A Secure Mechanism to Supervise Automotive Sensor Network by Client on Smart Phone
Journal: International Journal of Advanced Computer Research (IJACR) (Vol.3, No. 9)Publication Date: 2013-04-16
Authors : T R Yashavanth; Ravi S Malashetty; V R Udupi;
Page : 30-35
Keywords : Security; smart phone; vehicle;
Abstract
This paper presents a proposal on design of a secure client on smart phone to monitor automotive sensor network. Recently, more and more vehicles, such as BMW X5, are connected from outside via smart phone [3]. From smart phone, users can use the internet resources in automotive. Users can monitor the automotives by using their smart phones. When the automotive is moving or stolen by robber, alert information will be reported to users and users can even brake their automotive via smart phone in emergency status by sending control command to the vehicle information gateway. So client software in smart phone is required to monitor the sensor network in automotives. In order to prevent malicious attack on the client software by malicious attackers which are usually the robbers, there should be a mechanism provided to the clients which offers security by considering few criteria’s like power of computation, level of security and consumption of power. This proposed method uses IDEA for the encryption of all the messages since IDEA has high level of security and suitable to implement in software and also demands on computational power is less. Record management set is being suggested for the storage of critical data which is a Java MIDlet based mechanism. Between client software and its gateway a communication management on transaction is also proposed. The verification of the key updating process is verified with model checking in UPPAAL [7].
Other Latest Articles
- Extracting Person Name, Date and Place from Text Documents Using LEX Tool
- Result Analysis of Proposed Image Enhancement Algorithm Based on a Self Organizing Map Network and Wavelet Transform
- Securing Routing Protocol by Distributed Key Management and Threshold Cryptography in Mobile Ad hoc Network
- Robust LQR Control Design of Gyroscope
- Block Based Information Hiding using Cosine, Hartley, Walsh and Haar Wavelets
Last modified: 2014-12-17 20:32:17