• Title/Summary/Keyword: CAN 네트워크

Search Result 7,967, Processing Time 0.035 seconds

The Design of IPv6 Traffic Analysis Tool for Detecting Network Attacks (네트워크 공격을 탐지하기 위한 IPv6 트래픽 분석 도구)

  • Oh, Seung-Hee;Oh, Jin-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.848-851
    • /
    • 2005
  • The BcN is applying from public networks to local networks and each terminal step by step until 2007. By IPv6 network introduction, IP address lack problem can be solved. However, the threats that network attacks of another method can be caused with new problem of network security in IPv6 networks. In this paper, we suggest the traffic analysis tool which analyze IPv6 traffic efficiently to detect/response network attack in IPv6 environment. The implemented IPv6 traffic analysis tool uses IPv6 header to analyze traffic and detect network attacks. Also, we also propose detection algorithm to detect network attacks in IPv6 networks.

  • PDF

PDO Packing Mechanism for Reducing CANopen Network Utilization (CANopen 네트워크 이용률 감소를 위한 PDO 패킹 메커니즘)

  • Kang, Min-Koo;Park, Kie-Jin;Kim, Jong-Cheol
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.2
    • /
    • pp.124-133
    • /
    • 2009
  • CANopen which is one of the in-vehicle network (IVN) protocols is adopted to solve the hardware dependency problem of the CAN-based application. CANopen makes different CAN devices interoperable each others. By the advantage of the device profiling concept, it can make the period of developing CAN-based application system shorten. The utilization of CANopen network must be reduced to improve the communication performance (e.g. worst-case response time). For reducing network utilization, messages need to be packed as many as possible so that message frame overhead can be decreased. In this paper, we suggested a PDO packing mechanism using object dictionary (OD) and process data object (PDO) communication service in CANopen. Through experiments, the performance of the mechanism is evaluated with SAE benchmark. As a result, network utilization is decreased about 10% compared to the result of the previous works.

A Traffic-Aware Cluster Based Routing Protocol for Non-uniformly Distributed Mobile Ad Hoc Networks (불균일 분포 모바일 애드 혹 네트워크에서 집중되는 트래픽을 고려한 효율적인 클러스터 기반 라우팅 프로토콜)

  • Hamm, Yong-Gil;Kim, Yong-Seok
    • The KIPS Transactions:PartC
    • /
    • v.17C no.4
    • /
    • pp.379-384
    • /
    • 2010
  • Mobile nodes in high mobility ad hoc networks might come together in specific areas. In non-uniformly distributed networks, traffic load can be concentrated to intermediate nodes between dense clusters, and networks performance can be degraded. In this paper, we proposed a cluster based routing protocol that heavy traffic nodes adaptively react according to traffic load. The simulation result shows that the proposed protocol reduce packet loss and end-to-end delay.

Development of a Simulation algorithm AND Fault Test Methodology on CAN (CAN 네트워크상 시스템 분석을 위한 시뮬레이션 알고리즘 개발 및 Fault Test 방법)

  • Kang, Ho-Suk;Choi, Kyung-Hee;Jung, Gi-Hyun;Kim, Sang-Jung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.11a
    • /
    • pp.463-466
    • /
    • 2006
  • 오늘날 기술의 발전으로 차량 시스템에 대한 고객의 요구가 다양해져 차량내의 시스템이 복잡해지고 있다. 이에 따라, 배선양을 줄이기 위해 Controller Area Network(CAN)이 개발되었다. 그러나 CAN 을 사용한 시스템이 제대로 동작하는지 또는 안전한지에 대한 안전성 문제가 중요시되면서 시스템을 실제로 어떠한 CAN 네트워크에 연결할 경우 그 시스템이 제대로 동작하는지는 자체 테스트와 효과적인 테스트가 필요하다. 본 논문은 CAN 네트웍 통신상태를 자동 테스트 할 수 있는 시뮬레이션 알고리즘을 소개하며 또한 fault packet을 생성하여 CAN 네트웍을 테스트하였다.

  • PDF

A Mobility Management Scheme based on the Mobility Pattern of Mobile Networks (이동 네트워크의 이동 패턴에 기반을 둔 이동성 관리 기법)

  • Yang, Sun-Ok;Kim, Sung-Suk
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.4
    • /
    • pp.345-354
    • /
    • 2008
  • Recently, small-scale mobile network which is composed of many mobile devices in a man becomes popular. Also, Examples of large-scale mobile network can be thought access networks deployed on public transportation such as ships, trains and buses. To provide seamless mobility for mobile nodes in this mobile network, binding update messages must be exchanged frequently. However, it incurs network overhead increasingly and decreases energy efficiency of mobile router. If we try to reduce the number of the messages to cope with the problem, it may happen the security -related problems conversely Thus, mobile router needs a effective algorithm to update location information with low cost and to cover security problems. In this paper, mobility management scheme based on mobile router's mobility pattern is proposed. Whenever each mobile router leaves a visiting network, it records related information as moving log. And then it periodically computes mean resident time for all visited network, and saves them in the profile. If each mobile router moves into the visited network hereafter, the number of binding update messages can be reduced since current resident time may be expected based on the profile. At this time, of course, security problems can happen. The problems, however, are solved using key credit, which just sends some keys once. Through extensive experiments, bandwidth usages are measured to compare binding update messages in proposed scheme with that in existing scheme. From the results, we can reduce about 65% of mobility-management-related messages especially when mobile router stays more than 50 minutes in a network. Namely, the proposed scheme improves network usage and energy usage of mobile router by decreasing the number of messages and authorization procedure.

MTD (Moving Target Detection) with Preposition Hash Table for Security of Drone Network (드론 네트워크 보안을 위한 해시표 대체 방식의 능동 방어 기법)

  • Leem, Sungmin;Lee, Minwoo;Lim, Jaesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.4
    • /
    • pp.477-485
    • /
    • 2019
  • As the drones industry evolved, the security of the drone network has been important. In this paper, MTD (Moving Target Detection) technique is applied to the drone network for improving security. The existing MTD scheme has a risk that the hash value is exposed during the wireless communication process, and it is restricted to apply the one-to-many network. Therefore, we proposed PHT (Preposition Hash Table) scheme to prevent exposure of hash values during wireless communication. By reducing the risk of cryptographic key exposure, the use time of the cryptographic key can be extended and the security of the drone network will be improved. In addition, the cryptographic key exchange is not performed during flight, it is advantageous to apply PHT for a swarm drone network. Through simulation, we confirmed that the proposed scheme can contribute to the security of the drone network.

A Design and Implementation of Method for Positioning Vehicle Using Sensing Data (센싱 데이터를 이용한 차량 측위 기법의 설계 및 구현)

  • Moon, Hye-Young;Kim, Jin-Deog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.422-424
    • /
    • 2010
  • Recently the car attached many ECUs and entertainment devices to provide the easiness maintenance and driver's convenience. CAN and MOST networks have been used to manage and control those devices in the car. Wireless network also has been established to receive information from external. These days a car navigation system with GPS is being integrated with CAN, MOST and Wireless network. In these circumstances, the car navigation system can have HMI function to integrate and control the car networks' devices. To solve the GPS problems such as positioning errors or losing signals from satellites in the tunnels and urban canyons, this paper designs and implements a method for positioning vehicle by using the sensing data of sensors and Wi-Fi devices based on this integrated environment.

  • PDF

Implementation of MIB/MIT in CORBA based Network Management System (CORBA 기반 네트워크 관리 시스템에서 MIB/MIT 구현)

  • Cho, Haeng-Rae;Kim, Chung-Su;Kim, Young-Tak
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.2B
    • /
    • pp.117-128
    • /
    • 2003
  • The network management becomes more complicated due to the growth of network technology and introduction of a large number of new multimedia services. TINA has appeared as a concept for the advanced network management system platform using the information technology such as distributed processing and object oriented modeling. Since TINA is on the basis of DPE (Distributed Processing Environment), it can manage networks and services for open telecommunications. In this paper, we propose an implementation strategy of the MIB/MIT to federate various CORBA objects in CORBA based network management system implementing TINA DPE. The proposed strategy is novel in the sense that it can support the distribution of MIB/MIT that is well matched with the distributed component architecture of TINA DPE, and it can also support the scoping and filtering services on the MIT using CORBA Naming Service.

A Effective Sinkhole Attack Detection Mechanism for LQI based Routing in WSN (무선 센서 네트워크 환경에서 링크 품질에 기반한 라우팅에 대한 효과적인 싱크홀 공격 탐지 기법)

  • Choi, Byung-Goo;Cho, Eung-Jun;Hong, Choong-Seon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.9
    • /
    • pp.901-905
    • /
    • 2008
  • In this paper, we propose a detection scheme for sinkhole attacks in wireless sensor networks. Sinkhole attack makes packets that flow network pass through attacker. So, Sinkhole attack can be extended to various kind of attacks. We analyze sinkhole attack methods in the networks that use LQI based routing. For the purpose of response to each attack method, we propose methods to detect attacks. Our scheme can work for those sensor networks which use LQI based dynamic routing protocol. And we show the detection of sinkhole attack can be achieved by using a few detector nodes.

An NTRU-based Key Agreement Scheme for Wireless Sensor Networks (무선센서네트워크에서의 NTRU에 기반한 키 교환 스킴)

  • Koo, Nam-Hun;Jo, Gook-Hwa;Go, Byeong-Hwan;Kwon, Soon-Hak
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.5C
    • /
    • pp.445-453
    • /
    • 2010
  • Because of heavy computational overheads, the use of public key cryptosystem in Wireless Sensor Networks seems unfeasible. But some recent researches show that certain public key cryptosystem can be used in WSN, in which the key and data size, power consumption is relatively small. The NTRU cryptosystem is suggested as one of the candidates of public key cryptosystems which can be used in wireless sensor networks. In this paper, we propose an efficient key agreement scheme using NTRU and we show that it can be used in wireless sensor networks.