Eighth International Conference on Digital Information Management (ICDIM 2013) 2013
DOI: 10.1109/icdim.2013.6693985
|View full text |Cite
|
Sign up to set email alerts
|

Secure automotive telematics system (SATS)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
2
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…The EVITA project co-founded by the European Union aims to improve the security of the automotive onboard network to attacks from new V2X applications as well as those performed by having physical access to the vehicle [ 6 ], in which its cryptographic building block AES-128 is incorporated. In addition, Jattala et al in [ 7 ], secure the communication channel SMS of SATS (secure automotive telematics systems) using an AES-256 encryption algorithm. A hardware implementation of the Advanced Encryption Standard (AES) algorithm with a 32% higher speed throughput than the state of art is presented by [ 8 ].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The EVITA project co-founded by the European Union aims to improve the security of the automotive onboard network to attacks from new V2X applications as well as those performed by having physical access to the vehicle [ 6 ], in which its cryptographic building block AES-128 is incorporated. In addition, Jattala et al in [ 7 ], secure the communication channel SMS of SATS (secure automotive telematics systems) using an AES-256 encryption algorithm. A hardware implementation of the Advanced Encryption Standard (AES) algorithm with a 32% higher speed throughput than the state of art is presented by [ 8 ].…”
Section: Introductionmentioning
confidence: 99%
“…We can implement cryptographic solutions in software or hardware. Nevertheless, there is a trend in research for embedded systems applying IoT and IIoT to secure communications for automotive systems [ 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 ]. Hardware implementations use techniques such as iterative, parallel, unrolled, and pipeline architectures.…”
Section: Introductionmentioning
confidence: 99%
“…Considering protection strategies for stealth attach in the power systems, Arvani and Rao (2014) performed a simulation analysis for attack and detection in the systems. Jattala et al (2014) discussed the configuration of Telematics, which was made up of a vehicle tracking system and vehicle navigation system. Because of cyber security issues in Telematics, they proposed a cyber-secure automotive and information system to be implemented during the system design and development lifecycle.…”
Section: Introductionmentioning
confidence: 99%