• Title/Summary/Keyword: the automobile network system

Search Result 86, Processing Time 0.02 seconds

Verification of a Communication Method Secure against Attacks Using Convergence Hash Functions in Inter-vehicular Secure Communication (차량간 보안 통신에서 융합 해시함수를 이용하여 공격에 안전한 통신방법 검증)

  • Lee, Sang-Jun;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.9
    • /
    • pp.297-302
    • /
    • 2015
  • The increase in applying IT to vehicles has given birth to smart cars or connected cars. As smarts cars become connected with external network systems, threats to communication security are on the rise. With simulation test results supporting such threats to Convergence security in vehicular communication, concerns are raised over relevant vulnerabilities, while an increasing number of studies on secure vehicular communication are published. Hacking attacks against vehicles are more dangerous than other types of hacking attempts because such attacks may threaten drivers' lives and cause social instability. This paper designed a Convergence security protocol for inter-vehicle and intra-vehicle communication using a hash function, nonce, public keys, time stamps and passwords. The proposed protocol was tested with a formal verification tool, Casper/FDR, and found secure and safe against external attacks.

CAN Data Compression Using DLC and Compression Area Selection (DLC와 전송 데이터 압축영역 설정을 이용한 CAN 데이터 압축)

  • Wu, Yujing;Chung, Jin-Gyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.11
    • /
    • pp.99-107
    • /
    • 2013
  • Controller area network (CAN) was designed for multiplexing communication between electronic control units (ECUs) in vehicles and thus for decreasing the overall wire harness. The increasing number of ECUs causes the CAN bus overloaded and consequently the error probability of data transmission increases. Since the time duration for the data transmission is proportional to CAN frame length, it is desirable to reduce the frame length. In this paper, a CAN message compression method is proposed using Data Length Code (DLC) and compression area selection algorithm to reduce the CAN frame length and the error probability during the transmission of CAN messages. By the proposed method, it is not needed to predict the maximum value of the difference in successive CAN messages as opposed to other compression methods. Also, by the use of DLC, we can determine whether the received CAN message has been compressed or not without using two ID's as in conventional methods. By simulations using actual CAN data, it is shown that the CAN transmission data is reduced up to 52 % by the proposed method, compared with conventional methods. By using an embedded test board, it is shown that 64bit EMS CAN data compression can be performed within 0.16ms and consequently the proposed algorithm can be used in automobile applications without any problem.

Identity-Exchange based Privacy Preserving Mechanism in Vehicular Networks (차량 네트워크에서 신원교환을 통해 프라이버시를 보호하는 방법)

  • Hussain, Rasheed;Oh, Heekuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1147-1157
    • /
    • 2014
  • Intelligent transportation system (ITS) is realized through a highly ephemeral network, i.e. vehicular ad hoc network (VANET) which is on its way towards the deployment stage, thanks to the advancements in the automobile and communication technologies. However, it has not been successful, at least to date, to install the technology in the mass of vehicles due to security and privacy challenges. Besides, the users of such technology do not want to put their privacy at stake as a result of communication with peer vehicles or with the infrastructure. Therefore serious privacy measures should be taken before bringing this technology to the roads. To date, privacy issues in ephemeral networks in general and in VANET in particular, have been dealt with through various approaches. So far, multiple pseudonymous approach is the most prominent approach. However, recently it has been found out that even multiple pseudonyms cannot protect the privacy of the user and profilation is still possible even if different pseudonym is used with every message. Therefore, another privacy-aware mechanism is essential in vehicular networks. In this paper, we propose a novel identity exchange mechanism to preserve conditional privacy of the users in VANET. Users exchange their pseudonyms with neighbors and then use neighbors' pseudonyms in their own messages. To this end, our proposed scheme conditionally preserves the privacy where the senders of the message can be revoked by the authorities in case of any dispute.

A Design of Secure Communication for Device Management Based on IoT (사물인터넷 기반 디바이스 관리를 위한 안전한 통신 프로토콜 설계)

  • Park, Jung-Oh;Choi, Do-Hyeon;Hong, Chan-Ki
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.55-63
    • /
    • 2020
  • The IoT technology is a field that applies and converges the technologies in the existing industrial environment, instead of new technologies. The IoT technology is releasing various application services converged with other industries such as smart home, healthcare, construction, and automobile, and it is also possible to secure the work efficiency and convenience of users of IoT-based technologies. However, the security threats occurring in the IoT-based technology environment are succeeding to the vulnerability of the existing wireless network environment. And the occurrence of new and variant attacks in the combination with the ICT convergence environment, is causing damages. Thus, in the IoT technology-based environment, it would be necessary to have researches on the safe transmission of messages in the communication environment between user and device, and device and device. This thesis aims to design a safe communication protocol in the IoT-based technology environment. Regarding the suggested communication protocol, this thesis performed the safety analysis on the attack techniques occurring in the IoT technology-based environment. And through the performance evaluation of the existing PKI-based certificate issuance system and the suggested communication protocol, this thesis verified the high efficiency(about 23%) of communication procedure. Also, this thesis verified the reduced figure(about 65%) of the issued quantity of certificate compared to the existing issuance system and the certificate management technique.

Estimation of Unit Cost by Handling Cargo in Busan New Port DistriPark (부산항 신항 배후단지 취급화물별 비용 원단위 추정)

  • Kim, Yun-Hoe;Choung, Sang-Won;Kim, Yul-Seong
    • Journal of Navigation and Port Research
    • /
    • v.44 no.6
    • /
    • pp.550-556
    • /
    • 2020
  • Over the past years, the role of ports in the global network of supply chains has becoming increasingly important, not merely as a physical location for loading and unloading goods, but also as an essential center of economic activity where additional value is added to cargo. Due to the overall growing importance of ports, each country has chosen to adopt hub growth as a primary economic strategy. Northeast Asia in particular, due to its high population density, experiences intense competition between its ports. Busan's port, as a result, has used the establishment of Distripark in order to attract high and stable trade volume, and compete more effectively with other ports in the region. This study estimates the unit cost of the logistic process for the all principal cargos handled at Busan New Port, with the findings revealing that unit cost increases gradually starting with chemical products, LME bulk goods, automobile parts, LME containers, general cargoes, and LME inland transportation goods coming in last. Future research will look more closely at all all categories of cargo handled in the Distrpark of Busan New Port, thereby enabling us to better understand the value created by the port, and how to best implement effective trade volume-attraction strategy.

Development Strategy of Seosan-Daesan Port using AHP Analysis (AHP를 이용한 서산 대산항의 발전전략에 관한 연구)

  • Yun, Kyong-Jun;Ahn, Seung-Bum;Lee, Hyang-sook
    • Journal of Korea Port Economic Association
    • /
    • v.34 no.4
    • /
    • pp.39-52
    • /
    • 2018
  • The Seosan-Daesan Port is a representative trade port in Chungnam, and has the sixth largest total cargo throughput and the third largest oil cargo throughput in Korea. However, research on this port's development is lacking relative to that for Busan Port, Incheon Port, and Gwangyang Port, and no study exists that suggests the direction of the development strategy for Seosan-Daesan Port. This study discusses the future role of Seosan-Daesan Port in preparation for a rapidly changing future and the development strategy that should be established. Using the AHP, a development strategy is provided for Seosan-Daesan Port from short/mid-term and long-term viewpoints for three aspects: operation activation, infrastructure construction, and policy support. Operation activation is chosen as the most significant factor from a short/mid-term viewpoint, whereas infrastructure construction is recognized as important from a long-term viewpoint. Specifically, from a short/mid-term viewpoint, sustainable container cargo attraction, multipurpose dock construction, management pier construction, and opening of international passenger ferry lines are important factors while from the long-term viewpoint, hinterland construction, petrochemical industry cluster construction, automobile industry cluster construction, and management improvement system are important. Establishing action plans for each strategy and a cooperative network for sharing goals and strengthening cooperation is necessary.