IET Road Transport Information and Control Conference and the ITS United Kingdom Members' Conference (RTIC 2008) 2008
DOI: 10.1049/ic.2008.0810
|View full text |Cite
|
Sign up to set email alerts
|

Vehicle ECU classification based on safety-security characteristics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 50 publications
(29 citation statements)
references
References 13 publications
0
29
0
Order By: Relevance
“…In the article Vehicle ECU classification based on safety-security characteristics [14] a study was performed to showcase which of the ECU domains needed the strongest protection based on their security and safety requirements. The conclusion was that ECUs in the powertrain and body domain needed the strongest and most aggressive protection out of all the five ECU domains.…”
Section: Ecu Security Classesmentioning
confidence: 99%
“…In the article Vehicle ECU classification based on safety-security characteristics [14] a study was performed to showcase which of the ECU domains needed the strongest protection based on their security and safety requirements. The conclusion was that ECUs in the powertrain and body domain needed the strongest and most aggressive protection out of all the five ECU domains.…”
Section: Ecu Security Classesmentioning
confidence: 99%
“…The CAN protocol itself does not have any provision for data integrity protection or authentication (Nilsson ). Furthermore, CAN is peer‐to‐peer (as opposed to something like point‐to‐point), making the implementation of a trust mechanism that much more difficult.…”
Section: The Current State Of Automotive Securitymentioning
confidence: 99%
“…The authors explain that the lack of security can affect safety and describe the need for controller authentication and gateway firewalls for in-vehicle networks. Nilsson et al [10] classify vehicle functional domains based on their safety and security characteristics. The authors analyse cyber-attack introduced by enabling wireless communication to the vehicle.…”
Section: Security Within Vehicle Networkmentioning
confidence: 99%