2020 International Wireless Communications and Mobile Computing (IWCMC) 2020
DOI: 10.1109/iwcmc48107.2020.9148360
|View full text |Cite
|
Sign up to set email alerts
|

A Semi-centralized Security Framework for In-Vehicle Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 9 publications
0
0
0
Order By: Relevance
“…To address such security issues, Roca et al presented a semi-centralized key management framework for intelligent connected vehicle security [21,39]. They realized decentralized and dynamic key distribution during vehicle operation and considered different aspects such as the broadcast communication of the ECU (electronic control unit), the ECU manufacturing process, and ECU authentication without certificates of external third parties.…”
Section: Encryption and Authentication Techniques For Ict Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…To address such security issues, Roca et al presented a semi-centralized key management framework for intelligent connected vehicle security [21,39]. They realized decentralized and dynamic key distribution during vehicle operation and considered different aspects such as the broadcast communication of the ECU (electronic control unit), the ECU manufacturing process, and ECU authentication without certificates of external third parties.…”
Section: Encryption and Authentication Techniques For Ict Securitymentioning
confidence: 99%
“…In the past few years, numerous research studies have been conducted in the ICT security field, falling into three main categories: encryption and authentication [14][15][16][17][18][19][20][21], gateway isolation [22], and IDSs (intrusion detection systems) [23][24][25][26][27][28][29][30][31][32][33][34][35][36][37][38]. Specifically, the encryption and authentication approaches can accurately identify an attacker's intrusion and immediately distinguish the identity of the attacker.…”
Section: Introductionmentioning
confidence: 99%