scholarly journals AVoD: Advanced Verify-on-Demand for Efficient Authentication against DoS Attacks in V2X Communication

2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Taehyoung Ko ◽  
Cheongmin Ji ◽  
Manpyo Hong

Owing to the development of information and communication technology (ICT), autonomous cooperative vehicles are being developed. Autonomous cooperative driving combines vehicle-to-everything (V2X) communication technology in existing autonomous driving and provides safe driving by sharing information between communication entities. However, security factors should be considered during communication. Security Credential Management System (SCMS) has been proposed as one of these elements, but it is vulnerable to denial-of-service (DoS) attacks due to message authentication costs. In congested situations, the number of messages exchanged between vehicles becomes very large. However, the performance of the on-board unit (OBU) is not sufficient to handle huge number of messages, which can lead to a DoS attack. Therefore, a technique to prevent DoS attacks on autonomous cooperative driving vehicles using SCMS has been proposed in this paper. The proposed technique reduces authentication costs by classifying similar messages into multiple categories and authenticating only the first message represented in the group for a unit time. The effectiveness of this technique has been demonstrated by comparing the time it takes to verify huge number of message signatures in each method.

2020 ◽  
Vol 10 (9) ◽  
pp. 3277 ◽  
Author(s):  
Paweł Dymora ◽  
Mirosław Mazurek

Fractal and multifractal analysis can help to discover the structure of the communication system, and in particular the pattern and characteristics of traffic, in order to understand the threats better and detect anomalies in network operation. The massive increase in the amount of data transmitted by different devices makes these systems the target of various types of attacks by cybercriminals. This article presents the use of fractal analysis in detecting threats and anomalies. The issues related to the construction and functioning of the Security Operations Centre (SOC) are presented. To examine the correctness of SOC, several attacks on virtual systems located in the network were carried out, such as Denial of Service (DoS) attack, brute force, malware infections, exploits. Based on data collected from monitoring and devices, the response to the event was analyzed, and multifractal spectra of network traffic before and during the incident were created. The collected information allows us to verify the theses and confirm the effectiveness of multifractal methods in detecting anomalies in the operation of any Information and Communication Technology (ICT) network. Such solutions will contribute to the development of advanced intrusion detection systems (IDS).


2019 ◽  
Vol 2019 ◽  
pp. 1-13 ◽  
Author(s):  
Yousik Lee ◽  
Samuel Woo ◽  
Jungho Lee ◽  
Yunkeun Song ◽  
Heeseok Moon ◽  
...  

The convergence of automobiles and ICT (information and communication technology) has become a new paradigm for the development of next-generation vehicles. In particular, connected cars represent the most in-demand automobile-ICT convergence technology. With the development of 5G technology, communication between vehicle and external device using autonomous driving and Internet of things (IoT) technology has been remarkably developed. Control of vehicles using smart phones has become a routine feature, and over 200 Android apps are in use. However, Android apps are easy to tamper by repackaging and allowing hackers to attack vehicles with using this vulnerability, which can lead to life-critical accidents. In this study, we analyze the vulnerabilities of connected car environments when connecting with IoT technologies and demonstrate the possibility of cyberattack by performing attack experiments using real cars and repackaging for commercial apps. Furthermore, we propose a realistic security technology as a countermeasure to attain safety against cyberattacks. To evaluate the safety of the proposed method, a security module is developed and a performance evaluation is conducted on an actual vehicle.


2012 ◽  
Vol 43 (4) ◽  
pp. 222-231 ◽  
Author(s):  
Nina Hansen ◽  
Tom Postmes ◽  
Nikita van der Vinne ◽  
Wendy van Thiel

This paper studies whether and how information and communication technology (ICT) changes self-construal and cultural values in a developing country. Ethiopian children were given laptops in the context of an ICT for development scheme. We compared children who used laptops (n = 69) with a control group without laptops (n = 76) and a second control group of children whose laptop had broken down (n = 24). Results confirmed that after 1 year of laptop usage, the children’s self-concept had become more independent and children endorsed individualist values more strongly. Interestingly, the impact of laptop usage on cultural values was mediated by self-construal (moderated mediation). Importantly, modernization did not “crowd out” traditional culture: ICT usage was not associated with a reduction in traditional expressions (interdependent self-construal, collectivist values). Theoretical and practical implications are discussed.


2020 ◽  
Vol 3 (2) ◽  
pp. 109-119
Author(s):  
Partono Partono

So far, in implementing school strategies, they tend not to utilize Information and Communication Technology (ICT), despite the availability of ICT resources available. Stages of strategic management are needed to generate the vision, mission, objectives, policy, program, budget, and procedures as well as control and evaluation process as an effort to utilize ICT to improve school quality. Based on the interpretation and the results of the study, it is concluded that schools have organized stages in strategic management that enable schools to have a quality profile. The impact of effective utilization of ICTs for schools is the achievement of effective school management, as per the National Education Standards, which is characterized by effective planning, implementation, control, and evaluation of school ICTs.The purpose of this study is to get a general description, describe, and reveal the Strategic Management of Information and Communication Technology Utilization to Improve the Quality of School Learning in Ciledug Al Musaddadiyah Vocational High School and Garut 1 Vocational High School, both on environmental analysis, strategic formulation, implementation and strategic evaluation. The research method used in this research is the case study method, because the problems studied occur in the place and situation of Ciledug Al Musaddadiyah Vocational School and Vocational High School 1 Garut. The use of case study models in this study is based on the consideration that to provide an overview of the strategic management activities of the use of ICTs carried out at vocational high schools with the ultimate goal of being able to improve the quality of school learning. Based on observations in the field of SMK 1 Garut and SMK Al Musaddadiyah Ciledug Garut is one of the public schools and private schools that have these advantages.


2017 ◽  
Vol 23 (1) ◽  
pp. 3-8
Author(s):  
R. P. BAIN ◽  
D. P. RAI ◽  
SIDDARTH NAYAK

If we want to convert our rural population into knowledge driven, progressive, self sufficient, self reliant, sustainable society, the role of Information and Communication Technologies (ICT’s) cannot be ignored. Timely availability information is considered as most important factor in Indian agriculture. At present ICT is the technology of this millennium. Transferring the developed technology to all end users is time-consuming and tiresome task and is often not completed due to paucity of resources and lack of manpower. In India, agriculture and rural development has gained significantly from ICT due to its widespread extension and adoption. In this era of internet, ICT is committed to provide real, timely accurate authentic information to the farmers and rural peoples.


Sign in / Sign up

Export Citation Format

Share Document