A unified hybrid authentication framework was proposed to provide proactive authentication and re-authentication for media independent handover(MIH)-based multi-wireless access. In addition, a specific protocol dist...A unified hybrid authentication framework was proposed to provide proactive authentication and re-authentication for media independent handover(MIH)-based multi-wireless access. In addition, a specific protocol distributing a hierarchi- cal key after the proactive authentication from key holder to base station has been proposed. The proposed hybrid authenti- cation framework not only performs proaetive authentication with credentials based on Chameleon hashing, which removes the authentication procedures that exchanges messages with a authentication server, but also performs re-authentication with EAP re-authentication protocol(ERP) that distributes the hierarchical key on the basis of the root key generated by the pro- active authentication.展开更多
Electric Vehicle(EV)‘DC Fast Charging’systems directly connect an EV's battery to an external charger.A compromised EV charger may damage the EV or be used as part of a demand-side power grid attack.We show that...Electric Vehicle(EV)‘DC Fast Charging’systems directly connect an EV's battery to an external charger.A compromised EV charger may damage the EV or be used as part of a demand-side power grid attack.We show that the newest charging standard ISO 15118–20 is not sufficient to prevent charging attacks,as it provides no mechanism to verify charger integrity.We present system and threat models for the attack,before defining an extension to ISO 15118–20 that adds support for firmware integrity verification through remote attestation,while remaining interoperable with non-supporting devices.A proof of concept implementation demonstrates the security improvement by protecting against the specified attack while requiring only 85 bytes of secure storage,8 kB of working memory,and adding less than 0.5 s to the length of a charging session.Backwards compatibility with an implementation of the original standard is also demonstrated.展开更多
基金The KCC(Korea Communications Commission),Korea,under the R&D program supervised by the KCA(Korea Communi-cations Agency)(KCA-2012-08-911-05-001)
文摘A unified hybrid authentication framework was proposed to provide proactive authentication and re-authentication for media independent handover(MIH)-based multi-wireless access. In addition, a specific protocol distributing a hierarchi- cal key after the proactive authentication from key holder to base station has been proposed. The proposed hybrid authenti- cation framework not only performs proaetive authentication with credentials based on Chameleon hashing, which removes the authentication procedures that exchanges messages with a authentication server, but also performs re-authentication with EAP re-authentication protocol(ERP) that distributes the hierarchical key on the basis of the root key generated by the pro- active authentication.
文摘Electric Vehicle(EV)‘DC Fast Charging’systems directly connect an EV's battery to an external charger.A compromised EV charger may damage the EV or be used as part of a demand-side power grid attack.We show that the newest charging standard ISO 15118–20 is not sufficient to prevent charging attacks,as it provides no mechanism to verify charger integrity.We present system and threat models for the attack,before defining an extension to ISO 15118–20 that adds support for firmware integrity verification through remote attestation,while remaining interoperable with non-supporting devices.A proof of concept implementation demonstrates the security improvement by protecting against the specified attack while requiring only 85 bytes of secure storage,8 kB of working memory,and adding less than 0.5 s to the length of a charging session.Backwards compatibility with an implementation of the original standard is also demonstrated.