• 제목/요약/키워드: 차량간통신

Search Result 807, Processing Time 0.029 seconds

A Range-based Relay Node Selecting Algorithm for Vehicular Ad-hoc Network (차량 애드혹 네트워크를 위한 영역 기반 릴레이 노드 선택 알고리즘)

  • Kim Tae-Hwan;Kim Hie-Cheol;Hong Won-Kee
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.9 s.351
    • /
    • pp.88-98
    • /
    • 2006
  • VANET has several different characteristics from MANET such as high mobility of nodes and frequent change of node density and network topology. Due to these characteristics, the network topology based protocol, often used in MANET, can not be applied to VANET. In this paper, we propose an emergency warning message broadcast protocol using range based relay node selecting algorithm which determines the minimal waiting time spent by a given node before rebroadcasting the received warning message. Because the time is randomly calculated based on the distance between sender node and receiver node, a node chosen as a relay node is assured to have a minimal waiting time, even though it is not located at the border of radio transmission range. The proposed emergency warning message broadcast protocol has low network traffic because it does not need to exchange control messages for message broadcasting. In addition, it can reduce End-to-End delay under circumstances of low node density and short transmission range in VANET.

FlexRay: Protocol, Time Hierarchy, Message Frame, Communication Controller, and Conformance Test (FlexRay: 프로토콜, 시간 계층, 메시지 프레임, 커뮤니케이션 컨트롤러, 적합성 시험)

  • Seokjun Hahn;Sua Shin;Naeun Park;Chan Park;Daegi Lee;Seongsoo Lee
    • Journal of IKEEE
    • /
    • v.27 no.4
    • /
    • pp.668-678
    • /
    • 2023
  • FlexRay is an in-vehicle network with maximum two channels and maximum transmission speed of 10Mbps per channel. FlexRay exploits TDMA (Time Division Multiple Access) and FTDMA (Flexible Time division Multiple Access) to ensure real-time communication with efficient transmission, so it is used for real-time electronic control of safety-critical vehicular modules such as powertrain. This paper explains FlexRay protocol, time hierarchy, message frame, communication controller, and conformance test in detail based on ISO 17458 standard and FlexRay consortium documents.

Methodology for Determining RSE Spacing for Vehicle-Infrastructure Integration(VII) Based Traffic Information System (Focused on Uninterrupted Traffic Flow) (차량-인프라 연계(VII) 기반 교통정보시스템의 RSE 설치간격 결정 방법론 (연속류를 중심으로))

  • Park, Jun-Hyeong;O, Cheol;Im, Hui-Seop;Gang, Gyeong-Pyo
    • Journal of Korean Society of Transportation
    • /
    • v.27 no.6
    • /
    • pp.29-44
    • /
    • 2009
  • A variety of research efforts, using advanced wireless communication technologies, have been made to develop more reliable traffic information system. This study presents a novel decentralized traffic information system based on vehicle infrastructure integration (VII). A major objective of this study was also to devise a methodology for determining appropriate spacing of roadside equipment (RSE) to fully exploit the benefits of the proposed VII-based traffic information system. Evaluation of travel time estimation accuracy was conducted with various RSE spacings and the market penetration rates of equipped vehicle. A microscopic traffic simulator, VISSIM, was used to obtain individual vehicle travel information for the evaluation. In addition, the ANOVA tests were conducted to draw statistically significant results of simulation analyses in determining the RSE spacing. It is expected that the proposed methodology will be a valuable precursor to implementing capability-enhanced next generation traffic information systems under the forthcoming ubiquitous transportation environment.

The Influencing Factors and Moderating Factors on Intention to Continuously Use Car-Hailing Mobility Service (차량호출 모빌리티 서비스 지속이용의도의 영향요인 및 조절요인 연구)

  • Ae Ri Lee
    • Information Systems Review
    • /
    • v.23 no.4
    • /
    • pp.103-125
    • /
    • 2021
  • Mobility services are rapidly developing along with information and communication technology (ICT) innovation. Recently, the on-demand mobility platform market is growing, and an environment is provided in which users can call services more conveniently and check the connection status in real time using smartphones. This study investigates the current status of users' perceptions and experiences of car-hailing mobility services such as KAKAO Taxi and UT Taxi, and it analyzes the factors affecting the intention to continuously use the car-hailing service, focusing on environmental and instrumental benefits and trust in driver and platform. In particular, this study examines whether the significance of the relationship between influencing factors and continuous use intention could vary depending on the degree of innovativeness and ICT utilization. The results of this study showed that perceived benefits (environmental benefits and convenience and economic instrumental benefits) and trust in driver had significant effects on increasing trust in platform. It was analyzed that the higher the trust in platform, the higher the intention to continuously use the car-hailing service. Furthermore, the influence of perceived environmental benefits and economic benefits on the trust in platform was different depending on the degree of individual innovativeness, and the influence of convenience and economic benefits on the trust in platform varied depending on the degree of ICT utilization. Referring to the results of this study, mobility service providers can better understand the current status of users' perceptions and trust for car-hailing services, and implement service promotion strategies suitable for individual characteristics.

An Anonymous Authentication in the Hierarchy for VANET (VANET 환경을 위한 계층적 구조의 익명 인증 기술)

  • Bae, Kyungjin;Lee, Youngkyung;Kim, Jonghyun;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.563-577
    • /
    • 2018
  • In order to support secure communication in VANET(Vehicular Ad hoc Network), messages exchanged between vehicles or between vehicle and infrastructure must be authenticated. In this paper, we propose a hierarchical anonymous authentication system for VANET. The proposed system model reduces the overhead of PKG, which is a problem of previous system, by generating private keys hierarchically, thereby enhancing practicality. We also propose a two-level hierarchical identity-based signature(TLHIBS) scheme without pairings so that improve efficiency. The proposed scheme protects the privacy of the vehicle by satisfying conditional privacy and supports batch verification so that efficiently verifies multiple signatures. Finally, The security of the proposed scheme is proved in the random oracle model by reducing the discrete logarithm problem(DLP) whereas the security proof of the previous ID-based signatures for VANET was incomplete.

Design and Implementation of Car Blackbox Forensic Analysis Tool Through the Analysis of Data Structure (차량용 블랙박스 데이터 저장구조 분석을 통한 포렌식 분석도구 설계 및 구현)

  • Cha, In Hwan;Lee, Kuk Heon;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.11
    • /
    • pp.427-438
    • /
    • 2016
  • Car blackboxes record the information and status of driving. Since blackboxes are commonly used in daily life, the usage of video data recorded from blackboxes is increasing for investigating. Investigators use a own analysis tool suitable for their blackbox provided by the manufacturer in order to check the data. But the tools are not enough to use in the digital forensic analysis because they are dependent on a specific model of blackbox and provides ungeneralized functions. Moreover, if the manufacturer is bankrupt, then their own tools can not be obtained also. Therefore, the way data are stored in the blackboxes which are now in the market are investigated and the features and limitations which have blackbox's own analysis tools are checked. And a comprehensive tool for the analysis of blackboxes is designed and implemented as in this paper.

A Control System for Avoiding Collisions between Autonomous Warfare Vehicles and Infantry (군용 무인차량과 보병의 충돌방지를 위한 제어시스템)

  • Nam, Sea-Hyeon;Chung, You-Chung
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.3
    • /
    • pp.74-82
    • /
    • 2011
  • This paper describes a control system for positioning the real-time locations of the autonomous warfare vehicles and infantry, and for avoiding collisions between them. The control system utilizes the low-cost RSSI (Received Signal Strength Indication) for positioning the locations of the wireless devices. The mathematical mean filtering processes are applied to the calculation of the RSS matrix to improve the performance for positioning the wireless devices in the multi-path propagation environment. A fuzzy rule is proposed to recover and replace the broken packets occurring in the wireless communication. The gradient and geometric triangulation algorithms are proposed to trace the real-time locations of wireless devices, based on the distances between them. The estimated location results of the geometric triangulation algorithm are compared with the results of the GPS and the gradient algorithm.

Experimental Analysis of Physical Signal Jamming Attacks on Automotive LiDAR Sensors and Proposal of Countermeasures (차량용 LiDAR 센서 물리적 신호교란 공격 중심의 실험적 분석과 대응방안 제안)

  • Ji-ung Hwang;Yo-seob Yoon;In-su Oh;Kang-bin Yim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.217-228
    • /
    • 2024
  • LiDAR(Light Detection And Ranging) sensors, which play a pivotal role among cameras, RADAR(RAdio Detection And Ranging), and ultrasonic sensors for the safe operation of autonomous vehicles, can recognize and detect objects in 360 degrees. However, since LiDAR sensors use lasers to measure distance, they are vulnerable to attackers and face various security threats. In this paper, we examine several security threats against LiDAR sensors: relay, spoofing, and replay attacks, analyze the possibility and impact of physical jamming attacks, and analyze the risk these attacks pose to the reliability of autonomous driving systems. Through experiments, we show that jamming attacks can cause errors in the ranging ability of LiDAR sensors. With vehicle-to-vehicle (V2V) communication, multi-sensor fusion under development and LiDAR anomaly data detection, this work aims to provide a basic direction for countermeasures against these threats enhancing the security of autonomous vehicles, and verify the practical applicability and effectiveness of the proposed countermeasures in future research.

Automobile Engine Information Display Device Using CAN Communication (캔 통신을 이용한 자동차 엔진 정보 표시장치)

  • Park, Yang-Jae
    • Journal of Digital Convergence
    • /
    • v.17 no.12
    • /
    • pp.203-210
    • /
    • 2019
  • Most cars today use electronic control to control the state of the engine to achieve optimum performance. This study developed a device for maintaining fault diagnosis and optimal vehicle status by displaying the engine information of a car on the screen in real time using can communication. This system displays information generated from the engine to the driver in real time such as engine intake and exhaust temperature, current battery voltage, tire pressure, RPM, DPF collection amount, torque, and horsepower through the OBD2 socket. You can check immediately. It can help you to drive safely by measuring tire pressure and displaying it on the screen, and it provides a mode to set the shift timing to suit your taste. In particular, in the case of diesel engine cars, the problems caused by smoke can adversely affect the performance and environmental pollution. Therefore, the system was developed to display the DPF collection amount on the system screen to prevent environmental pollution and to manage the vehicle efficiently.

Scenario-based Future Infantry Brigade Information Distribution Capability Analysis (시나리오 기반의 미래 보병여단 정보유통능력 분석 연구)

  • Junseob Kim;Sangjun Park;Yiju You;Yongchul Kim
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.139-145
    • /
    • 2023
  • The ROK Army is promoting cutting-edge, future-oriented military development such as a mobile, intelligent, and hyper-connected Army TIGER system. The future infantry brigade plans to increase mobility with squad-level tactical vehicles to enable combat in multi-domain operations and to deploy various weapon systems such as surveillance and reconnaissance drones. In addition, it will be developed into an intelligent unit that transmits and receives data collected through the weapon system through a hyper-connected network. Accordingly, the future infantry brigade will transmit and receive more data. However, the Army's tactical information communication system has limitations in operating as a tactical communication system for future units, such as low transmission speed and bandwidth and restrictions on communication support. Therefore, in this paper, the information distribution capability of the future infantry brigade is presented through the offensive operation scenario and M&S.