메뉴 건너뛰기




Volumn , Issue , 2008, Pages

Efficient in-vehicle delayed data authentication based on compound message authentication codes

Author keywords

Attacks; Data authentication; Detect; In vehicle network; Message authentication code; Recover

Indexed keywords

AUTHENTICATION; CONTROL SYSTEM SYNTHESIS; CONTROL THEORY; ELECTRONICS INDUSTRY; IMAGE COMPRESSION; MANEUVERABILITY; METROPOLITAN AREA NETWORKS; POWER ELECTRONICS; VEHICLES; VIDEO STREAMING; WIRELESS NETWORKS;

EID: 58149105204     PISSN: 15502252     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/VETECF.2008.259     Document Type: Conference Paper
Times cited : (137)

References (25)
  • 6
    • 56449111413 scopus 로고    scopus 로고
    • Sniffing/Replay Attacks on CAN Buses: A simulated attack on the electric window lift classified using an adapted CERT taxonomy
    • Salzburg, Austria
    • T. Hoppe and J. Dittman, "Sniffing/Replay Attacks on CAN Buses: A simulated attack on the electric window lift classified using an adapted CERT taxonomy," in Proceedings of the 2nd Workshop on Embedded Systems Security (WESS), Salzburg, Austria, 2007.
    • (2007) Proceedings of the 2nd Workshop on Embedded Systems Security (WESS)
    • Hoppe, T.1    Dittman, J.2
  • 11
    • 58149121395 scopus 로고    scopus 로고
    • Overview of Bosch Motronic Hardware
    • ecu overview.htm, visited November
    • "Overview of Bosch Motronic Hardware," http://volvospeed.com/ obd2/ ecu overview.htm, visited November, 2007.
    • (2007)
  • 12
    • 58149121396 scopus 로고    scopus 로고
    • CP3SP33 Connectivity Processor with Cache, DSP, and Bluetooth, USB, and Dual CAN Interfaces
    • National Semiconductor
    • National Semiconductor, "CP3SP33 Connectivity Processor with Cache, DSP, and Bluetooth, USB, and Dual CAN Interfaces," Datasheet, 2005.
    • (2005) Datasheet
  • 13
    • 58149112736 scopus 로고    scopus 로고
    • Bosch, CAN Specification 2.0, http://www.dcd.pl/dcdpdf/ can2spec. pdf, 1991, visited August, 2007.
    • Bosch, "CAN Specification 2.0," http://www.dcd.pl/dcdpdf/ can2spec. pdf, 1991, visited August, 2007.
  • 15
    • 33745269795 scopus 로고    scopus 로고
    • Survey and Benchmark of Block Ciphers for Wireless Sensor Networks
    • February
    • Y. W. Law, J. Doumen, and P. Hartel, "Survey and Benchmark of Block Ciphers for Wireless Sensor Networks," ACM Transactions on Sensor Networks, vol. 2, no. 1, pp. 65-93, February 2006.
    • (2006) ACM Transactions on Sensor Networks , vol.2 , Issue.1 , pp. 65-93
    • Law, Y.W.1    Doumen, J.2    Hartel, P.3
  • 17
    • 85032128552 scopus 로고    scopus 로고
    • The Security of the Cipher Block Chaining Message Authentication Code
    • M. Bellare, J. Kilian, and P. Rogaway, "The Security of the Cipher Block Chaining Message Authentication Code," Journal of Computer and System Sciences, vol. 61, no. 3, pp. 362-399, 2000.
    • (2000) Journal of Computer and System Sciences , vol.61 , Issue.3 , pp. 362-399
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3
  • 23
    • 72549101635 scopus 로고    scopus 로고
    • MSP430x13x, MSP430x14x Mixed Signal Controller
    • Texas Instruments, Inc
    • Texas Instruments, Inc., "MSP430x13x, MSP430x14x Mixed Signal Controller," Datasheet, 2001.
    • (2001) Datasheet
  • 24
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors," Communications of the ACM archive, vol. 13, pp. 422-426, 1970.
    • (1970) Communications of the ACM archive , vol.13 , pp. 422-426
    • Bloom, B.H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.