http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
초고속 차량 링크 Automotive SerDes Alliance (ASA) 시스템
최은민(Eunmin Choi),정우진(Woojin Jeong),송호승(Hoseung Song),조민지(Minji Cho),강수원(Suwon Kang),최지웅(Ji-Woong Choi) 한국자동차공학회 2021 한국자동차공학회 부문종합 학술대회 Vol.2021 No.6
According to the development of connected and autonomous vehicles (CAVs) technology, the number of electronic devices embedded in vehicles is increasing and it causes the increment of data traffic of the in-vehicle networks. For highspeed data transmission, especially for the sensor network, the demand of automotive serializer/deserializer (SerDes) has increased. However, conventional automotive SerDes technologies do not provide interoperability because each company independently develops the technology. Automotive SerDes alliance (ASA) provides interoperability and 4~5 times higher data rate than conventional automotive SerDes technologies by standardizing with automotive original equipment manufacturers (OEMs) and vehicle semiconductor companies. In this paper, we introduce the ASA system in terms of frame structure and physical layer that are currently being standardized.
정우진(Woojin Jeong),최은민(Eunmin Choi),최지웅(Ji-Woong Choi) 제어로봇시스템학회 2021 제어·로봇·시스템학회 논문지 Vol.27 No.2
This paper proposes an autocorrelation-based intrusion detection system for a controller area network (CAN). The CAN is a bus topology network used in cyber-physical systems such as vehicles, robots, and trains. As the applications of the CAN are closely related to human life, and any malfunctions may lead to accidents, the system robustness is critical. However, the CAN is vulnerable to attacks because no authentication or encryption exists in the CAN protocol. The proposed system uses the autocorrelation of the CAN signals to identify the source node and detects the attack signals. Moreover, we evaluate the performance of the proposed system through a simulation and in a real-car environment. As the proposed system involves physical layer security, no modification of the CAN protocol is necessary. In addition, redundant security can be implemented when the system is applied with authentication or encryption protocols.