This content is not included in
your SAE MOBILUS subscription, or you are not logged in.
Autonomous Key Management (AKM) Security Architecture for Vehicle and IoT Applications
Technical Paper
2017-01-1653
ISSN: 0148-7191, e-ISSN: 2688-3627
Annotation ability available
Sector:
Language:
English
Abstract
This paper discusses the merits, benefits and usage of autonomous key management (with implicit authentication) (AKM) solutions for securing ECU-to-ECU communication within the connected vehicle and IoT applications; particularly for transmissions between externally exposed, edge ECU sensors connected to ECUs within the connected vehicle infrastructure. Specific benefits addressed include reductions of communication latency, implementation complexity, processing power and energy consumption. Implementation issues discussed include provisioning, key rotation, synchronization, re-synchronization, digital signatures and enabling high entropy.
Recommended Content
Authors
Topic
Citation
Shields, J., Huser, J., and Gell, D., "Autonomous Key Management (AKM) Security Architecture for Vehicle and IoT Applications," SAE Technical Paper 2017-01-1653, 2017, https://doi.org/10.4271/2017-01-1653.Also In
References
- Olympus Sky ODSP Technical Summary June 2016
- Leslie , Ron ZERO-KNOWLEDGE AUTHENTICATION https://www.sedicii.com/2015/07/30/zero-knowledge-authentication/ July 30 th 2015
- Brandon , Lum Jia Jun Implementing Zero-Knowledge Authentication with Zero Knowledge Proceedings of PyCon Asia-Pacific , The Python Papers Monograph 2 9 2010
- Giani Annarita Identification with Zero Knowledge Protocols SANS Institute InfoSec Reading Room, © SANS Institute 2001
- IBM Knowledge Center Cryptographic Hash Functions, Message Authentication Codes, and Digital Signatures http://www.ibm.com/support/knowledgecenter/SSYKE2_7.1.0/com.ibm.java.security.component.71.doc/security-component/jsse2Docs/cryptographichashetc.html © Copyright IBM Corporation 1998 2016
- SANS Institute InfoSec Reading Room An Overview of Hardware Security Modules © SANS Institute 2002
- ACM CCS 2013 tutorial Trusted Execution Environments on Mobile Devices Trustonic , Jan-Erik Ekberg ; ETH Zurich , Kari Kostiainen ; Asokan N. University of Helsinki and Aalto University
- Global Platform The Trusted Execution Environment, Delivering Enhanced Security at a Lower Cost to the Mobile Market White Paper February 2011 http://www.globalplatform.org/documents/GlobalPlatform_TEE_White_Paper_Feb2011.pdf
- OASIS PKCS 11 TC PKCS #11 Cryptographic Token Interface Base Specification Version 2.40 http://docs.oasis-open.org/pkcs11/pkcs11-base/v2.40/pkcs11-base-v2.40.pdf April 14 2015
- Whyte William , Weimerskirch Andre , Kumar Virendra , Hehn Thorsten A Security Credential Management System for V2V Communications IEEE Vehicular Networking Conference Dec. 2013
- The Physics of the Universe, Difficult Topics, made Understandable http://www.physicsoftheuniverse.com/numbers.html