Monday, January 22, 2018

Cube - Security Platform for Autonomous Vehicle



An autonomous car (also known as a driverless car, self-driving car, robotic car) and unmanned ground vehicle is a vehicle that is capable of sensing its environment and navigating without human input. Autonomous cars use a variety of techniques to detect their surroundings, such as radar, laser light, GPS, odometry and computer vision. Advanced control systems interpret sensory information to identify appropriate navigation paths, as well as obstacles and relevant signage. Autonomous cars must have control systems that are capable of analyzing sensory data to distinguish between different cars on the road.
The potential benefits of autonomous cars include reduced mobility and infrastructure costs, increased safety, increased mobility, increased customer satisfaction and reduced crime?talk about crime and hacking, technology experts agree that ‘connected and autonomous vehicles’ without drivers are at risk, following two high-profile US hacks of cars. There are concerns terrorists could fool the automated cars into detecting obstacles which are not there and remotely slam on their brakes. Once hackers get into your internet-connected car, they could disable the air bags, brakes, door locks and even steal the vehicle. That's the finding of researchers who recently uncovered a flaw in the way the different components of a connected car talk to each other. Their work follows several demonstrations of researchers remotely hacking into and taking control of cars, including one that led to a worldwide recall of one connected model of Jeep.

None of these hacks have yet been demonstrated with regular vehicles on the road. But they show how cyber security is becoming a big challenge to the car industry, especially as vehicles incorporate more and more driverless technology.These emphasise the need for companies to work together to build resilient vehicles whose security can be managed throughout their lifetime. But what can actually be done to ensure that as cars effectively become computers on wheels they are kept safe from hackers?This ICO project call CUBE working and solving this problem.


CUBE is the base to make security protection of car networks and autonomous vehicles with secure blockchain technology. More than 30% of the role of autonomous vehicles depends on communication. The highway control center monitors whether the wheel and brake control units operate without failure. The navigation required for vehicle operation also depends on communication. With this in mind, one of the problems primarily associated with autonomous vehicles is securing them from network attacks at risk. Until now, no fundamental defense mechanism has been developed against risky attacks on the network. This risk is the biggest problem for autonomous vehicles. CUBE solves the problem of autonomous vehicle safety by using blockchain technology.

The key to Blockchain is convincing technology. CUBE uses block-chain technology to assure the safety of autonomous mobile networks. In the operation of autonomous vehicles, many IOTs provide info on autonomous vehicles. Attackers attempt to gain access to networks on autonomous cars as well as IoT or central highways. In the same exact problem, the hashes of the infected binary are different from the hashes that are also included in multisig transactions signed by SW and OEM providers.

With that, the vehicle can easily detect such attacks before placing up-date infected SW. Incorrect update sharing by claiming to be an OEM or SW update provider can be stopped because nodal overlay knows OEM General Key as well as SW update provider. Therefore, an attacker can not claim to be one of these entities because it requires a private key associated with the General Key of the related entity.
CUBE uses block-chain technology to assure the safety of autonomous mobile networks. But there are various difficulties in applying traditional BC to autonomous vehicle safety. Blockchain instantiation assumes high overhead and low scalability. The consensus algorithm used in Blockchain involves solving difficult-to-verify difficult puzzles that use important computing resources. Everything transactions as well as blocks are served to all networks that generate definite packet overhead. Beyond that, this causes scalability problems because the number of impression packets increases with the square with the number of participating nodes.

CUBE broke the limited technology of this traditional BC with a hybrid BC, which uses general blockchain as well as private blocking. When slow, but requires a higher level of security, use Public Blockchain. However, some level of security is required, but if you need fast speed, use private blockchain. In the operation of autonomous vehicles, many IOTs provide info on autonomous vehicles. Attackers attempt to gain access to networks on autonomous cars and IoT highway centers, as well as engineer binary software with the intention of injecting malicious software into several large vehicles. In the corresponding problem, the hashes of the infected binary are different from the hashes that belong to the multisig. Transactions signed by SW and OEM providers. With that, the vehicle can easily detect such attacks before placing up-date infected SW. Incorrect update sharing by claiming to be an OEM or SW update provider can be stopped because the overlay nodule overrides the OEM PK and SW update providers. Therefore, an attacker can not claim to be one of these entities because it requires a private key relating to the PK of the related entity.

AI Deep - Learning Layer
The second layer is the AI ​​layer. This layer will be applied in part from 2019, and will be commercialized from 2020. Currently, network security is a passive system that collects patches to prevent reuse of methods used in past hacking cases. Cube will train, in supervisor mode, use the past as the main case for building a defense system against future attacks by creating a dangerous attack scenario that is likely to be done hundreds of millions of times. Cube intrusion detection systems, using inner neural networks for vehicle network security, have two parts, a discriminatory internal architecture and a generative inside architecture, depending on how the architecture is exploited.

After the pre-training phase is complete, fine-tuning will be done using the gradient descent method with supervised learning. While blockchain is used as the first and primary security method, AI-based security in learning will ensure multiple defense systems.

The Quantum Hash Cryptography Layer
Blockchain has improved security by using hashes appropriately. However, there are concerns that as computer performance grows rapidly, hash cryptography can be a limitation. Cube develops quantum cryptography to prevent malicious attacks against autonomous vehicles. This quantum cryptography will contribute not only to the autonomous drive, but also to the overall improvement of Blockchain's overall technology. Cryptography Layer Desire This passion will be applied from the year 2022.

The Cube's quantum hash technology will provide an important opportunity to ensure high levels of security throughout the blockchain field using simple hash technology. Cube improves the level of security by using the changing quantum characteristics, The characteristics that the data receive depend on the angle of polarization; Furthermore, data characteristics are destroyed in the event of malicious attacks.

CUBE Technology Market Application Plan Over The Air Market (From 2018)
OTA technology is a technology that can remotely upgrade remote automotive software. Automotive software can improve patch performance and bugs through upgrades. CUBE will provide remote diagnostic and installation software and patches of bugs from existing automotive software from remote with OTA technology based on blockchains.

Autonomous Vehicle Security Platform (2019)
There are plans to sell automotive vehicle security platform technology based on blockchain by 2019. The two major sales models will include the sale of CUBE technology licenses and sales of application technology.



Transparency Policy

CUBE considers transparent operation important. Thus, Cube has established a policy of transparency as follows:
1)    Cube is to receive a fair audit through a vote by five globally recognised and credible accounting firms.
2)    Cube shall publish monthly operational and financial reports to share the operational status of the company with its contributors.
3)    When hiring new staff members, such as developers, Cube shall implement a validation process as well as thoroughly examining the candidates’ portfolios and setting reward policies in accordance with their abilities.
4)    The company’s budget shall be tightly managed so that it will always be possible to operate and manage the company without additional funding for more than three years.

Token Valuation Policy

To protect its contributors and provide them with better profits, Cube will be operated as follows:
1) The executive managers of Cube are bound by a lock-up system, which means they are not entitled to make token sales for one year. The lock-up policy is intended to make sure the executive managers receive suitable rewards only after the company grows enough.
2) Cube shall strictly control the use of its budget to stably increase the value of Cube tokens. At least two-thirds of the beginning budget must remain after one year of funding. Using more than one-third of the beginning budget for any single event requires the approval of at least half of both the board and the contributors participating in the ballot.



For more information about please visit links:

0x7bdf35C638AC00d1A21F9Df3A1e632B30Fa058aC

No comments:

Post a Comment