• Title/Summary/Keyword: vehicle ID

Search Result 65, Processing Time 0.03 seconds

Car Theft Protection System using CAN Communication and Smart Devicenment (CAN 통신과 Smart Device를 이용한 차량 도난 방지 System)

  • Kim, Jae-Kyung;Hwang, Man-Tae;Kim, Young-Kil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.10
    • /
    • pp.2136-2142
    • /
    • 2011
  • Smart Device Communications using the development of anti-theft system for vehicles have been investigated. because Progress of Smart Device If someone get the Key for Vehicle theft, he can be easily stolen vehicle. We thought about the concept of dual security devices. Using vehicle's identifier ID of CAN, when Comparing Smat phone identifier ID value and identifier ID received from the Can in the Head, If the same ID is compared. At this point after the activity of the vehicle's ACC On/Off the system allows the vehicle's ignition.

Smart Card and Dynamic ID Based Electric Vehicle User Authentication Scheme (스마트카드 및 동적 ID 기반 전기 자동차 사용자 인증 스킴)

  • Jung, Su-Young;Kwak, Jin
    • Journal of Digital Convergence
    • /
    • v.11 no.7
    • /
    • pp.141-148
    • /
    • 2013
  • Smart grid can two-way communication using ICT(Information & Communication Technology). Also, smart grid can supply to dynamic power that grafted to electric vehicle can activate to electric vehicle charging infrastructure and used to storage battery of home. Storage battery of home can resale to power provider. These electric vehicle charging infrastructure locate fixed on home, apartment, building, etc charging infrastructure that used fluid on user. If don't authentication for user of fluid user use to charging infrastructure, electric charging service can occurred to illegal use, electric charges and leakgage of electric information. In this paper, we propose smartcard and dynamic ID based user authentication scheme for used secure to electric vehicle service in smart grid environment.

Development of Dynamic ID Allocation Algorithm for Real-time Quality-of-Service of Controller Area Network (Controller Area Network 의 실시간 서비스 품질 향상을 위한 동적 ID 할당 알고리즘 개발)

  • Lee, Suk;Ha, Kyoung-Nam;Lee, Kyung-Chang
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.26 no.10
    • /
    • pp.40-46
    • /
    • 2009
  • Recently CAN (Controller Area Network) is widely used as an in-vehicle networking protocol for intelligent vehicle. The identifier field (ID) of CAN is used not only to differentiate the messages but also to give different priorities to access the bus. This paper presents a dynamic 10 allocation algorithm in order to enhance the real-time quality-of-service (QoS) performance. When the network traffic is increased, this algorithm can allocate a network resource to lower priority message without degradation of the real-time QoS performance of higher priority message. In order to demonstrate the algorithm's feasibility, message transmission delays have been measured with and without the algorithm on an experimental network test bed.

GAN Based Adversarial CAN Frame Generation Method for Physical Attack Evading Intrusion Detection System (Intrusion Detection System을 회피하고 Physical Attack을 하기 위한 GAN 기반 적대적 CAN 프레임 생성방법)

  • Kim, Dowan;Choi, Daeseon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1279-1290
    • /
    • 2021
  • As vehicle technology has grown, autonomous driving that does not require driver intervention has developed. Accordingly, CAN security, an network of in-vehicles, has also become important. CAN shows vulnerabilities in hacking attacks, and machine learning-based IDS is introduced to detect these attacks. However, despite its high accuracy, machine learning showed vulnerability against adversarial examples. In this paper, we propose a adversarial CAN frame generation method to avoid IDS by adding noise to feature and proceeding with feature selection and re-packet for physical attack of the vehicle. We check how well the adversarial CAN frame avoids IDS through experiments for each case that adversarial CAN frame generated by all feature modulation, modulation after feature selection, preprocessing after re-packet.

Self Updatable Pseudonym System for VANET (VANET를 위한 차량자체 갱신가능 익명ID 시스템)

  • Kim, Sang-Jin;Lee, Byeong-Woo;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.93-103
    • /
    • 2009
  • Since message forgery or alteration in VANET may cause severe consequences, authentication of critical messages must be provided. However, using normal digital signature may infringe privacy of drivers. Therefore, VANET requires authentication systems that provide conditional anonymity. In this paper, we propose a new authentication system for VANET. In our proposed system, each vehicle can update its pseudonym using re-encryption technique and digitally sign messages using representation problem on the pseudonym. By limiting the usage period, revocation of individual pseudonym is not required. Moreover, we also provide a way to revoke the vehicle itself. Secureness of our system partially rely on the usage of tamper-resistance hardware.

Deep Neural Networks Learning based on Multiple Loss Functions for Both Person and Vehicles Re-Identification (사람과 자동차 재인식이 가능한 다중 손실함수 기반 심층 신경망 학습)

  • Kim, Kyeong Tae;Choi, Jae Young
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.8
    • /
    • pp.891-902
    • /
    • 2020
  • The Re-Identification(Re-ID) is one of the most popular researches in the field of computer vision due to a variety of applications. To achieve a high-level re-identification performance, recently other methods have developed the deep learning based networks that are specialized for only person or vehicle. However, most of the current methods are difficult to be used in real-world applications that require re-identification of both person and vehicle at the same time. To overcome this limitation, this paper proposes a deep neural network learning method that combines triplet and softmax loss to improve performance and re-identify people and vehicles simultaneously. It's possible to learn the detailed difference between the identities(IDs) by combining the softmax loss with the triplet loss. In addition, weights are devised to avoid bias in one-side loss when combining. We used Market-1501 and DukeMTMC-reID datasets, which are frequently used to evaluate person re-identification experiments. Moreover, the vehicle re-identification experiment was evaluated by using VeRi-776 and VehicleID datasets. Since the proposed method does not designed for a neural network specialized for a specific object, it can re-identify simultaneously both person and vehicle. To demonstrate this, an experiment was performed by using a person and vehicle re-identification dataset together.

Vehicle Running Characteristics for Interrupted Traffic Flow by Using Cellular Automata (CA 모델을 활용한 단속류에서의 차량주행 특성)

  • Jung, Kwangsu;Do, Myungsik;Lee, Jongdal;Lee, Yongdoo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.11 no.6
    • /
    • pp.31-39
    • /
    • 2012
  • This study aims to suggest a methodology of localizing and calibrating parameters, such as acceleration, deceleration, and lane changing which are the basis of car following model in interrupted traffic flow to overcome the limitation of origin and destination based transportation simulation and to verify the application of activity-based model for use in Korean roadway condition in a large scale area or a city. Especially, we figured out that a proper cell size reflecting Korean traffic conditions is 1.0m rather than 7.5m which is default size and a methodology of tracking vehicle behavior characteristics through tracking vehicle ID is suggested on this study. In addition, vehicle running characteristics in real interrupted traffic flow is analyzed through subdividing vehicle types and updating vehicle type ratio. For verification of suggested model, some portion of Dalgubyul-ro in the Daegu city is tested, and the possibility of realization of interrupted traffic flow in simulation is studied.

Vehicle Identification Number Recognition using Edge Projection and PCA (에지 투영과 PCA를 이용한 차대 번호 인식)

  • Ahn, In-Mo;Ha, Jong-Eun
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.17 no.5
    • /
    • pp.479-483
    • /
    • 2011
  • The automation of production process is actively expanding for the purpose of the cost reduction and quality assurance. Among these, automatic tracking of the product along the whole process of the production is also important topic. Typically this is done by adopting OCR technology. Conventional OCR technology operates well on the rather good quality of the image like as printed characters on the paper. In industrial application, IDs are marked on the metal surface, and this cause the height difference between background material and character. Illumination systems that guarantee an image with good quality may be a solution, but it is rather difficult to design such an illumination system. This paper proposes an algorithm for the recognition of vehicle's ID characters using edge projection and PCA (Principal Component Analysis). Proposed algorithm robustly operates under illumination change using the same parameters. Experimental results show the feasibility of the proposed algorithm.

Genotoxicity Tests on Hyrubicin ID6105, a Novel Anthracycline Anticancer Agent (새로운 Anthracycline계 항암제 Hyrubicin ID6105에 대한 유전독성연구)

  • 장호송;정미숙;이홍섭;유정수;김태영;김윤배;강종구
    • Toxicological Research
    • /
    • v.18 no.4
    • /
    • pp.385-391
    • /
    • 2002
  • The genotoxic potential of Hyrubicin lD6105, a novel anthracycline anticancer agent, was examined on bacterial mutagenicity, mammalian cell chromosome aberration and mouse micronucleus tests. In mutagenicity (Ames') test, Salmonella typhimurium strain TA98, TA100, TA1535 and TA1537, and Escherichia coli WP2uvrA- were treated with ID6105 at doses of 312.5, 625, 1,250, 2,500 and 5,000 $\mu\textrm{g}$/ plate with or without a metabolic activation system (S9 mix). Interestingly, ID6105 significantly enhanced the number of revertant colonies of TA98 strain at all dose levels used, in the presence or absence of S9 mix, without affecting other strains of S. typhimurium and E. coli. In chromosome aberration test using cultured chinese hamster lung fibroblasts, ID6105 (1.25, 2.5 and 5 $\mu\textrm{g}$/ml) did not increase the number of aberrant cells, compared with vehicle control. in the presence or absence of S9 mix. In addition, ID6105 treatment (2.5, 5 and 10 mg/kg) did not induce micronucleated polychromatic erythrocytes in mice. Taken together, it is suggested that ID6105 might not affect chromosome integrity in mammalian system in vitro and in vivo, although it may induce frame shift mutation of specific bacterial strain such os S. typhimurium TA98.

Implementation of Expert System Simulation based on 2th Security of Network (네트워크 2중 보안을 위한 전문가시스템 시뮬레이션의 구현)

  • Lee Chang-Jo
    • Management & Information Systems Review
    • /
    • v.4
    • /
    • pp.309-325
    • /
    • 2000
  • Organizations rely on Secure ID resources today to handle vast amounts of information. Because the data can vary widely in type and in degree of sensitivity, employees need to be able to exercise flexibility in handling and protecting it. It would not be practical or cost-effective to require that all data be handled in the same manner or be subject to the same protection requirements. Without some degree of standardization, however inconsistencies can develop at introduce risks. Policy formulation is an important step toward standardization of security activities for ID resources. ID security policy is generally formulated from the input of many members of an organization, including security officials, line managers, and ID resource specialists. However, policy is ultimately approved and issued by the organization's senior management. In environments where employees feel inundated with policies, directives, guidelines and procedures, an ID security policy should be introduced in a manner that ensures that management's unqualified support is clear. The organization's policy is management's vehicle for emphasizing the commitment to ID security and making clear the expectations for employee involvement and accountability. This paper will discuss ID security Policy in terms of the different types (program-level and issue-specific), components, and Implementation of Expert System Simulation based on 4GL, PowerBuilder.

  • PDF