CUBE - Automated Mobile Network Security Platform based on Blockchain
CUBE - Automated Mobile Network Security Platform based on Blockchain
Background
CUBE is a platform to protect secure network security of
automobiles and autonomous vehicles with blockchain technology. Cars are rapidly developing as connected vehicles instead
of traditional mechanical parts. Such as routing navigation, traffic information, etc. are the basic features of vehicles, units connected in vehicles such as the ECU, the Brake Control Unit (BCU), the Wheel Control Unit (WCU) and etc. also become vulnerable to malicious attacks.
automobiles and autonomous vehicles with blockchain technology. Cars are rapidly developing as connected vehicles instead
of traditional mechanical parts. Such as routing navigation, traffic information, etc. are the basic features of vehicles, units connected in vehicles such as the ECU, the Brake Control Unit (BCU), the Wheel Control Unit (WCU) and etc. also become vulnerable to malicious attacks.
More than 30% autonomous vehicle function depends on communication. The traffic control center monitors whether the control unit's wheels and brakes operate without failure. Navigation required for Vehicle Operations also depends on communication.
The key to Blockchain is ensuring technology trust. CUBE uses a chain of technology blocks to ensure the safety of autonomous mobile networks. In the operation of autonomous vehicles, many IOTs provide autonomous vehicle information. Attackers attempt to gain access to the network between an autonomous car and IoT or traffic center. In such cases, the hash of the infected binary is different from the hash included in the multisig transaction that is signed by the SW and OEM providers.
Potential Dangers
Autonomous cars are downgraded to potentially dangerous attackers of
various channels There are two types of weak channels that can be attacked, channels between communications, and intra-communication channels. Intercommunications channels include outside communication of information delivery sites and autonomous car gateways. This includes traffic information, navigation routing information, and remote firmware upgrades by automakers. Other channels are intra-communication channels. Autonomous Cars have intra networks, which include Electric Central Units (ECU), Break Central Units (BCU), Wheel Regulators (WCUs), tires, and so on.
various channels There are two types of weak channels that can be attacked, channels between communications, and intra-communication channels. Intercommunications channels include outside communication of information delivery sites and autonomous car gateways. This includes traffic information, navigation routing information, and remote firmware upgrades by automakers. Other channels are intra-communication channels. Autonomous Cars have intra networks, which include Electric Central Units (ECU), Break Central Units (BCU), Wheel Regulators (WCUs), tires, and so on.
Inter - Communication Channel requires high security and security. Ironically, to secure the security of this Intra-Communications Unit, this network must always be so connected to the automaker control center to check the autonomous status of the car, and it increases the likelihood of cyber attacks with malicious intent of attackers.
Interconnection-Network Security
Autonomous vehicles should obtain as much informaton as possible the
environment to operate their own vehicles. Such informaton could be an informaton road for navigaton, traffic informaton, or data to update the old firmware of an autonomous vehicle.
environment to operate their own vehicles. Such informaton could be an informaton road for navigaton, traffic informaton, or data to update the old firmware of an autonomous vehicle.
V2V, which means vehicle communication to vehicles, is an important function to make autonomous cars safer. Short-range communications systems are vehicle-based data transmission systems configured to transmit operatonal data of vehicles to other nearby vehicles and receive operatonal data of vehicles from other nearby vehicles
Blockchain CUBE Security Operations
CUBE breaks the boundaries of this traditonal BC technology with two segmentaton concepts and permissions. In operaton of autonomous vehicles, many IOT provide informaton to autonomous vehicles. This information may be sent directly between the IOT and the vehicle or can be sent through the center that controls the IOT.
Atacker may attempt to gain access to the network between an autonomous car and IoT traffic center, and manipulate binary software with the aim of injecting malicious software into a large number of vehicles. In such cases, the hash of the infected binary is different from the hash included in the multsig transkon signed by the SW and OEM providers. Thus, the vehicle can easily detect such atack before installing infected SW update.
The essental informaton used in the autonomous vehicle is self-driving data provided by the automaker, the traffic management center, and so on. The automaker must remotely monitor the status of the vehicle from autonomous vehicles and remotely upgrade the firmware. The autonomous car should receive only the authenticated data from the authentic center.
Problem of Conventonal Blockchain
The conventional safety and privacy methods used on intelligent vehicles tend to be ineffective because of the following challenges:
- Given the disadvantages of conventional safety methods, COAL adopts Blockchain as a key security plate for autonomous cars. All communications between nodes, Centralizaton: The current intelligent vehicle architecture relies on a centralized, mediated communicaton model in which all vehicles are identified, authenticated, authorized, and connected via a central cloud server.
- Lack of privacy: Most secure communicaton architectures today do not take into account user privacy, e.g. they use all vehicle data without owner's permission, or disclose noisy or summed data to the applicant. However, in some smart vehicle applications, applicants need the right vehicle data to provide personalized service.
- Security threat: Incorrect harassment for security breaches (e.g., by installing malicious SWs) may cause serious accidents that endanger the safety of passengers as well as other road users nearby.
Quantum Hashing Cryptography
The blockchain cryptographic hash function is used extensively in the system's current cryptography. Ideally, blockchain wants a hash function to have the following properties. First, the digest should be much shorter than the message. Depending on the application, the following security tools are desired.

Quantum key distributon (QKD) is a technique that allows two partes; we can say "Automotve Control Center" and "Autonomous Car," to share a common secret key for cryptographic purposes. In this case, I want to give an overview of what QKD and the techniques it involves. Concepts will be discussed in more detail in subsequent chapters.
CUBE Token
- Token Number: 72,000,000 CUBE
- Total Tokens for sale: 43.2 million CUBE
- Sales Reservation: 4,320,000 CUBE
- Maximum sales: 10% of total tokens
Token Sales Schedule
Token Distribution
- Sales Token 60%
- Team 26.3%
- the company reserves 13.7%
Budget allocation
- Development of core 60%
- Operation 10%
- Marketing 10%
- Security and Audit 10%
- Sales of 5%
- Law 5%
CUBE Profit Model
More info visit below:
Author: Vionaa
Komentar
Posting Komentar