메뉴 건너뛰기




Volumn 27, Issue 10, 2016, Pages 3044-3057

Security-Aware Mapping and Scheduling with Hardware Co-Processors for FlexRay-Based Distributed Embedded Systems

Author keywords

automotive embedded systems; FlexRay; message authentication; optimization; security

Indexed keywords

AUTHENTICATION; AUTOMOTIVE INDUSTRY; CONTROL SYSTEMS; HARDWARE; HARDWARE SECURITY; HEURISTIC ALGORITHMS; INTEGER PROGRAMMING; MAPPING; NETWORK SECURITY; OPTIMIZATION; RECONFIGURABLE HARDWARE; SIMULATED ANNEALING;

EID: 84987926978     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2016.2520949     Document Type: Article
Times cited : (74)

References (32)
  • 2
    • 84963904018 scopus 로고    scopus 로고
    • Privacy protection for preventing data over-collection in smart city
    • to appear in
    • Y. Li, W. Dai, Z. Ming, and M. Qiu, "Privacy protection for preventing data over-collection in smart city," to appear in IEEE Trans. Comput., 2016.
    • (2016) IEEE Trans. Comput.
    • Li, Y.1    Dai, W.2    Ming, Z.3    Qiu, M.4
  • 4
    • 70449878108 scopus 로고    scopus 로고
    • Flexible multicast authentication for time-triggered embedded control network applications
    • C. Szilagyi and P. Koopman, "Flexible multicast authentication for time-triggered embedded control network applications," in Proc. IEEE/IFIP Int. Conf. Dependable Syst. Netw., 2009, pp. 165-174.
    • (2009) Proc. IEEE/IFIP Int. Conf. Dependable Syst. Netw. , pp. 165-174
    • Szilagyi, C.1    Koopman, P.2
  • 7
    • 84987895797 scopus 로고    scopus 로고
    • Safety and security: Synergies and challenges of integrity-protected bus communication
    • B. Glas and C. Gebauer, "Safety and security: Synergies and challenges of integrity-protected bus communication," in Proc. Embedded Security in Cars (ESCAR) Conf., 2015.
    • (2015) Proc. Embedded Security in Cars (ESCAR) Conf.
    • Glas, B.1    Gebauer, C.2
  • 8
    • 38049156019 scopus 로고    scopus 로고
    • Chosen-prefix collisions for md5 and colliding x. 509 certificates for different identities
    • M. Stevens, A. Lenstra, and B. De Weger, "Chosen-prefix collisions for md5 and colliding x. 509 certificates for different identities," in Proc. 26th Annu. Int. Conf. Adv. Cryptol., 2007, pp. 1-22.
    • (2007) Proc. 26th Annu. Int. Conf. Adv. Cryptol. , pp. 1-22
    • Stevens, M.1    Lenstra, A.2    De Weger, B.3
  • 9
    • 84864682117 scopus 로고    scopus 로고
    • Design, implementation, and evaluation of a vehicular hardware security module
    • M. Wolf and T. Gendrullis, "Design, implementation, and evaluation of a vehicular hardware security module," in Proc. Inf. Security Cryptol., 2012, pp. 302-318.
    • (2012) Proc. Inf. Security Cryptol. , pp. 302-318
    • Wolf, M.1    Gendrullis, T.2
  • 10
    • 82155167643 scopus 로고    scopus 로고
    • Energy efficient security algorithm for power grid wide area monitoring system
    • Dec.
    • M. Qiu, W. Gao, M. Chen, J.-W. Niu, and L. Zhang, "Energy efficient security algorithm for power grid wide area monitoring system," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 715-723, Dec. 2011.
    • (2011) IEEE Trans. Smart Grid , vol.2 , Issue.4 , pp. 715-723
    • Qiu, M.1    Gao, W.2    Chen, M.3    Niu, J.-W.4    Zhang, L.5
  • 13
    • 84903474371 scopus 로고    scopus 로고
    • Next generation of automotive security: Secure hardware and secure open platforms
    • A. Groll, J. Holle, M. Wolf, and T. Wollinger, "Next generation of automotive security: secure hardware and secure open platforms," in Proc. 17th ITS World Congress, 2010.
    • (2010) Proc. 17th ITS World Congress
    • Groll, A.1    Holle, J.2    Wolf, M.3    Wollinger, T.4
  • 16
    • 84862101946 scopus 로고    scopus 로고
    • Co-design techniques for distributed real-time embedded systems with communication security constraints
    • K. Jiang, P. Eles, and Z. Peng, "Co-design techniques for distributed real-time embedded systems with communication security constraints," in Proc. Des., Autom. Test Eur. Conf. Exhib., 2012, pp. 947-952.
    • (2012) Proc. Des., Autom. Test Eur. Conf. Exhib. , pp. 947-952
    • Jiang, K.1    Eles, P.2    Peng, Z.3
  • 18
    • 66449109437 scopus 로고    scopus 로고
    • Message scheduling for the flexray protocol: The static segment
    • Jun.
    • K. Schmidt and E. G. Schmidt, "Message scheduling for the flexray protocol: The static segment," IEEE Trans. Veh. Technol., vol. 58, no. 5, pp. 2170-2179, Jun. 2009.
    • (2009) IEEE Trans. Veh. Technol. , vol.58 , Issue.5 , pp. 2170-2179
    • Schmidt, K.1    Schmidt, E.G.2
  • 20
    • 84902595503 scopus 로고    scopus 로고
    • Scheduling of time triggered messages in static segment of flexray
    • A. Darbandi, S. Kwon, and M. K. Kim, "Scheduling of time triggered messages in static segment of flexray," Int. J. Softw. Eng. Its Appl., vol. 8, no. 6, pp. 195-208, 2014.
    • (2014) Int. J. Softw. Eng. Its Appl. , vol.8 , Issue.6 , pp. 195-208
    • Darbandi, A.1    Kwon, S.2    Kim, M.K.3
  • 22
    • 79951576405 scopus 로고    scopus 로고
    • Schedule optimization of time-triggered systems communicating over the flexray static segment
    • Feb.
    • H. Zeng, M. Di Natale, A. Ghosal, and A. Sangiovanni-Vincentelli, "Schedule optimization of time-triggered systems communicating over the flexray static segment," IEEE Trans. Indus. Informat., vol. 7, no. 1, pp. 1-17, Feb. 2011.
    • (2011) IEEE Trans. Indus. Informat. , vol.7 , Issue.1 , pp. 1-17
    • Zeng, H.1    Di Natale, M.2    Ghosal, A.3    Sangiovanni-Vincentelli, A.4
  • 24
  • 25
    • 84889098665 scopus 로고    scopus 로고
    • Optimizing the implementation of real-time simulink models onto distributed automotive architectures
    • Nov.
    • G. Han, M. Di Natale, H. Zeng, X. Liu, and W. Dou, "Optimizing the implementation of real-time simulink models onto distributed automotive architectures," J. Syst. Archit., vol. 59, no. 10, pp. 1115-1127, Nov. 2013.
    • (2013) J. Syst. Archit. , vol.59 , Issue.10 , pp. 1115-1127
    • Han, G.1    Di Natale, M.2    Zeng, H.3    Liu, X.4    Dou, W.5
  • 28
    • 85027949525 scopus 로고    scopus 로고
    • A survey of broadcast authentication schemes for wireless networks
    • K. Grover and A. Lim, "A survey of broadcast authentication schemes for wireless networks," Ad Hoc Netw., vol. 24, pp. 288-316, 2015.
    • (2015) Ad Hoc Netw. , vol.24 , pp. 288-316
    • Grover, K.1    Lim, A.2
  • 30
    • 84907463040 scopus 로고    scopus 로고
    • Efficient algorithms for schedulability analysis and priority assignment for fixed-priority preemptive scheduling with offsets
    • Z. Gu and H. Cai, "Efficient algorithms for schedulability analysis and priority assignment for fixed-priority preemptive scheduling with offsets," Int. J. Embedded Syst., vol. 6, no. 4, pp. 303-318, 2014.
    • (2014) Int. J. Embedded Syst. , vol.6 , Issue.4 , pp. 303-318
    • Gu, Z.1    Cai, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.