메뉴 건너뛰기




Volumn 40, Issue , 2014, Pages 60-74

Towards a distributed secure in-vehicle communication architecture for modern vehicles

Author keywords

Authentication; ECM; ECU; Immobilizer; In vehicle communication; Security

Indexed keywords

DISTRIBUTED SECURITY; ECU; IMMOBILIZER; IN-VEHICLE COMMUNICATION; INDUSTRY STANDARDS; MOBILE INFORMATION SYSTEMS; MUTUAL AUTHENTICATION; SECURITY;

EID: 84889061810     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2013.11.003     Document Type: Article
Times cited : (55)

References (52)
  • 1
    • 84889026332 scopus 로고    scopus 로고
    • War texting: Identifying and interacting with devices on the telephone network
    • D. Bailey War texting: identifying and interacting with devices on the telephone network Black Hat (USA 2010) 2010
    • (2010) Black Hat (USA 2010)
    • Bailey, D.1
  • 6
    • 84888994539 scopus 로고
    • CAN Bosch specification of can-bus 1991 http://www.semiconductors.bosch. de/media/pdf/canliteratur/can2spec.pdf
    • (1991) Bosch Specification of Can-bus
  • 9
    • 84889075231 scopus 로고    scopus 로고
    • C. Cremers Scyther 2012 people.inf.ethz.ch/cremersc/scyther/index.html
    • (2012) Scyther
    • Cremers, C.1
  • 18
    • 84889030086 scopus 로고    scopus 로고
    • Secure automotive on-board networks-basis for secure vehicle-to-x communication
    • (From Holland to Hesse without traffic jam)
    • O. Henniger Secure automotive on-board networks-basis for secure vehicle-to-x communication Workshop Staufrei von Holland nach Hessen 2010 (From Holland to Hesse without traffic jam)
    • (2010) Workshop Staufrei von Holland Nach Hessen
    • Henniger, O.1
  • 19
    • 56449111413 scopus 로고    scopus 로고
    • Sniffing/replay attacks on can buses: A simulated attack on the electric window lift classified using an adapted cert taxonomy
    • T. Hoppe, and J. Dittman Sniffing/replay attacks on can buses: a simulated attack on the electric window lift classified using an adapted cert taxonomy Workshop on embedded systems security 2007 66 72
    • (2007) Workshop on Embedded Systems Security , pp. 66-72
    • Hoppe, T.1    Dittman, J.2
  • 22
    • 77956249542 scopus 로고    scopus 로고
    • Applying intrusion detection to automotive it - Early insights and remaining challenges
    • T. Hoppe, S. Kiltz, and J. Dittmann Applying intrusion detection to automotive it - early insights and remaining challenges J Inf Assur Secur 4 2009 226 235
    • (2009) J Inf Assur Secur , vol.4 , pp. 226-235
    • Hoppe, T.1    Kiltz, S.2    Dittmann, J.3
  • 24
    • 84889007482 scopus 로고    scopus 로고
    • Modint: A compact modular arithmetic java class library for cellular phones, and its application to secure electronic voting
    • IFIP International Federation for Information Processing Springer Boston
    • H. Kikuchi, and J. Nakazato Modint: a compact modular arithmetic java class library for cellular phones, and its application to secure electronic voting Security and protection in information processing systems IFIP International Federation for Information Processing Vol. 147 2004 Springer Boston 177 192
    • (2004) Security and Protection in Information Processing Systems , vol.147 VOL. , pp. 177-192
    • Kikuchi, H.1    Nakazato, J.2
  • 30
    • 1542275320 scopus 로고    scopus 로고
    • A secure electronic voting protocol for general elections
    • H.-T. Liaw A secure electronic voting protocol for general elections J Comput Secur 23 2 2004 107 119
    • (2004) J Comput Secur , vol.23 , Issue.2 , pp. 107-119
    • Liaw, H.-T.1
  • 32
    • 84881760192 scopus 로고    scopus 로고
    • McAfee, Tech. rep. McAfee
    • McAfee Caution: Malware ahead Tech. rep. 2011 McAfee
    • (2011) Caution: Malware Ahead
  • 33
    • 78049397804 scopus 로고    scopus 로고
    • Risk-adaptable access control (radac)
    • NIST-National Institute of Standards and Technology-Information Technology Laboratory
    • R.W. McGraw Risk-adaptable access control (radac) Privilege (Access) management Workshop 2009 NIST-National Institute of Standards and Technology-Information Technology Laboratory
    • (2009) Privilege (Access) Management Workshop
    • McGraw, R.W.1
  • 37
    • 84888991757 scopus 로고    scopus 로고
    • Car immobilizer security
    • K. Nohl Car immobilizer security ESCAR 2010 2010
    • (2010) ESCAR 2010
    • Nohl, K.1
  • 46
    • 70449878108 scopus 로고    scopus 로고
    • Flexible multicast authentication for time-triggered embedded control network applications in dependable systems networks
    • C. Szilagyi, and P. Koopman Flexible multicast authentication for time-triggered embedded control network applications in dependable systems networks IEEE/IFIP Int Conf on dependable systems networks 2009 165 174
    • (2009) IEEE/IFIP Int Conf on Dependable Systems Networks , pp. 165-174
    • Szilagyi, C.1    Koopman, P.2
  • 49
    • 84889818635 scopus 로고    scopus 로고
    • Secure in-vehicle communication
    • K. Lemke, C. Paar, M. Wolf, Springer-Verlag
    • A. Weimerskirch, C. Paar, and M. Wolf Secure in-vehicle communication K. Lemke, C. Paar, M. Wolf, Embedded security in cars 2006 Springer-Verlag
    • (2006) Embedded Security in Cars
    • Weimerskirch, A.1    Paar, C.2    Wolf, M.3
  • 50
    • 84889063511 scopus 로고    scopus 로고
    • State of the art: Embedding security in vehicles
    • [Special Issue on Embedded Systems for Intelligent Vehicles]
    • Weimerskirch A, Wolf M, Wollinger T. State of the art: embedding security in vehicles. EURASIP J Embed Syst, [Special Issue on Embedded Systems for Intelligent Vehicles].
    • EURASIP J Embed Syst
    • Weimerskirch, A.1    Wolf, M.2    Wollinger, T.3
  • 52
    • 84864682117 scopus 로고    scopus 로고
    • Design, implementation, and evaluation of a vehicular hardware security module
    • M. Wolf, and T. Gendrullis Design, implementation, and evaluation of a vehicular hardware security module Proceeding of the ICISC 2011 302 318
    • (2011) Proceeding of the ICISC , pp. 302-318
    • Wolf, M.1    Gendrullis, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.