• Title/Summary/Keyword: Smart Key

Search Result 1,227, Processing Time 0.027 seconds

How to defend against car smart key amplification attacks (자동차 스마트키 증폭 공격을 방어하는 방법)

  • Bae, Dong-ki;Kwon, Yong-gyu;Lee, Dong-hun;Lee, Daesung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.467-469
    • /
    • 2016
  • Car smart key system is a technology that allows you to turn activate / deactivate the auto lock through the contact form of electronic keys on the remote control and turn on the ignition by pressing the button. Smart key system is regarded as one of the essential options of the car as it is increasingly convenient to user, but there is no response yet for an attack to this situation. Therefore, in this paper, through an analysis of the amplification attack of a smart key we propose a way to stop the amplification attack and stop the car seized in case the car door opened due to the amplification attack.

  • PDF

A Key-Frame Extraction Method based on HSV Color Model for Smart Vehicle Management System (스마트 차량 관리 시스템을 위한 HSV 색상모델 기반의 키 프레임 추출 기법)

  • Kwon, Young-Wook;Jung, Se-Hoon;Park, Dong-Gook;Sim, Chun-Bo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.4
    • /
    • pp.595-604
    • /
    • 2013
  • Currently, registered number of imported vehicles is increasing rapidly over the years. Accordingly, environment improvements of vehicle maintenance company for maintenance of luxury vehicle such as imported vehicle are continuously being made. In this paper, we propose a key frame extraction method based on HSV color model for smart vehicle management system implementation to offer for customer reliability of maintenance vehicle. After automatically recognize the license plates of the vehicle using vehicle license plate recognition system when the vehicle come in the car center, we check the repair history and request of the vehicle based on it. We implement mobile services which provide extracted key frame images to the user after extract key frames from vehicle repair video. In addition, we verify the superiority of key frame extraction method by applying a smart vehicle management system. Finally, we convert the RGB color to HSV color to improve the performance of proposed key frame extraction scheme. As a result, we confirmed that our scheme is more excellence about 30% in terms of recall than RGB color model from the performance evaluations.

Smart-City Development Management: Goals and Instruments

  • KALENYUK, Iryna;TSYMBAL, Liudmyla;UNINETS, Iryna
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.324-330
    • /
    • 2022
  • At the present stage of the world economic development, a new economic system is being formed, in which non-economic values, in particular environmental and social parameters, have become widespread. A new vision of economic activity is being formed, which acquires the qualities of Smart-economy. The purpose of this paper is reveal the features of managing the development of smart cities as specific entities of the Smart-economy. New functions of economic entities are formed within the framework of the Smart-economy concept, while their role and weight in the localities' activity or formation have changed. Determining that the key trends in the Smart-economy development are such as digitalization, greening, socialization, institutionalization, and urbanization, this is necessary to note that all these trends are most active in the formation of urban ecosystems. These trends are determined by the general population growth and the urban population growth, which requires considerable attention to planning each city's development itself. Such planning could ensure the comfort of living for all its inhabitants, quality, safe, and modern life. The Smart-city's key elements and the intellectualized approach implementation planes to the decision of these or those tasks are definedIt is determined that a new ecosystem of governance is being formed.

AN IDENTITY BASED AUTHENTICATED KEY AGREEMENT PROTOCOL ON THE TATE PAIRING

  • Yoon, Suk-Bong
    • Communications of the Korean Mathematical Society
    • /
    • v.20 no.3
    • /
    • pp.611-621
    • /
    • 2005
  • This paper introduces an ID based authenticated two pass key agreement protocol of Smart[4] which used the Weil pairing. We propose other an ID based authenticated two pass key agreement protocol which using the Tate Pairing. We will compare protocol of Smart with this protocol.

Development of LF/RF Smart Key Entry System for passanger vehicle (LF/RF를 이용한 승용 스마트 키 시스템 개발)

  • Shin, Sang-Ho;Ko, Kuk-Won;Lee, Se-Won
    • Proceedings of the KAIS Fall Conference
    • /
    • 2011.05a
    • /
    • pp.101-104
    • /
    • 2011
  • 본 논문에서는 FOB Key Smart Key System module 간의 원할한 통신을 위한 실차 테스트를 하였으며, 실차 테스트를 위한 데모 모듈레이션 구성은 물론 각 모듈간의 통신상태및 최적의 통신 상태를 위한 3차원 그리드 형태의 실험준비를 하였고 최적의 감도를 얻기위한 수천번의 실차 테스트를 실시하였다.

  • PDF

A New Session Key Agreement Scheme Using Smart Cards (스마트 카드를 이용한 새로운 세션 키 생성 방법)

  • Lee, Jongkook;Jongsoo Jang
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04a
    • /
    • pp.518-520
    • /
    • 2003
  • This paper proposes a new session key agreement scheme which is based on Station-to-station protocol, or STS shortly. We extend key agreement model of STS, to take into account smart cards. Besides, we modify STS to withstand message replaying attack. Security analysis shows our scheme is still secure.

  • PDF

A Design of Key Generation and Communication for Device Access Control based on Smart Health Care (스마트 헬스케어 기반의 디바이스 접근제어를 위한 키 생성 및 통신기법 설계)

  • Min, So-Yeon;Lee, Kwang-Hyong;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.746-754
    • /
    • 2016
  • Smart healthcare systems, a convergent industry based on information and communications technologies (ICT), has emerged from personal health management to remote medical treatment as a distinguished industry. The smart healthcare environment provides technology to deliver vital information, such as pulse rate, body temperature, health status, and so on, from wearable devices to the hospital network where the physician is located. However, since it deals with the patient's personal medical information, there is a security issue for personal information management, and the system may be vulnerable to cyber-attacks in wireless networks. Therefore, this study focuses on a key-development and device-management system to generate keys in the smart environment to safely manage devices. The protocol is designed to provide safe communications with the generated key and to manage the devices, as well as the generated key. The security level is analyzed against attack methods that may occur in a healthcare environment, and it was compared with existing key methods and coding capabilities. In the performance evaluation, we analyze the security against attacks occurring in a smart healthcare environment, and the security and efficiency of the existing key encryption method, and we confirmed an improvement of about 15%, compared to the existing cipher systems.

Key Management Framework based on Double Hash Chain for Secure Smart Grid Environments (안전한 스마트 그리드 환경을 위한 이중 해쉬 체인 기반 키 관리 프레임워크)

  • Lee, Young-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.9
    • /
    • pp.2063-2072
    • /
    • 2013
  • Smart Grid is the next-generation intelligent power grid that maximizes energy efficiency with the convergence of IT technologies and the existing power grid. It enables consumers to check power rates in real time for active power consumption. It also enables suppliers to measure their expected power generation load, which stabilizes the operation of the power system. However, there are high possibility that various kinds of security threats such as data exposure, data theft, and privacy invasion may occur in interactive communication with intelligent devices. Therefore, to establish a secure environment for responding to such security threat with the smart grid, the key management technique, which is the core of the development of a security mechanism, is required. Using a hash chain, this paper suggests a group key management mechanism that is efficiently applicable to the smart grid environment with its hierarchical structure, and analyzes the security and efficiency of the suggested group key management framework.

Spatial correlation-based WRF observation-nudging approach in simulating regional wind field

  • Ren, Hehe;Laima, Shujin;Chen, Wen-Li;Guo, Anxin;Li, Hui
    • Wind and Structures
    • /
    • v.28 no.2
    • /
    • pp.129-140
    • /
    • 2019
  • Accurately simulating the wind field of large-scale region, for instant urban areas, the locations of large span bridges, wind farms and so on, is very difficult, due to the complicated terrains or land surfaces. Currently, the regional wind field can be simulated through the combination of observation data and numerical model using observation-nudging in the Weather Research and Forecasting model (WRF). However, the main drawback of original observation-nudging method in WRF is the effects of observation on the surrounding field is fully mathematical express in terms of temporal and spatial, and it ignores the effects of terrain, wind direction and atmospheric circulation, while these are physically unreasonable for the turbulence. For these reasons, a spatial correlation-based observation-nudging method, which can take account the influence of complicated terrain, is proposed in the paper. The validation and comparation results show that proposed method can obtain more reasonable and accurate result than original observation-nudging method. Finally, the discussion of wind field along bridge span obtained from the simulation with spatial correlation-based observation-nudging method was carried out.

Hash chain based Group Key Management Mechanism for Smart Grid Environments (스마트그리드 환경에 적용 가능한 해쉬체인 기반의 그룹키 관리 메커니즘)

  • Eun, Sun-Ki;Oh, Soo-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.149-160
    • /
    • 2011
  • Smart Grid is the next-generation intelligent power grid that maximizes energy efficiency with the convergence of IT technologies and the existing power grid. It enables consumers to check power rates in real time for active power consumption. It also enables suppliers to measure their expected power generation load, which stabilizes the operation of the power system. However, there are high possibility that various kinds of security threats such as data exposure, data theft, and privacy invasion may occur in interactive communication with intelligent devices. Therefore, to establish a secure environment for responding to such security threat with the smart grid, the key management technique, which is the core of the development of a security mechanism, is required. Using a hash chain, this paper suggests a group key management mechanism that is efficiently applicable to the smart grid environment with its hierarchical structure, and analyzes the security and efficiency of the suggested group key management mechanism.