Securing Internet of Vehicles Using TCM

نویسندگان

  • Jian Wang
  • Yanheng Liu
  • Wenbin Gao
چکیده

In order to solve the security issues of mobile vehicles in the Internet of vehicles, such as identity authentication and integrality verification, we apply the trusted cryptography module (TCM) into the on-vehicle electronic systems. TCM has many security features, such as integrality measurement, integrality report and protected storage, by which the on-vehicle electronic systems achieve a trusted boot process. Data and information of vehicles are encrypted before storage and transmission. The experiments show that with the authorization on the vehicular platform, the TCM will improve the credibility and security of the Internet of Vehicles.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Intelligent Traffic Management System for Prioritizing Emergency Vehicles in a Smart City (TECHNICAL NOTE)

Traffic congestion worldwide has led to loss of human lives due to failure in transporting accident victims, critical patients, medical equipment and medicines on time. With the unending growth in vehicular traffic everywhere, Internet of Things (IOT) and Vehicular Ad Hoc Network (VANET) have embarked as a promising platform for an Intelligent Traffic Management System (ITMS). Many researches h...

متن کامل

TCM: Transactional Completeness Measure based vulnerability analysis for Business Intelligence Support

Real world business applications completely lie on the top of internet technology where the faces of user are unknown at most cases. The user may be a registered or trusted one; the behavior of them cannot be predicted. In any transactional platform the vulnerability arises depend on the security measures enforced in the underlying platform. To enhance the security measures and to support the b...

متن کامل

Security and privacy in automotive on-board networks. (Sécurité et protection de la vie privée dans les systèmes embarqués automobiles)

In recent decades, vehicles have been equipped with an increasing number of electronic features and controllers. They have become a vital part of automotive architecture. This architecture consists of an internal network of microcontrollers and small computers, called Electronic Control Units (ECUs). Such ECUs may be part of an entertainment system, which will interact with the driver, or they ...

متن کامل

Managing and Securing Critical Infrastructure - A Semantic Policy and Trust driven approach∗

Cyber physical systems (CPS) and cyber infrastructure are a key elements of the national infrastructure, and securing them is of vital importance to national security. There is ample evidence that these systems are vulnerable to disruption and damage due to natural disasters social crises, and terrorism. CPS applications are becoming more widespread, ranging from healthcare patient monitoring s...

متن کامل

Bayesian Modeling Based on Data from the Internet of Things

The Internet of Things is suggested as the upcoming revolution in the Information and communication technology due to its very high capability of making various businesses and industries more productive and efficient. This productivity comes from the emergence of innovation and the introduction of new capabilities for businesses. Different industries have shown varying reactions to IOT, but wha...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • JDCTA

دوره 4  شماره 

صفحات  -

تاریخ انتشار 2010