A Dedicated Hardware Security Module for Field Operational Tests of Car-to-X Communication

نویسندگان

  • Attila Jaeger
  • Hagen Stübing
  • Sorin A. Huss
چکیده

In this work a security module is developed, providing FPGA based hardware acceleration for Elliptic Curve Cryptography which meets the requirements of Car-to-X Communication. The module is pluggable via USB to a Car-to-X system and therefore easily deployable within currently running or planed Field Operational Tests.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Evolving the European Its Architecture for Car-to-x Communication

With the publication of a first framework of the communications architecture for European Intelligent Transport Systems (ITS), a major milestone was achieved in harmonization of various R&D efforts towards a unified architecture. Relying on this framework, the project PRE-DRIVE C2X further elaborates four main aspects of the ITS communications architecture: (i) overall system architecture, (ii)...

متن کامل

Security issues in vehicular systems: threats, emerging solutions and standards

This extended abstract aims at giving a comprehensive overview of the state of the art of information and network security in vehicular systems today and of future development. Current research topics, which in particular focus on enabling e-safety services are covered. In the near future, safety services and applications will be deployed in vehicles as well as at roadside infrastructure, as fo...

متن کامل

UICE: A High-Performance Cryptographic Module for SoC and RFID Applications

In order to overcome proprietary algorithms with respect to the system manufacturers, a free cryptographic module, the Universal Immobilizer Crypto Engine (UICE), will be proposed. This UICE algorithm is tailored to 8-bit microprocessor architectures and is therefore very fast in software and hardware. The dedicated hardware implementation leads to a small gate count, because the registers for ...

متن کامل

Secure FPGA Design by Filling Unused Spaces

Nowadays there are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications. Hardware Trojan Horse (HTH) insertion is one of the major security threats that can be implemented in unused space of the FPGA. This unused space is unavoidable to ...

متن کامل

Exploring the infrastructures for establishment of electronic municipality (e-municipality) in metropolis city of Tabriz

The purpose of this study is to explore infrastructures for establishment of electronic municipality in metropolis city of Tabriz. Thisis a descriptive survey and it is an applied one in terms of goal .Total sample consisted of total number of 120 employees in Statistics and Information Technology Department of municipality as well as those working in related sections to information technolog...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011