• Title/Summary/Keyword: V2X security

Search Result 26, Processing Time 0.021 seconds

A Survey on Side-Channel Attacks and Countermeasures for ECC Processor (ECC 프로세서에 대한 부채널 공격 및 대응방안 동향)

  • Jeong, Young-su;Shin, Kyung-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.101-103
    • /
    • 2022
  • Elliptic curve cryptography (ECC) is widely used in hardware implementations of public-key crypto-systems for IoT devices and V2X communication because it is suitable for efficient hardware implementation and has high security strength. However, ECC-based public-key cryptography is known to have security vulnerabilities against side-channel attacks, so it is necessary to apply countermeasures against security attacks in designing ECC processor. This paper describes a survey on the side-channel attacks and countermeasures applicable to ECC processor design.

  • PDF

A Secure and Efficient Message Authentication Scheme for Vehicular Networks based on LTE-V

  • Xu, Cheng;Huang, Xiaohong;Ma, Maode;Bao, Hong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2841-2860
    • /
    • 2018
  • Vehicular networks play an important role in current intelligent transportation networks and have gained much attention from academia and industry. Vehicular networks can be enhanced by Long Term Evolution-Vehicle (LTE-V) technology, which has been defined in a series of standards by the 3rd Generation Partnership Project (3GPP). LTE-V technology is a systematic and integrated V2X solution. To guarantee secure LTE-V communication, security and privacy issues must be addressed before the network is deployed. The present study aims to improve the security functionality of vehicular LTE networks by proposing an efficient and secure ID-based message authentication scheme for vehicular networks, named the ESMAV. We demonstrate its ability to simultaneously support both mutual authentication and privacy protection. In addition, the ESMAV exhibit better performance in terms of overhead computation, communication cost, and security functions, which includes privacy preservation and non-frameability.

A Method of Digital Signature Using FIDO2 CTAP (FIDO2 CTAP을 활용한 전자서명 방법)

  • Cho, Han-koo;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1049-1062
    • /
    • 2019
  • The national accredited certificate is a user certificate issued based on the user's personal information, which has been identified in advance, and has become a universal authentication method used for most electronic financial transactions and user authentication. And it contributed a lot to the use of e-government and domestic service. However, due to the lack of web standards on how to use, it was inconvenient to install a separate plug-in, and efforts to improve it have been continued. In this paper, we attempt to solve the problem of certificate usage environment by presenting the certificate digital signature method using the extension of the FIDO2 (Fast Identity Online v2) client to authentication protocol (CTAP) specification.

A Design and Implementation of Two-Phase Server Login Authentication System based on XML-Signature Extension (XML-Signature 확장을 통한 2단계 서버 로그인 인증 시스템의 설계 및 구현)

  • Kim, Yong-Hwa;Kim, Jin-Sung;Kim, Yong-Sung
    • The KIPS Transactions:PartC
    • /
    • v.14C no.4
    • /
    • pp.321-330
    • /
    • 2007
  • This paper proposes a two-phase server login authentication system by XML-Signature schema extension to protect server's information resources opened on network which offer various web contents. A proposed system requests and publishes XML-based certificate through on-line, registers certificate extension information provided by CA(Certification Authority) to XCMS(XML Certificate Management Server), and performs prior authentication using user's certificate password. Then, it requests certificate extension information added by user besides user's certificate password and certificate extension information registered in XCMS by using SOAP message, and performs posterior authentication by comparing these certificate extension information. As a result, a proposed system is a security reinforced system compared with existing systems.

A Study and Analysis of COVID-19 Diagnosis and Approach of Deep Learning

  • R, Mangai Begum
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.149-158
    • /
    • 2022
  • The pandemic of Covid-19 (Coronavirus Disease 19) has devastated the world, affected millions of people, and disrupted the world economy. The cause of the Covid19 epidemic has been identified as a new variant known as Severe Acute Respiratory Syndrome Coronavirus 2(SARS-CoV2). It motives irritation of a small air sac referred to as the alveoli. The alveoli make up most of the tissue in the lungs and fill the sac with mucus. Most human beings with Covid19 usually do no longer improve pneumonia. However, chest x-rays of seriously unwell sufferers can be a useful device for medical doctors in diagnosing Covid19-both CT and X-ray exhibit usual patterns of frosted glass (GGO) and consolidation. The introduction of deep getting to know and brand new imaging helps radiologists and medical practitioners discover these unnatural patterns and pick out Covid19-infected chest x-rays. This venture makes use of a new deep studying structure proposed to diagnose Covid19 by the use of chest X-rays. The suggested model in this work aims to predict and forecast the patients at risk and identify the primary COVID-19 risk variables

STABILITY OF THE RECIPROCAL DIFFERENCE AND ADJOINT FUNCTIONAL EQUATIONS IN THREE VARIABLES

  • Kim, Gwang Hui;Lee, Young Whan
    • Korean Journal of Mathematics
    • /
    • v.18 no.3
    • /
    • pp.311-322
    • /
    • 2010
  • In this paper, we prove stabilities of the reciprocal difference functional equation $$r(\frac{x+y+z}{3})-r(x+y+z)=\frac{2r(x)r(y)r(z)}{r(x)r(y)+r(y)r(z)+r(z)r(x)}$$ and the reciprocal adjoint functional equation $$r(\frac{x+y+z}{3})+r(x+y+z)=\frac{4r(x)r(y)r(z)}{r(x)r(y)+r(y)r(z)+r(z)r(x)}$$ with three variables. Stabilities of the reciprocal difference functional equation and the reciprocal adjoint functional equation in two variables was proved by K. Ravi, J. M. Rassias and B. V. Senthil Kumar. We extend their results to three variables in similar types.

A Survey about Vulnerabilities and Solutions of Autonomous vehicle security (자율주행 자동차 보안 취약성 및 솔루션 조사)

  • JaeKyung Park;SeungYoon Kang;Chat-GPT
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.615-616
    • /
    • 2023
  • 본 논문은 자율주행 자동차의 보안 취약성과 이를 해결하기 위한 솔루션에 대한 조사를 다루고 있다. 자동차의 자율주행 및 초연결성이 대두됨에 따라 보안 위협이 점점 중요해지는 현실을 직면하고 있다. 본 논문은 다양한 취약성을 카테고리 별로 다루고, 해당 취약성에 대응하기 위한 보안 솔루션과 현재 연구 개발 중인 솔루션들을 소개하고 있다. 그러나 아직 해결되지 않은 과제들이 산적해 있으며, 연구와 개발이 계속되어야 안전하고 신뢰성 있는 초연결 자율주행 자동차를 구현할 수 있을 것으로 기대한다.

  • PDF

Efficient FPGA Implementation of AES-CCM for IEEE 1609.2 Vehicle Communications Security

  • Jeong, Chanbok;Kim, Youngmin
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.6 no.2
    • /
    • pp.133-139
    • /
    • 2017
  • Vehicles have increasingly evolved and become intelligent with convergence of information and communications technologies (ICT). Vehicle communications (VC) has become one of the major necessities for intelligent vehicles. However, VC suffers from serious security problems that hinder its commercialization. Hence, the IEEE 1609 Wireless Access Vehicular Environment (WAVE) protocol defines a security service for VC. This service includes Advanced Encryption Standard-Counter with CBC-MAC (AES-CCM) for data encryption in VC. A high-speed AES-CCM crypto module is necessary, because VC requires a fast communication rate between vehicles. In this study, we propose and implement an efficient AES-CCM hardware architecture for high-speed VC. First, we propose a 32-bit substitution table (S_Box) to reduce the AES module latency. Second, we employ key box register files to save key expansion results. Third, we save the input and processed data to internal register files for secure encryption and to secure data from external attacks. Finally, we design a parallel architecture for both cipher block chaining message authentication code (CBC-MAC) and the counter module in AES-CCM to improve performance. For implementation of the field programmable gate array (FPGA) hardware, we use a Xilinx Virtex-5 FPGA chip. The entire operation of the AES-CCM module is validated by timing simulations in Xilinx ISE at a speed of 166.2 MHz.

Device to Device Communications Architectures and Cross-Layer Evaluation Frameworks

  • Aldabbagh, Ghadah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.152-161
    • /
    • 2021
  • The paper focuses on Device-to-device (D2D) Architectures evaluation frameworks. D2D communication and discovery can improve spectrum usage efficiency and optimize the tradeoffs between throughput and energy consumption. The target operation modes involve both indirect communication between two nodes via a base station or the direct communication among proximal nodes, enabling use cases that can support communications out of cellular coverage, as well as low end-end delay requirements. The paper will present the architectural evolution of D2D networks within 3GPP standardization and will highlight key network functionalities and signaling protocols. It will also identify key analytical and simulation models that can be used to assess the performance and energy efficiency of resource allocation strategies, and it will present a suitable cross-layer integrated framework.

A Study on User Authentication of Mobile Internet Environment Based on WPKI - (무선 인터넷 환경의 WPKI 기반 사용자 인증에 관한 연구)

  • Lee, Cheol-Seung;Park, Young-Ok;Lee, Ho-Young;Lee, Jeon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.560-563
    • /
    • 2003
  • In this paper describes for use Authentication with the WPKI and Kerberos protocol. this paper is the security structure that defined in a WAP forum and security and watches all kinds of password related technology related to the existing authentication system. It looks up weakness point on security with a problem on the design that uses wireless public key-based structure and transmission hierarchical security back of a WAP forum, and a server-client holds for user authentication of an application level all and all, and it provides one counterproposal. Therefore, We offer authentication way solution that connected X.509 with using WIM for complement an authentication protocol Kerberos and its disadvantages.

  • PDF