메뉴 건너뛰기




Volumn 22, Issue 2, 2017, Pages

Security in automotive networks: Lightweight authentication and authorization

Author keywords

Authentication; Authorization; Automotive; Lightweight; Security

Indexed keywords

AUTHENTICATION; CRYPTOGRAPHY; FORMAL METHODS; INTERNET PROTOCOLS; LIFE CYCLE; VEHICLES;

EID: 85017123300     PISSN: 10844309     EISSN: 15577309     Source Type: Journal    
DOI: 10.1145/2960407     Document Type: Article
Times cited : (73)

References (48)
  • 5
    • 67650240831 scopus 로고    scopus 로고
    • Unbounded verification, falsification, and characterization of security protocols by pattern refinement
    • ACM, New York, NY
    • C. J. F. Cremers. 2008b. Unbounded verification, falsification, and characterization of security protocols by pattern refinement. In Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS'08). ACM, New York, NY, 119-128. DOI:http://dx.doi.org/10.1145/1455770.1455787
    • (2008) Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS'08) , pp. 119-128
    • Cremers, C.J.F.1
  • 10
    • 84872695108 scopus 로고    scopus 로고
    • LiBrA-CAN: A lightweight broadcast authentication protocol for controller area networks
    • J. Pieprzyk, A.-R. Sadeghi, and M. Manulis (Eds.). Lecture Notes in Computer Science, Springer, Berlin
    • B. Groza, S. Murvay, A. van Herrewege, and I. Verbauwhede. 2012. LiBrA-CAN: A lightweight broadcast authentication protocol for controller area networks. In Cryptology and Network Security, J. Pieprzyk, A.-R. Sadeghi, and M. Manulis (Eds.). Lecture Notes in Computer Science, Vol. 7712. Springer, Berlin, 185-200. DOI:http://dx.doi.org/10.1007/978-3-642-35404-5-15
    • (2012) Cryptology and Network Security , vol.7712 , pp. 185-200
    • Groza, B.1    Murvay, S.2    Van Herrewege, A.3    Verbauwhede, I.4
  • 11
    • 84903848012 scopus 로고    scopus 로고
    • SAFE: Security-aware FlexRay scheduling engine
    • G. Han, H. Zeng, Y. Li, and W. Dou. 2014. SAFE: Security-aware FlexRay scheduling engine. In Proceedings of DATE. DOI:http://dx.doi.org/10.7873/DATE2014.021
    • (2014) Proceedings of DATE
    • Han, G.1    Zeng, H.2    Li, Y.3    Dou, W.4
  • 15
    • 78649321196 scopus 로고    scopus 로고
    • Security threats to automotive CAN networks-practical examples and selected short-term countermeasures
    • Jan. 2011
    • T. Hoppe, S. Kiltz, and J. Dittmann. 2011. Security threats to automotive CAN networks-practical examples and selected short-term countermeasures. Reliabil. Eng. Syst. Safety 96, 1 (Jan. 2011), 11-25. DOI:http://dx.doi.org/10.1016/j.ress.2010.06.026
    • (2011) Reliabil. Eng. Syst. Safety , vol.96 , Issue.1 , pp. 11-25
    • Hoppe, T.1    Kiltz, S.2    Dittmann, J.3
  • 22
    • 84957099911 scopus 로고    scopus 로고
    • 2016. Security-aware obfuscated priority assignment for automotive CAN platforms
    • M. Lukasiewycz, P. Mundhenk, and S. Steinhorst. 2016. Security-aware obfuscated priority assignment for automotive CAN platforms. ACM Trans. Des. Autom. Electron. Syst. 21 (2016), 32:1-32:27. DOI:http://dx.doi.org/10.1145/2831232
    • (2016) ACM Trans. Des. Autom. Electron. Syst , vol.21 , pp. 321-3227
    • Lukasiewycz, M.1    Mundhenk, P.2    Steinhorst, S.3
  • 23
    • 84901675643 scopus 로고    scopus 로고
    • Adventures in automotive networks and control units
    • C. Miller and C. Valasek. 2013. Adventures in automotive networks and control units. In Proceedings of DEF CON.
    • (2013) Proceedings of DEF CON
    • Miller, C.1    Valasek, C.2
  • 25
    • 84964764354 scopus 로고    scopus 로고
    • Remote exploitation of an unaltered passenger vehicle
    • C. Miller and C. Valasek. 2015. Remote exploitation of an unaltered passenger vehicle. In Proceedings of Black Hat.
    • (2015) Proceedings of Black Hat
    • Miller, C.1    Valasek, C.2
  • 26
    • 85013849764 scopus 로고    scopus 로고
    • Open source model and simulator for real-time performance analysis of automotive network security
    • 2016
    • P. Mundhenk, A. Mrowca, S. Steinhorst, M. Lukasiewycz, S. A. Fahmy, and S. Chakraborty. 2016a. Open source model and simulator for real-time performance analysis of automotive network security. ACM SIGBED Rev. 13, 3 (2016), 8-13.
    • (2016) ACM SIGBED Rev , vol.13 , Issue.3 , pp. 8-13
    • Mundhenk, P.1    Mrowca, A.2    Steinhorst, S.3    Lukasiewycz, M.4    Fahmy, S.A.5    Chakraborty, S.6
  • 32
    • 0003508560 scopus 로고    scopus 로고
    • NIST
    • NIST. 2001. Specification for the Advanced Encryption Standard (AES). United States National Institute of Standards and Technology (NIST). Retrieved from http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf.
    • (2001) Specification for the Advanced Encryption Standard (AES)
  • 41
    • 84883331893 scopus 로고    scopus 로고
    • Architecture and development of secure communication solutions for smart grid applications
    • 2013
    • A. Sikora. 2013. Architecture and development of secure communication solutions for smart grid applications. J. Commun. 8, 8 (2013), 490-496. DOI:http://dx.doi.org/10.12720/jcm.8.8.490-496
    • (2013) J. Commun , vol.8 , Issue.8 , pp. 490-496
    • Sikora, A.1
  • 44
    • 85017100888 scopus 로고    scopus 로고
    • TUM CREATE. Retrieved October 1, 2015
    • TUM CREATE. 2015. EVA. Retrieved October 1, 2015, http://www.eva-taxi.sg/.
    • (2015) EVA


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.