+ANN.

A Control Method for designing Object Interactions in 3D Game (3차원 게임에서 객체들의 상호 작용을 디자인하기 위한 제어 기법)

  • 김기현;김상욱
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.3
    • /
    • pp.322-331
    • /
    • 2003
  • As the complexity of a 3D game is increased by various factors of the game scenario, it has a problem for controlling the interrelation of the game objects. Therefore, a game system has a necessity of the coordination of the responses of the game objects. Also, it is necessary to control the behaviors of animations of the game objects in terms of the game scenario. To produce realistic game simulations, a system has to include a structure for designing the interactions among the game objects. This paper presents a method that designs the dynamic control mechanism for the interaction of the game objects in the game scenario. For the method, we suggest a game agent system as a framework that is based on intelligent agents who can make decisions using specific rules. Game agent systems are used in order to manage environment data, to simulate the game objects, to control interactions among game objects, and to support visual authoring interface that ran define a various interrelations of the game objects. These techniques can process the autonomy level of the game objects and the associated collision avoidance method, etc. Also, it is possible to make the coherent decision-making ability of the game objects about a change of the scene. In this paper, the rule-based behavior control was designed to guide the simulation of the game objects. The rules are pre-defined by the user using visual interface for designing their interaction. The Agent State Decision Network, which is composed of the visual elements, is able to pass the information and infers the current state of the game objects. All of such methods can monitor and check a variation of motion state between game objects in real time. Finally, we present a validation of the control method together with a simple case-study example. In this paper, we design and implement the supervised classification systems for high resolution satellite images. The systems support various interfaces and statistical data of training samples so that we can select the most effective training data. In addition, the efficient extension of new classification algorithms and satellite image formats are applied easily through the modularized systems. The classifiers are considered the characteristics of spectral bands from the selected training data. They provide various supervised classification algorithms which include Parallelepiped, Minimum distance, Mahalanobis distance, Maximum likelihood and Fuzzy theory. We used IKONOS images for the input and verified the systems for the classification of high resolution satellite images.

Research of generate a test case to verify the possibility of external threat of the automotive ECU (차량 ECU의 외부 위협성 가능성을 검증하기 위한 테스트 케이스 생성 연구)

  • Lee, Hye-Ryun;Kim, Kyoung-Jin;Jung, Gi-Hyun;Choi, Kyung-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.9
    • /
    • pp.21-31
    • /
    • 2013
  • ECU(Electric Control Unit) on the important features of the vehicle is equipped, ECU between sending and receiving messages is connected to one of the internal network(CAN BUS), but this network easily accessible from the outside and not intended to be able to receive attacks from an attacker, In this regard, the development of tools that can be used in order to verify the possibility of attacks on attacks from outside, However, the time costs incurred for developing tools and time to analyze from actual car for CAN messages to be used in the attack to find. In this paper, we want to solve it, propose a method to generate test cases required for the attack is publicly available tool called Sulley and it explains how to find the CAN messages to be used in the attack. Sulley add the CAN messages data generated library files in provided library file and than Sulley execute that make define and execute file conform to the CAN communication preferences and create message rules. Experiments performed by the proposed methodology is applied to the actual car and result, test cases generated by the CAN messages fuzzing through Sulley send in the car and as a result without a separate tool developed was operating the car.

Comparative Study of Subjective Mental Workload Assessment Techniques for the Evaluation of ITS-oriented Human-Machine Interface Systems (지능형 교통체계 기반 인간-기계 인터페이스 시스템 평가를 위한 정신적부하 측정방법의 비교 연구)

  • Cha, Doo-Won;Park, Peom
    • Journal of Korean Society of Transportation
    • /
    • v.19 no.3
    • /
    • pp.45-58
    • /
    • 2001
  • Subjective mental workload assessment technique becomes a standard human factors and human-machine interface evaluation tool for the evaluation of ITS(Intelligent Transport Systems)-oriented information systems as well as the drivers visual activity analysis, physiological indices(GSR, EEG, ECG, etc.), secondary task performance, reaction time. vehicle control parameters(speed, steering behavior, accelerator control) that are widely applied for transportation and vehicle systems to evaluate the safety, to decide the system or design alternatives, and to establish the design guidelines. This paper reviewed and compared the most globally employed four mental workload assessment techniques that have been designed for the use of various human-machine systems and ITS-oriented in-vehicle information systems. NASA-TLX(National Aeronautics and Space Administration-Task Load Index). SWAT(Subjective Workload Assessment Technique), MCH(Modified Cooper-Harper) scale, and recently developed RNASA-TLX(Revision of NASA-TH) were compared in terms of sensitivity and subjective evaluations to derive the human-machine interface evaluation guidelines for the application of ITS-oriented in-vehicle information systems. Then, experiment results supported that RNASA-TLX is the prospective tool for the mental workload assessment of ITS-oriented in-vehicle information systems.

  • PDF

Low Body Obesity Control with Female University Students -Focusing on Meridian Massage with Aroma Essential Oil- (여대생의 하체 비만관리 -아로마 에센셜 오일을 이용한 경락마사지를 중심으로-)

  • Yun, Un-Jae;Kim, Young-Ran
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.8
    • /
    • pp.360-366
    • /
    • 2009
  • The purpose of this research was to study of the lower body obesity control with female university students, particularly has been done meridian message and aroma therapy, The data included in the remainder of this research was gathered from the experimental groups consisted of eighteen female students for tested group and compared group over 8 weeks. By the observation of tested group and compared group, we could see the measurement of thigh and calf sizing down overall, but they still show some differences depend on physical constitutions of each members who has been tested. This meant that the result could be changed by the will and persistent endurance of experimented ones Both of tested group and compared group's body mass index shrinked but still there were some exceptions, this result showed the difference of each participants' willingness as well as the age gap. We could find the reduction of Total Cholesterol, LDL, neutral fat and blood sugar in both tested group and compared group. However in case of HDL the measurement increased which means wrong method of controlling obesity can show some abnormal figures

VLSI Design of Interface between MAC and PHY Layers for Adaptive Burst Profiling in BWA System (BWA 시스템에서 적응형 버스트 프로파일링을 위한 MAC과 PHY 계층 간 인터페이스의 VLSI 설계)

  • Song Moon Kyou;Kong Min Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.1
    • /
    • pp.39-47
    • /
    • 2005
  • The range of hardware implementation increases in communication systems as high-speed processing is required for high data rate. In the broadband wireless access (BWA) system based on IEEE standard 802.16 the functions of higher part in the MAC layer to Provide data needed for generating MAC PDU are implemented in software, and the tasks from formatting MAC PDUs by using those data to transmitting the messages in a modem are implemented in hardware. In this paper, the interface hardware for efficient message exchange between MAC and PHY layers in the BWA system is designed. The hardware performs the following functions including those of the transmission convergence(TC) sublayer; (1) formatting TC PDU(Protocol data unit) from/to MAC PDU, (2) Reed-solomon(RS) encoding/decoding, and (3) resolving DL MAP and UL MAP, so that it controls transmission slot and uplink and downlink traffic according to the modulation scheme of burst profile. Also, it provides various control signal for PHY modem. In addition, the truncated binary exponential backoff (TBEB) algorithm is implemented in a subscriber station to avoid collision on contention-based transmission of messages. The VLSI architecture performing all these functions is implemented and verified in VHDL.