• 제목/요약/키워드: vehicle security

검색결과 402건 처리시간 0.024초

A Survey on Security Schemes based on Conditional Privacy-Preserving in Vehicular Ad Hoc Networks

  • Al-Mekhlafi, Zeyad Ghaleb;Mohammed, Badiea Abdulkarem
    • International Journal of Computer Science & Network Security
    • /
    • 제21권11호
    • /
    • pp.105-110
    • /
    • 2021
  • Contact between Vehicle-to-vehicle and vehicle-to-infrastructural is becoming increasingly popular in recent years due to their crucial role in the field of intelligent transportation. Vehicular Ad-hoc networks (VANETs) security and privacy are of the highest value since a transparent wireless communication tool allows an intruder to intercept, tamper, reply and erase messages in plain text. The security of a VANET based intelligent transport system may therefore be compromised. There is a strong likelihood. Securing and maintaining message exchange in VANETs is currently the focal point of several security testing teams, as it is reflected in the number of authentication schemes. However, these systems have not fulfilled all aspects of security and privacy criteria. This study is an attempt to provide a detailed history of VANETs and their components; different kinds of attacks and all protection and privacy criteria for VANETs. This paper contributed to the existing literature by systematically analyzes and compares existing authentication and confidentiality systems based on all security needs, the cost of information and communication as well as the level of resistance to different types of attacks. This paper may be used as a guide and reference for any new VANET protection and privacy technologies in the design and development.

군집 드론망을 통한 IoT 서비스를 위한 보안 프레임워크 연구 (A Study on the Security Framework in IoT Services for Unmanned Aerial Vehicle Networks)

  • 신민정;김성운
    • 한국멀티미디어학회논문지
    • /
    • 제21권8호
    • /
    • pp.897-908
    • /
    • 2018
  • In this paper, we propose a security framework for a cluster drones network using the MAVLink (Micro Air Vehicle Link) application protocol based on FANET (Flying Ad-hoc Network), which is composed of ad-hoc networks with multiple drones for IoT services such as remote sensing or disaster monitoring. Here, the drones belonging to the cluster construct a FANET network acting as WTRP (Wireless Token Ring Protocol) MAC protocol. Under this network environment, we propose an efficient algorithm applying the Lightweight Encryption Algorithm (LEA) to the CTR (Counter) operation mode of WPA2 (WiFi Protected Access 2) to encrypt the transmitted data through the MAVLink application. And we study how to apply LEA based on CBC (Cipher Block Chaining) operation mode used in WPA2 for message security tag generation. In addition, a modified Diffie-Hellman key exchange method is approached to generate a new key used for encryption and security tag generation. The proposed method and similar methods are compared and analyzed in terms of efficiency.

An Efficient Anonymous Authentication Scheme with Secure Communication in Intelligent Vehicular Ad-hoc Networks

  • Zhang, Xiaojun;Mu, Liming;Zhao, Jie;Xu, Chunxiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권6호
    • /
    • pp.3280-3298
    • /
    • 2019
  • Vehicular ad-hoc networks (VANETs) have become increasingly significant in intelligent transportation systems, they play a great role in improving traffic safety and efficiency. In the deployment of intelligent VANETs, intelligent vehicles can efficiently exchange important or urgent traffic information and make driving decisions. Meanwhile, secure data communication and vehicle's identity privacy have been highlighted. To cope with these security issues, in this paper, we construct an efficient anonymous authentication scheme with secure communication in intelligent VANETs. Combing the ElGamal encryption technique with a modified Schnorr signature technique, the proposed scheme provides secure anonymous authentication process for encrypted message in the vehicle-to-infrastructure communication model, and achieves identity privacy, forward security, and reply attack resistance simultaneously. Moreover, except the trusted authority (TA), any outside entity cannot trace the real identity of an intelligent vehicle. The proposed scheme is designed on an identity-based system, which can remove the costs of establishing public key infrastructure (PKI) and certificates management. Compared with existing authentication schemes, the proposed scheme is much more practical in intelligent VANETs.

Enhancing VANET Security: Efficient Communication and Wormhole Attack Detection using VDTN Protocol and TD3 Algorithm

  • Vamshi Krishna. K;Ganesh Reddy K
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제18권1호
    • /
    • pp.233-262
    • /
    • 2024
  • Due to the rapid evolution of vehicular ad hoc networks (VANETs), effective communication and security are now essential components in providing secure and reliable vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication. However, due to their dynamic nature and potential threats, VANETs need to have strong security mechanisms. This paper presents a novel approach to improve VANET security by combining the Vehicular Delay-Tolerant Network (VDTN) protocol with the Deep Reinforcement Learning (DRL) technique known as the Twin Delayed Deep Deterministic Policy Gradient (TD3) algorithm. A store-carry-forward method is used by the VDTN protocol to resolve the problems caused by inconsistent connectivity and disturbances in VANETs. The TD3 algorithm is employed for capturing and detecting Worm Hole Attack (WHA) behaviors in VANETs, thereby enhancing security measures. By combining these components, it is possible to create trustworthy and effective communication channels as well as successfully detect and stop rushing attacks inside the VANET. Extensive evaluations and simulations demonstrate the effectiveness of the proposed approach, enhancing both security and communication efficiency.

Self-Driving and Safety Security Response : Convergence Strategies in the Semiconductor and Electronic Vehicle Industries

  • Dae-Sung Seo
    • International journal of advanced smart convergence
    • /
    • 제13권2호
    • /
    • pp.25-34
    • /
    • 2024
  • The paper investigates how the semiconductor and electric vehicle industries are addressing safety and security concerns in the era of autonomous driving, emphasizing the prioritization of safety over security for market competitiveness. Collaboration between these sectors is deemed essential for maintaining competitiveness and value. The research suggests solutions such as advanced autonomous driving technologies and enhanced battery safety measures, with the integration of AI chips playing a pivotal role. However, challenges persist, including the limitations of big data and potential errors in semiconductor-related issues. Legacy automotive manufacturers are transitioning towards software-driven cars, leveraging artificial intelligence to mitigate risks associated with safety and security. Conflicting safety expectations and security concerns can lead to accidents, underscoring the continuous need for safety improvements. We analyzed the expansion of electric vehicles as a means to enhance safety within a framework of converging security concerns, with AI chips being instrumental in this process. Ultimately, the paper advocates for informed safety and security decisions to drive technological advancements in electric vehicles, ensuring significant strides in safety innovation.

A Novel Certificate Revocation List Distribution for Vehicle Communications in Mobile Communication Networks

  • Dan, Du Anh;Kim, Hyun-Gon
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권12호
    • /
    • pp.109-116
    • /
    • 2017
  • Short-lived pseudonym certificates as vehicle identities could satisfy both security and privacy requirements. However, to remove revoked certificates especially in vehicle communications, pseudonym certificate revocation list (CRL) should be distributed resource-efficiently from a practical deployment point of view and in a timely manner. In this paper, we propose a novel CRL distribution scheme capable of CRL multicast to only activated vehicles registered to the CRL multicast group using the group communication system enabler, namely, the GCSE which is being standardized. The scheme is resource efficient by using CRL distribution paths instead of paging processes to find out multicast vehicle(s) within a certain region. The analyzed results show that the proposed scheme outperforms in terms of paging cost, packets transmission cost, and the processing cost at the respective entities compared to the existing four schemes in the literature.

정보보호를 고려한 전기자동차 충방전 시스템의 인증과 운영에 관한 연구 (Secured Authentication Scheme and Charging & Discharging System Operation for Electric Vehicles)

  • 이성욱
    • 문화기술의 융합
    • /
    • 제7권1호
    • /
    • pp.551-557
    • /
    • 2021
  • 전기자동차의 증가에 따라 공공장소의 전기자동차 충방전 기반시설 또한 급격히 늘어나고 있다. 전기자동차의 충방전을 위해서는 보안상의 취약점을 최소화하기 위해 전기자동차와 서비스 제공자가 서로의 신원을 확인하는 상호인증과정 후에 층방전 서비스를 시작하여야 한다. 본고에서는 해쉬함수와 메시지 인증코드를 사용하여 전기자동차와 충방전 서비스 제공자간의 양방향 인증 방법을 제안한다. 그리고 효율적인 충방전 시스템의 운영에 대해 기술한다. 제안된 시스템은 외부로 부터의 공격에 강한 내성을 가지며 충방전 서비스 이용자의 개인정보를 효과적으로 보호할 수 있다.

스마트시티 내 긴급차량 우선신호 제어시스템 구축과 효과성 분석 및 ISMS-P 기술적 통제항목 개선 방향성 연구 (Establishment and Effectiveness Analysis of Emergency Vehicle Priority Signal Control System in Smart City and Directions for ISMS-P Technical Control Item Improvement)

  • 윤태석;박용석
    • 한국정보통신학회논문지
    • /
    • 제25권9호
    • /
    • pp.1166-1175
    • /
    • 2021
  • 국내 스마트시티와 긴급차량 우선신호 제어시스템의 현재 상황과 발전동향을 알아보고, 긴급차량 우선신호 제어시스템의 기존 효과분석과 신호제어시스템의 보안을 위한 국내외 선행 연구 내용을 바탕으로, 긴급차량 우선신호 제어시스템을 구축하고 긴급차량에 실제 적용 및 시험운행을 통해 시간단축의 효과성을 분석하였다. 더불어 실시간 신호시스템 제어의 보안관리 및 안정적인 서비스를 위해 기존 ISMS-P 인증제도와 한국인터넷진흥원 사이버보안 가이드의 보안요구사항과 보안위협 항목에 따른 보안대책의 연관성에 따라 비교하여 맵핑함으로서, 인명구조나 화재 등 긴급상황 발생 시 시민의 소중한 생명과 재산을 지킬 수 있는 골든타임 확보 가능성을 높일 수 있도록 ISMS-P 인증제도의 기술적 통제항목 개선을 제안한다.

운전 패턴을 이용한 운전자 보조 인증방법 (The Sub Authentication Method For Driver Using Driving Patterns)

  • 정종명;강형철;조효진;윤지원;이동훈
    • 정보보호학회논문지
    • /
    • 제23권5호
    • /
    • pp.919-929
    • /
    • 2013
  • 최근에 많은 IT기술들이 자동차에 적용되고 있다. 하지만 일부 자동차 IT 기술들은 보안에 대한 적절한 고려 없이 자동차에 적용되어 보안 사고를 야기할 수도 있다. 특히 최근의 연구 결과들은 차량 소유자 인증을 해주는 특정 모델의 스마트키가 무선 신호를 재전송하거나 이를 위조하는 공격으로부터 안전하지 않고, 이를 통해 차량을 탈취할 수 있음을 실험을 통해 증명하였다. 따라서 본 논문에서는 스마트키의 무선 신호 조작 공격을 이용한 차량도난으로부터 안전한 차량 운전자 인증 방법을 제안한다. 오늘날 차량에 구축된 전자장치간의 네트워크에서는 운전자의 운전 패턴에 대한 정보를 얻을 수 있다. 본 논문에서는 이러한 차량 소유자의 운전 패턴 정보를 학습시켜 이를 표준 정규분포화한 후, 운전자에 대한 인증이 가능한 인증 모델을 설계하였다. 또한 제안하는 인증 모델을 검증하기 위해 k-묶음 교차 검증을 수행하였고, false positive rate가 0.35일 때 true positive rate 0.7 로 운전자 인식이 가능함을 확인하였다. 제안하는 인증모델은 차량 소유자에게 연락할 수 있는 모듈(eg. 3G/4G 통신 module)과 함께 사용된다면 기존의 소유기반(스마트 키)의 인증 방식 보다 더 안전하게 차량을 보호할 수 있다.

자율주행 자동차 보안기술 동향 (Security Trends for Autonomous Driving Vehicle)

  • 권혁찬;이석준;최중용;정병호;이상우;나중찬
    • 전자통신동향분석
    • /
    • 제33권1호
    • /
    • pp.78-88
    • /
    • 2018
  • As the traffic environment gradually changes to autonomous driving and intelligent transport systems, vehicles are becoming increasingly complicated and intelligent, and their connectivity is greatly expandinged. As a result, attack vectors of such vehicles increasing, and security threats further expanding. Currently, various solutions for vehicle security are being developed and applied, but the damage caused by cyber attacks is still increasing. In recent years, vehicles such as the Tesla Model S and Mitsubishi Outlander have been hacked and remotely controlled by an attacker. Therefore, there is a need for advanced security technologies to cope with increasingly intelligent and sophisticated automotive cyber attacks. In this article, we introduce the latest trends of autonomous vehicles and their security threats, as well as the current status and issues of security technologies to cope with them.