VBSM: VCC-Based Black Box Service Model with Enhanced Data Integrity

Other literature type, Article English OPEN
Kang, Won; Lee, Jae; Park, Jong;
(2014)

Recently, intelligent transport systems have been applied to vehicle cloud environments. Such technology is especially useful for the systematic management of road traffic. Moreover, automobiles are increasingly equipped with a black box for accident prevention and pres... View more
  • References (11)
    11 references, page 1 of 2

    2. Kim, M.S.; Choi, S.G.; Jeong, C.Y.; Han, J.W. Security Issues and Trends in Vehicle Black box. In Electronics and Telecommunications Trends; Electronics and Telecommunications Research Institute: Daejeon, Korea, 2012; pp. 123-129.

    3. Jeong, S.-W.; Park, Y.-H. Integrated video management system for vehicle black box using the mobile cloud. J. Korea Inst. Inf. Commun. Eng. 2013, 17, 2352-2358.

    4. Kim, M.; Nam, J.-H.; Jang, J.-W. Implementation of smart car infotainment system including black box and self-diagnosis function. Int. J. Softw. Eng. Appl. 2014, 18, 267-274.

    5. Kim, Y.Y.; Kim, B.H.; Lee, D.H. Real-time integrity for vehicle black box system. J. Korea Inst. Inf. Secur. Cryptol. 2009, 19, 49-61.

    6. Choi, S.-O.; Kim, Y.-P.; Im, Y.-S.; Kim, Y.-J.; Kang, E.-Y. Smart Moblie Blackbox DVR in car Environment. J. Inst. Internet Broadcast. Commun. 2013, 13, 9-15.

    7. Kim, M.S.; Jeong, C.Y. An Efficient Data Integrity Scheme for Preventing Falsification of Car Black box. In Proceedings of the 2013 International Conference on ICT Convergence (ICTC), Jeju, Korea, 14-16 October 2013.

    8. Nguyen, D.L.; Lee, M.-E.; Lensky, A. The Design and Implementation of New Vehicle Black box Using the OBD Information. In Proceedings of the 2012 7th International Conference on Computing and Convergence Technology (ICCCT), Seoul, Korea, 3-5 December 2012.

    9. Verkhovsky, B.S. Public-key cryptosystems with secret encryptor and digital signature. Int. J. Innov. Technol. Explor. Eng. 2013, 2, 321-325.

    10. Noroozi, E.; Daud, S.M.; Sabouhi, A. Secure digital signature schemes based on hash functions. Int. J. Commun. Netw. Syst. Sci. 2013, 6, 1-6.

    11. Wan. H.; Cho, H.E.; Heon, Y.; Yeom, A. Study on mirroring for high-availability cloud storage. J. Korean Inst. Inf. Sci. Eng. 2011, 38, 273-276.

  • Metrics
Share - Bookmark