• Title/Summary/Keyword: controller area network(CAN)

Search Result 298, Processing Time 0.035 seconds

Embedded Mobile Automatic System Architecture and Interface for the Telematics (텔레매틱스를 위한 임베디드 이동체 자동화 시스템 구조 및 인터페이스)

  • Han Cheol-Min;Kim Nam-Hee;Cho Hae-Sung
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.05a
    • /
    • pp.443-447
    • /
    • 2005
  • EMAST(Embedded Mobile Automatic System for Telematics) is implemented in SoC using the CAN and ARM Processor. For the general usage, EMAST must satisfy the two condition. First, Mobile internal interface is to be designed to support Differential Transceiver, Optical Transceiver and Wireless Transceiver Second, it should be supporting the interface between terminals using EMAST and telematics networks. In this paper, we propose EMAST structure and the efficient interface structure between EMAST and each mobile units.

  • PDF

Decentralized Group Key Management for Untrusted Dynamic Networks (신뢰할 수 없는 동적 네트워크 환경을 위한 비중앙화 그룹키 관리 기법)

  • Hur, Jun-Beom;Yoon, Hyun-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.4
    • /
    • pp.263-274
    • /
    • 2009
  • Decentralized group key management mechanisms offer beneficial solutions to enhance the scalability and reliability of a secure multicast framework by confining the impact of a membership change in a local area. However, many of the previous decentralized solutions reveal the plaintext to the intermediate relaying proxies, or require the key distribution center to coordinate secure group communications between subgroups. In this study, we propose a decentralized group key management scheme that features a mechanism allowing a service provider to deliver the group key to valid members in a distributed manner using the proxy cryptography. In the proposed scheme, the key distribution center is eliminated while data confidentiality of the transmitted message is provided during the message delivery process. The proposed scheme can support a secure group communication in dynamic network environments where there is no trusted central controller for the whole network and the network topology changes frequently.

Blocking Intelligent Dos Attack with SDN (SDN과 허니팟 기반 동적 파라미터 조절을 통한 지능적 서비스 거부 공격 차단)

  • Yun, Junhyeok;Mun, Sungsik;Kim, Mihui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.1
    • /
    • pp.23-34
    • /
    • 2022
  • With the development of network technology, the application area has also been diversified, and protocols for various purposes have been developed and the amount of traffic has exploded. Therefore, it is difficult for the network administrator to meet the stability and security standards of the network with the existing traditional switching and routing methods. Software Defined Networking (SDN) is a new networking paradigm proposed to solve this problem. SDN enables efficient network management by programming network operations. This has the advantage that network administrators can flexibly respond to various types of attacks. In this paper, we design a threat level management module, an attack detection module, a packet statistics module, and a flow rule generator that collects attack information through the controller and switch, which are components of SDN, and detects attacks based on these attributes of SDN. It proposes a method to block denial of service attacks (DoS) of advanced attackers by programming and applying honeypot. In the proposed system, the attack packet can be quickly delivered to the honeypot according to the modifiable flow rule, and the honeypot that received the attack packets analyzed the intelligent attack pattern based on this. According to the analysis results, the attack detection module and the threat level management module are adjusted to respond to intelligent attacks. The performance and feasibility of the proposed system was shown by actually implementing the proposed system, performing intelligent attacks with various attack patterns and attack levels, and checking the attack detection rate compared to the existing system.

A Study of Automatic Fire Detection Installation based CAN Comunnication (CAN 통신기반 자동화재탐지설비에 관한 연구)

  • Kim, Young-Dong;Oh, Guem-Kon;Kang, Won-Chan
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.20 no.2
    • /
    • pp.50-59
    • /
    • 2006
  • In this paper, We are going to propose the fire protection system using CAN(Controller Area Network). The larger, higher and deeper buildings an, the more dangerous people are when fire happens. We should be aware of the problems of prior fire protection system. Therefore, we construct the embedded system based on CAN communication that is capable of N to N communication, and build independent fire protection system. If the fire is occurred on the building, the problem is that how fast we can detect the fire and put it on by using available system, this is major factor that reduces damage of our wealth. Therefore in this studies, We would like to design more stable system than current system. This system is based on CAN communication which is available N to N communication constructs and designed to compensate for each fault, so that our aim is to reduce the wires of system, cost of installation and to suppose future type fire protection system.

Analyzing of connected car vulnerability and Design of Security System (커네티트 카의 취약점 분석 및 보안 시스템 설계)

  • Kim, Tae-Hyoung;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.241-243
    • /
    • 2016
  • In the Past, Trend of car security was Physical Something like doorlock system, and The Generation did not have skills connecting External devices. Through Car Development is up, that trend of car security Changed Physical Security to Intelligence Security. This Changes give a chance to hackers to attack this system. This System use CAN(Controller Area Network) Protocol which have three vulnerabilities. First, ID Spoofing, Twice, D - Dos Attack, Third, Android Application Injected Modern cars have many ECU(Electronic Control Unit) to control devices like Engine ON/OFF, Door Lock Handling, and Controlling Handle. Because CAN Protocol spread signal using broadcast, Hackers can get the signal very easily, and Those often use Mobile devices like Android or IOS to attack this system. if bluetooth signal is spread wide, hackers get the signal, and analysis the bluetooth data, so then They makes certain data to attack ECU, they send the data to ECU, and control ECU installed car. so I suggest that I will prevent this attack to make Auth system and prevent this attack in end of Android.

  • PDF

Design of Bi-directional RDM-DMX512 Converter for LED Lighting Control

  • Hung, Nguyen Manh;Lee, Chang-Hoon
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.13 no.2
    • /
    • pp.106-115
    • /
    • 2013
  • LED lighting control system using unidirectional DMX512 (digital multiplex with 512 pieces of information)) protocol has been the most popular. Nowadays, the user's consumption has been upgrading to the more intelligent system but the upgrading process does not affect the existing infrastructure. There were many researches use the additional communication for the feedback communication way such as WiFi, Controller Area Network (CAN), Power Line Communication (PLC), etc but all researches had inherent disadvantages that created the independent feedback with the existing DMX512 system. Our paper represents the novel method that uses the remote device management (RDM) protocol to associate the additional feedback with existent DMX512 infrastructure in the one system. The data in DMX512 frame sending to the DMX512 client is split and repacked to become the RDM packet. This RDM packet is transferred to the RDM monitor console and the response RDM packet is converted to the DMX512 frame for control DMX512 client devices. This is the closed loop control model which uses the bidirectional convertibility between RDM packet and DMX512 frame. The proposed method not only upgrades the feedback control function for the old DMX512 system without changing the existent infrastructure, but also solves compatible problems between new RDM devices and old DMX512 devices and gives the low cost solution for extending DMX512 universe.

자동차 스마트키 시스템 보안 연구 동향

  • Kyungho Joo;Wonsuk Choi;Dong Hoon Lee
    • Review of KIISC
    • /
    • v.33 no.4
    • /
    • pp.13-22
    • /
    • 2023
  • Controller area network (CAN) 네트워크로 대표되는 자동차 내부네트워크와 비교하여 자동차 스마트키 시스템은 상대적으로 소수의 연구가 진행되어오고 있다. 하지만, 현실 세계에서는 스마트키 시스템의 취약점으로 인해 많은 피해사례가 발생하고 있다. 대표적으로, 2010년 NDSS 학회에 소개된 신호 중계 공격 (signal relay attack)은 현재까지도 수많은 자동차 절도 사건들에 악용되고 있다. 이와 같은 문제를 근본적으로 해결하기 위해 초광대역 통신(ultra-wideband communication, UWB)을 사용한 디지털 키 (Digital Key) 기술이 일부 최신 자동차들에 탑재되고 있다. 하지만, 2022년USENIX Security 학회에서 애플, 삼성과 같은 글로벌 기업이 채택한 high rate pulse repetition frequency (HRP) UWB 측위 시스템에 대한 거리 단축 공격 (distance reduction attack)이 가능함이 소개되었다. 이는 디지털 키 시스템 또한 신호중계 공격과 같은 보안 위협에 노출될 수 있다는 점을 시사한다. 본 논문에서는 자동차 스마트키 시스템을 대상으로 수행된 공격 연구 사례들을 살펴본다. 먼저, remote keyless entry (RKE) 시스템 및 passive keyless entry and start (PKES) 시스템으로 대표되는 기존 스마트키 시스템을 대상으로 하는 보안 위협에 대해 살펴본다. 다음으로 차세대 스마트키 시스템으로 주목받고 있는 디지털키 시스템을 구성하는 초광대역 통신기술의 동작 원리 및 이에 대한 보안위협 연구 동향을 살펴본다.

OBD2 Vehicle Operation Information Black Box System for Accident Preparedness (사고 발생에 대비한 OBD2 차량 운행 정보 블랙박스)

  • Jun-Young Kim;Jun-Hee Kim;Hyung-Seong Oh;Jae-Hyung Choi;Kyung-Ho Ko;Myung-Chun Ryoo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2024.01a
    • /
    • pp.279-280
    • /
    • 2024
  • 본 논문에서는 주행 중 차량의 상태를 실시간으로 모니터링함과 동시에, 페달 조작 여부를 확인할 수 있는 영상 촬영 및 저장 시스템을 제안한다. 개발된 차량 운행 정보 블랙박스는 블루투스 OBD2 커넥터를 통해 차량의 PID 값을 식별하고 수집한다. 이 데이터는 비동기 방식으로 처리되며, 라즈베리파이와 7인치 터치 디스플레이를 이용해 운전자에게 한눈에 보일 수 있는 형태로 정보를 제공한다. 특히, 멀티스레드를 활용하여 ECU 정보를 페달 조작 여부 영상에 표시하는 동시에 녹화하고, CSV 파일로 SD 카드에 실시간으로 저장한다. 수집된 차량 데이터와 영상 데이터는 예기치 못한 사고 발생 시 운전자의 과실 비율 측정과 대처행동을 입증하는 데 중요한 역할을 할 것으로 기대되며, 차량 정비 시 참고 자료로 활용될 수 있다.

  • PDF

The Control System of a Medical Robot Bed for Prevention and Healing of Pressure Ulcer (욕창 예방 및 치유를 위한 의료용 로봇 침대 제어 시스템)

  • Lee, Youngdae;Kim, Changyoung;Chang, Changjun;Kim, Jung Ae;Lim, Jae-Young
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.3
    • /
    • pp.353-359
    • /
    • 2020
  • In this study, the controller structure and control algorithm of medical robot bed developed for pressure ulcer prevention and healing are described. The existing pressure ulcer prevention mattress is operated manually and the remaining maximum body pressure exceeds the pressure of ulcer generation, so there is always room for pressure ulcers. However, the system developed in this study does not generate the pressure ulcers because the body pressure drops to zero when the keyboard of the bed descends using the active electric driving keyboard. In addition, even if the bed is raised and the pressure above the critical body ulcer pressure is abnormal, the device and the control algorithm are designed so that the lasting time is within the pressure ulcer generation critical time and the pressure ulcer itself is not generated. The bed key board motor is a motor designed with the BLDC servos suitable for medical use and these can communicate each other easily through CAN(Car Area Network). The system is new medical robot bed that is effective in preventing pressure ulcers and will be distributed to many patients suffering from pressure ulcers.

Design of Fault Diagnostic and Fault Tolerant System for Induction Motors with Redundant Controller Area Network

  • Hong, Won-Pyo;Yoon, Chung-Sup;Kim, Dong-Hwa
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2004.11a
    • /
    • pp.371-374
    • /
    • 2004
  • Induction motors are a critical component of many industrial processes and are frequently integrated in commercially available equipment. Safety, reliability, efficiency, and performance are some of the major concerns of induction motor applications. Preventive maintenance of induction motors has been a topic great interest to industry because of their wide range application of industry. Since the use of mechanical sensors, such as vibration probes, strain gauges, and accelerometers is often impractical, the motor current signature analysis (MACA) techniques have gained murk popularity as diagnostic tool. Fault tolerant control (FTC) strives to make the system stable and retain acceptable performance under the system faults. All present FTC method can be classified into two groups. The first group is based on fault detection and diagnostics (FDD). The second group is independent of FDD and includes methods such as integrity control, reliable stabilization and simultaneous stabilization. This paper presents the fundamental FDD-based FTC methods, which are capable of on-line detection and diagnose of the induction motors. Therefore, our group has developed the embedded distributed fault tolerant and fault diagnosis system for industrial motor. This paper presents its architecture. These mechanisms are based on two 32-bit DSPs and each TMS320F2407 DSP module is checking stator current, voltage, temperatures, vibration and speed of the motor. The DSPs share information from each sensor or DSP through DPRAM with hardware implemented semaphore. And it communicates the motor status through field bus (CAN, RS485). From the designed system, we get primitive sensors data for the case of normal condition and two abnormal conditions of 3 phase induction motor control system is implemented. This paper is the first step to drive multi-motors with serial communication which can satisfy the real time operation using CAN protocol.

  • PDF