Application layer security for internet communications: A comprehensive review, challenges, and future trends
The security of Internet communications has traditionally been delegated to controls at lower
layers of the Transmission Control Protocol/Internet Protocol (TCP/IP) architecture. However …
layers of the Transmission Control Protocol/Internet Protocol (TCP/IP) architecture. However …
[HTML][HTML] Automotive cybersecurity: A Survey on frameworks, standards, and testing and monitoring technologies
CV Kifor, A Popescu - Sensors, 2024 - mdpi.com
Modern vehicles are increasingly interconnected through various communication channels,
which requires secure access for authorized users, the protection of driver assistance and …
which requires secure access for authorized users, the protection of driver assistance and …
DSR-CAAP: A Novel Denial of Service Resilient Channel-Aware Authenticated Key Exchange Protocol Suite for SAE J1939
The SAE J1939, a higher-layer broadcast communication protocol with ISO 11898-1
specification at its lower layer, has significantly impacted the automobile industry. However …
specification at its lower layer, has significantly impacted the automobile industry. However …
On Secure and Energy-Efficient Message Communication Protocols for Internet of Vehicles: Cryptanalysis and Improvements
The Internet of Vehicles (IoV), a subset of the Internet of Things (IoT) within the transportation
sector, enhances driving safety and comfort by utilizing intelligent transportation systems to …
sector, enhances driving safety and comfort by utilizing intelligent transportation systems to …
A Gap Analysis of the Adoption Maturity of Certificateless Cryptography in Cooperative Intelligent Transportation Systems
Cooperative Intelligent Transport Systems (C-ITSs) are an important development for
society. C-ITSs enhance road safety, improve traffic efficiency, and promote sustainable …
society. C-ITSs enhance road safety, improve traffic efficiency, and promote sustainable …
Research on certificateless anonymous authentication and key agreement scheme of vehicle network based on CPN.
Z Lu, F Tao, SU Chunhua - Journal on Communication …, 2024 - search.ebscohost.com
To address the shortcomings of existing authentication schemes in vehicle networks, which
commonly suffer from key escrow issues, as well as the lack of consideration for lightweight …
commonly suffer from key escrow issues, as well as the lack of consideration for lightweight …
基于 CPN 的车载网络无证书匿名认证和密钥协商方案研究
郑路, 冯涛, 苏春华 - 通信学报, 2024 - infocomm-journal.com
为了解决现有车载网络的认证方案中普遍存在密钥托管带来的缺陷, 以及没有考虑计算受限电子
控制单元(ECU) 轻量级部署和安全快速认证的问题, 首先, 针对计算不受限的ECU 网络 …
控制单元(ECU) 轻量级部署和安全快速认证的问题, 首先, 针对计算不受限的ECU 网络 …
Privacy-preserving and Anonymous Certificateless Mutual Authentication Protocol for WBAN
Y Wu, J Zhang - 2024 7th International Conference on …, 2024 - ieeexplore.ieee.org
In wireless body area networks (WBAN), real-time sensing and comprehensive analysis of
human body conditions can be achieved by wearing or implanting various sensors, thereby …
human body conditions can be achieved by wearing or implanting various sensors, thereby …
Intrusion detection systems on CAN Buses for commercial vehicles with SAE J1939 compliant communication
CV Jichici, BI Groza - 2023 - dspace.upt.ro
The SAE J1939 protocol, built on the top of the CAN protocol, is a standard for heavy-duty in-
vehicle networks. This commercial vehicle sector plays a significant role in various domains …
vehicle networks. This commercial vehicle sector plays a significant role in various domains …
[PDF][PDF] Applications of Formal Verification Techniques for Security in the Context of Automotive Diagnostics
J Figge, D Knuplesch - datamod2024.github.io
The automotive industry is shifting from a mechanical engineering focus to an integrated
approach emphasizing software development. This transition is marked by the increased …
approach emphasizing software development. This transition is marked by the increased …