2021
DOI: 10.3390/s21206807
|View full text |Cite
|
Sign up to set email alerts
|

Security-Related Hardware Cost Optimization for CAN FD-Based Automotive Cyber-Physical Systems

Abstract: The introduction of various networks into automotive cyber-physical systems (ACPS) brings great challenges on security protection of ACPS functions, the auto industry recommends to adopt the hardware security module (HSM)-based multicore ECU to secure in-vehicle networks while meeting the delay constraint. However, this approach incurs significant hardware cost. Consequently, this paper aims to reduce security enhancing-related hardware cost by proposing two efficient design space exploration (DSE) algorithms,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 28 publications
0
2
0
Order By: Relevance
“…Moreover, this judicious removal of unnecessary features aligns seamlessly with the principle of minimalistic design, fostering a leaner, more secure vehicular architecture. Amidst these solutions, TPMs, as depicted in Figure 9, and more particularly HSMs emerge as potent tools [65,66]. These specialized hardware devices provide a secure enclave for cryptographic operations, safeguarding sensitive cryptographic keys from potential compromise.…”
Section: Encryption Authentication and Access Controlmentioning
confidence: 99%
“…Moreover, this judicious removal of unnecessary features aligns seamlessly with the principle of minimalistic design, fostering a leaner, more secure vehicular architecture. Amidst these solutions, TPMs, as depicted in Figure 9, and more particularly HSMs emerge as potent tools [65,66]. These specialized hardware devices provide a secure enclave for cryptographic operations, safeguarding sensitive cryptographic keys from potential compromise.…”
Section: Encryption Authentication and Access Controlmentioning
confidence: 99%
“…The other ECUs will read the data from the bus, will check the E2E status, and if it is valid, will use it inside the BSW or ASW according to the specification. The aim of this paper is to design and evaluate an E2E hardware module for basic sensors [24], [25] capable of sending protected E2E data on an automotive communication bus. Figure 11 depicts the integration of the proposed sensor into an automotive communication network.…”
Section: Migration Of E2e Communication Protection Library To Hardwarementioning
confidence: 99%