期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
A framework of hybrid authentication for link access under MIH environments
1
作者 Kangsuk Chae Jiman Mun Souhwan Jung 《Journal of Measurement Science and Instrumentation》 CAS 2012年第4期362-369,共8页
A unified hybrid authentication framework was proposed to provide proactive authentication and re-authentication for media independent handover(MIH)-based multi-wireless access. In addition, a specific protocol dist... A unified hybrid authentication framework was proposed to provide proactive authentication and re-authentication for media independent handover(MIH)-based multi-wireless access. In addition, a specific protocol distributing a hierarchi- cal key after the proactive authentication from key holder to base station has been proposed. The proposed hybrid authenti- cation framework not only performs proaetive authentication with credentials based on Chameleon hashing, which removes the authentication procedures that exchanges messages with a authentication server, but also performs re-authentication with EAP re-authentication protocol(ERP) that distributes the hierarchical key on the basis of the root key generated by the pro- active authentication. 展开更多
关键词 hybrid authentication vertical handover media independent handover(MIH) chameleon hashing extensible authentication protocol(EAP) EAP re-authentication protocol(ERP)
在线阅读 下载PDF
Enhancing security in the ISO 15118-20 EV charging system
2
作者 Ross Porter Morteza Biglari-Abhari +1 位作者 Benjamin Tan Duleepa Thrimawithana 《Green Energy and Intelligent Transportation》 2025年第6期99-109,共11页
Electric Vehicle(EV)‘DC Fast Charging’systems directly connect an EV's battery to an external charger.A compromised EV charger may damage the EV or be used as part of a demand-side power grid attack.We show that... Electric Vehicle(EV)‘DC Fast Charging’systems directly connect an EV's battery to an external charger.A compromised EV charger may damage the EV or be used as part of a demand-side power grid attack.We show that the newest charging standard ISO 15118–20 is not sufficient to prevent charging attacks,as it provides no mechanism to verify charger integrity.We present system and threat models for the attack,before defining an extension to ISO 15118–20 that adds support for firmware integrity verification through remote attestation,while remaining interoperable with non-supporting devices.A proof of concept implementation demonstrates the security improvement by protecting against the specified attack while requiring only 85 bytes of secure storage,8 kB of working memory,and adding less than 0.5 s to the length of a charging session.Backwards compatibility with an implementation of the original standard is also demonstrated. 展开更多
关键词 ISO 15118–20 EV charging Remote attestation protocol extension Cyber-physical systems CYBERSECURITY
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部