Automotive proxy-based security architecture for CE device integration

Alexandre Bouard, Johannes Schanda, Daniel Herrscher, Claudia Eckert

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

9 Scopus citations

Abstract

Increasing adoption of Consumer Electronic (CE) devices in the automotive world encourages car makers to propose new CE-related features each year. However, car complexity and security concerns slow down this process. The ubiquitous and personal nature of such devices represents a real threat for car IT systems. We believe that the arrival of IP standards in car should solve most of these issues. In this paper, we describe a proxy-based security architecture for an on-board IP-based network allowing deep and total integration of external mobile wireless services. The proposed architecture has been integrated in an automotive IP-based communication middleware and supports security mechanisms complying with the highly demanding automotive requirements.

Original languageEnglish
Title of host publicationMobile Wireless Middleware, Operating Systems, and Applications - 5th International Conference, Mobilware 2012, Revised Selected Papers
Pages62-76
Number of pages15
DOIs
StatePublished - 2013
Event5th International Conference on Mobile Wireless Middleware, Operating Systems, and Applications, Mobilware 2012 - Berlin, Germany
Duration: 13 Nov 201214 Nov 2012

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
Volume65 LNICST
ISSN (Print)1867-8211

Conference

Conference5th International Conference on Mobile Wireless Middleware, Operating Systems, and Applications, Mobilware 2012
Country/TerritoryGermany
CityBerlin
Period13/11/1214/11/12

Keywords

  • Access Control
  • Automotive Application
  • CE Device
  • Car-to-X Communication
  • Data Labelling
  • Middleware
  • Mobile Device
  • Security

Fingerprint

Dive into the research topics of 'Automotive proxy-based security architecture for CE device integration'. Together they form a unique fingerprint.

Cite this