18.118.184.237
18.118.184.237
close menu
KCI 후보
외부 해킹 방지를 위한 CAN 네트워크 침입 검출 알고리즘 개발
Development of CAN network intrusion detection algorithm to prevent external hacking
김현희 ( Hyun-hee Kim ) , 신은혜 ( Eun Hye Shin ) , 이경창 ( Kyung-chang Lee ) , 황용연 ( Yeong-yeun Hwang )
UCI I410-ECN-0102-2019-500-001630320

With the latest developments in ICT(Information Communication Technology) technology, research on Intelligent Car, Connected Car that support autonomous driving or services is actively underway. It is true that the number of inputs linked to external connections is likely to be exposed to a malicious intrusion. I studied possible security issues that may occur within the Connected Car. A variety of security issues may arise in the use of CAN, the most typical internal network of vehicles. The data can be encrypted by encrypting the entire data within the CAN network system to resolve the security issues, but can be time-consuming and time-consuming, and can cause the authentication process to be carried out in the event of a certification procedure. To resolve this problem, CAN network system can be used to authenticate nodes in the network to perform a unique authentication of nodes using nodes in the network to authenticate nodes in the nodes and By encoding the ID, identifying the identity of the data, changing the identity of the ID and decryption algorithm, and identifying the cipher and certification techniques of the external invader, the encryption and authentication techniques could be detected by detecting and verifying the external intruder. Add a monitoring node to the CAN network to resolve this. Share a unique ID that can be authenticated using the server that performs the initial certification of nodes within the network and encrypt IDs to secure data. By detecting external invaders, designing encryption and authentication techniques was designed to detect external intrusion and certification techniques, enabling them to detect external intrusions.

1. 서론
2. CAN 네트워크 침입 탐지 검출 시스템의 구조
3. 침입탐지 알고리즘 구현 및 성능평가
4. 결론
후기
참고문헌
[자료제공 : 네이버학술정보]
×