Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33085
A Security Module for Car Appliances
Authors: Pang-Chieh Wang, Ting-Wei Hou, Jung-Hsuan Wu, Bo-Chiuan Chen
Abstract:
In this paper we discuss on the security module for the car appliances to prevent stealing and illegal use on other cars. We proposed an open structure including authentication and encryption by embed a security module in each to protect car appliances. Illegal moving and use a car appliance with the security module without permission will lead the appliance to useless. This paper also presents the component identification and deal with relevant procedures. It is at low cost to recover from destroys by the burglar. Expect this paper to offer the new business opportunity to the automotive and technology industry.Keywords: Automotive, component identification, electronic immobilizer, key management.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1077211
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1842References:
[1] Kerstin Lemke, Ahmad-Reza Sadeghi and Christian St├╝ble, "An Open Approach for Designing Secure Electronic Immobilizers", Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 2005
[2] André Weimerskirch, Christof Paar, Marko Wolf, "Cryptographic Component Identification: Enabler for Secure Vehicles", IEEE 62nd Semiannual Vehicular Technology Conference, VTC, Dallas, Texas, USA, September 2005
[3] Sundeep Bajikar, Trusted Platform Module (TPM) based Security on Notebook PCs - White Paper, Mobile Platforms Group, Intel Corporation, June 20, 2002, available at http://www.intel.com/design/mobile/platform/downloads/Trusted_Platfo rm_Module_White_Paper.pdf
[4] Steven Kinney, Trusted Platform Module Basics - Using TPM in Embedded Systems, Newnes Ltd., July 2006
[5] Bruce Schneier, Applied Cryptography, 2nd Ed., John Wiley & Sons Ltd., 1996
[6] Trusted Computing Group. Trusted Platform Module Main Specification. June 2006, Version 1.2, Revision 94, available at http://www.trustedcomputinggroup.org
[7] Wolfgang Rankl, Wolfgang Effing, Smart Card Handbook 3rd Ed., John Wiley & Sons Ltd., January 2004
[8] Bosch-s Controller Area Network Homepage, available at http://www.can.bosch.com
[9] Can in Automation (CiA) Can Protocol introduction, available at http://www.can-cia.de/can/protocol/
[10] National Insurance Crime Bureau (NICB), available at https://www.nicb.org