A self-adaptive system for vehicle information security applications

被引:1
作者
Huang, Chun-Hsian [1 ]
Chen, Huang-Yi [1 ]
Huang, Tsung-Fu [1 ]
Tzeng, Yao-Ying [1 ]
Li, Peng-Yi [1 ]
Wu, Pei-Shan [1 ]
机构
[1] Natl Taitung Univ, Dept Comp Sci & Informat Engn, Taitung, Taiwan
来源
PROCEEDINGS IEEE/IFIP 13TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING 2015 | 2015年
关键词
AUTHENTICATION; ARCHITECTURE;
D O I
10.1109/EUC.2015.9
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
To provide complete vehicle information protection mechanism, this work proposes a self-adaptive system for vehicle information security applications (SAV). Different from the conventional software-based information access method, in the SAV, the access control policies are designed by the protection matrices and implemented as reconfigurable hardware modules. The information access method becomes specific and not generic, so the risks of illegal access of vehicle information can be reduced. To not only meet real-time requirements but also enhance hardware resource utilization, the cryptographic functions in the SAV are also implemented as reconfigurable hardware modules. Thus, the SAV can adapt its access control policies and cryptographic functions at runtime to different system requirements. Our experiments have also demonstrated the SAV can accelerate by up to 3.78x the processing time required by using the software-based design. Compared to the conventional embedded system design, the SAV can also reduce 27.1% of slice registers and 26.5% of slice LUTs in the Xilinx Virtex-5 XC5VLX110T FPGA.
引用
收藏
页码:188 / 192
页数:5
相关论文
共 17 条
[1]  
[Anonymous], 2012, P 2 ED ICN WORKSH IN
[2]  
Cheng JF, 2013, 2013 SIXTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTATIONAL INTELLIGENCE (ICACI), P362, DOI 10.1109/ICACI.2013.6748531
[3]  
Efstratiou C., 2001, Mobile Data Management. Second International Conference, MDM 2001. Proceedings (Lecture Notes in Computer Science Vol.1987), P15
[4]  
Ghim SJ, 2004, LECT NOTES COMPUT SC, V3090, P75
[5]  
Khan M. F. F., 2012, 2012 International Conference on Innovations in Information Technology (IIT), P123, DOI 10.1109/INNOVATIONS.2012.6207715
[6]  
Kleiner E., 2006, P 6 INT WORKSH AUT V, P91
[7]  
Lagger A, 2006, I C FIELD PROG LOGIC, P777
[8]   Compact AES-based architecture for symmetric encryption, hash function, and random number generation [J].
Laue, Ralf ;
Kelm, Oliver ;
Schipp, Sebastian ;
Shoufan, Abdulhadi ;
Huss, Sorin A. .
2007 INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS, PROCEEDINGS, VOLS 1 AND 2, 2007, :480-484
[9]  
Li B, 2012, APPL MATH INFORM SCI, V6, P821
[10]  
Mentens N, 2006, I C FIELD PROG LOGIC, P133