scholarly journals Analysis of Security Vulnerability Levels of In-Vehicle Network Topologies Applying Graph Representations

Author(s):  
Zsombor Petho ◽  
Intiyaz Khan ◽  
Árpád Torok

AbstractThis article investigates cybersecurity issues related to in-vehicle communication networks. In-vehicle communication network security is evaluated based on the protection characteristics of the network components and the topology of the network. The automotive communication network topologies are represented as undirected weighted graphs, and their vulnerability is estimated based on the specific characteristics of the generated graph. Thirteen different vehicle models have been investigated to compare the vulnerability levels of the in-vehicle network using the Dijkstra's shortest route algorithm. An important advantage of the proposed method is that it is in accordance with the most relevant security evaluation models. On the other hand, the newly introduced approach considers the Secure-by-Design concept principles.

2018 ◽  
Vol 8 (11) ◽  
pp. 2071 ◽  
Author(s):  
Shiyi Jin ◽  
Mengzhuo Liu ◽  
Yujing Wu ◽  
Yihu Xu ◽  
Jingnan Zhang ◽  
...  

FlexRay is becoming the in-vehicle communication network of the next generation. In this study, the main contents are the FlexRay network static segment scheduling algorithm and optimization strategy, improve the scheduling efficiency of vehicle network and optimize the performance of communication network. The FlexRay static segment characteristic was first analyzed, then selected bandwidth utilization as the performance metrics to scheduling problem. A signal packing method is proposed based on Next Fit Decreasing (NFD) algorithm. Then Frame ID (FID) multiplexing method was used to minimize the number of FIDs. Finally, experimental simulation by CANoe. FlexRay software, that shows the model can quickly obtain the message schedule of each node, effectively control the message payload size and reduced bus payload by 16.3%, the number of FID drops 53.8% while improving bandwidth utilization by 32.8%.


2017 ◽  
Vol 50 (1) ◽  
pp. 1199-1204 ◽  
Author(s):  
Holger Zipper ◽  
Christian Diedrich

2014 ◽  
Vol 13 (03) ◽  
pp. 1450020 ◽  
Author(s):  
Y. Saez ◽  
X. Cao ◽  
L. B. Kish ◽  
G. Pesti

We review the security requirements for vehicular communication networks and provide a critical assessment of some typical communication security solutions. We also propose a novel unconditionally secure vehicular communication architecture that utilizes the Kirchhoff-law–Johnson-noise (KLJN) key distribution scheme.


2013 ◽  
Vol 4 (3) ◽  
pp. 388-392
Author(s):  
Shanu K Rakesh ◽  
Bharat Choudhary ◽  
Rachna Sandhu

Swarm intelligence, as demonstrated by natural biological swarms, has numerous powerful properties desirable in many engineering systems, such as telecommunication. Communication network management is becoming increasingly difficult  due to the increasing size, rapidly changing topology, and complexity of communication networks. This paper describes  how biologically-inspired agents can be used to solve control problems in telecommunications. These agents, inspired by the foraging behaviour of ants, exhibit the desirable characteristics of simplicity of action and interaction. The colle ction of agents, or swarm system, deals only with local knowledge and exhibits a form of distributed control with agent communication effected through the environment. In this paper we explore the application of ant-like agents to the problem of routing in telecommunication networks.


2021 ◽  
Vol 19 (2) ◽  
pp. 41-48
Author(s):  
Yu. V. Nemtsov ◽  
I. V. Seryogin ◽  
P. I. Volnov

Base station (BS) is a terminal device of a radio communication network, while railway radio communications play an important role in ensuring safety of passenger and cargo transportation.A proposed method for calculating the performance of base stations in railway digital radio communication networks is intended to calculate for the BS the probabilities of being in certain state.BS was decomposed and such functional elements as circuit groups and a radio frequency path were identified, as well as the central module ensuring the exchange of information with elements of this BS and with other BSs. A detailed study of each element has increased accuracy of the proposed method. Following the Markov model, BS is presented as a system in which all possible states are considered. Models for BS with two and three circuit groups have been constructed. The parameters of each functional element of the model can be obtained through observation over a certain period. The solution of the system of equations for each of the models presented in the article will allow obtaining the values of the system being in a certain state. The obtained characteristics can be used to calculate the reliability of the entire radio communication network, and then to assess quality of service provided to the users of this network.Conclusions are made about the possibilities of using the obtained models when designing new railway communication networks and when calculating quality indices of existing ones. The proposed models can be applied not only to railway radio communication networks but also to mobile communication networks of commercial operators. 


2020 ◽  
Vol 3 (1) ◽  
pp. 27-36
Author(s):  
Muhammad Ikhsan Ikhsan ◽  
Roza Yulida ◽  
Fajar Restuhadi

In order to encourage rubber agribusiness activities, farmers need adequate information and reliable sources of information to achieve their goals. To meet information needs, farmers develop communication networks between farmers and their actors. This research aims to describe the sociogram of the communication network of rubber farmers in self-help patterns,and analyze the relationship between farmer characteristics and communication networks.This research conducted in Batu Bersurat Village XIII Koto Kampar District. The method used in this research is the census method and the study respondents were taken as many as 42 farmers.  The results of this research indicate that the structure of the communication network formed in rubber farmers approached the radial personal networkstructure .Based on the correlation test results indicate that the characteristics of rubber farmers related to locall centrality are, extent of land tenure, cosmopolity, intensity of counseling, and number of sources of information. Correlation test results indicate that the characteristics of rubber farmers related to globall centrality are level of education, extent of land tenure, cosmopolity, intensity of counseling, and number of sources of information.Correlation test results indicate that the characteristics of rubber farmers related to betwenness are extent of land tenure, cosmopolity, intensity of counseling, and number of sources of information.


2020 ◽  
Author(s):  
Indushree Banerjee ◽  
Martijn Warnier ◽  
Frances M. T Brazier

Abstract When physical communication network infrastructures fail, infrastructure-less communication networks such as mobile ad-hoc networks (MANET), can provide an alternative. This, however, requires MANETs to be adaptable to dynamic contexts characterized by the changing density and mobility of devices and availability of energy sources. To address this challenge, this paper proposes a decentralized context-adaptive topology control protocol. The protocol consists of three algorithms and uses preferential attachment based on the energy availability of devices to form a loop-free scale-free adaptive topology for an ad-hoc communication network. The proposed protocol has a number of advantages. First, it is adaptive to the environment, hence applicable in scenarios where the number of participating mobile devices and their availability of energy resources is always changing. Second, it is energy-efficient through changes in the topology. This means it can be flexibly be combined with different routing protocols. Third, the protocol requires no changes on the hardware level. This means it can be implemented on all current phones, without any recalls or investments in hardware changes. The evaluation of the protocol in a simulated environment confirms the feasibility of creating and maintaining a self-adaptive ad-hoc communication network, consisting of multitudes of mobile devices for reliable communication in a dynamic context.


Sign in / Sign up

Export Citation Format

Share Document