Simple Cryptographic Key Management Scheme of the Electronic Control Unit in the Lifecycle of a Vehicle

Author(s):  
Toru Sakon ◽  
Yukikazu Nakamoto
1978 ◽  
Vol 17 (2) ◽  
pp. 106-125 ◽  
Author(s):  
W. F. Ehrsam ◽  
S. M. Matyas ◽  
C. H. Meyer ◽  
W. L. Tuchman

2013 ◽  
Vol 2 (2) ◽  
pp. 23-31
Author(s):  
Sufyan T. Faraj Al-janabi ◽  
Ali J. Dawood ◽  
Ekram H. Hassan

2010 ◽  
Vol 21 (3) ◽  
pp. 516-527 ◽  
Author(s):  
Ting YUAN ◽  
Jian-Qing MA ◽  
Yi-Ping ZHONG ◽  
Shi-Yong ZHANG

2009 ◽  
Vol 29 (3) ◽  
pp. 638-642
Author(s):  
Wei-ni ZENG ◽  
Ya-ping LIN ◽  
Qiu-ying LU

Author(s):  
Tong Chen ◽  
Lei Zhang ◽  
Kim-Kwang Raymond Choo ◽  
Rui Zhang ◽  
Xinyu Meng

Sensors ◽  
2021 ◽  
Vol 21 (9) ◽  
pp. 2962
Author(s):  
Xingda Chen ◽  
Margaret Lech ◽  
Liuping Wang

Security is one of the major concerns of the Internet of Things (IoT) wireless technologies. LoRaWAN is one of the emerging Low Power Wide Area Networks being developed for IoT applications. The latest LoRaWAN release v.1.1 has provided a security framework that includes data confidentiality protection, data integrity check, device authentication and key management. However, its key management part is only ambiguously defined. In this paper, a complete key management scheme is proposed for LoRaWAN. The scheme addresses key updating, key generation, key backup, and key backward compatibility. The proposed scheme was shown not only to enhance the current LoRaWAN standard, but also to meet the primary design consideration of LoRaWAN, i.e., low power consumption.


Sign in / Sign up

Export Citation Format

Share Document