• 제목/요약/키워드: Smart cars

검색결과 110건 처리시간 0.031초

보안과 프라이버시 위험이 스마트카 안전과 신뢰에 미치는 영향 (The impact of security and privacy risk on smart car safety and trust)

  • 권순범;이환수
    • 융합보안논문지
    • /
    • 제23권5호
    • /
    • pp.9-19
    • /
    • 2023
  • 운전자의 주행 안전성과 편의성을 증가시키기 위하여 최근 자동차는 ICT 기술이 융합된 스마트카 형태로 진화하고 있다. 그러나 스마트카의 자율주행 기능을 구현하기 위해 존재하는 전자제어장치(Electronic Control Unit; ECU)와 차량용 네트워크의 취약성은 자동차 사이버보안에 대한 위험을 증가시키는 원인이 되고 있다. 스마트카 보안에 대한 운전자들의 불안 심리는 스마트카 확산에 부정적인 영향을 미칠 수 있으나 실제 스마트카 해킹이 현실에서 일어난 사례는 적은 상황으로 주로 연구를 통해서만 이러한 위험에 대해 논의되고 있는 상황이다. 향후 스마트카의 보급과 확산을 위해서는 스마트카의 실질적인 보안능력 향상과 더불어 운전자들이 인식하는 위험 요인과 이를 통해 형성된 스마트카에 대한 신뢰를 이해하는 것이 중요할 수 있다. 따라서 본 연구에서는 스마트카의 신뢰 형성에 영향을 미치는 위험 요인을 보안과 프라이버시를 중심으로 살펴보고 이러한 요인들이 스마트카 안전인식과 신뢰에 어떠한 영향을 미치는지 분석한다.

The Intelligent Blockchain for the Protection of Smart Automobile Hacking

  • Kim, Seong-Kyu;Jang, Eun-Sill
    • Journal of Multimedia Information System
    • /
    • 제9권1호
    • /
    • pp.33-42
    • /
    • 2022
  • In this paper, we have recently created self-driving cars and self-parking systems in human-friendly cars that can provide high safety and high convenience functions by recognizing the internal and external situations of automobiles in real time by incorporating next-generation electronics, information communication, and function control technologies. And with the development of connected cars, the ITS (Intelligent Transportation Systems) market is expected to grow rapidly. Intelligent Transportation System (ITS) is an intelligent transportation system that incorporates technologies such as electronics, information, communication, and control into the transportation system, and aims to implement a next-generation transportation system suitable for the information society. By combining the technologies of connected cars and Internet of Things with software features and operating systems, future cars will serve as a service platform to connect the surrounding infrastructure on their own. This study creates a research methodology based on the Enhanced Security Model in Self-Driving Cars model. As for the types of attacks, Availability Attack, Man in the Middle Attack, Imperial Password Use, and Use Inclusive Access Control attack defense methodology are used. Along with the commercialization of 5G, various service models using advanced technologies such as autonomous vehicles, traffic information sharing systems using IoT, and AI-based mobility services are also appearing, and the growth of smart transportation is accelerating. Therefore, research was conducted to defend against hacking based on vulnerabilities of smart cars based on artificial intelligence blockchain.

Neural Network and Cloud Computing for Predicting ECG Waves from PPG Readings

  • Kosasih, David Ishak;Lee, Byung-Gook;Lim, Hyotaek
    • Journal of Multimedia Information System
    • /
    • 제9권1호
    • /
    • pp.11-20
    • /
    • 2022
  • In this paper, we have recently created self-driving cars and self-parking systems in human-friendly cars that can provide high safety and high convenience functions by recognizing the internal and external situations of automobiles in real time by incorporating next-generation electronics, information communication, and function control technologies. And with the development of connected cars, the ITS (Intelligent Transportation Systems) market is expected to grow rapidly. Intelligent Transportation System (ITS) is an intelligent transportation system that incorporates technologies such as electronics, information, communication, and control into the transportation system, and aims to implement a next-generation transportation system suitable for the information society. By combining the technologies of connected cars and Internet of Things with software features and operating systems, future cars will serve as a service platform to connect the surrounding infrastructure on their own. This study creates a research methodology based on the Enhanced Security Model in Self-Driving Cars model. As for the types of attacks, Availability Attack, Man in the Middle Attack, Imperial Password Use, and Use Inclusive Access Control attack defense methodology are used. Along with the commercialization of 5G, various service models using advanced technologies such as autonomous vehicles, traffic information sharing systems using IoT, and AI-based mobility services are also appearing, and the growth of smart transportation is accelerating. Therefore, research was conducted to defend against hacking based on vulnerabilities of smart cars based on artificial intelligence blockchain.

Chinese Sensitivity Analysis for a Compact Car Exterior Design

  • Yoon, Hyung-Kun;Fu, Kaili;Zhou, Junjun;Zhuo, Tian
    • 감성과학
    • /
    • 제15권2호
    • /
    • pp.317-327
    • /
    • 2012
  • This paper uses the sensibility engineering method to find the model of automobile most appealing to buyers in the $4^{th}$ and $5^{th}$ tier cities of China. Samples of class A & A0 cars were shown to 96 subjects in those cities to investigate their responses in relation to the concepts 'modern' and 'smart'. The result shows that even though men tend to be more sensitive to automobile models in general than women are, both genders showed similar responses to specific models when they were asked to identify a model 'magnificent', 'modern', 'lively', 'smart' or 'cute'. This implies that despite the gender differences in terms of aesthetic sensitivity, both men and women share similar taste in relation to the appearance of cars. Apart from aesthetics, however, men tend to pay a greater attention to the details of design and material used for the cars, while women tend to pay attention to higher priced and better looking cars.

  • PDF

Localization of Mobile Users with the Improved Kalman Filter Algorithm using Smart Traffic Lights in Self-driving Environments

  • Jung, Ju-Ho;Song, Jung-Eun;Ahn, Jun-Ho
    • 한국컴퓨터정보학회논문지
    • /
    • 제24권5호
    • /
    • pp.67-72
    • /
    • 2019
  • The self-driving cars identify appropriate navigation paths and obstacles to arrive at their destinations without human control. The autonomous cars are capable of sensing driving environments to improve driver and pedestrian safety by sharing with neighbor traffic infrastructure. In this paper, we have focused on pedestrian protection and have designed an improved localization algorithm to track mobile users on roads by interacting with smart traffic lights in vehicle environments. We developed smart traffic lights with the RSSI sensor and built the proposed method by improving the Kalman filter algorithm to localize mobile users accurately. We successfully evaluated the proposed algorithm to improve the mobile user localization with deployed five smart traffic lights.

속성 기반 권한위임 관리 기법을 사용한 스마트 자동차 안전성 검토에 관한 연구 (A Study of a Secure Smart Car System using Attribute-based Delegation Method)

  • 김진묵;문정경;황득영
    • 융합보안논문지
    • /
    • 제19권3호
    • /
    • pp.71-79
    • /
    • 2019
  • 스마트 자동차에 대한 수요가 급격하게 증가하고 있다. 3GPP와 5GAA와 같은 표준기구에서는 스마트 자동차를 위한 자율 주행 자동차를 포함한 커넥티드 카, 자동차 네트워크 인프라에 대한 표준 통신 프로토콜을 제시하고 있다. 하지만 이와 같이, 스마트 자동차 네트워크 환경에는 기존의 유선 통신 네트워크 보다 더욱 위험할 것으로 예상되는 보안 위협 요소들이 존재한다. 대표적으로 스마트 자동차의 주변 장치들이 신분을 위장하여 차량에 대한 위치정보, 개인 정보 등을 탈취할 수 있을 뿐만 아니라, 스마트 자동차 주변의 인프라 요소들이 공모하여 주행중인 자동차를 위험한 상황에 빠뜨려 생명에 위협을 가할 수도 있을 것이다. 이를 해결하기 위해서, 본 논문에서는 속성 기반 권한 위임 관리 기법과 임계치 암호 알고리즘을 사용해 공모 공격으로부터 안전한 시스템을 제안하였다. 제안한 시스템은 앞서 예로 제시한 공모 공격으로부터 안전할 수 있음을 의미론적 안전 모델을 사용해서 증명하였다.

Smart Pricing in Action: The Case of Asset Pricing for a Rent-a-Car Company

  • Chang Hee Han;Seongmin Jeon;Sangchun Shim;Byungjoon Yoo
    • Asia pacific journal of information systems
    • /
    • 제29권4호
    • /
    • pp.673-689
    • /
    • 2019
  • The Internet enables businesses to acquire a great deal of information, including prices in the open markets. In this study, we investigate what the value of reference price information is to a company in the market and how the company can make use of such information. Using business analytics, we were able to estimate prices of used cars for a rent-a-car company. The results show that a smart pricing information system is useful for collecting online reference price information and for estimating future prices of used cars and rental prices.

Boosting green cars retail in Malaysia: The influence of conditional value on consumers behaviour

  • ALGANAD, Amr Mohammed Nasser;ISA, Normalisa Md;FAUZI, Waida Irani Mohd
    • 유통과학연구
    • /
    • 제19권7호
    • /
    • pp.87-100
    • /
    • 2021
  • Purpose: This paper examined the role of conditional value in the green automotive industry. The relationships of conditional value's four factors, consumers' attitudes and consumers' intention to purchase green cars were investigated. The conditional value was extended by examining the effect of fuel prices. Research design, data, and methodology: This study is quantitatively designed. All variables were measured using a 7-point Likert-scale; 425 questionnaires were collected from the respondents in Malaysia. SmartPLS was utilized to examine the proposed nine hypotheses. Result: The results demonstrate a positive relationship between attitude and intention toward green cars. Additionally, the results of the relationships were as follows: fuel prices was the most significant predictor of Malaysian consumers' attitudes and consumers' intention to purchase green cars, followed by environmental consequences and government policy. However, retail sales promotions did not show a significant effect on both consumers' attitudes and intentions. Conclusion: The study's findings suggest that the Malaysian government should implement an integrated package that includes a fuel pricing policy that restricts the purchase of non-green cars, as well as a set of financial incentives for purchasing green cars. Moreover, it is valuable to conduct public awareness campaigns about the negative consequences of current consumption patterns.

스마트 자동차 네트워크의 보안취약점 분석 및 해결방안 마련 (Smart Vehicle Security Vulnerability Analysis and Solution Support)

  • 김진묵;문정경;황득영
    • 융합보안논문지
    • /
    • 제18권3호
    • /
    • pp.69-76
    • /
    • 2018
  • 4차 산업혁명 시대에 가장 주목 받는 기술 중에 하나로 스마트 자동차 분야에 대한 관심이 매우 높아지고 있다. 가까운 미래에는 스마트 자동차를 타고 원하는 곳으로 이동하는 것이 가능해질 뿐만 아니라, 인공지능 요소를 포함한 스마트 자동차가 스스로 갑작스런 자동차 사고를 회피할 수도 있다. 하지만 스마트 자동차 분야가 발전하면 할수록 보안 분야에서 발생할 수 있는 다양한 위험성은 증가하게 된다. 그러므로 본 연구에서는 스마트 자동차 네트워크에서 발생할 수 있는 보안 취약점들에 대한 이해를 바탕으로, FIDO와 속성기반 권한 위임 기법을 사용한 정보보호 기술을 스마트 자동차 네트워크에 적용함으로써 안전하고 보안성이 높은 제어 기술을 제공할 수 있게 하고자 한다. 제안한 연구방법은 안전한 스마트 자동차 제어 기술을 사용함으로써, 스마트 자동차 네트워크 환경에서 발생할 수 있는 보안 취약점들을 해결할 수 있음을 보였다. 뿐만 아니라 스마트 자동차 네트워크 분야에서 발생할 수 있는 보안 취약성들을 해결하기 위한 다양한 제안방법들을 향후 연구를 통해서 제안하고자 한다.

  • PDF

Research on synchronization between smart toys and smart phones for classifying smart toys

  • Jung, Sugkyu
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제9권4호
    • /
    • pp.25-30
    • /
    • 2017
  • Market of smart toys is showing rapid growth globally. Recently, new types of toys which can be synced with smart phones, so called smart toys, are being released continuously. As a result, products from RC cars with camera attached that can be driven and monitored using a connected smart phone to toys that would call kid's name once it has been entered through a mobile app. It has been confirmed that there are various way to connect those toys with mobile devices. In this paper, functions of smart toys are classified, and research on different synchronization methods of the toys sold in market as of July, 2017 are explained.