• Title/Summary/Keyword: Vehicle Safety Communication

Search Result 332, Processing Time 0.094 seconds

Development of Traffic Safety Monitoring Technique by Detection and Analysis of Hazardous Driving Events in V2X Environment (V2X 환경에서 위험운전이벤트 검지 및 분석을 통한 교통안전 모니터링기법 개발)

  • Jeong, Eunbi;Oh, Cheol;Kang, Kyeongpyo;Kang, Younsoo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.11 no.6
    • /
    • pp.1-14
    • /
    • 2012
  • Traffic management centers (TMC) collect real-time traffic data from the field and have powerful databases for analysing, recording, and archiving the data. Recent advanced sensor and communication technologies have been widely applied to intelligent transportation systems (ITS). Regarding sensors, various in-vehicle sensors, in addition to global positioning system (GPS) receiver, are capable of providing high resolution data representing vehicle maneuverings. Regarding communication technologies, advanced wireless communication technologies including vehicle-to-vehicle (V2V) and vehicle-to-vehicle infrastructure (V2I), which are generally referred to as V2X, have been widely used for traffic information and operations (references). The V2X environment considers the transportation system as a network in which each element, such as the vehicles, infrastructure, and drivers, communicates and reacts systematically to acquire information without any time and/or place restrictions. This study is motivated by needs of exploiting aforementioned cutting-edge technologies for developing smarter transportation services. The proposed system has been implemented in the field and discussed in this study. The proposed system is expected to be used effectively to support the development of various traffic information control strategies for the purpose of enhancing traffic safety on highways.

Hacking attack and vulnerabilities in vehicle and smart key RF communication (차량과 스마트키 RF통신에 대한 해킹 공격 및 취약점에 대한 연구)

  • Kim, Seung-woo;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.8
    • /
    • pp.1052-1057
    • /
    • 2020
  • With the development of new ICT technology, smart keys for vehicles are terminals with ICT technology. Therefore, when the vehicle and the smart key communicate with RF, a cyber hacking attack is possible. Cyber-attacks on smart keys can pose a threat to vehicle theft and vehicle control. Therefore, it is necessary to study hacking attacks and vulnerabilities of smart keys for autonomous vehicles. In this paper, we analyze the cyber attack case of RF communication for vehicles and smart keys. In addition, a real RF cyber attack on the smart key is performed, and the vulnerability of radio wave replication in the same frequency band is found. In this paper, we analyze the vulnerability of RF communication between vehicles and smart keys, and propose a countermeasure against cyber security. In the future, plans to strengthen cyber attacks and security through the popularization of autonomous vehicles will become basic data to protect human and vehicle safety.

A Robust Scheme for Emergency Message Delivery in Vehicle Communications on Freeway (고속도로상의 차량간 통신에서 에러에 강한 긴급메시지 전달 기법)

  • Park, Jeong-Seo;Park, Tae-Keun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.12A
    • /
    • pp.1113-1121
    • /
    • 2010
  • The Vehicle Safety Communications (VSC) is one of VANET applications for preventing vehicle accidents, and it utilizes vehicle-to-vehicle communication to exchange emergency messages. To propagate such messages in VSC, several schemes based on selective flooding have been proposed. Their common idea is that an emergency message is relayed by one of vehicles receiving the message. However, the schemes do not consider the transmission errors and duplications of an emergency event. In the schemes, if there are transmission errors and a vehicle detects a hazard, there may be vehicles which fail to receive an emergency message. If k vehicles detect a hazard, k emergency messages are created and propagated. The duplications of an event increase reliability of the message delivery but decrease efficiency. In this paper, we propose an emergency message delivery scheme which is efficient and robust to transmission errors. Our proposed scheme utilizes clustering for massage aggregation and retransmissions in a cluster. It also uses an acknowledgment mechanism for reliable inter-cluster communication. Our simulation results show that the proposed scheme outperforms Least Common Neighbor Flooding which is one of the selective flooding schemes.

Measures for Automaker's Legal Risks from Security Threats in Connected Car Development Lifecycle

  • Kim, Dong Hee;Baek, Seung Jo;Lim, Jongin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.865-882
    • /
    • 2017
  • To improve passenger convenience and safety, today's vehicle is evolving into a "connected vehicle," which mounts various sensors, electronic control devices, and wired/wireless communication devices. However, as the number of connections to external networks via the various electronic devices of connected vehicles increases and the internal structures of vehicles become more complex, there is an increasing chance of encountering issues such as malfunctions due to various functional defects and hacking. Recalls and indemnifications due to such hacking or defects, which may occur as vehicles evolve into connected vehicles, are becoming a new risk for automakers, causing devastating financial losses. Therefore, automakers need to make voluntary efforts to comply with security ethics and strengthen their responsibilities. In this study, we investigated potential security issues that may occur under a connected vehicle environment (vehicle-to-vehicle, vehicle-to-infrastructure, and internal communication). Furthermore, we analyzed several case studies related to automaker's legal risks and responsibilities and identified the security requirements and necessary roles to be played by each player in the automobile development process (design, manufacturing, sales, and post-sales management) to enhance their responsibility, along with measures to manage their legal risks.

On the Performance Management System to Analyse the Effectiveness of Type Approval System for Railway Vehicle

  • Lee, Young Hoon;Lee, Jee Ha;Park, Chan Kyung;Kim, Young Min
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.1-10
    • /
    • 2021
  • The type approval system for railway vehicle has been in effect since 2016 in order to establish a regular safety management system to secure railway safety and enhance the technological competitiveness of the railway industry, abolished the conventional performance test system through the reform of the Railroad Safety Act in 2012. Until now, there has been appreciated it has been making significant contributions to railway safety and industry of operation and manufacturing companies, taking their place in accordance with the implementation of the system. But there has been no case of quantitative analysis on the effectiveness of the actual system. In this study, in order to examine the full-scale performance of the approval system and quantitatively analyze effectiveness, we identified and defined the relationships with the major elements of the type approval system based on system thinking principle and determined the calculated outcomes to relevant stakeholders. A method of establishing a type approval performance management system that can be grasped, utilized, and adjusted from a point of various stakeholders' views was proposed. This is expected to be more helpful in the implementation of the system, such as improving and applying quantitative effects to analysis by closely reviewing the effects and influencing factors of the type approval system based on the data accumulated through continuous performance management and reflecting to system improvement.

An Efficient Anonymous Authentication Scheme with Secure Communication in Intelligent Vehicular Ad-hoc Networks

  • Zhang, Xiaojun;Mu, Liming;Zhao, Jie;Xu, Chunxiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3280-3298
    • /
    • 2019
  • Vehicular ad-hoc networks (VANETs) have become increasingly significant in intelligent transportation systems, they play a great role in improving traffic safety and efficiency. In the deployment of intelligent VANETs, intelligent vehicles can efficiently exchange important or urgent traffic information and make driving decisions. Meanwhile, secure data communication and vehicle's identity privacy have been highlighted. To cope with these security issues, in this paper, we construct an efficient anonymous authentication scheme with secure communication in intelligent VANETs. Combing the ElGamal encryption technique with a modified Schnorr signature technique, the proposed scheme provides secure anonymous authentication process for encrypted message in the vehicle-to-infrastructure communication model, and achieves identity privacy, forward security, and reply attack resistance simultaneously. Moreover, except the trusted authority (TA), any outside entity cannot trace the real identity of an intelligent vehicle. The proposed scheme is designed on an identity-based system, which can remove the costs of establishing public key infrastructure (PKI) and certificates management. Compared with existing authentication schemes, the proposed scheme is much more practical in intelligent VANETs.

Development of Collision Safety Control Logic using ADAS information and Machine Learning (머신러닝/ADAS 정보 활용 충돌안전 제어로직 개발)

  • Park, Hyungwook;Song, Soo Sung;Shin, Jang Ho;Han, Kwang Chul;Choi, Se Kyung;Ha, Heonseok;Yoon, Sungroh
    • Journal of Auto-vehicle Safety Association
    • /
    • v.14 no.3
    • /
    • pp.60-64
    • /
    • 2022
  • In the automotive industry, the development of automobiles to meet safety requirements is becoming increasingly complex. This is because quality evaluation agencies in each country are continually strengthening new safety standards for vehicles. Among these various requirements, collision safety must be satisfied by controlling airbags, seat belts, etc., and can be defined as post-crash safety. Apart from this safety system, the Advanced Driver Assistance Systems (ADAS) use advanced detection sensors, GPS, communication, and video equipment to detect the hazard and notify driver before the collision. However, research to improve passenger safety in case of an accident by using the sensor of active safety represented by ADAS in the existing passive safety is limited to the level that utilizes the sudden braking level of the FCA (Forward Collision-avoidance Assist) system. Therefore, this study aims to develop logic that can improve passenger protection in case of an accident by using ADAS information and driving information secured before a collision. The proposed logic was constructed based on LSTM deep learning techniques and trained using crash test data.

Fuzzy-AHP Estimation Technique for Korea High Speed Railway Safety Management (F-AHP 평가수법을 적용한 고속전철 안전성의 평가)

  • Park Tae-Keun;Park Choon-Soo;Seo Sung-Il
    • Proceedings of the KSR Conference
    • /
    • 2004.06a
    • /
    • pp.328-333
    • /
    • 2004
  • Railway is huge traffic system which is operated organically combining all the elements; vehicle, track, electric power, signal/communication, operation, etc. Safety level has ben improved steadily by learning lessons from past accident. But with rapid progress in high-speed, massive, high-frequency transit fresh idea of accident prevention is now in order. In quest of effective and efficient countermeasure, we aim to establish an adequate safety evaluation/management method. Our proposals are basic concept relating to safety analysis of fatal accidents, AHP of Saaty, Fuzzy AHP.

  • PDF

Fuzzy-AHP Estimation Technique for Korea High Speed Railway Safety Management (F-AHP평가수법을 적용한 고속전철 안전성의 평가)

  • 박태근;박춘수;서승일
    • Proceedings of the KSR Conference
    • /
    • 2003.10a
    • /
    • pp.192-198
    • /
    • 2003
  • Railway is huge traffic system which is operated organically combining all the elements; vehicle, track, electric power, signal/communication, operation, etc. Safety level has been improved steadily by learning lessons from past accident. But with rapid progress in high-speed, massive, high-frequency transit fresh idea of accident prevention is now in order. In quest of effective and efficient countermeasure, we aim to establish an adequate safety evaluation/management method. Our proposals are basic concept relating to safety analysis of fatal accidents, AHP of Saaty, Fuzzy AHP.

  • PDF

Smart Navigation System Implementation by MOST Network of In-Vehicle (차량 내 MOST Network를 이용한 지능형 Navigation 구현)

  • Kim, Mi-jin;Baek, Sung-hyun;Jang, Jong-wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.82-85
    • /
    • 2009
  • Lately, in the automotive market appeared keywords such as convenience, safety in presentation and increase importance of part of vehicle. Accordingly, the use of many electronic devices was required essentially and communication between electronic devices is being highlighted. Various devices such as controllers, sensors and multimedia device(audio, speakers, video, navigation) in-vehicle connected car network such as CAN, MOST. Modern in-vehicle network managed and operated as purpose of each other. In this Paper, intelligent car navigation considering convenience and safety implement on MOST Network and present system to control CAN Network in vehicle.

  • PDF