IEEE Proceedings. Intelligent Vehicles Symposium, 2005. 2005
DOI: 10.1109/ivs.2005.1505167
|View full text |Cite
|
Sign up to set email alerts
|

Secure software upload in an intelligent vehicle via wireless communication links

Abstract: Abstruct-The demand for drive-by-wire, telematics, entertainment, multimedia, pre-crash warning, highway guidance, remote diagnostic, etc. will significantly increase the complexity of a vehicle's sofhrvare modules. From time to time, the vehicle's software may need to be updated due to many reasons such as the introduction of new features in vehicles, changing the navigation map, fixing software hugs, etc.Software updates must be done in secure modes to avoid any fuhtre disasters due to malfunctions of the ve… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
27
0

Year Published

2006
2006
2022
2022

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 45 publications
(28 citation statements)
references
References 2 publications
0
27
0
Order By: Relevance
“…The authors I. Hossain and S. M. Mahmud [4] introduced a special device denoted Network Device Monitor (NDM) which is installed in the AP within an ITS infrastructure. The purpose of the NDM is to authenticate vehicles, manage the session keys for the multicast group, and to send software to the vehicles therein.…”
Section: Previous Workmentioning
confidence: 99%
“…The authors I. Hossain and S. M. Mahmud [4] introduced a special device denoted Network Device Monitor (NDM) which is installed in the AP within an ITS infrastructure. The purpose of the NDM is to authenticate vehicles, manage the session keys for the multicast group, and to send software to the vehicles therein.…”
Section: Previous Workmentioning
confidence: 99%
“…Mutual authentication between the HU and the remote administrative server is assumed to be done using standard security protocols used in WLAN or WWAN. Since security protocols in WLAN or WWAN has security flaws, a symmetric key based mutual authentication technique between the software provider and the vehicle is proposed in [1][2].…”
Section: A Backgrund and Related Workmentioning
confidence: 99%
“…The RSU techniques proposed in [1][2][3] is suitable for the scenario where a single vehicle needs to fix or update software in one of its ECUs. When an Auto Company (AC) or the ITS authority decides to add new features or update an existing feature, or needs to eliminate software bug from a large number of vehicles, multicasting the software packets will be more efficient than multiple unicast transmission.…”
Section: A Backgrund and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In the first case, software needs to be uploaded in one vehicle which is a unicast process. A secure unicast software upload technique via wireless communication link has been proposed in [1]. However, unicast process is very inefficient and expensive for uploading software in a large number of vehicles.…”
Section: Introductionmentioning
confidence: 99%