The realization of safe and reliable communication in remote-operated, autonomous mobile system of IoT era View Homepage


Ontology type: schema:MonetaryGrant     


Grant Info

YEARS

2016-2019

FUNDING AMOUNT

39390000 JPY

ABSTRACT

For the introduction of cryptographic technology adapted to the system, first consider the introduction of MAC authentication such as Hash using random numbers based on the progress of the first year. We also consider the introduction of elliptic curve cryptography as the authentication system. In addition, we will first introduce protocols using HMAC in CAN and proceed with its operation verification. In doing so, we will begin studying application of elliptic curve cryptography with experiments. Since calculation processing costs are high for elliptic curve cryptography, we will advance research and development on parameter setting and implementation that can suppress this. In doing so, we also conduct experiments using Arduino, RaspberryPi, FPGA and others. For each of the algorithms to be installed, we will review the possibility of a side channel attack and think about incorporating the countermeasure. Then, the whole operating system is maintained, and control and control of the movement of the experiment robot is confirmed concretely. We also conduct experiments and evaluations on safety against assumed anticipation of tampering attack and real-time performance of driving system. More... »

URL

https://kaken.nii.ac.jp/grant/KAKENHI-PROJECT-16H01723

Related SciGraph Publications

  • 2018. Parallel Implementations of SIMON and SPECK, Revisited in INFORMATION SECURITY APPLICATIONS
  • JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/2208", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "type": "DefinedTerm"
          }
        ], 
        "amount": {
          "currency": "JPY", 
          "type": "MonetaryAmount", 
          "value": "39390000"
        }, 
        "description": "For the introduction of cryptographic technology adapted to the system, first consider the introduction of MAC authentication such as Hash using random numbers based on the progress of the first year. We also consider the introduction of elliptic curve cryptography as the authentication system. In addition, we will first introduce protocols using HMAC in CAN and proceed with its operation verification. In doing so, we will begin studying application of elliptic curve cryptography with experiments. Since calculation processing costs are high for elliptic curve cryptography, we will advance research and development on parameter setting and implementation that can suppress this. In doing so, we also conduct experiments using Arduino, RaspberryPi, FPGA and others. For each of the algorithms to be installed, we will review the possibility of a side channel attack and think about incorporating the countermeasure. Then, the whole operating system is maintained, and control and control of the movement of the experiment robot is confirmed concretely. We also conduct experiments and evaluations on safety against assumed anticipation of tampering attack and real-time performance of driving system.", 
        "endDate": "2019-03-31T00:00:00Z", 
        "funder": {
          "id": "https://www.grid.ac/institutes/grid.54432.34", 
          "type": "Organization"
        }, 
        "id": "sg:grant.5898342", 
        "identifier": [
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "5898342"
            ]
          }, 
          {
            "name": "kaken_id", 
            "type": "PropertyValue", 
            "value": [
              "16H01723"
            ]
          }
        ], 
        "inLanguage": [
          "ja"
        ], 
        "keywords": [
          "Arduino", 
          "safety", 
          "evaluation", 
          "whole operating system", 
          "experiments", 
          "operation verification", 
          "movement", 
          "MAC authentication", 
          "authentication system", 
          "reliable communication", 
          "introduction", 
          "addition", 
          "parameter settings", 
          "RaspberryPi", 
          "countermeasures", 
          "calculation processing costs", 
          "cryptographic technology", 
          "others", 
          "Remote", 
          "progress", 
          "realization", 
          "control", 
          "research", 
          "elliptic curve cryptography", 
          "side channel attacks", 
          "system", 
          "development", 
          "possibility", 
          "random numbers", 
          "anticipation", 
          "hash", 
          "experiment robot", 
          "first year", 
          "autonomous mobile systems", 
          "algorithms", 
          "implementation", 
          "FPGA", 
          "IoT era", 
          "application", 
          "HMAC", 
          "CAN", 
          "attack", 
          "real-time performance", 
          "protocol"
        ], 
        "name": "The realization of safe and reliable communication in remote-operated, autonomous mobile system of IoT era", 
        "recipient": [
          {
            "id": "https://www.grid.ac/institutes/grid.261356.5", 
            "type": "Organization"
          }
        ], 
        "sameAs": [
          "https://app.dimensions.ai/details/grant/grant.5898342"
        ], 
        "sdDataset": "grants", 
        "sdDatePublished": "2021-01-19T02:20", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com.uberresearch.data.processor/core_data/20181219_192338/projects/base/kaken_projects_16.xml.gz", 
        "startDate": "2016-04-01T00:00:00Z", 
        "type": "MonetaryGrant", 
        "url": "https://kaken.nii.ac.jp/grant/KAKENHI-PROJECT-16H01723"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/grant.5898342'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/grant.5898342'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/grant.5898342'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/grant.5898342'


     

    This table displays all metadata directly associated to this object as RDF triples.

    78 TRIPLES      19 PREDICATES      64 URIs      57 LITERALS      4 BLANK NODES

    Subject Predicate Object
    1 sg:grant.5898342 schema:about anzsrc-for:2208
    2 schema:amount N2a1fc2ad4b4e42c290df1b84565ca5c1
    3 schema:description For the introduction of cryptographic technology adapted to the system, first consider the introduction of MAC authentication such as Hash using random numbers based on the progress of the first year. We also consider the introduction of elliptic curve cryptography as the authentication system. In addition, we will first introduce protocols using HMAC in CAN and proceed with its operation verification. In doing so, we will begin studying application of elliptic curve cryptography with experiments. Since calculation processing costs are high for elliptic curve cryptography, we will advance research and development on parameter setting and implementation that can suppress this. In doing so, we also conduct experiments using Arduino, RaspberryPi, FPGA and others. For each of the algorithms to be installed, we will review the possibility of a side channel attack and think about incorporating the countermeasure. Then, the whole operating system is maintained, and control and control of the movement of the experiment robot is confirmed concretely. We also conduct experiments and evaluations on safety against assumed anticipation of tampering attack and real-time performance of driving system.
    4 schema:endDate 2019-03-31T00:00:00Z
    5 schema:funder https://www.grid.ac/institutes/grid.54432.34
    6 schema:identifier N1e82e7ccb4de463183a31bcd1ed3a5d5
    7 Nfad1ecd5ab6741388cb8caf206046fe2
    8 schema:inLanguage ja
    9 schema:keywords Arduino
    10 CAN
    11 FPGA
    12 HMAC
    13 IoT era
    14 MAC authentication
    15 RaspberryPi
    16 Remote
    17 addition
    18 algorithms
    19 anticipation
    20 application
    21 attack
    22 authentication system
    23 autonomous mobile systems
    24 calculation processing costs
    25 control
    26 countermeasures
    27 cryptographic technology
    28 development
    29 elliptic curve cryptography
    30 evaluation
    31 experiment robot
    32 experiments
    33 first year
    34 hash
    35 implementation
    36 introduction
    37 movement
    38 operation verification
    39 others
    40 parameter settings
    41 possibility
    42 progress
    43 protocol
    44 random numbers
    45 real-time performance
    46 realization
    47 reliable communication
    48 research
    49 safety
    50 side channel attacks
    51 system
    52 whole operating system
    53 schema:name The realization of safe and reliable communication in remote-operated, autonomous mobile system of IoT era
    54 schema:recipient https://www.grid.ac/institutes/grid.261356.5
    55 schema:sameAs https://app.dimensions.ai/details/grant/grant.5898342
    56 schema:sdDatePublished 2021-01-19T02:20
    57 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    58 schema:sdPublisher Nc471ed69988d4aa9908482e3dec2eb46
    59 schema:startDate 2016-04-01T00:00:00Z
    60 schema:url https://kaken.nii.ac.jp/grant/KAKENHI-PROJECT-16H01723
    61 sgo:license sg:explorer/license/
    62 sgo:sdDataset grants
    63 rdf:type schema:MonetaryGrant
    64 N1e82e7ccb4de463183a31bcd1ed3a5d5 schema:name dimensions_id
    65 schema:value 5898342
    66 rdf:type schema:PropertyValue
    67 N2a1fc2ad4b4e42c290df1b84565ca5c1 schema:currency JPY
    68 schema:value 39390000
    69 rdf:type schema:MonetaryAmount
    70 Nc471ed69988d4aa9908482e3dec2eb46 schema:name Springer Nature - SN SciGraph project
    71 rdf:type schema:Organization
    72 Nfad1ecd5ab6741388cb8caf206046fe2 schema:name kaken_id
    73 schema:value 16H01723
    74 rdf:type schema:PropertyValue
    75 anzsrc-for:2208 schema:inDefinedTermSet anzsrc-for:
    76 rdf:type schema:DefinedTerm
    77 https://www.grid.ac/institutes/grid.261356.5 schema:Organization
    78 https://www.grid.ac/institutes/grid.54432.34 schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...