2022
DOI: 10.1109/tifs.2022.3152405
|View full text |Cite
|
Sign up to set email alerts
|

EC-SVC: Secure CAN Bus In-Vehicle Communications With Fine-Grained Access Control Based on Edge Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
0
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 30 publications
0
0
0
Order By: Relevance
“…2. The IVN fields and their subjects in the reviewed works Field Paper(s) Subjects Requirements of automotive TSN [6], [11], [12] List of requirements for future IVN processing platforms [13], [14] Integrate TSN with SDN with security [15] NDN [16] Graceful degradation for real-time autonomous vehicle applications [17] Improve the accuracy of the canvas [10] Reducing latency by porting it to Xronos [18] TSN-5G heterogeneous networks [19] HPVUs security [20] OTT Ethernet algorithm [21] Ethernet backbone with Zone based architecture [22] iDriving [45], [46] TSN PSFP, Protection of the TSN automotive Ethernet Security protocols for IVN [23], [24], [30], [35], [39] Review of blockchain and security attributes of IVN [34] IPSEC [36] Extensions to the SOME/IP protocol for securing SOME/IP service discovery [37] CANFD [25]- [29], [33], [38] Confidentiality, authentication, integrity [30]- [33] Blockchain in IVN [40] Structure-aware CAN Fuzzing procedure [41] Mitigations against an underactuated USV Intrusions detection systems for IVN [29], [42], [44], [47], [48], [53] Intrusion Detection Systems [49], …”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…2. The IVN fields and their subjects in the reviewed works Field Paper(s) Subjects Requirements of automotive TSN [6], [11], [12] List of requirements for future IVN processing platforms [13], [14] Integrate TSN with SDN with security [15] NDN [16] Graceful degradation for real-time autonomous vehicle applications [17] Improve the accuracy of the canvas [10] Reducing latency by porting it to Xronos [18] TSN-5G heterogeneous networks [19] HPVUs security [20] OTT Ethernet algorithm [21] Ethernet backbone with Zone based architecture [22] iDriving [45], [46] TSN PSFP, Protection of the TSN automotive Ethernet Security protocols for IVN [23], [24], [30], [35], [39] Review of blockchain and security attributes of IVN [34] IPSEC [36] Extensions to the SOME/IP protocol for securing SOME/IP service discovery [37] CANFD [25]- [29], [33], [38] Confidentiality, authentication, integrity [30]- [33] Blockchain in IVN [40] Structure-aware CAN Fuzzing procedure [41] Mitigations against an underactuated USV Intrusions detection systems for IVN [29], [42], [44], [47], [48], [53] Intrusion Detection Systems [49], …”
Section: Resultsmentioning
confidence: 99%
“…Vehicle messages with the world were not secure by design; furthermore, the cars' internal devices are resource constrained to manage security processes. Yu et al [38] proposed secure IVN that support data confidentiality, authentication, integrity, fine-grained access control, and certification. They used the concept of edge computing by introducing the security agent (SA), which manages cryptographical processes that require low resources.…”
Section: Cryptography: Other Cryptographymentioning
confidence: 99%
“…Furthermore, they demonstrated the attack on both low-end and high-end automotive embedded platforms and implemented an authentication mechanism on the CAN while maintaining backward compatibility. Yu et al addressed the excessive resource usage problem by transferring security operations to high-performance devices and adopted attribute-based access control to ensure message confidentiality from both the attackers and unauthorized users [20]. They reconstructed the existing access-control-based security protection technology to address new vulnerabilities arising from the use of edge computing and attribute-based access control.…”
Section: Encryption and Authentication Techniques For Ict Securitymentioning
confidence: 99%
“…In the past few years, numerous research studies have been conducted in the ICT security field, falling into three main categories: encryption and authentication [14][15][16][17][18][19][20][21], gateway isolation [22], and IDSs (intrusion detection systems) [23][24][25][26][27][28][29][30][31][32][33][34][35][36][37][38]. Specifically, the encryption and authentication approaches can accurately identify an attacker's intrusion and immediately distinguish the identity of the attacker.…”
Section: Introductionmentioning
confidence: 99%
“…Besides, it is worthy of mentioning that the additional expander algorithm (please see the algorithm Expand in Section IV-A) is efficient since it only needs operations on a cryptographic collision-resistant hash function (e.g., MD5, SHA256, etc). It is generally considered that hash operation is a kind of lightweight computation and it has many important applications, for examples, message authentication, digital signature, encryption, password protection [1], [2], [3], [4], [5].…”
Section: Introductionmentioning
confidence: 99%