new text document (2)

Download New Text Document (2)

If you can't read please download the document

Upload: vgmanjunatha

Post on 10-Nov-2015

214 views

Category:

Documents


0 download

DESCRIPTION

kk asjkz jks zx jklz kjx zjklkz zxk k

TRANSCRIPT

at focus on protecting the communication of vehicles withAfter thgives an optimis of E-safety Ve(EVITA), a project co-funded byed to Car to Car (C2C)cotion. Moreover, the SHE does not provide all thesecurity features. For those and others reasons, many solutionsavailable today on the market do not make use of this module.2) EVITA Project: The objectives of E-safety Vehicle Intrusionmmunication. Moreover, the SHE does not provide all thesecurity features. For those and others reasons, many solutionsavailable today on the market do not make use of this module.2) EVITA Project: The objectives of E-safety Vehicle Intrusionis, HIS group developed a hardware module calledapplication ensure different secsafety aids based on vehicle-to-vehicle and vehicle-toinfrastructurecommunication. Focussing on on-board networkprotection, EVITA complements other e-safety related projectsthurity aspects. The SHEwa to Car (C2C)communication. Moreover, the SHE does not provide all thesecurity features. For those and others reasons, many solutionsavailable today on the market do not make use of this module.2) EVITA Project: The objectives of E-safety Vehicle Intrusionis, HIS group developed a hardware module calledSecure Hardware Extension (SHE), that together with a softwareapplication ensure different security aspects. The SHEwas the ?rst attempt to create a standard solution to solve thesecurity problem in the automotive environment, however theSHE gives an optimized solution limited to Car to Car (C2C)communication. Moreover, the SHE does not provide all thesecurity features. For those and others reasons, many solutionsavailable today on the market do not make use of this module.2) EVITA Project: The objectives of E-safety Vehicle IntrusionproTected Application (EVITA), a project co-funded bythe European Commission, are to design, to verify, and to prototypeAfter this, HIS group developed a hardware module calledSecure Hardware Extension (SHE), that together with a softwareapplication ensure different security aspects. The SHEwas the ?rst attempt to create a standard solution to solve thesecurity problem in the automotive environment, however theSHE gives anan architecture for automotive on-board networks wheresecurity-relevant components are protected against tamperingand sensitive data are protected against compromise. Thus,EVITA provides a basis for the secure deployment of electronicsafety aids based on vehicle-to-vehicle and vehicle-toinfrastructurecommunication. Focussing on on-board networkprotection, EVITA complements other e-safety related projectsthat focus on protecting the communication of vehicles withThis paper presents the ?rst attempt at fusing datafrom inertial and vision depth sensors within the frameworkof a hidden Markov model for the application of hand gesturerecognition. The data fusion approach introduced in this paperis general purpose in the sense that it can be used for recognitionof various body movements. It is shown that the fusion of datafrom the vision depth and inertial sensors act in a complementarymanner leading to a more robust recognition outcome comparedwith the situations when each sensor is used individually on itsown. The obtained recognition rates for the single hand gesturesin the Microsoft MSR data set indicate that our fusion approachprovides improved recognition in real-time and under realisticconditions.the outside. Based on the security requirements and theautomotive constraints, they designed a secure on-board architecture,which includes a Hardware Secure Module (HSM),and secure on-board communications protocols. The securityfunctions are partitioned between software and hardware. Theroot of trust is placed in the HSM that should be realised asextension of automotive microcontrollers. As a result of theEVITA analysis, in table II, is shown which algorithms haveto be implemented through the HSM for different levels ofsecurity, compared with the SHE features.The AES cipher is almost identical to the block cipherRijndael [5]. The Rijndael block and key size vary between128, 192 and 256 bits. However, the AES standard only callsfor a block size of 128 bits. Hence, only Rijndael with block length of 128 bits is known as the AES algorithm.AES consists of so-called layers. Each layer manipulates all128 bits of the data path. The data path is also referred as the state of the algorithm. There are only three differenttypes of layers. Each round, with the exception of the ?rst,consists of all three layers as shown in ?gure 1: the plaintedenoted as x, the cipher text as y and the number of roundsas nr, which are 10 for AES-128. Moreover, the last round ndoes not make use of the MixColumn transformation, whichmakes the encryption and decryption scheme symmetric. Eachtransformation is brie?y described below. Key Addition layer: A 128-bit round key, or sub kewhich has been derived from the main key in the keschedule, is XORed to the state. Byte Substitution layer: Each element of the state non-linearly transformed using lookup tables with specialmathematical properties. This introduces confusion to thedata, i.e., it assures that changes in individual state bitspropagate quickly across the data path. ShiftRows layer: it permutes the data on a byte level. MixColumn layer: it is a matrix operation, which combines(mixes) blocks of four bytes.ShiftRows and MixColumn transformations perform diffusionprinciple over all state bits.For each round, Key Addition layer exploits a different sub