• Title/Summary/Keyword: Vehicle Safety Communication

Search Result 335, Processing Time 0.021 seconds

A Study on the Legal and Institutional Military UAV Rules in Korea (한국의 군용 무인항공기 비행규칙에 관한 법적.제도적 운용 연구)

  • Lee, Kang-Seok;Park, Won-Tae;Im, Kwang-Hyun
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.28 no.2
    • /
    • pp.117-144
    • /
    • 2013
  • The MOLIT is also establishing the flight safety standards for UAV within the current Aviation Law. Accordingly the required flight criteria includes operator location, mission operation limit, equipment, etc. which are the principle and standard applied based on the airspace use for UAV. Also, general flight rules, visual flight rules, instrument flight rules are required to be applied to the actual flight. Besides, an appliance regulation needs to be arranged regarding two-way communication, ATC and communication issue, airspace and area in-flight between UAS(Unmanned Aircraft System) users. An operation of the UAV in the air significantly requires the guarantee of the aircraft's capacity, and also the standardized flight criteria. A safe and smooth use is ensured only if this criteria is applied and understood by the entire airspace users. For the purpose, a standardized military UAV flight operations criteria and a law complementary scheme.

  • PDF

Secure and Efficient V2V Message Authentication Scheme in Dense Vehicular Communication Networks (차량 밀집환경에서 안전하고 효율적인 V2V 메시지 인증기법)

  • Jung, Seock-Jae;Yoo, Young-Jun;Paik, Jung-Ha;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.41-52
    • /
    • 2010
  • Message authentication is an essential security element in vehicular ad-hoc network(VANET). For a secure message authentication, integrity, availability, privacy preserving skill, and also efficiency in various environment should be provided. RAISE scheme has been proposed to provide efficient message authentication in the environment crowded with lots of vehicles and generally considered to be hard to provide efficiency. However, as the number of vehicles communicating in the area increases, the overhead is also incurred in proportion to the number of vehicles so that it still needs to be reduced, and the scheme is vulnerable to some attacks. In this paper, to make up for the vulnerabilities in dense vehicular communication network, we propose a more secure and efficient scheme using a process that RSU(Road Side Unit) transmits the messages of neighbor vehicles at once with Bloom Filter, and timestamp to protect against replay attack. Moreover, by adding a handover function to the scheme, we simplify the authentication process as omitting the unnecessary key-exchange process when a vehicle moves to other area. And we confirm the safety and efficiency of the scheme by simulating the false positive probability and calculating the traffic.

An Analysis of Velocity Patterns and Improvement Effect after Application of Domestic Roundabout Design Guidelines (Focusing on Busan Metropolitan City) (국내 회전교차로 설계지침 적용에 따른 속도패턴과 개선효과 분석 - 부산광역시를 중심으로 -)

  • Lim, Chang-Sik;Choi, Yang-Won
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.33 no.1
    • /
    • pp.305-316
    • /
    • 2013
  • To find out if modern roundabout is still effective under drivers behavior and driving conditions in Busan Metropolitan City, the effects before and after introduction of roundabout were analyzed. According to analysis on velocity profile at roundabout, velocity deviation decreased, and average vehicle speed was close to design speed. As a result, it has been confirmed that most roundabouts were properly built. In terms of traffic operation, average vehicle speed improved by 87.2% when a traffic intersection was replaced by a roundabout. therefore, it has been found out that the introduction of roundabout has a positive effect on increasing vehicle speed by reducing traffic congestion. In addition, annual benefits expected from the replacement from a traffic intersection to a roundabout were KRW 872 million as follows; KRW 410 million in traffic communication, KRW 39 million in transportation safety, KRW 255 million in energy saving, KRW 95 million in reduction of air pollution and KRW 73 million in reduction of traffic signal installation cost. In other words, if 10% (193 spots) of all traffic intersections (1,926 spots in total) in Busan City are replaced by roundabouts, the municipal authority would be able to save about KRW 168.3 billion. According to analysis on the benefits expected from the installation of roundabouts compared to the investment cost for traffic intersections, about KRW 679 million could be saved per roundabout. Considering 10% of all traffic intersections in the City of Busan, about KRW 131 billion could be saved annually. The traffic accidents in roundabout usually occur because drivers aren't aware of right-of-way rules. Once the right-of-way rules settle, the number of traffic accidents would significantly decrease. In addition, it is urgent to promote education and campaign for drivers, pedestrians and bikers on the roundabout.

Security Credential Management & Pilot Policy of U.S. Government in Intelligent Transport Environment (지능형 교통 환경에서 미국정부의 보안인증관리 & Pilot 정책)

  • Hong, Jin-Keun
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.9
    • /
    • pp.13-19
    • /
    • 2019
  • This paper analyzed the SCMS and pilot policy, which is pursued by the U.S. government in connected vehicles. SCMS ensures authentication, integrity, privacy and interoperability. The SCMS Support Committee of U.S. government has established the National Unit SCMS and is responsible for system-wide control. Of course, it introduces security policy, procedures and training programs making. In this paper, the need for SCMS to be applied to C-ITS was discussed. The structure of the SCMS was analyzed and the U.S. government's filot policy for connected vehicles was discussed. The discussion of the need for SCMS highlighted the importance of the role and responsibilities of SCMS between vehicles and vehicles. The security certificate management system looked at the structure and analyzed the type of certificate used in the vehicle or road side unit (RSU). The functions and characteristics of the certificates were reviewed. In addition, the functions of basic safety messages were analyzed with consideration of the detection and warning functions of abnormal behavior in SCMS. Finally, the status of the pilot project for connected vehicles currently being pursued by the U.S. government was analyzed. In addition to the environment used for the test, the relevant messages were also discussed. We also looked at some of the issues that arise in the course of the pilot project.

Unsupervised Learning-Based Threat Detection System Using Radio Frequency Signal Characteristic Data (무선 주파수 신호 특성 데이터를 사용한 비지도 학습 기반의 위협 탐지 시스템)

  • Dae-kyeong Park;Woo-jin Lee;Byeong-jin Kim;Jae-yeon Lee
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.147-155
    • /
    • 2024
  • Currently, the 4th Industrial Revolution, like other revolutions, is bringing great change and new life to humanity, and in particular, the demand for and use of drones, which can be applied by combining various technologies such as big data, artificial intelligence, and information and communications technology, is increasing. Recently, it has been widely used to carry out dangerous military operations and missions, such as the Russia-Ukraine war and North Korea's reconnaissance against South Korea, and as the demand for and use of drones increases, concerns about the safety and security of drones are growing. Currently, a variety of research is being conducted, such as detection of wireless communication abnormalities and sensor data abnormalities related to drones, but research on real-time detection of threats using radio frequency characteristic data is insufficient. Therefore, in this paper, we conduct a study to determine whether the characteristic data is normal or abnormal signal data by collecting radio frequency signal characteristic data generated while the drone communicates with the ground control system while performing a mission in a HITL(Hardware In The Loop) simulation environment similar to the real environment. proceeded. In addition, we propose an unsupervised learning-based threat detection system and optimal threshold that can detect threat signals in real time while a drone is performing a mission.