MasterIn this thesis, we propose a secure logging scheme (tamper-evidence) in off- line vehicles using Trusted Platform Module (TPM) 2.0. This allows a trusted server to verify trusted logs that was generated when the vehicle was in off- line. For secure logging scheme, the vehicle uses TPM, a security module, and considers three factors: log generation location, log generation situation, and log generation order. The prototype implements the car on the ODROID XU board using Ubuntu 15.04 and the server that is implemented on the Ubuntu 15.04 using VMware workstation. We uses Software TPM 2.0 provided by IBM to match the interface between the car and the server. We also analyze security which consist of operation analysis and network analysi...
The paradigm of the automotive industry has changed, over the course of the last10-15 years. Electro...
Wireless vehicle diagnostics is expected to provide great improvements to the maintenance of future ...
In IT systems, a logfile provides administrators with an audit trail which can be used to review a s...
Auditing system logs is an important means of ensuring systems' security in situations where run-tim...
Car manufacturers are noticing and encouraging a trend away from individual mobility, where a vehicl...
The Unified Diagnostics Services (UDS) have become an essential tool for manufacturers and technicia...
Digital forensics is becoming an important feature for many embedded devices. In automotive systems...
Given the growing importance of Information Technology in todays vehicles with their ever increasing...
With the establishment of intelligent transportation systems (ITS), research on vehicle ad-hoc netwo...
In order to solve the security issues of mobile vehicles in the Internet of vehicles, such as identi...
It is common today in large corporate environments for system administrators to employ centralized s...
Thesis for the degree of Doctor of Philosophy Software has been the enabler for the last decades of ...
A central aspect for securing connected embedded systems are remote firmware upgrades to deal with v...
In recent years, information technology has entered the automobile domain. Most of the functionality...
AbstractVehicular Ad hoc Network (VANET) is a special network of vehicles which can communicate with...
The paradigm of the automotive industry has changed, over the course of the last10-15 years. Electro...
Wireless vehicle diagnostics is expected to provide great improvements to the maintenance of future ...
In IT systems, a logfile provides administrators with an audit trail which can be used to review a s...
Auditing system logs is an important means of ensuring systems' security in situations where run-tim...
Car manufacturers are noticing and encouraging a trend away from individual mobility, where a vehicl...
The Unified Diagnostics Services (UDS) have become an essential tool for manufacturers and technicia...
Digital forensics is becoming an important feature for many embedded devices. In automotive systems...
Given the growing importance of Information Technology in todays vehicles with their ever increasing...
With the establishment of intelligent transportation systems (ITS), research on vehicle ad-hoc netwo...
In order to solve the security issues of mobile vehicles in the Internet of vehicles, such as identi...
It is common today in large corporate environments for system administrators to employ centralized s...
Thesis for the degree of Doctor of Philosophy Software has been the enabler for the last decades of ...
A central aspect for securing connected embedded systems are remote firmware upgrades to deal with v...
In recent years, information technology has entered the automobile domain. Most of the functionality...
AbstractVehicular Ad hoc Network (VANET) is a special network of vehicles which can communicate with...
The paradigm of the automotive industry has changed, over the course of the last10-15 years. Electro...
Wireless vehicle diagnostics is expected to provide great improvements to the maintenance of future ...
In IT systems, a logfile provides administrators with an audit trail which can be used to review a s...