Info: Zenodo’s user support line is staffed on regular business days between Dec 23 and Jan 5. Response times may be slightly longer than normal.

Published November 28, 2007 | Version 11397
Journal article Open

A Security Module for Car Appliances

Description

In this paper we discuss on the security module for the car appliances to prevent stealing and illegal use on other cars. We proposed an open structure including authentication and encryption by embed a security module in each to protect car appliances. Illegal moving and use a car appliance with the security module without permission will lead the appliance to useless. This paper also presents the component identification and deal with relevant procedures. It is at low cost to recover from destroys by the burglar. Expect this paper to offer the new business opportunity to the automotive and technology industry.

Files

11397.pdf

Files (435.8 kB)

Name Size Download all
md5:269a705eea0f6deb15e16331e5ec11b4
435.8 kB Preview Download

Additional details

References

  • Kerstin Lemke, Ahmad-Reza Sadeghi and Christian St├╝ble, "An Open Approach for Designing Secure Electronic Immobilizers", Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 2005
  • André Weimerskirch, Christof Paar, Marko Wolf, "Cryptographic Component Identification: Enabler for Secure Vehicles", IEEE 62nd Semiannual Vehicular Technology Conference, VTC, Dallas, Texas, USA, September 2005
  • Sundeep Bajikar, Trusted Platform Module (TPM) based Security on Notebook PCs - White Paper, Mobile Platforms Group, Intel Corporation, June 20, 2002, available at http://www.intel.com/design/mobile/platform/downloads/Trusted_Platfo rm_Module_White_Paper.pdf
  • Steven Kinney, Trusted Platform Module Basics - Using TPM in Embedded Systems, Newnes Ltd., July 2006
  • Bruce Schneier, Applied Cryptography, 2nd Ed., John Wiley & Sons Ltd., 1996
  • Trusted Computing Group. Trusted Platform Module Main Specification. June 2006, Version 1.2, Revision 94, available at http://www.trustedcomputinggroup.org
  • Wolfgang Rankl, Wolfgang Effing, Smart Card Handbook 3rd Ed., John Wiley & Sons Ltd., January 2004
  • Bosch-s Controller Area Network Homepage, available at http://www.can.bosch.com
  • Can in Automation (CiA) Can Protocol introduction, available at http://www.can-cia.de/can/protocol/ [10] National Insurance Crime Bureau (NICB), available at https://www.nicb.org