Securing Internet of Vehicles Using TCM
نویسندگان
چکیده
In order to solve the security issues of mobile vehicles in the Internet of vehicles, such as identity authentication and integrality verification, we apply the trusted cryptography module (TCM) into the on-vehicle electronic systems. TCM has many security features, such as integrality measurement, integrality report and protected storage, by which the on-vehicle electronic systems achieve a trusted boot process. Data and information of vehicles are encrypted before storage and transmission. The experiments show that with the authorization on the vehicular platform, the TCM will improve the credibility and security of the Internet of Vehicles.
منابع مشابه
Intelligent Traffic Management System for Prioritizing Emergency Vehicles in a Smart City (TECHNICAL NOTE)
Traffic congestion worldwide has led to loss of human lives due to failure in transporting accident victims, critical patients, medical equipment and medicines on time. With the unending growth in vehicular traffic everywhere, Internet of Things (IOT) and Vehicular Ad Hoc Network (VANET) have embarked as a promising platform for an Intelligent Traffic Management System (ITMS). Many researches h...
متن کاملTCM: Transactional Completeness Measure based vulnerability analysis for Business Intelligence Support
Real world business applications completely lie on the top of internet technology where the faces of user are unknown at most cases. The user may be a registered or trusted one; the behavior of them cannot be predicted. In any transactional platform the vulnerability arises depend on the security measures enforced in the underlying platform. To enhance the security measures and to support the b...
متن کاملSecurity and privacy in automotive on-board networks. (Sécurité et protection de la vie privée dans les systèmes embarqués automobiles)
In recent decades, vehicles have been equipped with an increasing number of electronic features and controllers. They have become a vital part of automotive architecture. This architecture consists of an internal network of microcontrollers and small computers, called Electronic Control Units (ECUs). Such ECUs may be part of an entertainment system, which will interact with the driver, or they ...
متن کاملManaging and Securing Critical Infrastructure - A Semantic Policy and Trust driven approach∗
Cyber physical systems (CPS) and cyber infrastructure are a key elements of the national infrastructure, and securing them is of vital importance to national security. There is ample evidence that these systems are vulnerable to disruption and damage due to natural disasters social crises, and terrorism. CPS applications are becoming more widespread, ranging from healthcare patient monitoring s...
متن کاملBayesian Modeling Based on Data from the Internet of Things
The Internet of Things is suggested as the upcoming revolution in the Information and communication technology due to its very high capability of making various businesses and industries more productive and efficient. This productivity comes from the emergence of innovation and the introduction of new capabilities for businesses. Different industries have shown varying reactions to IOT, but wha...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- JDCTA
دوره 4 شماره
صفحات -
تاریخ انتشار 2010