• Title/Summary/Keyword: vehicle security

Search Result 406, Processing Time 0.03 seconds

Performance Evaluation for a Unicast Vehicular Delay Tolerant Routing Protocol Networks

  • Abdalla, Ahmed Mohamed
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.167-174
    • /
    • 2022
  • Vehicular Ad hoc Networks are considered as special kind of Mobile Ad Hoc Networks. VANETs are a new emerging recently developed, advanced technology that allows a wide set of applications related to providing more safety on roads, more convenience for passengers, self-driven vehicles, and intelligent transportation systems (ITS). Delay Tolerant Networks (DTN) are networks that allow communication in the event of connection problems, such as delays, intermittent connections, high error rates, and so on. Moreover, these are used in areas that may not have end-to-end connectivity. The expansion from DTN to VANET resulted in Vehicle Delay Tolerant Networks (VDTN). In this approach, a vehicle stores and carries a message in its buffer, and when the opportunity arises, it forwards the message to another node. Carry-store-forward mechanisms, packets in VDTNs can be delivered to the destination without clear connection between the transmitter and the receiver. The primary goals of routing protocols in VDTNs is to maximize the probability of delivery ratio to the destination node, while minimizing the total end-to-end delay. DTNs are used in a variety of operating environments, including those that are subject to failures and interruptions, and those with high delay, such as vehicle ad hoc networks (VANETs). This paper discusses DTN routing protocols belonging to unicast delay tolerant position based. The comparison was implemented using the NS2 simulator. Simulation of the three DTN routing protocols GeOpps, GeoSpray, and MaxProp is recorded, and the results are presented.

Proxy based Access Privilige Management for Tracking of Moving Objects

  • Cha, Hyun-Jong;Yang, Ho-Kyung;Song, You-Jin
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.225-232
    • /
    • 2022
  • When we drive a vehicle in an IoT environment, there is a problem in that information of car users is collected without permission. The security measures used in the existing wired network environment cannot solve the security problem of cars running in the Internet of Things environment. Information should only be shared with entities that have been given permission to use it. In this paper, we intend to propose a method to prevent the illegal use of vehicle information. The method we propose is to use attribute-based encryption and dynamic threshold encryption. Real-time processing technology and cooperative technology are required to implement our proposed method. That's why we use fog computing's proxy servers to build smart gateways in cars. Proxy servers can collect information in real time and then process large amounts of computation. The performance of our proposed algorithm and system was verified by simulating it using NS2.

A Study on Vehicle Security Threats in V2X Environment (V2X 환경에서의 차량 보안 위협에 관한 연구)

  • Chan-Min Kim;Jun-Taek Lee;Ji-Won Seo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.314-316
    • /
    • 2024
  • 과거 자동차 내부 네트워크는 폐쇄적이었으나, 오늘날 블루투스,WiFi, 셀룰러 등 다양한 인터페이스를 통해 외부와 연결되며 안전과 편의성을 제공하기 위해 커넥티드카 혹은 스마트카로 변화하고 있다. 그러나, 외부와의 연결성이 제공됨으로써 기존에 존재하지 않았던 보안 위협이 꾸준히 증가하고 있다. 특히 커넥티드카는 V2X(Vehicle to Everything) 통신을 통해, 다양한 보안 취약점이 발생할 수 있게 되었다. 따라서 본 논문에서는 커넥티드카에서 발생할 수 있는 보안 위협 시나리오들에 대해 제안하고자 한다.

A Study on the Safety Regulation Revision for Urban Transit Vehicles (도시철도차량의 안전기준 강화에 관한 연구)

  • Lee Woo-Dong;Shin Jeong-Ryol;Kim Gil-Dong;Han Suk-Youn;Park Kee-Jun;Hong Jai-Sung;Ahn Tai-Ki;Lee Ho-Yong;Kim Jong-Wook
    • Proceedings of the KSR Conference
    • /
    • 2003.10c
    • /
    • pp.322-326
    • /
    • 2003
  • Dae-gu subway accident raise whole points in connection with safety facilities and operating of national urban transit system like rolling stocks, facilities, management of human. Rolling stock is made every effort for improvement of performance, guarantee of comfortableness, insurance of economical efficiency. But Security like safety of fire is not thoroughgoing enough. Especially, interior material has used although it is not prove its degree of safety. it is a main cause of Dae-gu subway accident. Safety regulation of urban transit vehicle that legislate for security in March 2000 does not applied manufacturing vehicles before in 2000. It has be prescribed in the regulations that incombustibles must be used. But detailed test standard related with incombustibles is not prescribe. Thus that regulation be required reinforcement of detailed test standard. Main cause of Dae-Gu subway accident is a fire in vehicle. However, many defects are found in infrastructure and operating vehicle of urban transit, such as inexperienced disposal of driver and CCC in early stage of the fire accident, unskilled opening and closing doors, insufficient escape facilities and safety facilities of a station house and tunnel, and incomplete communication system between vehicle and CTC, extraordinary step. Thus the aims of this study are prevention of urban transit accident, improvement plan of safety driving, and proposal of quick action plan through analysis of total faculty of vehicle.

  • PDF

Commercial ECU-Based Test-Bed for LIN-CAN Co-Analysis and Proof on Ultrasonic Sensors through Physical Error Injection (실차기반 LIN-CAN 연계 통합 분석 테스트베드 개발과 초음파센서 물리적 오류주입 및 분석을 통한 효용성 검증)

  • Yoon-ji Kim;Ye-ji Koh;In-su Oh;Kang-bin Yim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.325-336
    • /
    • 2023
  • With the development of autonomous driving technology, the number of external contact sensors mounted on vehicles is increasing, and the importance is also rising. The vehicular ultrasonic sensor uses the LIN protocol in the form of a bus topology and reports a status message about its surroundings through the vehicle's internal network. Since ultrasonic sensors are vulnerable to various threats due to poor security protocols, physical testing on actual vehicle is needed. Therefore, this paper developed a LIN-CAN co-analysis testbed with a jig for location-specific distance test to examine the operational relation between LIN and CAN caused by ultrasonic sensors.

Research on improvement of law for invigorating autonomous vehicle

  • Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.167-173
    • /
    • 2018
  • The Korean government announced its goal of commercializing autonomous vehicle by year 2020. With such changes, it is expecting to decrease car accident mortality by half. To commercialize autonomous car, not only worries on safety of autonomous vehicle has to be solved but at the same time, institutional system has to be clear to distinguish legal responsibilities in case of accident. This paper will present the legal improvement direction of the introduction of autonomous vehicles as follows. First, it is necessary to re-establish concept of 'driver' institutionally. Second, it is appropriate to focus on Level 3 autonomous vehicle which is about to be commercialized in year 2020 and organize legal responsibility. Third, we should have a clear understanding on how level 3 autonomous vehicle will be commercialized in the future. Fourth, it is necessary to revise The Traffic Law, Act on Special Cases concerning the Settlement of Traffic Accident, and Automobile Accident Compensation Security Law in line with level 3 autonomous vehicle. Fifth, it is necessary to review present car insurance system. Sixth, present Product Liability Law is limited to movable products (Article 2), however, it is necessary to include intangible product which is software. Seventh, we should review on making special law related to autonomous car including civil, criminal, administrative, and insurance perspectives.

The probable use of UAV(Unmanned Aerial Vehicle) in crime, cybercrime, and terrorism and responses (무인기 개발과 범죄, 사이버 범죄, 테러 활용 가능성과 대응방안)

  • Joh, Hyeon-Jin;Yun, Min-Woo
    • Korean Security Journal
    • /
    • no.46
    • /
    • pp.189-216
    • /
    • 2016
  • In March 2015, the North Korean UAVs (Unmanned Aerial Vehicles) were found and countries around the world have actively developed UAVs. UAVs or Drone have become commercialized and more civilians use UAVs for leisure. The positive possibilities of UAV use expand. However, there could be the negative sides of UAV use. The UAVs could be used for the purpose of various crime, cybercrime, and terrorism. For instance, hacking devices attached drone could be infiltrated into the sensitive networks to steal personal informations and public data. This could be a new dimension of cybercrime. As the number of internet users and cyberspace rapidly expands, problems of crimes could be worsened both quantitatively and qualitatively. By contrast, defensive measures against such threats are limited. Especially, the Korean society is vulnerable despite its well-advanced internet and computer network technology. This article investigates the current UAV types and its developments, discusses various possibilites of UAV-related crime, cybercrime, and terrorism, and proposes responses.

  • PDF

Method for Inferring Format Information of Data Field from CAN Trace (CAN 트레이스 분석을 통한 데이터 필드 형식 추론 방법 연구)

  • Ji, Cheongmin;Kim, Jimin;Hong, Manpyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.167-177
    • /
    • 2018
  • As the number of attacks on vehicles has increased, studies on CAN-based security technologies are actively being carried out. However, since the upper layer protocol of CAN differs for each vehicle manufacturer and model, there is a great difficulty in researches such as developing anomaly detection for CAN or finding vulnerabilities of ECUs. In this paper, we propose a method to infer the detailed structure of the data field of CAN frame by analyzing CAN trace to mitigate this problem. In the existing Internet environment, many researches for reverse engineering proprietary protocols have already been carried out. However, CAN bus has a structure difficult to apply the existing protocol reverse engineering technology as it is. In this paper, we propose new field classification methods with low computation-cost based on the characteristics of data in CAN frame and existing field classification method. The proposed methods are verified through implementation that analyze CAN traces generated by simulations of CAN communication and actual vehicles. They show higher accuracy of field classification with lower computational cost compared to the existing method.

A Study on Establishment of Criteria to Identify the Defense Industrial Technology of Diesel Engine for Military Vehicle (군용차량을 위한 디젤기관의 방산기술 식별기준 정립에 관한 연구)

  • Yoon, Heung-Soo;Ryu, Yeon-Seung
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.3
    • /
    • pp.177-184
    • /
    • 2019
  • The Defense Technology Security Act was enacted in 2015 to protect the defense industrial technology from being duplicated or interfering technologies being developed, which prevents its value and utility from deterioration and prevents inappropriate export. Defense industrial technology refers to technology that should be protected for national security among the national defense science and technology related to the defense industry. However, technical identification criteria of identification and management system of protection technology are not regulated. Therefore, in this study, through the Delphi survey, diesel engine core technology identification criteria related to the high efficiency internal combustion engine propulsion technology among the 141 defense industrial technologies is established to improve the identification and management system of the technology to be protected among the defense industrial technology protection system. As a result of the study, operational operability, durability, safety, sequencing and modularization were established as diesel engine core technology identification criteria.