Skip to main content
Log in

Vulnerabilities of intelligent automobiles using TPEG update based on T-DMB and its countermeasures

  • Original Paper
  • Published:
Journal of Computer Virology and Hacking Techniques Aims and scope Submit manuscript

Abstract

With the advancement of communication methods of intelligent automobiles, it is delivering convenient and safe information to the drivers. However, such advancement of communication methods must also consider the security. Even the updates for navigation used for the intelligent automobiles are using the wireless update method, but the reality is that current update methods do not offer a reliable security measures. This paper aims to propose security countermeasures after creating an attack scenario in order to transmit the update information which is reliable by identifying the characteristics on the wireless update for navigation.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Kil-Nam, Oh, Kim, B.S., Choi, W.S.: An application of T-DMB TPEG to telematics. KOCON. 3(2), 654–658 (2005)

    Google Scholar 

  2. Kim, B.-S., Min, S.-W.: Design and implementation of assisted GPS navigation systems using TPEG protocol of terrestrial DMB data services. KICS 35(11), 1618–1623 (2010)

    Google Scholar 

  3. ISO/TS 18234:2013 Intelligent transport systems—Traffic and travel information via transport protocol experts group, generation 1 (TPEG1) binary data format, Part 1–6, (2013)

  4. Joe, I.-W.: A priority-based scheduling approach for TPEG applications. KICS 33(2), 204–209 (2008)

    Google Scholar 

  5. Chun, H.-S.: TPEG service promotion trends. ETRI 22(6), 170–181 (2007)

    Google Scholar 

  6. Kwon, D.-B., Chae, Y.-S.: Design and implementation of the traffic and travel information service for terrestrial DMB system. KSBE 12(3), 203–213 (2007)

    Google Scholar 

  7. Hyun, C.-S., Han, W.S., Kim, D.H., Hong, Y.-S.: TPEG application as a protocol of traffic information for DMB in Korea. IEIE 43(9), 128–134 (2006)

    Google Scholar 

  8. Johns, M.: On JavaScript malware and related threats. Comput. Virol. 3(3), 161–178 (2008)

    Article  MathSciNet  Google Scholar 

  9. Feil, R., Nyffenegger, L.: Evolution of cross site request forgery attacks. Comput. Virol. 4(3), 61–71 (2008)

    Article  Google Scholar 

  10. Coles-Kemp, L., Overill, R.E.: On the role of the facilitator in information security risk assessment. Comput. Virol. 3(2), 143–148 (2007)

    Article  Google Scholar 

  11. Aiache, H., Haettel, F., Lebrun, L., Tavernier, C.: Improving security and performance of an Ad Hoc network through a multipath routing strategy. Comput. Virol. 4(3), 267–278 (2008)

    Article  Google Scholar 

  12. Han, S.-B., Hong, S.-G.: Countermeasures in the financial sector for the APT attack. KIISC 23(1), 44–53 (2013)

    Google Scholar 

  13. Son, K.-H., Lee, T.J., Won, D.H.: Design for Zombie PCs and APT attack detection based on traffic analysis. KIISC 24(3), 491–498 (2014)

    Google Scholar 

  14. Winter, S., McCauley, M., Venaas, S., Wierenga, K.: TLS encryption for RADIUS, IETF Internet Draft, draft-ietf-radext-radsec-10, (2012)

  15. FIPS Publication 180–4, Secure Hash Standard (SHS), NIST, (2012)

Download references

Acknowledgments

“This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT and Future Planning (2013R1A1A1A05012348)”

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Keun-Ho Lee.

Additional information

Special Issue: Convergence Security Systems.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kim, JH., Lee, KH. Vulnerabilities of intelligent automobiles using TPEG update based on T-DMB and its countermeasures. J Comput Virol Hack Tech 11, 143–148 (2015). https://doi.org/10.1007/s11416-015-0243-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11416-015-0243-1

Keywords

Navigation