In-vehicle networks (IVNs) and security
In-vehicle networks like CAN, Flexray, LIN, MOST are wired communications to support high-speed and robust data rate processing. We focused on high-speed in-vehicle communication systems called TURBO CAN and Thunderbus to effectively support data traffic such as sensors, cameras, infotainment systems with venture company, VSI. Recently, we are focusing on next-generation in-vehicle networks like Automotive SerDes Alliance (ASA), Automotive Ethernet. Additionally, we are researching on vehicular security to prevent various attacks using those technologies.
Vehicle to everything (V2X) communication
As autonomous vehicles market has been increasing, vehicular communication is becoming a crucial field. The V2X covers all of the things communicating with a vehicle such as vehicles, devices, infrastructure, etc. However, it is difficult to use V2X communication in a real environment because there are some limitations such as latency, reliability, and data congestion. Thus, to solve these problems, we are researching algorithms on standard-based cellular V2X communication systems.
Smart convergence technologies for UAV
Unmanned aerial vehicle (UAV) system is a promising technology shall bring innovations in many industrial fields such as logistic and broadcasting. However, existing UAV system communication links are designed without considering differential physical characteristics or constraints of UAV system (radio channel characteristics or 3D control, etc.). We develop algorithms for effective navigation, control system, and autonomous flight system in urban situations. Furthermore, we study UAV disabling technologies against unauthorized UAV.
Physical layer security for resilient CPS
Advanced communication team studies about physical layer security techniques such as security capacity, MIMO beamforming, anti-jamming, etc. To ensure security, many people utilize cryptology based technologies, like RSA algorithm. However, breaking these algorithms is possible although it takes very long time. So physical layer security techniques provide additional security by physically blocking accesses of unauthenticated users to networks like MIMO beamforming technique, ensuring physically safe wireless channels for authenticated users.
Network performance analysis for CPS, IoT and 5G cellular
Performance analysis for recent complicated wireless systems is quite difficult because of a huge number of nodes and its complex network topologies with the introduction of CPS, IoT, and 5G. Therefore, recent performance analysis results are relying on unrealistic simplified models or computer simulations taking long time. To overcome this issue, we use stochastic geometry for analysis.
- Collaborative AI based autonomous driving system toward safe, reliable, and scalable human-in-the-loop cloud mobility service (MSIT)
- High-speed, high-reliability, and intelligent IVN semiconductor development (MSIT/IITP)
- Resilient cyber-physical systems research (MSIP/IITP)
- Protection technique for mobile wideband communication signal (ADD)
- Smart convergence technologies for UAV safety control in urban areas (MSIP)