• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

Çмú´ëȸ ÇÁ·Î½Ãµù

Ȩ Ȩ > ¿¬±¸¹®Çå > Çмú´ëȸ ÇÁ·Î½Ãµù > Çѱ¹Á¤º¸Åë½ÅÇÐȸ Çмú´ëȸ > 2016³â Ãá°èÇмú´ëȸ

2016³â Ãá°èÇмú´ëȸ

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) Ä¿³×ƼƮ Ä«ÀÇ Ãë¾àÁ¡ ºÐ¼® ¹× º¸¾È ½Ã½ºÅÛ ¼³°è
¿µ¹®Á¦¸ñ(English Title) Analyzing of connected car vulnerability and Design of Security System
ÀúÀÚ(Author) ±èÅÂÇü   ÀåÁ¾¿í   Tae-Hyoung Kim   Jong-Wook Jang  
¿ø¹®¼ö·Ïó(Citation) VOL 20 NO. 01 PP. 0241 ~ 0243 (2016. 05)
Çѱ۳»¿ë
(Korean Abstract)
°ú°Å, ÀÚµ¿Â÷ º¸¾ÈÀº ¡®Door Lock¡¯°ú °°Àº ¹°¸®ÀûÀÎ Á¢±ÙÀ» ¹æÁöÇÏ´Â °ÍÀ̾ú´Ù. ±×·¯³ª ½Ã´ë°¡ ¹ß´ÞÇÔ¿¡ µû¶ó, ÀÚµ¿Â÷ º¸¾ÈÀÇ Æ®·»µå´Â ÀÌ·¯ÇÑ ¹°¸®ÀûÀÎ º¸¾È¿¡¼­ ±²ÀåÈ÷ Áö´ÉÀûÀ¸·Î ¹Ù²î¾ú´Ù. ÀÌ·¯ÇÑ º¯È­´Â ÇØÄ¿µé·Î ÇÏ¿©±Ý Â÷·® Åë½Å ½Ã½ºÅÛÀ» °ø°ÝÇÒ °è±â¸¦ ¸¸µé°Ô µÇ¾ú°í ÇöÀç Â÷·® Åë½Å ½Ã½ºÅÛÀº ¸î °¡Áö Ãë¾àÁ¡ÀÌ Á¸ÀçÇÏ´Â CAN ProtocolÀ» »ç¿ëÇÏ°í ÀÖ´Ù. ù °·Î ID ½ºÇªÇÎ, µÑ °·Î ¼­ºñ½º ºÐ»ê °ø°Ý, ¼Â °·Î ¾Èµå·ÎÀ̵å Á»ºñ ¾îÇø®ÄÉÀ̼ÇÀÌ´Ù. ÇöÀç ÀÚµ¿Â÷µéÀº ¿£Áø Á¦¾î³ª, µµ¾î ¶ô Á¦¾î, ±×¸®°í ÇÚµéÀÇ Á¦¾î¸¦ À§ÇØ ¼ö¸¹Àº ECUµéÀ» »ç¿ëÇÏ°í ÀÖ´Ù. ±×¸®°í CAN ProtocolÀº ½ÅÈ£¸¦ Broad – Cast ¹æ½ÄÀ¸·Î Á¦°øÇϱ⠶§¹®¿¡ ÇØÄ¿µéÀº ±²ÀåÈ÷ ½±°Ô ±× ½ÅÈ£¿¡ Á¢±Ù °¡´ÉÇÏ´Ù. ±×¸®°í Â÷·® Åë½Å ½Ã½ºÅÛÀ» °ø°ÝÇϱâ À§ÇØ Android³ª IOS¿Í °°Àº ¹ü¿ë¼ºÀÌ ³ôÀº ¾îÇø®ÄÉÀ̼ÇÀ» ÀÚÁÖ ÀÌ¿ëÇÑ´Ù. Â÷·®ÀÇ ¼ÒÀ¯ÁÖ°¡ ºí·çÅõ½º µ¿±ÛÀ» ÅëÇØ ½ÅÈ£¸¦ ³Ð°Ô Æ۶߸®°Ô µÇ¸é ÇØÄ¿´Â ÀÌ ½ÅÈ£¿¡ ½±°Ô Á¢±ÙÇÏ°Ô µÇ°í, ÇØ´ç µ¥ÀÌÅ͸¦ ¼öÁýÇØ ºÐ¼®ÇÏ°í ±×µéÀº Â÷·®ÀÇ ECU¸¦ °ø°ÝÇϱâ À§ÇØ Æ¯Á¤ÇÑ µ¥ÀÌÅ͸¦ ¸¸µé°í ECU¿¡ Àü¼ÛÇØ ECU¸¦ Á¦¾îÇÏ°Ô µÈ´Ù. ±×·¡¼­ º»ÀÎÀº ÀÎÁõ ½Ã½ºÅÛ°ú ¾Èµå·ÎÀ̵åÀÇ ¸»´Ü¿¡¼­ ÀÌ·¯ÇÑ °ø°ÝÀ» ¸·À» ¹æ¹ýÀ» Á¦½ÃÇÑ´Ù.
¿µ¹®³»¿ë
(English Abstract)
In the Past, Trend of car security was Physical Something like doorlock system, and The Generation did not have skills connecting External devices. Through Car Development is up, that trend of car security Changed Physical Security to Intelligence Security. This Changes give a chance to hackers to attack this system. This System use CAN(Controller Area Network) Protocol which have three vulnerabilities. First, ID Spoofing, Twice, D – Dos Attack, Third, Android Application Injected Modern cars have many ECU(Electronic Control Unit) to control devices like Engine ON/OFF, Door Lock Handling, and Controlling Handle. Because CAN Protocol spread signal using broadcast, Hackers can get the signal very easily, and Those often use Mobile devices like Android or IOS to attack this system. if bluetooth signal is spread wide, hackers get the signal, and analysis the bluetooth data, so then They makes certain data to attack ECU, they send the data to ECU, and control ECU installed car. so I suggest that I will prevent this attack to make Auth system and prevent this attack in end of Android.
Å°¿öµå(Keyword) connected car   CAN   Security   vulnerability  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå