Embedded Security Solutions for Automotive Applications
Chapter
Abstract
In this paper we present a number of architectural security solutions based upon concrete hardware components such as customized security controllers, trusted platform modules (TPMs), “security boxes”, FPGAs and ASICs. We analyze benefits and disadvantages of each solution proposed in terms of physical and cryptographic security, costs, needed and achievable performance. We also discuss the consequences of the solutions with respect to several wide-spread security applications including immobilizer systems, component identification, software flashing, etc.
Keywords
Automotive Application Trust Platform Module Digital Right Management Security Architecture External Party
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Preview
Unable to display preview. Download preview PDF.
Literatur
- 1.André Weimerskirch, Christof Paar, and Marko Wolf, "Cryptographic Component Identification: Enabler for Secure Inter-vehicular Networks", 62nd IEEE Vehicular Technology Conference, September 25-28, 2005, Dallas, TX, USA.Google Scholar
- 2.Common Criteria for Information Technology Security Evaluation. Parts 1, 2 and 3. Version 2.2. January 2004Google Scholar
- 3.Smartcard IC Platform Protection Profile BSI-PP-0002, Version 1.0, July 2001Google Scholar
- 4.Protection Profile Smartcard Integrated Circuit PP/9806, Version 2.0, September 1998Google Scholar
- 5.TCG TPM Specification, Version 1.2, Revision 94, 29 March 2006Google Scholar
Copyright information
© Springer-Verlag Berlin Heidelberg 2007