Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
Secure Dissemination of Video Data in Vehicle-to-Vehicle Systems presents about Motivation, Objectives, Related Work, Core Design (Active Bundle Concept, System Architecture, Video Recording, Face Recognition, Video Recreation), Evaluation, Pros and Cons. | Secure Dissemination of Video Data in Vehicle-to-Vehicle Systems 6-th Intl. Workshop on DNCMS’15 1 Outline Motivation Objectives Related Work Core Design 4.1. Active Bundle Concept 4.2. System Architecture 4.3. Video Recording 4.4. Face Recognition 4.5. Video Recreation Evaluation Pros and Cons Conclusions 6-th Intl. Workshop on DNCMS’15 2 Vehicle has more than 60 sensors and 30 or more Electronic Control Units (ECUs), i.e. Brake Control, Engine Control, GPS, Airbag Control, etc [6] CAN (Control Area Network) Bus Radio Interface or On-Board Unit (OBU) enables short-range wireless ad hoc networks to be formed OBU allows heterogeneous and homogenous communications between vehicles and infrastructures (roadside equipment) Motivation 6-th Intl. Workshop on DNCMS’15 3 Motivation 6-th Intl. Workshop on DNCMS’15 4 Connected vehicles deploy signals to communicate with other vehicles, roadside units, personal devices and cloud services Goal: provide assistance to drivers and prevent accidents | Secure Dissemination of Video Data in Vehicle-to-Vehicle Systems 6-th Intl. Workshop on DNCMS’15 1 Outline Motivation Objectives Related Work Core Design 4.1. Active Bundle Concept 4.2. System Architecture 4.3. Video Recording 4.4. Face Recognition 4.5. Video Recreation Evaluation Pros and Cons Conclusions 6-th Intl. Workshop on DNCMS’15 2 Vehicle has more than 60 sensors and 30 or more Electronic Control Units (ECUs), i.e. Brake Control, Engine Control, GPS, Airbag Control, etc [6] CAN (Control Area Network) Bus Radio Interface or On-Board Unit (OBU) enables short-range wireless ad hoc networks to be formed OBU allows heterogeneous and homogenous communications between vehicles and infrastructures (roadside equipment) Motivation 6-th Intl. Workshop on DNCMS’15 3 Motivation 6-th Intl. Workshop on DNCMS’15 4 Connected vehicles deploy signals to communicate with other vehicles, roadside units, personal devices and cloud services Goal: provide assistance to drivers and prevent accidents Connected vehicle consists of electronic control units (ECUs) communicating via CAN (Controller Area Network) bus to transfer messages and execute queries sent from other ECUs Vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications are prone to security threats Protection mechanisms Active Bundle [5], [9], [10], [11], [12], [13] Digital Signature HMAC Motivation Potential problems in vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) systems: Opaque data sharing (e.g. BS1=> BS2) Owner’s data can be shared with other parties but data owner does not know about it Undetected privacy violations Topology of V2V networks is constantly changing Lack of policy enforcement 6-th Intl. Workshop on DNCMS’15 5 Base Station 2 (BS2) Law Enforcement Server Base Station 1 (BS1) Motivation 6-th Intl. Workshop on DNCMS’15 6 Data D = {d1, , dn } where di is a separated data item Data D is sent in encrypted form E.g. d1 is captured video data without human faces d2 is a .