• Title/Summary/Keyword: vehicle attack

Search Result 156, Processing Time 0.024 seconds

Implementation of In-Car GNSS Jamming Signal Data Generator to Test Autonomous Driving Vehicles under RFI Attack on Navigation System (항법 시스템 오작동 시 자율주행 알고리즘 성능 테스트를 위한 차량 내 재밍 신호 데이터 발생기 구현)

  • Kang, Min Su;Jin, Gwon Gyu;Won, Jong Hoon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.20 no.2
    • /
    • pp.79-94
    • /
    • 2021
  • A GNSS receiver installed in autonomous vehicles is the most essential device for its navigation. However, if an intentional jamming signal is generated, there is a risk of exposure to an accident risk due to deterioration of the GNSS sensor's performance. Research is required to prevent this, and accordingly, a jamming generating device must be provided. However, according to the provisions of the law related to jamming, this is illegal. In this paper, we implement an in-vehicle jamming device that complies with the provisions of the law and does not affect the surrounding GNSS sensors. Driving simulation is used to evaluate the performance of the GNSS algorithm, and the malfunction of autonomous vehicles occurring in the interference environment and data errors output from the GNSS sensor are analyzed.

Countermeasure of Uumanned Aerial Vehicle (UAV) against terrorist's attacks in South Korea for the public crowded places (국내 소프트 타깃 대상 드론테러의 법제도 개선방안 연구)

  • Oh, Hangil
    • Journal of the Society of Disaster Information
    • /
    • v.15 no.1
    • /
    • pp.49-66
    • /
    • 2019
  • Purpose: This study aims to apply the counter terrorism policy in pertain to malicious drone abuse and the croweded public places in South Korea. And, to improve counter terrorism protection measure, this study suggests an adoptation of Anti UAV technology into counter terrorism related regulation. Method: Compared to nations' operations of counter terrorism prevention and protection activities with the South Korean gov, problems and limitations are suggested. Results: Anti UAV technology could not be applied for Multi-user facilities by any law due to the limitation, so that it is required to amend counte terrporism related policies and law. Conclusion: This study intends to identify various protection methods against UAV threats. To reduce the risk of UAV, the law of public safety and counter terrorism should be promoted and reinforced for the first.

Study of the Flush Air Data Sensing System for Subsonic and Supersonic Flows (아음속 및 초음속 유동의 플러시 대기자료 측정장치 연구)

  • Lee, Chang-Ho
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.47 no.12
    • /
    • pp.831-840
    • /
    • 2019
  • Flush Air Data Sensing system (FADS) estimates air data states using pressure data measured at the surface of flight vehicles. The FADS system does not require intrusive probes, so it is suitable for high performance aircrafts, stealth vehicles, and hypersonic flight vehicles. In this study, calibration procedures and solution algorithms of the FADS for a sphere-cone shape vehicle are presented for the prediction of air data from subsonic to supersonic flights. Five flush pressure ports are arranged on the surface of nose section in order to measure surface pressure data. The algorithm selects the concept of separation for the prediction of flow angles and the prediction of pressure related variables, and it uses the pressure model which combines the potential flow solution for a subsonic flow with the modified Newtonian flow theory for a hypersonic flow. The CFD code which solves Euler equations is developed and used for the construction of calibration pressure data in the Mach number range of 0.5~3.0. Tests are conducted with various flight conditions for flight Mach numbers in the range of 0.6~3.0 and flow angles in the range of -10°~+10°. Air data such as angle of attack, angle of sideslip, Mach number, and freestream static pressure are predicted and their accuracies are analyzed by comparing predicted data with reference data.

Secure and Efficient V2V Message Authentication Scheme in Dense Vehicular Communication Networks (차량 밀집환경에서 안전하고 효율적인 V2V 메시지 인증기법)

  • Jung, Seock-Jae;Yoo, Young-Jun;Paik, Jung-Ha;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.41-52
    • /
    • 2010
  • Message authentication is an essential security element in vehicular ad-hoc network(VANET). For a secure message authentication, integrity, availability, privacy preserving skill, and also efficiency in various environment should be provided. RAISE scheme has been proposed to provide efficient message authentication in the environment crowded with lots of vehicles and generally considered to be hard to provide efficiency. However, as the number of vehicles communicating in the area increases, the overhead is also incurred in proportion to the number of vehicles so that it still needs to be reduced, and the scheme is vulnerable to some attacks. In this paper, to make up for the vulnerabilities in dense vehicular communication network, we propose a more secure and efficient scheme using a process that RSU(Road Side Unit) transmits the messages of neighbor vehicles at once with Bloom Filter, and timestamp to protect against replay attack. Moreover, by adding a handover function to the scheme, we simplify the authentication process as omitting the unnecessary key-exchange process when a vehicle moves to other area. And we confirm the safety and efficiency of the scheme by simulating the false positive probability and calculating the traffic.

Estimation of Maneuverability of Underwater Vehicles with Ahead Propeller by the Vertical Planar Motion Mechanism Test (VPMM 시험을 통한 선수부에 프로펠러를 갖는 수중운동체의 조종성능 추정)

  • Shin, Myung-Sub;Kim, Dong-Hwi;Kim, Yagin;Hwang, Jong-Hyon;Baek, Hyung-Min;Kim, Sung-Jae;Park, Sang-Jun;Choi, Young-Myung;Park, Hongrae;Kim, Eun-Soo
    • Journal of Navigation and Port Research
    • /
    • v.46 no.3
    • /
    • pp.168-178
    • /
    • 2022
  • In this study, the resistance test, the vertical static angle of the attack test and VPMM test will be conducted to estimate the maneuverability of underwater vehicles with ahead propeller. The vertical static test will be conducted within the range of -40deg to 40deg, to investigate the cross-flow drag at high incidence angles. The tests will be conducted by dividing the propeller rotation into a case in which the propeller rotates at a specific rpm, and a case in which the propeller rotates naturally, according to the towing speed. Hydrodynamic coefficients of vertical direction will be estimated by the captive model tests. Additionally, the vertical dynamic stability index based on estimated hydrodynamic coefficients will be calculated and the impact of the propeller revolution state on the index will be investigated. The results are expected to be used as reference test data for underwater vehicles with ahead propeller.

Proposal for the 『Army TIGER Cyber Defense System』 Installation capable of responding to future enemy cyber attack (미래 사이버위협에 대응 가능한 『Army TIGER 사이버방호체계』 구축을 위한 제언)

  • Byeong-jun Park;Cheol-jung Kim
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.157-166
    • /
    • 2024
  • The Army TIGER System, which is being deployed to implement a future combat system, is expected to bring innovative changes to the army's combat methods and comabt execution capability such as mobility, networking and intelligence. To this end, the Army will introduce various systems using drones, robots, unmanned vehicles, AI(Artificial Intelligence), etc. and utilize them in combat. The use of various unmanned vehicles and AI is expected to result in the introduction of equipment with new technologies into the army and an increase in various types of transmitted information, i.e. data. However, currently in the military, there is an acceleration in research and combat experimentations on warfigthing options using Army TIGER forces system for specific functions. On the other hand, the current reality is that research on cyber threats measures targeting information systems related to the increasing number of unmanned systems, data production, and transmission from unmanned systems, as well as the establishment of cloud centers and AI command and control center driven by the new force systems, is not being pursued. Accordingly this paper analyzes the structure and characteristics of the Army TIGER force integration system and makes suggestions for necessity of building, available cyber defense solutions and Army TIGER integrated cyber protections system that can respond to cyber threats in the future.