Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles

被引:0
作者
Nilsson, Dennis K. [1 ]
Larson, Ulf E. [1 ]
Jonsson, Erland [1 ]
机构
[1] Chalmers Univ Technol, Dept Comp Sci & Engn, SE-41296 Gothenburg, Sweden
来源
COMPUTER SAFETY, RELIABILITY, AND SECURITY, PROCEEDINGS | 2008年 / 5219卷
关键词
Infrastructure; vehicle; wireless; security; guidelines; policies;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
A Set of guidelires for creating a. secure infrastructure for wireless diagnostics and software updates in vehicles is presented. The guidelines are derived from a risk assessment, for a wireless, infrastructure. From the outcome of the risk assessment, a set, of security requirements to counter the identified security risks were developed. The security requirements call be viewed as guidelines to support a secure implementation of the wireless infrastructure, Moreover, we discuss the importance of defining security policies.
引用
收藏
页码:207 / 220
页数:14
相关论文
共 31 条
  • [1] [Anonymous], WORKSH EMB IT SEC CA
  • [2] [Anonymous], 1998, SAND988667
  • [3] CHEN CH, 2001, Patent No. 6184779
  • [4] Deal R., 2004, CISCO ROUTER FIREWAL
  • [5] ON THE SECURITY OF PUBLIC KEY PROTOCOLS
    DOLEV, D
    YAO, AC
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) : 198 - 208
  • [6] Hoppe T, 2007, P 2 WORKSHOP EMBEDDE, P1
  • [7] HUI J, 2005, DELUGE 2 0 TINYOS NE
  • [8] *IEEE, 2004, 16092 IEEE
  • [9] Pixy: A static analysis tool for detecting Web application vulnerabilities - (Short paper)
    Jovanovic, Nenad
    Kruegel, Christopher
    Kirda, Engin
    [J]. 2006 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2006, : 258 - +
  • [10] Performance evaluation of public-key cryptosystem operations in WTLS protocol
    Levi, A
    Savas, E
    [J]. EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATION, VOLS I AND II, PROCEEDINGS, 2003, : 1245 - 1250