• Title/Summary/Keyword: Vehicle Privacy

Search Result 72, Processing Time 0.025 seconds

A Study on Security Evaluation for Secure Software Update Management System in Automotive (안전한 자동차용 SUMS 구축을 위한 보안성 평가기준 도출)

  • Seo, Jaewan;Kwak, Jiwon;Hong, Paul;Cho, Kwangsoo;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1151-1163
    • /
    • 2022
  • As wireless communication functions begin to be installed in vehicles, cyberattacks that exploit vulnerabilities in wireless communication functions are increasing. To respond to this, UNECE enacted the UN R156 regulation to safely distribute the software installed in the vehicle by using the wireless communication function. The regulations specify the requirements necessary to safely distribute the software for vehicles, but only the abstract requirements are presented without information on the components and detailed functions necessary to develop and implement the requirements. Therefore, in this paper, we propose a security evaluation standard that can evaluate whether a safe SUMS is built using threat modeling, a method for systematically analyzing security threats.

An Authentication Scheme for Emergency Vehicle Priority Transit Service in VANET (VANET 기반의 긴급 차량 우선통과 서비스를 위한 인증 기법)

  • Yoon, Young-Kyun;Jung, Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.10C
    • /
    • pp.749-757
    • /
    • 2008
  • In this paper, we propose an authentication scheme for EVPT (Emergency Vehicle Priority Transit) service in Vehiclar Ad-hoc Networks (VANET) enable a variety of vehicle comfort services, traffic management applications, and infotainment services. These are the basis for a new generation of preventive and active safety functions. By intelligently controlling signalling at intersections, providing additional information to the driver and warning the driver in critical situations. we therefore focus on vehicle-to-infrastructure communication for the authentication between emergency vehicles and traffic lights system. This authentication process should identify the vehicle, and provide privacy protection.

Secured Authentication Scheme and Charging & Discharging System Operation for Electric Vehicles (정보보호를 고려한 전기자동차 충방전 시스템의 인증과 운영에 관한 연구)

  • Lee, Sunguk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.551-557
    • /
    • 2021
  • With increase of electric vehicle in the road, the number of charging/discharging infrastructure for electric vehicle in public space is also increased rapidly. To charge or discharge the electric vehicle the user of electric vehicle and service provider should verify the each other's identity to minimize security vulnerability. This paper proposes mutual authentication scheme between electric vehicle and charging/discharging service provider with help of hash function and Message Authentication Code(MAC). Also efficient operating scheme for charging/discharging service system is proposed. The analysis shows that the system has robustness against security vulnerability. Also this system can keep the sensitive personal information of service user safely.

Security Attacks and Challenges of VANETs : A Literature Survey

  • Quyoom, Abdul;Mir, Aftab Ahmad;Sarwar, Abid
    • Journal of Multimedia Information System
    • /
    • v.7 no.1
    • /
    • pp.45-54
    • /
    • 2020
  • This paper presented a brief introduction along with various wireless standards which provide an interactive way of interaction among the vehicles and provides effective communication in VANET. Security issues such as confidentiality, authenticity, integrity, availability and non-repudiation, which aims to secure communication between vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I). A detailed discussion and analysis of various possible attacks based on security services are also presented that address security and privacy concern in VANETs. Finally a general analysis of possible challenges is mentioned. This paper can serve as a source and reference in building the new technique for VANETs.

A Design of Framework for Secure Communication in Vehicular Cloud Environment (차량 클라우드 환경에서 안전한 통신을 위한 프레임워크 설계)

  • Park, Jung-oh;Choi, Do-hyeon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.9
    • /
    • pp.2114-2120
    • /
    • 2015
  • Vehicle cloud technology is a fusion technology of vehicle communication technology and cloud computing used in wired and wireless Internet, and has attracted attention as a new IT paradigm. It is expected that it would contribute to resolve the road traffic problem with effective communication by providing computer, sensor, communication, device, and resource. but security is necessary to apply vehicle cloud environment and it have to resolve security threats and various attacks occurred in wired and wireless vehicle environment. Therefore, in this paper, we designed security framework to provide secure communication between vehicle and vehicle, and vehicle and the Road side in the vehicle cloud environment. Safety and security of the vehicle environment was satisfied with the security requirements of the vehicle and cloud-based environment, and increased efficiency than the conventional vehicle network communication protocols.

The Proposal for Solution of Problems from Drone Operation by Examine Cases (사례로 살펴본 드론 활용 문제점에 따른 방향성 제시)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.3
    • /
    • pp.55-64
    • /
    • 2016
  • Recently, unmanned aerial vehicle, also known as drone is being used in variety of areas. Previously drones are used as military purposes. After unmanned technology went abroad to civil, drones are used as multipurpose such as hobby, business and other more. Even though drones are very useful in many areas, problems such as safety and personal privacy infringement raised new social issues. In this thesis it will analyze and suggest solutions to the social problems of personal privacy infringement which occurred by drone filming. This thesis will also suggest that new law of drone safety must legislate quickly. Drone is exploration of new filed. Varies of new technology help to grow drone industries. Drone is able to complete tasks which are impossible or very difficult to do. To constantly grow drone industries, people must have solutions for problems of drone. If people can figure out solutions problem of drone which introduced by this thesis, value of drone will grow even more.

A Security Module for Vehicle Network Communication (차량 네트워크 통신용 보안 모듈)

  • Kwon, Byeong-Heon;Park, Jin-Sung
    • Journal of Digital Contents Society
    • /
    • v.8 no.3
    • /
    • pp.371-376
    • /
    • 2007
  • Many modules such as controller, sensor, telematics terminal, navigation, audio and video are connected each other via vehicle network (CAN, MOST, etc). Futhermore, users can have ITS or internet services in moving by connecting to wireless mobile network. These network capabilities can cause a lots of security issues such as data hacking, privacy violation, location tracking and so on. Some possibilities which raise a breakdown or accident by hacking vehicle operation data (sensor, control data) are on the increase. In this paper, we propose a security module which has encryption functionalities and can be used for vehicle network system such as CAN, MOST, etc. This security module can provide conventional encryption algorithms and digital signature processing functionality such as DES, 3-DES, SEED, ECC, and RSA.

  • PDF

Car Black Box and the Protection of Drivers' Privacy : In Light of the Regulation on EDR(Event Data Recorder) in U.S.A. (차량용 블랙박스와 운전자의 사생활 보호 : 미국에서의 사고기록장치(Event Data Recorder : EDR) 규제를 중심으로)

  • Lee, Kyung Gyu
    • Journal of Information Technology Services
    • /
    • v.12 no.2
    • /
    • pp.171-184
    • /
    • 2013
  • Frequently faced with dangerous situations, for evidentiary purpose in case of civil and criminal liability challenges, car drivers in Korea have been armed with so-called 'black boxes'; however, which are just video recorders in vehicles rather than real 'black boxes' that are equipped in the airplanes. In the United States, they are called EDRs(Event Data Recorders), more technically, which means that they record data of events happened while driving, such as velocity changes, airbags deployment, seatbelt wearing etc. just like in the airplanes. EDR technology is quickly becoming more advanced, more widely available, and less expensive; however, new concerns are emerging : the privacy of drivers. In U. S., vehicle manufacturers and insurance companies and the governmental agencies including the courts and legislatures are the main parties in terms of the EDR concerns. In order to determine the best way to regulate EDR, it is necessary to balance all the merits, such as safety, privacy, truth, justice and efficiency, to support a legal framework regulating the EDR concerns. This article, in light of the regulation of EDR and experience therof in the United States, examines EDR technology itself, particularly with respect to the automobile industry, describing its history, its current state, and trends that may change it in the future; and explains how the National Highway Transportation Safety Agency (NHTSA), legislatures, courts have approached EDR data. At the early stage of regulation on EDRs in Korea, examining U. S. legal framework and usages would help for successful establishment of legislation and regulation.

Long Distance Vehicle License Plate Region Detection Using Low Resolution Feature of License Plate Region in Road View Images (로드뷰 영상에서 번호판 영역의 저해상도 특징을 이용한 원거리 자동차 번호판 영역 검출)

  • Oh, Myoung-Kwan;Park, Jong-Cheon
    • Journal of Digital Convergence
    • /
    • v.15 no.1
    • /
    • pp.239-245
    • /
    • 2017
  • For privacy protection, we propose a vehicle license plate region detection method in road view image served from portal site. Because vehicle license plate regions in road view images have different feature depending on distance, long distance vehicle license plate regions are not detected by feature of low resolution. Therefore, we suggest a method to detect short distance vehicle license plate regions by edge feature and long distance vehicle license plate regions using MSER feature. And then, we select candidate region of vehicle license plate region from detected region of each method, because the number of the vehicle license plate has a structural feature, we used it to detect the final vehicle license plate region. As the experiment result, we got a recall rate of 93%, precision rate of 75%, and F-Score rate of 80% in various road view images.

User Authentication Risk and Countermeasure in Intelligent Vehicles (지능형 자동차의 사용자 인증에 대한 위협 및 대응 기법)

  • Kim, Seung-Hwan;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.3 no.1
    • /
    • pp.7-11
    • /
    • 2012
  • Intellgent Vehles network capabilities can cause a lots of security issues such as data hacking, privacy violation, location tracking and so on. Some possibilities which raise a breakdown or accident by hacking vehicle operation data are on the increase. In this paper, we propose a security module which has user authentication and encryption functionalities and can be used for vehicle network system.