• Title/Summary/Keyword: car hacking

Search Result 19, Processing Time 0.023 seconds

Study of Monitoring Performance Measurement and Performance Evaluation for Car Surveillance using CCTV Camera (CCTV기반 차량관제의 성능 평가 및 관제율 측정 방법 연구)

  • Seo, Tae-Woong;Kim, Chang-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.802-804
    • /
    • 2011
  • There are various monitoring and control system using CCTV camera. However, it is important to consider disaster and terrorism with unauthorized changes on location information. Therefore we analyzed performance of observation when the camera is break down as a result from hacking to CCTV monitoring and control system.

  • PDF

A Study on the Prediction and Countermeasure of Hacking Threat of Car using Bluetooth (블루투스를 통한 자동차 해킹 위협에 대한 예상과 대응방안에 대한 연구)

  • Kwon, Ku-Hwan;Lee, Keun-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.477-479
    • /
    • 2015
  • 해킹의 범위가 넓어지고 있는 현 시대에는 컴퓨터 통신 장비만을 해킹 하던 과거와 달리 우리가 살고 있는 21세기에는 컴퓨터 시스템에 한정되지 않고 인간이 사용하는 모든 장비에 통신시스템이 설계되면서 해킹이 가능한 장비들의 범주가 증가하고 있고 인간이 사용하는 모든 통신장비를 해킹하는 사례가 증가하는 추세이다. 특히 스마트 자동차가 나오기 시작하면서 스마트 자동차에 대한 해킹의 위험이 높아지고 있는 상황이다. 블루투스에 대한 보안적인 요소들과 보안 취약점 및 대응방안에 대하여 제안하였다.

The impact of security and privacy risk on smart car safety and trust (보안과 프라이버시 위험이 스마트카 안전과 신뢰에 미치는 영향)

  • Soonbeom Kwon;Hwansoo Lee
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.9-19
    • /
    • 2023
  • Smart cars, which incorporate information and communication technologies (ICT) to improve driving safety and convenience for drivers, have recently emerged. However, the increasing risk of automotive cybersecurity due to the vulnerability of electronic control units (ECUs) and automotive networks, which are essential for realizing the autonomous driving functions of smart cars, is a major obstacle to the widespread adoption of smart cars. Although there have been only a few real-world cases of smart car hacking, drivers' concerns about the security of smart cars can have a negative impact on their proliferation. Therefore, it is important to understand the risk factors perceived by drivers and the trust in smart cars formed through them in order to promote the future diffusion of smart cars. This study examines the risk factors that affect the formation of trust in smart cars, focusing on security and privacy, and analyzes how these factors affect safety perceptions and trust in smart cars.

A Design of Secure Communication Framework for Device Management and User Authentication in Wireless Network Environment (무선 네트워크 환경에서 기기 관리 및 사용자 인증을 위한 안전한 통신 프레임워크 설계)

  • Park, JungOh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.2
    • /
    • pp.43-52
    • /
    • 2019
  • The recent technological developments of smart devices, multiple services are provided to enhance the users' quality of life including smart city, smart energy, smart car, smart healthcare, smart home, and so on. Academia and industries try to provide the users with convenient services upon seamless technological research and developments. Also, whenever and wherever a variety of services can be used without any limitation on the place and time upon connecting with different types of devices. However, security weaknesses due to integrations of multiple technological elements have been detected resulting in the leakage of user information, account hacking, and privacy leakage, threats to people's lives by device operation have been raised. In this paper, safer communication framework is suggested by device control and user authentication in the mobile network environment. After implementations of registration and authentication processes by users and devices, safe communication protocol is designed based on this. Also, renewal process is designed according to the safe control of the device. In the performance evaluation, safety was analyzed on the attack of protocol change weakness occurred in the existing system, service halt, data leakage, illegal operation control of message, and so on, which confirmed the enhanced speed approximately by 8% and 23% in the communication and verification parts, respectively, compared to the existing system.

Neural Network and Cloud Computing for Predicting ECG Waves from PPG Readings

  • Kosasih, David Ishak;Lee, Byung-Gook;Lim, Hyotaek
    • Journal of Multimedia Information System
    • /
    • v.9 no.1
    • /
    • pp.11-20
    • /
    • 2022
  • In this paper, we have recently created self-driving cars and self-parking systems in human-friendly cars that can provide high safety and high convenience functions by recognizing the internal and external situations of automobiles in real time by incorporating next-generation electronics, information communication, and function control technologies. And with the development of connected cars, the ITS (Intelligent Transportation Systems) market is expected to grow rapidly. Intelligent Transportation System (ITS) is an intelligent transportation system that incorporates technologies such as electronics, information, communication, and control into the transportation system, and aims to implement a next-generation transportation system suitable for the information society. By combining the technologies of connected cars and Internet of Things with software features and operating systems, future cars will serve as a service platform to connect the surrounding infrastructure on their own. This study creates a research methodology based on the Enhanced Security Model in Self-Driving Cars model. As for the types of attacks, Availability Attack, Man in the Middle Attack, Imperial Password Use, and Use Inclusive Access Control attack defense methodology are used. Along with the commercialization of 5G, various service models using advanced technologies such as autonomous vehicles, traffic information sharing systems using IoT, and AI-based mobility services are also appearing, and the growth of smart transportation is accelerating. Therefore, research was conducted to defend against hacking based on vulnerabilities of smart cars based on artificial intelligence blockchain.

Research on Countermeasures of Controller Area Network Vulnerability (Controller Area Network 취약점 분석 및 대응 방안 연구)

  • Hong, Sunghyuck
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.115-120
    • /
    • 2018
  • As the number ofconnected cars grows, the security of the connected cars is becoming more important. There are also increasing warnings about the threat of attacks via the CAN bus used for in-vehicle networks. An attack can attack through a vulnerability in the CAN bus because the attacker can access the CAN bus remotely, or directly to the vehicle, without a security certificate on the vehicle, and send a malicious error message to the devices connected to the CAN bus. A large number of error messages put the devices into a 'Bus-Off' state, causing the device to stop functioning. There is a way to detect the error frame, or to manage the power of the devices related to the bus, but eventually the new standard for the CAN bus will be the fundamental solution to the problem. If new standards are adopted in the future, they will need to be studied.

Proposal of New Data Processing Function to Improve the Security of Self-driving Cars' Systems (자율주행 자동차의 시스템 보안 향상을 위한 새로운 데이터처리 기능 제안)

  • Jang, Eun-Jin;Shin, Seung-Jung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.4
    • /
    • pp.81-86
    • /
    • 2020
  • With the development of the intelligent Internet of Things AIoT that goes beyond the IoT of the Internet of Things, the industry is changing overall. In addition, with the advent of the 4th Industrial Revolution, revolutionary changes and developments are also taking place in the automobile industry. A representative example is "autonomous driving vehicle". Because the domestic and foreign interests in autonomous vehicles have increased, many developments have been made, and although limited, they have developed into the commercialization stage. However, the structure of the autonomous vehicle that collects, analyzes, and controls data using various sensors installed in the vehicle, not the driver, is often insufficiently exposed to hacking due to the lack of multiplexed devices for security. In this case, as this can be a threat not only to the driver, but also to the surrounding environment, this paper proposes a new data processing function to improve the system security of autonomous vehicles.

Development of Software-Defined Perimeter-based Access Control System for Security of Cloud and IoT System (Cloud 및 IoT 시스템의 보안을 위한 소프트웨어 정의 경계기반의 접근제어시스템 개발)

  • Park, Seung-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.2
    • /
    • pp.15-26
    • /
    • 2021
  • Recently, as the introduction of cloud, mobile, and IoT has become active, there is a growing need for technology development that can supplement the limitations of traditional security solutions based on fixed perimeters such as firewalls and Network Access Control (NAC). In response to this, SDP (Software Defined Perimeter) has recently emerged as a new base technology. Unlike existing security technologies, SDP can sets security boundaries (install Gateway S/W) regardless of the location of the protected resources (servers, IoT gateways, etc.) and neutralize most of the network-based hacking attacks that are becoming increasingly sofiscated. In particular, SDP is regarded as a security technology suitable for the cloud and IoT fields. In this study, a new access control system was proposed by combining SDP and hash tree-based large-scale data high-speed signature technology. Through the process authentication function using large-scale data high-speed signature technology, it prevents the threat of unknown malware intruding into the endpoint in advance, and implements a kernel-level security technology that makes it impossible for user-level attacks during the backup and recovery of major data. As a result, endpoint security, which is a weak part of SDP, has been strengthened. The proposed system was developed as a prototype, and the performance test was completed through a test of an authorized testing agency (TTA V&V Test). The SDP-based access control solution is a technology with high potential that can be used in smart car security.

New attempt on the Autonomous Vehicles Act based on criminal responsibility (자율주행자동차 사고시 형사책임에 따른 '자율주행자동차의 운행과 책임에 관한 법률안' 시도)

  • Lee, Seung-jun
    • Journal of Legislation Research
    • /
    • no.53
    • /
    • pp.593-631
    • /
    • 2017
  • Like the technological competition of each country around commercialization of Autonomous Vehicles(the rest is 'AV'), legalizations are also in a competition. However, in the midst of this competition, the Ethik-Kommission Automatisiertes und vernetztes Fahren of Germany has recently introduced 20 guidelines. This guideline is expected to serve as a milestone for future AV legislations. In this paper, I have formulated a new legislative proposal that will incorporate the main content presented by the Ethik-Kommission. The structure is largely divided into general rules of purpose and definition, chapter on types of AV and safety standards, registration and inspection, maintenance, licenses for AV, driver's obligations, insurance and accident responsibilities, roads and facilities, traffic system, and chapter on penalties. The commercialization of AV in Korea seems to be in a distant future, and it is possible to pretend that it is not necessary to prepare legal systems. But considering our reality, leading legislation may be necessary. In this paper, I have prepared individual legislative proposals based on the essential matters based on the criminal responsibility in case of AV car accidents. To assure the safety of AV, AV and mode of operation were defined for more clear interpretation and application of law, and basic safety standards for AV were presented. In addition, the obligation of insurance and the liability for damages were defined, and the possibility of immunity from the criminal responsibility was examined. Furthermore, I have examined the penalties for penalties such as hacking in order to secure the effectiveness of the Act. Based on these discussions, I have attempted the 'Autonomous Vehicles Act', which aims to provide a basis for new discussions to be held on the basis of various academic fields related to the operation of AV and related industries in the future. Although there may be a sense of unurgency in time, the automobile industry needs time to prepare for the regulation of the AV ahead of time. And a process of public debate is also needed for the ecosystem of healthy AV industry.