메뉴 건너뛰기




Volumn , Issue , 2011, Pages 31-39

Authentication in time-triggered systems using time-delayed release of keys

Author keywords

real time systems; Security; TESLA; Time triggered Architecture

Indexed keywords

ATTACK SCENARIOS; AUTHENTICATION PROTOCOLS; CRYPTOGRAPHIC ALGORITHMS; DATA ITEMS; DISTRIBUTED EMBEDDED SYSTEM; EMBEDDED REAL TIME SYSTEMS; GLOBAL TIME; INTERNAL SYSTEMS; KEY MANAGEMENT; MALICIOUS ATTACK; MESSAGE TRANSFERS; RESEARCH QUESTIONS; SAFETY CONSTRAINT; SECURITY; SYMMETRIC KEYS; SYSTEM BEHAVIORS; TESLA; TIME TRIGGERED; TIME-TRIGGERED ARCHITECTURES; TIME-TRIGGERED SYSTEMS; TRANSMISSION CHANNELS;

EID: 79957990720     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISORC.2011.14     Document Type: Conference Paper
Times cited : (18)

References (34)
  • 1
    • 3242756924 scopus 로고    scopus 로고
    • Embedded systems security
    • July
    • P. Koopman, "Embedded systems security," IEEE Computer, vol. 37, no. 7, pp. 95-97, July 2004.
    • (2004) IEEE Computer , vol.37 , Issue.7 , pp. 95-97
    • Koopman, P.1
  • 2
    • 70449466750 scopus 로고    scopus 로고
    • EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2008-8, Jan
    • E. A. Lee, "Cyber Physical Systems: Design Challenges," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2008-8, Jan 2008.
    • (2008) Cyber Physical Systems: Design Challenges
    • Lee, E.A.1
  • 4
    • 0141684229 scopus 로고    scopus 로고
    • The time-triggered architecture
    • January
    • H. Kopetz and G. Bauer, "The time-triggered architecture," Proceedings of the IEEE, vol. 91, no. 1, pp. 112-126, January 2003.
    • (2003) Proceedings of the IEEE , vol.91 , Issue.1 , pp. 112-126
    • Kopetz, H.1    Bauer, G.2
  • 12
    • 0003956839 scopus 로고    scopus 로고
    • RFC 2246, Internet Engineering Task Force, January
    • T. Dierks and C. Allen, "The TLS Protocol," RFC 2246, Internet Engineering Task Force, January 1999, http://www.rfc-editor.org/rfc/rfc2246.txt.
    • (1999) The TLS Protocol
    • Dierks, T.1    Allen, C.2
  • 14
    • 84947901848 scopus 로고    scopus 로고
    • Cryptanalysis of Message Authentication Codes
    • Information Security, 1st International Workshop
    • B. Prenel, "Cryptanalysis of Message Authentication Codes," Lecture Notes In Computer Science; Information Security, 1st International Workshop, vol. 1396, pp. 55-65, 2004.
    • (2004) Lecture Notes in Computer Science , vol.1396 , pp. 55-65
    • Prenel, B.1
  • 17
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • November
    • L. Lamport, "Password authentication with insecure communication," Communications of the ACM, vol. 24, no. 11, pp. 770-772, November 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 18
    • 0028499968 scopus 로고
    • Ordering and Timeliness Requirements of Dependable Real- Time Programs
    • V. Paulo, "Ordering and Timeliness Requirements of Dependable Real- Time Programs," in Real-Time Systems, vol. 7, no. 3, 1994, pp. 105-128.
    • (1994) Real-Time Systems , vol.7 , Issue.3 , pp. 105-128
    • Paulo, V.1
  • 19
    • 35248833199 scopus 로고    scopus 로고
    • On the Computation-Storage Trade-Offs of Hash Chain Traversal
    • Y. Sella, "On The Computation-Storage Trade-Offs of Hash Chain Traversal," Lecture Notes in Computer Science, vol. 2742, pp. 270-285, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2742 , pp. 270-285
    • Sella, Y.1
  • 20
    • 79958018446 scopus 로고    scopus 로고
    • Security in embedded systems
    • R. Zurawski, Ed. CRC Press Inc.
    • A. Steffen, "Security in embedded systems." in The Industrial Information Technology Handbook, R. Zurawski, Ed. CRC Press Inc., 2005, pp. 1-12.
    • (2005) The Industrial Information Technology Handbook , pp. 1-12
    • Steffen, A.1
  • 21
    • 0036738266 scopus 로고    scopus 로고
    • Spins: Security protocols for sensor networks
    • September
    • A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, "Spins: security protocols for sensor networks," Wireless Networks, vol. 8, no. 5, pp. 521-534, September 2002.
    • (2002) Wireless Networks , vol.8 , Issue.5 , pp. 521-534
    • Perrig, A.1    Szewczyk, R.2    Tygar, J.D.3    Wen, V.4    Culler, D.E.5
  • 22
    • 38149032366 scopus 로고    scopus 로고
    • Ph.D. dissertation, Technische Universität Wien, Institut für Technische Informatik, Treitlstr. 3/3/182-1, 1040 Vienna, Austria
    • K. Steinhammer, "Design of an FPGA-Based Time-Triggered Ethernet System," Ph.D. dissertation, Technische Universität Wien, Institut für Technische Informatik, Treitlstr. 3/3/182-1, 1040 Vienna, Austria, 2006.
    • (2006) Design of An FPGA-Based Time-Triggered Ethernet System
    • Steinhammer, K.1
  • 24
    • 79958015026 scopus 로고    scopus 로고
    • IEEE 802.3 CSMA/CD (Ethernet)
    • March
    • IEEE 802.3 CSMA/CD (Ethernet), IEEE Standard Part 3, March 2002.
    • (2002) IEEE Standard Part 3
  • 25
    • 79957994359 scopus 로고    scopus 로고
    • Francisco Josephinum Wieselburg, Rottenhauserstrasse 1, A3250 Wieselburg, Bericht BLT053322, November
    • H. Prankl and H. Schaufler, "Motortuning zur Leistungssteigerung an Traktoren," Francisco Josephinum Wieselburg, Rottenhauserstrasse 1, A3250 Wieselburg, Bericht BLT053322, November 2006.
    • (2006) Motortuning Zur Leistungssteigerung An Traktoren
    • Prankl, H.1    Schaufler, H.2
  • 29
    • 79957971979 scopus 로고    scopus 로고
    • E. P. S. Group, Online; Accessed 11- November-2010
    • E. P. S. Group, "Ethernet Powerlink Brochure," Online; Accessed 11- November-2010, 2005, http://www.ethernet-powerlink.org.
    • (2005) Ethernet Powerlink Brochure


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.