2021
DOI: 10.1109/tvt.2021.3098546
|View full text |Cite
|
Sign up to set email alerts
|

Fast and Efficient Group Key Exchange in Controller Area Networks (CAN)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(4 citation statements)
references
References 31 publications
0
4
0
Order By: Relevance
“…Multiple entities or nodes in the IoT network share the duty of key management thanks to decentralized protocols [15]. These methods do not require a governing body to control keys.…”
Section: B Decentralized Group Key Managementmentioning
confidence: 99%
“…Multiple entities or nodes in the IoT network share the duty of key management thanks to decentralized protocols [15]. These methods do not require a governing body to control keys.…”
Section: B Decentralized Group Key Managementmentioning
confidence: 99%
“…However, in recent years, only few works have been focus on derivation of shared key on CAN without the pre-shared secret. In [10], Musuroi et al proposed a protocol for group shared key derivation. Authors build the foundation with base Diffie-Hellman key exchange scheme of Station to Station protocol.…”
Section: B Research On Security Mechanisms For In-vehicle Networkmentioning
confidence: 99%
“…In the last phase, ECU will derive the session key using identitybased broadcast encryption. Note that, in [12], Carvajal-Roca et al employ public key encryption in the three main phases for session key derivation, including authentication, initialization and session key phase; in [10], Musuroi et al also employ asymmetric cryptography in all phases for session key derivation, including share compute, extract & confirm, and verify confirmation phase. On the contrary, we employ the KEM in only one phase and instead use symmetric cryptography plus hash function in subsequent phases for more simplicity and efficiency.…”
Section: B Research On Security Mechanisms For In-vehicle Networkmentioning
confidence: 99%
See 1 more Smart Citation