2019
DOI: 10.1109/mce.2019.2941392
|View full text |Cite
|
Sign up to set email alerts
|

Hardware Security Primitives for Vehicles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…The idea of the PUF is to generate a unique identifier from a challenge response pair (CRP) that is derived from the unique features inherited by the circuitry over the fabrication process. The complexity and the secureness of the PUF based schemes are reliant on the number of CRPs associated with them [88]. In addition to authentication, PUFs can be employed for secure storing.…”
Section: • Device Authenticationmentioning
confidence: 99%
See 1 more Smart Citation
“…The idea of the PUF is to generate a unique identifier from a challenge response pair (CRP) that is derived from the unique features inherited by the circuitry over the fabrication process. The complexity and the secureness of the PUF based schemes are reliant on the number of CRPs associated with them [88]. In addition to authentication, PUFs can be employed for secure storing.…”
Section: • Device Authenticationmentioning
confidence: 99%
“…In addition to authentication, PUFs can be employed for secure storing. New directives on PUFs can be found in [48,59,88,100,153].…”
Section: Security By Designmentioning
confidence: 99%
“…This approach is constrained by the limited computing power of ECUs and the small payload size of CAN messages (8 Bytes). Proposed solutions include: adding hardware coprocessors to offload computation-intensive cryptographic algorithms from the ECU [31]; selectively adding coprocessors to a partial set of ECUs to meet timing constraints while minimizing cost [21]; truncating the MAC to reduce its length and performing successful authentication of several consecutively received messages [21,47]; dynamically adjusting the MAC size to maximize it while meeting timing constraints [54]; security-aware obfuscated priority assignment for CAN with Flexible Data-rate (CAN-FD) [16,53], and others. Despite these research advances, MA on the CAN bus is not yet widely adopted in the automotive industry due to its high cost or high complexity.…”
Section: Introductionmentioning
confidence: 99%