A Dedicated Hardware Security Module for Field Operational Tests of Car-to-X Communication
نویسندگان
چکیده
In this work a security module is developed, providing FPGA based hardware acceleration for Elliptic Curve Cryptography which meets the requirements of Car-to-X Communication. The module is pluggable via USB to a Car-to-X system and therefore easily deployable within currently running or planed Field Operational Tests.
منابع مشابه
Evolving the European Its Architecture for Car-to-x Communication
With the publication of a first framework of the communications architecture for European Intelligent Transport Systems (ITS), a major milestone was achieved in harmonization of various R&D efforts towards a unified architecture. Relying on this framework, the project PRE-DRIVE C2X further elaborates four main aspects of the ITS communications architecture: (i) overall system architecture, (ii)...
متن کاملSecurity issues in vehicular systems: threats, emerging solutions and standards
This extended abstract aims at giving a comprehensive overview of the state of the art of information and network security in vehicular systems today and of future development. Current research topics, which in particular focus on enabling e-safety services are covered. In the near future, safety services and applications will be deployed in vehicles as well as at roadside infrastructure, as fo...
متن کاملUICE: A High-Performance Cryptographic Module for SoC and RFID Applications
In order to overcome proprietary algorithms with respect to the system manufacturers, a free cryptographic module, the Universal Immobilizer Crypto Engine (UICE), will be proposed. This UICE algorithm is tailored to 8-bit microprocessor architectures and is therefore very fast in software and hardware. The dedicated hardware implementation leads to a small gate count, because the registers for ...
متن کاملSecure FPGA Design by Filling Unused Spaces
Nowadays there are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications. Hardware Trojan Horse (HTH) insertion is one of the major security threats that can be implemented in unused space of the FPGA. This unused space is unavoidable to ...
متن کاملExploring the infrastructures for establishment of electronic municipality (e-municipality) in metropolis city of Tabriz
The purpose of this study is to explore infrastructures for establishment of electronic municipality in metropolis city of Tabriz. Thisis a descriptive survey and it is an applied one in terms of goal .Total sample consisted of total number of 120 employees in Statistics and Information Technology Department of municipality as well as those working in related sections to information technolog...
متن کامل