Security in integrated vetronics: applying elliptic curve digital signature algorithm to a safety-critical network protocol-TTP/C
Security in integrated vetronics: applying elliptic curve digital signature algorithm to a safety-critical network protocol-TTP/C
- Author(s): A. Deshpande ; O. Obi ; E. Stipidis ; P. Charchalakis
- DOI: 10.1049/cp.2012.1513
For access to this article, please select a purchase option:
Buy conference paper PDF
Buy Knowledge Pack
IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.
7th IET International Conference on System Safety, incorporating the Cyber Security Conference 2012 — Recommend this title to your library
Thank you
Your recommendation has been sent to your librarian.
- Author(s): A. Deshpande ; O. Obi ; E. Stipidis ; P. Charchalakis Source: 7th IET International Conference on System Safety, incorporating the Cyber Security Conference 2012, 2012 page ()
- Conference: 7th IET International Conference on System Safety, incorporating the Cyber Security Conference 2012
- DOI: 10.1049/cp.2012.1513
- ISBN: 978-1-84919-678-9
- Location: Edinburgh, UK
- Conference date: 15-18 Oct. 2012
- Format: PDF
Military vetronics consists of a variety of sub-systems which perform a myriad of functions. These sub-systems are connected together using gateways and backbone networks to provide the crew, the military and decision makers with realtime data, enabling information sharing. This integration of the vetronics architecture provides greater functionalities than an individual sub-system. However, this poses a potential risk from malicious attacks. For example, an attack on a safety-critical Drive-by-wire sub-system can affect the safety of the crew and compromise the mission. In this paper, we explore and carry out a feasibility study of applying elliptic curve digital signature algorithm on a safety-critical time-triggered protocol (TTP/C) to provide node authentication and message integrity. (5 pages)
Inspec keywords: military vehicles; protocols; military computing; military communication; cryptography
Subjects: Data security; Military engineering computing; Transportation (military and defence); Military communications; Cryptography
Related content
content/conferences/10.1049/cp.2012.1513
pub_keyword,iet_inspecKeyword,pub_concept
6
6