• Title/Summary/Keyword: 자동차 내부 네트워크

Search Result 53, Processing Time 0.026 seconds

Design of the Automotive Gateway Based on a Mapping Table (매핑 테이블 기반의 자동차용 게이트웨이 설계)

  • Oh, Se-Chun;Kim, Eui-Ryong;Kim, Young-Gon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.12
    • /
    • pp.1959-1968
    • /
    • 2016
  • The recent automobiles, a number of ECU inside the vehicle has been used. Also, each ECU is connected to different types of networks in accordance with the characteristics. Therefore, efficient data exchange between discrete network has emerged as a very important element. The gateway is responsible for the ability to exchange data between discrete network. In this study, we propose the new gateway algorithm to provide the structure of the mapping table to improve the efficiency of data exchange between discrete network. Also it provides a structure of a new gateway algorithm with a function of adjusting the priority of the data to be transmitted to another network arbitrarily. Moreover, the proposed gateway structure may simultaneously convert the transmission data input from a particular network to multiple networks. Another advantage is easy to change the entire data structure only if we change the table structure in the gateway.

Deriving Essential Security Requirements of IVN through Case Analysis (사례 분석을 통한 IVN의 필수 보안 요구사항 도출)

  • Song, Yun keun;Woo, Samuel;Lee, Jungho;Lee, You sik
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.18 no.2
    • /
    • pp.144-155
    • /
    • 2019
  • One of the issues of the automotive industry today is autonomous driving vehicles. In order to achieve level 3 or higher as defined by SAE International, harmonization of autonomous driving technology and connected technology is essential. Current vehicles have new features such as autonomous driving, which not only increases the number of electrical components, but also the amount and complexity of software. As a result, the attack surface, which is the access point of attack, is widening, and software security vulnerabilities are also increasing. However, the reality is that the essential security requirements for vehicles are not defined. In this paper, based on real attacks and vulnerability cases and trends, we identify the assets in the in-vehicle network and derive the threats. We also defined the security requirements and derived essential security requirements that should be applied at least to the safety of the vehicle occupant through risk analysis.

CAN 네트워크에서의 악의적인 ECU 식별 기술 연구 동향

  • Seyoung Lee;Wonsuk Choi;Dong Hoon Lee
    • Review of KIISC
    • /
    • v.33 no.4
    • /
    • pp.47-55
    • /
    • 2023
  • 자동차 산업에서 전자제어장치 (Electronic Controller Unit, ECU)를 활용한 혁신으로 운전자들은 안전하고 편리한 운전경험을 누리고 있다. 그러나 이와 동시에, 차량 내부 ECU 간의 통신을 지원하는 CAN (Controller Area Network)을 대상으로 한 악의적인 침입과 사이버 공격의 위협 역시 증가하고 있다. 이러한 문제에 대응하기 위해 많은 연구가 진행 중이며, 특히 자동차 침입 탐지 시스템 (Intrusion Detection System, IDS)의 발전이 주목받고 있다. 그러나 대부분의 IDS는 주로 공격을 탐지하는 데 집중되어 있으며, 실제 악의적인 메시지를 전송한 ECU를 정확히 식별하는 데에는 한계점이 있다. 악의적인 ECU를 식별하는 기술은 공격 ECU를 격리시키거나 펌웨어 업데이트 등의 보안 패치를 적용하는데 필수적인 기술이다. 본 고에서는 현재까지 제안된 CAN에서의 악의적인 ECU를 식별하기 위한 기술들에 대해 살펴보고, 비교 분석 및 한계점에 대해 분석하고자 한다.

Development of FlexRay Module based on the AUTOSAR (AUTOSAR 기반의 FlexRay 모듈 개발)

  • Ju, Hong-Taek;Jeong, Seol-Young;Lee, Myung-Suk
    • The KIPS Transactions:PartC
    • /
    • v.16C no.6
    • /
    • pp.747-752
    • /
    • 2009
  • The AUTOSAR(AUTOmotive Open System ARchitecture) is an open software platform for automotive. The AUTOSAR contains the modules of FlexRay that is the next generation automotive network protocol. We have developed the modules including FlexRay State Manager, FlexRay Transport, FlexRay Interface, FlexRay Transceiver Driver and FlexRay Driver based on the standard of the module. This thesis presented not only the result of development but the result of design and implementation. And the developed modules were ported to the microcontroller board and verified.

Developing bundle of OSGi framework for vehicle telemetics services (차량 텔레메틱스 서비스를 위한 OSGi Framework 개발)

  • Oh, Se-Hwan;Lee, Seung-Kun;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.73-76
    • /
    • 2008
  • OSGi(Open Service Gateway initiative) Alliance는 1999년에 썬 마이크로시스템즈, IBM, 에릭손 등에 의해 구성된 개방형 표준 단체로 지능형 분산 컴포넌트와 원격 관리 될 수 있는 자바 기반의 서비스 플랫폼을 제정 해왔다. OSGi의 핵심은 어플리케이션의 생명 주기를 OSGi 플랫폼 위에서 어플리케이션이나 번들 컴포넌트의 재부팅 없이 실시간으로 설치, 시작, 정지, 업데이트, 제거를 할 수 있도록 지원해 주며, OSGi는 또한 어플리케이션에 포함될 수 있는 형태의 SOA를 구현하고 있다. 본 연구에서는 OSGi가 현재 홈 네트워크에서 많이 사용되고 있는데 그 방향을 자동차 내부의 네트워크 환경에 중점을 두어 실제로 어떤 서비스가 가능한지 시뮬레이션이나 간단한 서비스를 제작하여 알아본다.

  • PDF

Periodic-and-on-Event Message-Aware Automotive Intrusion Detection System (Periodic-and-on-Event 메시지 분석이 가능한 차량용 침입탐지 기술)

  • Lee, Seyoung;Choi, Wonsuk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.373-385
    • /
    • 2021
  • To provide convenience and safety of drivers, the recent vehicles are being equipped with a number of electronic control units (ECUs). Multiple ECUs construct a network inside a vehicle to share information related to the vehicle's status; in addition, the CAN protocol is normally applied. As the modern vehicles provide highly convenient and safe services, it provides many types of attack surfaces; as a result, it makes them vulnerable to cyber attacks. The automotive IDS (Intrusion Detection System) is one of the promising techniques for securing vehicles. However, the existing methods for automotive IDS are able to analyze only periodic messages. If someone attacks on non-periodic messages, the existing methods are not able to properly detect the intrusion. In this paper, we present a method to detect intrusions including an attack using non-periodic messages. Moreover, we evaluate our method on the real vehicles, where we show that our method has 0% of FPR and 0% of FNR under our attack model.

Design and Analysis of Resource Management Architecture for Network Mobility (네트워크 이동성을 위한 자원 관리 구조의 설계와 분석)

  • 백은경;조호식;최양희
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7B
    • /
    • pp.628-640
    • /
    • 2004
  • The demand for next generation networks can be condensed into always-best-connected, ubiquitous, mobile, all-lP, and converged networks. IPv6 has been introduced for all-IP ubiquitous communications, and vehicles are coming to represent an important communication platform. In this paper. we propose various resource management schemes for in-vehicle mobile networks, which are adaptive to different hardware configurations. We focus on power and wireless bandwidth since they are critical resources for mobile communications. Based on the mobility characteristics of in-vehicle networks, we propose vehicle-aware power saving schemes. The main idea behind these power saving schemes is to adjust mobile router (MR) advertisement interval and binding lifetime. In addition, according to different wireless environments, we propose adaptive bandwidth management schemes using multihoming: best-connected MR selection based on location, and high-data-rate MR selection based on priority By mathematical analysis, it is shown that our schemes save power prominently for both the dormant nodes and active nodes. In addition, simulation results show that proposed multiple mobile router architecture outperforms previous simple redundant router architecture in preserving session and providing sufficient bandwidth.

Studies of the possibility of external threats of the automotive ECU through simulation test environment (자동차용 ECU의 CAN 메시지를 통한 자동차 공격 방법 연구)

  • Lee, Hye-Ryun;Kim, Kyoung-Jin;Jung, Gi-Hyun;Choi, Kyung-Hee;Park, Seung-Kyu;Kwon, Do-Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.39-49
    • /
    • 2013
  • In this paper, security mechanism of internal network(CAN) of vehicle is a very incomplete state and the possibility of external threats as a way to build a test environment that you can easily buy from the market by the vehicle's ECU(Electric Control Unit) to verify and obtain a CAN message. Then, by applying it to ECU of the real car to try to attack is proposed. A recent study, Anyone can see plain-text status of the CAN message in the vehicle. so that in order to verify the information is vulnerable to attack from outside, analyze the data in a vehicle has had a successful attack, but attack to reverse engineering in the stationary state and buying a car should attempt has disadvantages that spatial, financial, and time costs occurs. Found through the car's ECU CAN message is applied to a real car for Potential threats outside of the car to perform an experiment to verify and equipped with a wireless network environment, the experimental results, proposed method through in the car to make sure the attack is possible. As a result, reduce the costs incurred in previous studies and in the information absence state of the car, potential of vehicle's ECU attack looks.

A Practical Attack on In-Vehicle Network Using Repacked Android Applications (커넥티드 카 환경에서 안드로이드 앱 리패키징을 이용한 자동차 강제 제어 공격)

  • Lee, Jung Ho;Woo, Samuel;Lee, Se Young;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.679-691
    • /
    • 2016
  • As vehicle started to contain many different communication devices, collecting external information became possible in IoT environment. In such environment, remotely controling vehicle is possible when vehicle information is obtained by looking in to vehicle network through smart device. However, android based smart device applications are vulnerable to malicious modulation and redistribution. Modulated android application can lead to vehicle information disclosure that could bring about vehicle control accident which becomes threat to drivers. furthermore, since vehicles today does not contain security methods to protect it, they are very vulnerable to security threats which can cause serious damage to users and properties. In this paper, many different vehicle management android applications that are sold in Google Play has been analyzed. With this information, possible threats that could happen in vehicle management applications are being analysed to prove the risks. the experiment is done on actual vehicle to prove the risks. Also, access control method to protect the vehicle against malicious actions that could happen through external network in IoT environment is suggested in the paper.

Verification of a Communication Method Secure against Attacks Using Convergence Hash Functions in Inter-vehicular Secure Communication (차량간 보안 통신에서 융합 해시함수를 이용하여 공격에 안전한 통신방법 검증)

  • Lee, Sang-Jun;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.9
    • /
    • pp.297-302
    • /
    • 2015
  • The increase in applying IT to vehicles has given birth to smart cars or connected cars. As smarts cars become connected with external network systems, threats to communication security are on the rise. With simulation test results supporting such threats to Convergence security in vehicular communication, concerns are raised over relevant vulnerabilities, while an increasing number of studies on secure vehicular communication are published. Hacking attacks against vehicles are more dangerous than other types of hacking attempts because such attacks may threaten drivers' lives and cause social instability. This paper designed a Convergence security protocol for inter-vehicle and intra-vehicle communication using a hash function, nonce, public keys, time stamps and passwords. The proposed protocol was tested with a formal verification tool, Casper/FDR, and found secure and safe against external attacks.