675,305 research outputs found

    BlockChain: A distributed solution to automotive security and privacy

    Full text link
    Interconnected smart vehicles offer a range of sophisticated services that benefit the vehicle owners, transport authorities, car manufacturers and other service providers. This potentially exposes smart vehicles to a range of security and privacy threats such as location tracking or remote hijacking of the vehicle. In this article, we argue that BlockChain (BC), a disruptive technology that has found many applications from cryptocurrencies to smart contracts, is a potential solution to these challenges. We propose a BC-based architecture to protect the privacy of the users and to increase the security of the vehicular ecosystem. Wireless remote software updates and other emerging services such as dynamic vehicle insurance fees, are used to illustrate the efficacy of the proposed security architecture. We also qualitatively argue the resilience of the architecture against common security attacks

    The system architecture of the Pocket Companion

    Get PDF
    In the Moby Dick project we design the architecture of a so-called Pocket Companion. It is a small personal portable computer with wireless communication facilities for every day use. The typical use of the Pocket Companion induces a number of requirements concerning security, performance, energy consumption, communication and size. We have shown that these requirements are interrelated and can only be met optimal with one single architecture. The Pocket Companion architecture consists of a central switch with a security module surrounded by several modules. The Pocket Companion is a personal machine. Communication, and particularly wireless communication, is essential for the system to support electronic transactions. Such a system requires a good security infrastructure not only for safeguarding personal data, but also to allow safe (financial) transactions. The integration of a security module in the Pocket Companion architecture provides the basis for a secure environment.\ud Because battery life is limited and battery weight is an important factor for the size and the weight of the Pocket Companion, energy consumption plays a crucial role in the architecture. An important theme of the architecture is: enough performance for minimal energy consumption

    Law and technology security standard

    Get PDF
    The author will deal with the relationship between law and technology from the viewpoint of technology security standard. One of the relationships can be found in that law has been providing a security level of technology. They have been saying that law would often follow technology. Law is too slow to adapt the changing technology through the advancement of technology. Above all, information technology has an electronic rapidity and a legislation technology has a paper one. There might be a big estrangement between law and technology. However, law must provide a security standard of technology. The standard must be based on a relative security level. The relative level would premise on the ordinary, lawful and ethical use of technology. Most technology has been opened to the public without any technology impact assessment. Technology would have some defect, which the producers have overlooked. As a result, the users might often meet with the accidents caused on the defects. Then law should provide a technology security standard to exclude the defects from the users’ viewpoint as secure as possible. The security standard must be reflected on the architecture standard of technology. The architecture standard may be a yardstick whether the creators can evade the responsibility for the accidents. The standard would also premise on the ordinary, lawful and ethical use of technology. The ordinary use means that the users should use normally technology within the extent of the architecture standard. The ethical use means that the users should use technology being conscious of the defects in order to avoid accidents. The relative security level may be the sum of the architecture standard and the ethical use of technology

    Security Issues in a SOA-based Provenance System

    No full text
    Recent work has begun exploring the characterization and utilization of provenance in systems based on the Service Oriented Architecture (such as Web Services and Grid based environments). One of the salient issues related to provenance use within any given system is its security. Provenance presents some unique security requirements of its own, which are additionally dependent on the architectural and environmental context that a provenance system operates in. We discuss the security considerations pertaining to a Service Oriented Architecture based provenance system. Concurrently, we outline possible approaches to address them

    Mobile integrated conditional access system

    Get PDF
    This paper presents design of a novel security architecture integrating mobile and broadcasting technologies in the Pay-TV system. The security architecture proposed herein is a state-of-the-art solution to tackle well-known problems challenging current Pay-TV systems including but not limited to interoperability amongst service providers, relatively high cost of the service deployment, the security compromise, limited interactivity and bespoken services offered to subscribers. It also proposes the Follow-me service that enables subscribers to access their entitlements via an arbitrary set-top box
    corecore