2013
DOI: 10.1007/978-3-642-36660-4_5
|View full text |Cite
|
Sign up to set email alerts
|

Automotive Proxy-Based Security Architecture for CE Device Integration

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
4
4
1

Relationship

3
6

Authors

Journals

citations
Cited by 12 publications
(11 citation statements)
references
References 10 publications
0
11
0
Order By: Relevance
“…We developed an Etch proxy in C, similar to the one developed for [8]. The proxy provides two secure communication interfaces: external over SSL and internal over IPsec.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…We developed an Etch proxy in C, similar to the one developed for [8]. The proxy provides two secure communication interfaces: external over SSL and internal over IPsec.…”
Section: Methodsmentioning
confidence: 99%
“…It will abstract and automate the network addressing and security enforcement [7]. Then the centralization of most of the external wireless interfaces (e.g., LTE, Wi-Fi) in a multi-platform antenna-ECU (called proxy here) will enable car makers to design a single security gateway for all Car-to-X (C2X) communications [8].…”
Section: Future Automotive Architecturementioning
confidence: 99%
“…Guidance can be in the forms of tutorials, help desk, tips, and labeled diagrams, which provides roadmaps for navigating the apps and understanding its functionality. Because mobile devices are equipped with hardware required to run sophisticated apps, newer versions are often packed with complex features that take advantage of recent advances in tablet technologies (Bouard et al, 2013). This trend allows apps to include complicated interfaces that may result in users becoming lost when interacting with them.…”
Section: A3 Guidancementioning
confidence: 99%
“…• a security architecture for the communication proxy, extended from our previous work [9] and complying with the enforcement of DIFC and DDFT rules;…”
Section: Introductionmentioning
confidence: 99%