Ontology type: schema:MonetaryGrant
2016-2019
FUNDING AMOUNT39390000 JPY
ABSTRACTFor the introduction of cryptographic technology adapted to the system, first consider the introduction of MAC authentication such as Hash using random numbers based on the progress of the first year. We also consider the introduction of elliptic curve cryptography as the authentication system. In addition, we will first introduce protocols using HMAC in CAN and proceed with its operation verification. In doing so, we will begin studying application of elliptic curve cryptography with experiments. Since calculation processing costs are high for elliptic curve cryptography, we will advance research and development on parameter setting and implementation that can suppress this. In doing so, we also conduct experiments using Arduino, RaspberryPi, FPGA and others. For each of the algorithms to be installed, we will review the possibility of a side channel attack and think about incorporating the countermeasure. Then, the whole operating system is maintained, and control and control of the movement of the experiment robot is confirmed concretely. We also conduct experiments and evaluations on safety against assumed anticipation of tampering attack and real-time performance of driving system. More... »
URL
JSON-LD is the canonical representation for SciGraph data.
TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT
[
{
"@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json",
"about": [
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/2208",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"type": "DefinedTerm"
}
],
"amount": {
"currency": "JPY",
"type": "MonetaryAmount",
"value": "39390000"
},
"description": "For the introduction of cryptographic technology adapted to the system, first consider the introduction of MAC authentication such as Hash using random numbers based on the progress of the first year. We also consider the introduction of elliptic curve cryptography as the authentication system. In addition, we will first introduce protocols using HMAC in CAN and proceed with its operation verification. In doing so, we will begin studying application of elliptic curve cryptography with experiments. Since calculation processing costs are high for elliptic curve cryptography, we will advance research and development on parameter setting and implementation that can suppress this. In doing so, we also conduct experiments using Arduino, RaspberryPi, FPGA and others. For each of the algorithms to be installed, we will review the possibility of a side channel attack and think about incorporating the countermeasure. Then, the whole operating system is maintained, and control and control of the movement of the experiment robot is confirmed concretely. We also conduct experiments and evaluations on safety against assumed anticipation of tampering attack and real-time performance of driving system.",
"endDate": "2019-03-31T00:00:00Z",
"funder": {
"id": "https://www.grid.ac/institutes/grid.54432.34",
"type": "Organization"
},
"id": "sg:grant.5898342",
"identifier": [
{
"name": "dimensions_id",
"type": "PropertyValue",
"value": [
"5898342"
]
},
{
"name": "kaken_id",
"type": "PropertyValue",
"value": [
"16H01723"
]
}
],
"inLanguage": [
"ja"
],
"keywords": [
"Arduino",
"safety",
"evaluation",
"whole operating system",
"experiments",
"operation verification",
"movement",
"MAC authentication",
"authentication system",
"reliable communication",
"introduction",
"addition",
"parameter settings",
"RaspberryPi",
"countermeasures",
"calculation processing costs",
"cryptographic technology",
"others",
"Remote",
"progress",
"realization",
"control",
"research",
"elliptic curve cryptography",
"side channel attacks",
"system",
"development",
"possibility",
"random numbers",
"anticipation",
"hash",
"experiment robot",
"first year",
"autonomous mobile systems",
"algorithms",
"implementation",
"FPGA",
"IoT era",
"application",
"HMAC",
"CAN",
"attack",
"real-time performance",
"protocol"
],
"name": "The realization of safe and reliable communication in remote-operated, autonomous mobile system of IoT era",
"recipient": [
{
"id": "https://www.grid.ac/institutes/grid.261356.5",
"type": "Organization"
}
],
"sameAs": [
"https://app.dimensions.ai/details/grant/grant.5898342"
],
"sdDataset": "grants",
"sdDatePublished": "2021-01-19T02:20",
"sdLicense": "https://scigraph.springernature.com/explorer/license/",
"sdPublisher": {
"name": "Springer Nature - SN SciGraph project",
"type": "Organization"
},
"sdSource": "s3://com.uberresearch.data.processor/core_data/20181219_192338/projects/base/kaken_projects_16.xml.gz",
"startDate": "2016-04-01T00:00:00Z",
"type": "MonetaryGrant",
"url": "https://kaken.nii.ac.jp/grant/KAKENHI-PROJECT-16H01723"
}
]
Download the RDF metadata as: json-ld nt turtle xml License info
JSON-LD is a popular format for linked data which is fully compatible with JSON.
curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/grant.5898342'
N-Triples is a line-based linked data format ideal for batch operations.
curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/grant.5898342'
Turtle is a human-readable linked data format.
curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/grant.5898342'
RDF/XML is a standard XML format for linked data.
curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/grant.5898342'
This table displays all metadata directly associated to this object as RDF triples.
78 TRIPLES
19 PREDICATES
64 URIs
57 LITERALS
4 BLANK NODES
Subject | Predicate | Object | |
---|---|---|---|
1 | sg:grant.5898342 | schema:about | anzsrc-for:2208 |
2 | ″ | schema:amount | N2a1fc2ad4b4e42c290df1b84565ca5c1 |
3 | ″ | schema:description | For the introduction of cryptographic technology adapted to the system, first consider the introduction of MAC authentication such as Hash using random numbers based on the progress of the first year. We also consider the introduction of elliptic curve cryptography as the authentication system. In addition, we will first introduce protocols using HMAC in CAN and proceed with its operation verification. In doing so, we will begin studying application of elliptic curve cryptography with experiments. Since calculation processing costs are high for elliptic curve cryptography, we will advance research and development on parameter setting and implementation that can suppress this. In doing so, we also conduct experiments using Arduino, RaspberryPi, FPGA and others. For each of the algorithms to be installed, we will review the possibility of a side channel attack and think about incorporating the countermeasure. Then, the whole operating system is maintained, and control and control of the movement of the experiment robot is confirmed concretely. We also conduct experiments and evaluations on safety against assumed anticipation of tampering attack and real-time performance of driving system. |
4 | ″ | schema:endDate | 2019-03-31T00:00:00Z |
5 | ″ | schema:funder | https://www.grid.ac/institutes/grid.54432.34 |
6 | ″ | schema:identifier | N1e82e7ccb4de463183a31bcd1ed3a5d5 |
7 | ″ | ″ | Nfad1ecd5ab6741388cb8caf206046fe2 |
8 | ″ | schema:inLanguage | ja |
9 | ″ | schema:keywords | Arduino |
10 | ″ | ″ | CAN |
11 | ″ | ″ | FPGA |
12 | ″ | ″ | HMAC |
13 | ″ | ″ | IoT era |
14 | ″ | ″ | MAC authentication |
15 | ″ | ″ | RaspberryPi |
16 | ″ | ″ | Remote |
17 | ″ | ″ | addition |
18 | ″ | ″ | algorithms |
19 | ″ | ″ | anticipation |
20 | ″ | ″ | application |
21 | ″ | ″ | attack |
22 | ″ | ″ | authentication system |
23 | ″ | ″ | autonomous mobile systems |
24 | ″ | ″ | calculation processing costs |
25 | ″ | ″ | control |
26 | ″ | ″ | countermeasures |
27 | ″ | ″ | cryptographic technology |
28 | ″ | ″ | development |
29 | ″ | ″ | elliptic curve cryptography |
30 | ″ | ″ | evaluation |
31 | ″ | ″ | experiment robot |
32 | ″ | ″ | experiments |
33 | ″ | ″ | first year |
34 | ″ | ″ | hash |
35 | ″ | ″ | implementation |
36 | ″ | ″ | introduction |
37 | ″ | ″ | movement |
38 | ″ | ″ | operation verification |
39 | ″ | ″ | others |
40 | ″ | ″ | parameter settings |
41 | ″ | ″ | possibility |
42 | ″ | ″ | progress |
43 | ″ | ″ | protocol |
44 | ″ | ″ | random numbers |
45 | ″ | ″ | real-time performance |
46 | ″ | ″ | realization |
47 | ″ | ″ | reliable communication |
48 | ″ | ″ | research |
49 | ″ | ″ | safety |
50 | ″ | ″ | side channel attacks |
51 | ″ | ″ | system |
52 | ″ | ″ | whole operating system |
53 | ″ | schema:name | The realization of safe and reliable communication in remote-operated, autonomous mobile system of IoT era |
54 | ″ | schema:recipient | https://www.grid.ac/institutes/grid.261356.5 |
55 | ″ | schema:sameAs | https://app.dimensions.ai/details/grant/grant.5898342 |
56 | ″ | schema:sdDatePublished | 2021-01-19T02:20 |
57 | ″ | schema:sdLicense | https://scigraph.springernature.com/explorer/license/ |
58 | ″ | schema:sdPublisher | Nc471ed69988d4aa9908482e3dec2eb46 |
59 | ″ | schema:startDate | 2016-04-01T00:00:00Z |
60 | ″ | schema:url | https://kaken.nii.ac.jp/grant/KAKENHI-PROJECT-16H01723 |
61 | ″ | sgo:license | sg:explorer/license/ |
62 | ″ | sgo:sdDataset | grants |
63 | ″ | rdf:type | schema:MonetaryGrant |
64 | N1e82e7ccb4de463183a31bcd1ed3a5d5 | schema:name | dimensions_id |
65 | ″ | schema:value | 5898342 |
66 | ″ | rdf:type | schema:PropertyValue |
67 | N2a1fc2ad4b4e42c290df1b84565ca5c1 | schema:currency | JPY |
68 | ″ | schema:value | 39390000 |
69 | ″ | rdf:type | schema:MonetaryAmount |
70 | Nc471ed69988d4aa9908482e3dec2eb46 | schema:name | Springer Nature - SN SciGraph project |
71 | ″ | rdf:type | schema:Organization |
72 | Nfad1ecd5ab6741388cb8caf206046fe2 | schema:name | kaken_id |
73 | ″ | schema:value | 16H01723 |
74 | ″ | rdf:type | schema:PropertyValue |
75 | anzsrc-for:2208 | schema:inDefinedTermSet | anzsrc-for: |
76 | ″ | rdf:type | schema:DefinedTerm |
77 | https://www.grid.ac/institutes/grid.261356.5 | ″ | schema:Organization |
78 | https://www.grid.ac/institutes/grid.54432.34 | ″ | schema:Organization |