This content is not included in your SAE MOBILUS subscription, or you are not logged in.
Autonomous Key Management (AKM) Security Architecture for Air (and Defense) Vehicles and IoT Applications
ISSN: 0148-7191, e-ISSN: 2688-3627
Published September 19, 2017 by SAE International in United States
Annotation ability available
This paper discusses the merits, benefits and usage of autonomous key management (with implicit authentication) (AKM) solutions for securing Electronic Module to Electronic Module (i.e. ECUs, FCC, REUs, etc.) communication within air (and defense) vehicles and IoT applications; particularly for transmissions between externally exposed, edge Electronic Module sensors connected to Electronic Modules within the air (and defense) vehicle infrastructure. Specific benefits addressed include reductions of communication latency, implementation complexity, processing power and energy consumption. Implementation issues discussed include provisioning, key rotation, synchronization, re-synchronization, digital signatures and enabling high entropy.
CitationShields, J. and Barker, B., "Autonomous Key Management (AKM) Security Architecture for Air (and Defense) Vehicles and IoT Applications," SAE Technical Paper 2017-01-2101, 2017, https://doi.org/10.4271/2017-01-2101.
- Olympus Sky ODSP Technical Summary June 2016
- Leslie , Ron ZERO-KNOWLEDGE AUTHENTICATION https://www.sedicii.com/2015/07/30/zero-knowledge-authentication/ July 30 th 2015
- Lum Jia Jun , Brandon Implementing Zero-Knowledge Authentication with Zero Knowledge Proceedings of PyCon Asia-Pacific , The Python Papers Monograph 2 9 2010
- Giani Annarita Identification with Zero Knowledge Protocols SANS Institute InfoSec Reading Room, © SANS Institute 2001
- .IBM Knowledge Center Cryptographic Hash Functions, Message Authentication Codes, and Digital Signatures http://www.ibm.com/support/knowledgecenter/SSYKE2_7.1.0/com.ibm.java.security.component.71.doc/security-component/jsse2Docs/cryptographichashetc.html Copyright IBM Corporation 1998 2016 1998 2016
- SANS Institute, InfoSec Reading Room An Overview of Hardware Security Modules SANS Institute 2002
- ACM CCS 2013 tutorial Trusted Execution Environments on Mobile Devices Jan-Erik Ekberg , Trustonic Kari Kostiainen, ETH Zurich N. Asokan, University of Helsinki and Aalto University
- Global Platform The Trusted Execution Environment, Delivering Enhanced Security at a Lower Cost to the Mobile Market White Paper February 2011 http://www.globalplatform.org/documents/GlobalPlatform_TEE_White_Paper_Feb2011.pdf
- OASIS PKCS 11 TC PKCS #11 Cryptographic Token Interface Base Specification Version 2.40 http://docs.oasis-open.org/pkcs11/pkcs11-base/v2.40/pkcs11-base-v2.40.pdf April 14 2015
- The Physics of the Universe, Difficult Topics, made Understandable http://www.physicsoftheuniverse.com/numbers.html