Tracking the information flow to mitigate the potential vulnerabilities with localization and accuracy has led to various IFT techniques with different levels of abstraction. However, each technique focusses on a particular level of granularity for information flow control which leads to limited access control or area overhead costs decreasing the precision logic of the system. This paper presents a novel approach providing both fine and coarse grain granularity by integrating Instruction level and Gate level IFT to track the data. The proposed approach translates from Instruction level to Gate level based on the user application and module instantiation.
The advent of autonomous vehicles requires machine-to-machine interaction to support services for charging the vehicle, running on designated/programmed routes, and following the rules and regulations. The charging/refueling stations are emerging-industry that is compelling service-markets to enable the machine-to-machine interaction. That in turn necessitates supporting the standardized features such as socket-outlets and the power to enable electric vehicles to be charged. This economic shift also introduces vulnerabilities that could result in security and safety concerns; e.g., for the computing on wheels platforms and communications modules with the support infrastructure. In this paper, we consider the security vulnerabilities, e.g., hardware and embedded security primitives that can enforce secure authentication in fog computing environment. That in turn enables secure interactions between the adapting network of vehicles and charging stations. The paper discusses the use of hardware security and trust primitives and authentication protocol for enabling secure autonomous machine-to-machine framework.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.