Proceedings of the 53rd Annual Design Automation Conference 2016
DOI: 10.1145/2897937.2905006
|View full text |Cite
|
Sign up to set email alerts
|

Invited - Cooperation or competition?

Abstract: Safety is traditionally the most relevant property for automotive systems, and it is further enhanced by Advanced Driver Assistance Systems (ADAS) in modern automotive systems. To support ADAS and other advanced autonomous functions, automotive electronic systems become more distributed and connected than ever, with in-vehicle architecture or Vehicle-to-X (V2X) communication. These connections create a variety of interfaces which become breeding grounds for security attacks. Accordingly, security becomes a ris… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(6 citation statements)
references
References 27 publications
0
6
0
Order By: Relevance
“…These techniques include the clustering of subsystems through the usage of gateways, embedding hardware accelerators in automotive computing units for encryption, using signature mechanisms for supervisory authentication, classifying ECUs into different security classes, and intrusion detection systems relying on physical or upper layer features. Underlining that Ethernet-based automotive networks such as TTEthernet and TSN provide a higher bandwidth and better timing guarantees, Lin and Yu [44] emphasizes that there is a trade-off between ensuring the safety and security of a vehicle. For this purpose, they investigate the security trends for the tasks of secret key management, frame replication and elimination, and Virtual Local Area Network (VLAN) segmentation for in-vehicle communication networks.…”
Section: Defense Strategies For In-vehicle Networkmentioning
confidence: 99%
“…These techniques include the clustering of subsystems through the usage of gateways, embedding hardware accelerators in automotive computing units for encryption, using signature mechanisms for supervisory authentication, classifying ECUs into different security classes, and intrusion detection systems relying on physical or upper layer features. Underlining that Ethernet-based automotive networks such as TTEthernet and TSN provide a higher bandwidth and better timing guarantees, Lin and Yu [44] emphasizes that there is a trade-off between ensuring the safety and security of a vehicle. For this purpose, they investigate the security trends for the tasks of secret key management, frame replication and elimination, and Virtual Local Area Network (VLAN) segmentation for in-vehicle communication networks.…”
Section: Defense Strategies For In-vehicle Networkmentioning
confidence: 99%
“…However, it required additional computing resources and made a large number of modifications to the existing automotive system, which could be inefficient. Lin et al proposed a solution based on a VLAN (virtual local area network) to improve ICT security [17]. They addressed both safety and security issues in Ethernet-based automotive networks, especially their interactions in relation to three problems: secret key management, frame replication and elimination, and VLAN segmentation.…”
Section: Encryption and Authentication Techniques For Ict Securitymentioning
confidence: 99%
“…In the past few years, numerous research studies have been conducted in the ICT security field, falling into three main categories: encryption and authentication [14][15][16][17][18][19][20][21], gateway isolation [22], and IDSs (intrusion detection systems) [23][24][25][26][27][28][29][30][31][32][33][34][35][36][37][38]. Specifically, the encryption and authentication approaches can accurately identify an attacker's intrusion and immediately distinguish the identity of the attacker.…”
Section: Introductionmentioning
confidence: 99%
“…In this attack, the attacker constantly submits frames for analysis in order to waste energy. The corrective mechanism should consider the authentication, and frame replication along with the virtual local area network segmentation scheme [122].…”
Section: Security Threats-automotive Ethernet (Ae)mentioning
confidence: 99%