Cited time in webofscience Cited time in scopus

Full metadata record

DC Field Value Language
dc.contributor.author Yu, Donghyun -
dc.contributor.author Hsu, Ruei-Hau -
dc.contributor.author Lee, Jemin -
dc.contributor.author Lee, Sungjin -
dc.date.accessioned 2022-11-17T10:40:12Z -
dc.date.available 2022-11-17T10:40:12Z -
dc.date.created 2022-02-28 -
dc.date.issued 2022-02 -
dc.identifier.issn 1556-6013 -
dc.identifier.uri http://hdl.handle.net/20.500.11750/17158 -
dc.description.abstract In-vehicle communications are not designed for message exchange between the vehicles and outside systems originally. Thus, the security design of message protection is insufficient. Moreover, the internal devices do not have enough resources to process the additional security operations. Nonetheless, due to the characteristic of the in-vehicle network in which messages are broadcast, secure message transmission to specific receivers must be ensured. With consideration of the facts aforementioned, this work addresses resource problems by offloading secure operations to high-performance devices, and uses attribute-based access control to ensure the confidentiality of messages from attackers and unauthorized users. In addition, we reconfigure existing access control based cryptography to address new vulnerabilities arising from the use of edge computing and attribute-based access control. Thus, this paper proposes an edge computing-based security protocol with fine-grained attribute-based encryption using a hash function, symmetric-based cryptography, and reconfigured cryptographic scheme. In addition, this work formally proves the reconfigured cryptographic scheme and security protocol, and evaluates the feasibility of the proposed security protocol in various aspects using the CANoe software. IEEE -
dc.language English -
dc.publisher Institute of Electrical and Electronics Engineers -
dc.title EC-SVC: Secure CAN Bus In-Vehicle Communications with Fine-grained Access Control Based on Edge Computing -
dc.type Article -
dc.identifier.doi 10.1109/TIFS.2022.3152405 -
dc.identifier.scopusid 2-s2.0-85124810994 -
dc.identifier.bibliographicCitation IEEE Transactions on Information Forensics and Security, v.17, pp.1388 - 1403 -
dc.description.isOpenAccess TRUE -
dc.subject.keywordAuthor attribute-based encryption -
dc.subject.keywordAuthor edge computing -
dc.subject.keywordAuthor in-vehicle security -
dc.subject.keywordAuthor access control -
dc.subject.keywordPlus Security -
dc.subject.keywordPlus Protocols -
dc.subject.keywordPlus Access control -
dc.subject.keywordPlus Cryptography -
dc.subject.keywordPlus Authentication -
dc.subject.keywordPlus Encryption -
dc.subject.keywordPlus Edge computing -
dc.citation.endPage 1403 -
dc.citation.startPage 1388 -
dc.citation.title IEEE Transactions on Information Forensics and Security -
dc.citation.volume 17 -

qrcode

  • twitter
  • facebook
  • mendeley

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE