• Title/Summary/Keyword: vehicle attack

Search Result 158, Processing Time 0.024 seconds

Intrusion Detection System for In-Vehicle Network to Improve Detection Performance Considering Attack Counts and Attack Types (공격 횟수와 공격 유형을 고려하여 탐지 성능을 개선한 차량 내 네트워크의 침입 탐지 시스템)

  • Hyunchul, Im;Donghyeon, Lee;Seongsoo, Lee
    • Journal of IKEEE
    • /
    • v.26 no.4
    • /
    • pp.622-627
    • /
    • 2022
  • This paper proposes an intrusion detection system for in-vehicle network to improve detection performance considering attack counts and attack types. In intrusion detection system, both FNR (False Negative Rate), where intrusion frame is misjudged as normal frame, and FPR (False Positive Rate), where normal frame is misjudged as intrusion frame, seriously affect vechicle safety. This paper proposes a novel intrusion detection algorithm to improve both FNR and FPR, where data frame previously detected as intrusion above certain attack counts is automatically detected as intrusion and the automatic intrusion detection method is adaptively applied according to attack types. From the simulation results, the propsoed method effectively improve both FNR and FPR in DoS(Denial of Service) attack and spoofing attack.

A Numerical Study on the Characteristics of the Supercavitation and Hydrodynamic Forces Generated in a Supercavitating Underwater Vehicle with Angle of Attack (받음각을 갖는 초공동 수중 운동체에서 발생하는 초월공동과 유체력 특성에 대한 수치적 연구)

  • Jeon, Yunho;Park, Jeonghoon;Jeon, Kwansoo
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.58 no.4
    • /
    • pp.214-224
    • /
    • 2021
  • Recently, as the technology of the supercavitating underwater vehicle is improved, the necessity of research for maneuvering characteristics of the supercavitating underwater vehicle has emerged. In this study, as a preliminary step to analyzing the maneuverability of a supercavitating underwater vehicle, the characteristics of cavity shapes and hydrodynamic forces generated in a supercavitating underwater vehicle with an angle of attack were evaluated numerically. First, the geometry was designed by modifying the shape of the existing supercavitating underwater vehicle. The continuity and the Navier-stokes equations are numerically solved, and turbulent eddy viscosity is solved by the k-ω SST model. The results present the characteristics of cavity shape and the hydrodynamic forces of the designed geometry with an angle of attack.

Development of side attack guidance law for an underwater vehicle (수중 운동체를 위한 측면 공격 유도 기법)

  • 이보형;이장규;한형석;김병수
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1993.10a
    • /
    • pp.533-539
    • /
    • 1993
  • In this paper, two side-attack guidance laws for an underwater vehicle are considered. In order to find the guidance command, we first make use of the optimal guidance law with terminal impact angle constraint. Secondly, the optimal solution of tracking problem is used. This paper shows some brief theory which is used in deriving the side-attack guidance laws, and the method of computing these guidance laws. Simulations on underwater vehicle for a constant moving target prove that the suggested side-attack guidance laws have enhanced side attack performance over the optimal guidance law with miss distance weighting only. Furthermore, from simulation results. we conclude that the guidance law using the optimal solution of tracking problem is more efficient for the side-attack guidance than the optimal guidance law with terminal impact angle constraint.

  • PDF

Vulnerability analysis of smart key for vehicle and countermeasure against hacking attack (차량용 스마트키 취약점 분석과 해킹공격 대응방안)

  • Kim, Seung-woo;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.302-305
    • /
    • 2017
  • With the development of new ICT technology, new technologies are being applied to automobiles. The smart key for vehicles is also a device to which ICT new technology is applied. Therefore, a cyber-hacking attack against a smart key of a vehicle is possible. The cyber attack on the smart key can cause an abnormal control of the vehicle. Vehicle control can lead to vehicle hijacking and vehicle control risks. In this paper, we analyze the vulnerability of smart key for vehicle. Analyze cyber attacks against smart keys in vehicles. Then, we conduct real hacking attacks on smart keys for vehicles and propose countermeasures. We conduct a hacking attack against the smart key for vehicle that has devised countermeasures and analyze countermeasures against cyber attack security. This paper will contribute to the prevention of vehicle deodorization and to the safety of the people.

  • PDF

AERODYNAMIC ANALYSIS OF SUB-ORBITAL RE-ENTRY VEHICLE (저궤도 재진입 비행체의 공력해석)

  • Kim, C.W.;Lee, Y.G.;Lee, D.S.
    • Journal of computational fluids engineering
    • /
    • v.13 no.2
    • /
    • pp.1-7
    • /
    • 2008
  • For Aerodynamic analysis of vehicle at altitude, 100km, the validity of governing equations based on continuum model, was reviewed. Also, as the preliminary study for the sub-orbital space plane development, a candidate geometry was suggested and computational fluid dynamic(CFD) analysis was performed for various angles of attack in subsonic and supersonic flow regimes to analyze the aerodynamic characteristics and performance. The inviscid flow analyses showed that the stall starts at angle of attack above $20^{\circ}$, the maximum drag is generated at angle of attack, $87^{\circ}$ and the maximum lift to drag ratio is about 8 in subsonic flow. In supersonic, the stall angle is about $40^{\circ}$ and the maximum drag is generated at angle of attack, $90^{\circ}$. Also, mach number distribution of re-entry vehicle was computed versus altitudes.

A COMPUTATIONAL STUDY OF HEMISPHERE-CYLINDER FLIGHT VEHICLE AT HIGH ANGLES OF ATTACK AND SIDE SLIP (HEMISPHERE-CYLINDER 비행체의 고앙각과 SIDE SLIP에서의 거동해석 연구)

  • Na, Chae-Rok;Lim, Seol;Kim, Sang-Dug;Song, Dong-Joo
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2006.10a
    • /
    • pp.142-146
    • /
    • 2006
  • The behavior of a hemisphere-cylinder flight vehicle at high angles of attack and side slip angles have been studied. $0^{\circ}{\sim}35^{\circ}$ angles of attack and $0^{\circ}{\sim}5^{\circ}$ side slip angles were selected as fright conditions at Mach No. 0.3. Flow changes from low angles of attack to high angles of attack were compared and analyzed. We changed from low to high angles of attack with small side slip angles. We compared normal, side and axial force coefficients among various test cases.

  • PDF

Study on Aerodynamic Characteristics of a Launch Vehicle with Mach Number, Angle of Attack and Nozzle Effect at Initial Stage (발사초기 단계에서 발사체의 마하수, 받음각 및 노즐 효과에 따른 공력특성 연구)

  • Jeong, Taegeon;Kim, Sungcho;Choi, Jongwook
    • Journal of the Korean Society of Visualization
    • /
    • v.17 no.1
    • /
    • pp.34-42
    • /
    • 2019
  • Aerodynamic characteristics for a launch vehicle are numerically analyzed with various conditions. The local drag coefficients are high at the nose of the launch vehicle in subsonic region and on the main body in supersonic region because of the induced drag and the wave drag, respectively. The drag coefficients show the similar trend with the angle of attack except zero degree. However, the more the angle of attack increases, the more dependent on the Mach number the lift coefficient is. The body rotation for the flight stability destroys the vortex pair formed above the body opposite to the flight direction, so the flow fields are more or less complicated. The drag coefficient of the launch vehicle at sea level is about three times larger than that at altitude 7.2 km. And the thrust jet at the nozzle causes to reduce the drag coefficient compared with the jetless transonic flight.

A COMPUTATIONAL STUDY ON THE CHARACTERISTICS OF ASYMMETRIC VORTEX OF TANGENT-OGIVE-CYLINDER FLIGHT VEHICLE AT HIGH ANGLES OF ATTACK (Tangent-Ogive-Cylinder 비행체의 고앙각에서의 비대칭 와류 특성 연구)

  • Lim, S.;Kim, S.D.;Song, D.J.
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2007.04a
    • /
    • pp.3-7
    • /
    • 2007
  • The characteristics of asymmetric vortex and side force of tangent-ogive-cylinder flight vehicle at high angles of attack have been performed by using upwind Navier-Stokes method with the ${\kappa}-{\omega}$ turbulence model. And Asymmetric transition positions are considered for generation of asymmetric vortex.

  • PDF

GAN Based Adversarial CAN Frame Generation Method for Physical Attack Evading Intrusion Detection System (Intrusion Detection System을 회피하고 Physical Attack을 하기 위한 GAN 기반 적대적 CAN 프레임 생성방법)

  • Kim, Dowan;Choi, Daeseon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1279-1290
    • /
    • 2021
  • As vehicle technology has grown, autonomous driving that does not require driver intervention has developed. Accordingly, CAN security, an network of in-vehicles, has also become important. CAN shows vulnerabilities in hacking attacks, and machine learning-based IDS is introduced to detect these attacks. However, despite its high accuracy, machine learning showed vulnerability against adversarial examples. In this paper, we propose a adversarial CAN frame generation method to avoid IDS by adding noise to feature and proceeding with feature selection and re-packet for physical attack of the vehicle. We check how well the adversarial CAN frame avoids IDS through experiments for each case that adversarial CAN frame generated by all feature modulation, modulation after feature selection, preprocessing after re-packet.

A Message Authentication and Key Distribution Mechanism Secure Against CAN bus Attack (CAN 버스 공격에 안전한 메시지 인증 및 키 분배 메커니즘)

  • Cho, A-Ram;Jo, Hyo Jin;Woo, Samuel;Son, Young Dong;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1057-1068
    • /
    • 2012
  • According to advance on vehicle technology, many kinds of ECU(Electronic Control Unit) are equipped inside the vehicle. In-vehicle communication among ECUs is performed through CAN(Controller Area Networks). CAN have high reliability. However, it has many vulnerabilities because there is not any security mechanism for CAN. Recently, many papers proposed attacks of in-vehicle communication by using these vulnerabilities. In this paper, we propose an wireless attack model using a mobile radio communication network. We propose a secure authentication mechanism for in-vehicle network communication that assure confidentiality and integrity of data packets and also protect in-vehicle communication from the replay attack.