My Account Log in

1 option

Secure Key Management - A Key Feature for Modern Vehicle Electronics ESCRYPT GmbH

SAE Technical Papers (1906-current) Available online

View online
Format:
Conference/Event
Author/Creator:
Schleiffer, Schleiffer, author.
Contributor:
Weimerskirch, André
Wolf, Marko
Wolleschensky, Lars
Conference Name:
SAE 2013 World Congress & Exhibition (2013-04-16 : Detroit, Michigan, United States)
Language:
English
Physical Description:
1 online resource
Place of Publication:
Warrendale, PA SAE International 2013
Summary:
The need for vehicular data security and privacy protection is already enormous and increases even further. Prominent application areas are for instance theft protection, anti-counterfeiting, secure data storage and secure communication inside the vehicle and from the vehicle to the outside world. However, most of the vehicular security and privacy protection solutions involve modern cryptography and require availability of cryptographic keys in the vehicle and in related backend infrastructure. A central aspect for ensuring this availability and a controlled usage of such cryptographic keys is a secure key management, which affects the whole lifecycle of the key, from creation and distribution, usage, backup and update up to key deactivation. Even though secure key management is quite well understood in the standard computer world, the situation in the automotive world is quite different, as we have different functional requirements (e.g., sporadic low-bandwidth connections) and different security requirements (e.g., physical insider attacks).We hence analyze the requirements and give best practice approaches for a secure key management solution in the automotive context. We highlight potential security concerns that are encountered during each phase on a lifecycle of a cryptographic key used in a typical vehicular security solution. Knowing the security vulnerabilities, we will introduce open solutions and best practice approaches for secure key management implementation both in the embedded in-vehicle domain as well as for the supporting backend infrastructure
Notes:
Vendor supplied data
Publisher Number:
2013-01-1418
Access Restriction:
Restricted for use by site license

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account