2014
DOI: 10.1016/j.cose.2013.11.003
|View full text |Cite
|
Sign up to set email alerts
|

Towards a distributed secure in-vehicle communication architecture for modern vehicles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 52 publications
(22 citation statements)
references
References 1 publication
0
22
0
Order By: Relevance
“…In [ 27 ], a sensor-based detection method recognize a malicious intrusion by using several sensors designed for the attack scenarios. Secured protocols in accordance with the conventional specifications are proposed in [ 28 , 29 ].…”
Section: Introductionmentioning
confidence: 99%
“…In [ 27 ], a sensor-based detection method recognize a malicious intrusion by using several sensors designed for the attack scenarios. Secured protocols in accordance with the conventional specifications are proposed in [ 28 , 29 ].…”
Section: Introductionmentioning
confidence: 99%
“…Cybersecurity hardware accelerators should be integrated in new automotive controllers to implement in real-time the encryption of data packets. To this aim, cybersecurity hardware accelerators to implement in real-time advanced encryption standard (AES), at the core of symmetric cryptography, or elliptic curve cryptography (ECC) for asymmetric cryptography, are under development [56][57][58][59][60].…”
Section: In-vehicle Cyber-security For New Gv Generations: Threats Anmentioning
confidence: 99%
“…4 Even though this research suggested the use of encryption algorithms, mutual authentication of ECUs wasn't covered until recently. 5 McAfee (www.mcafee.com/us/resources/reports/rp -caution-malware-ahead.pdf) and AUTOSAR (www .eetimes.com/document.asp?doc_id=1278566) also indicated vital automotive security issues (www.youtube .com/watch?v=BA2J7O6cqzQ), highlighting the necessity of securely programming ECUs and the immobilizer control module (ICM) so that they're controlled only by authorized entities via specific sets of cryptographic techniques. Automotive units and components accumulate multiple unstructured and unused data functions or variants due to heterogeneous cryptographic routines.…”
Section: Security On Tapmentioning
confidence: 99%