ONE SOLUTION FOR PERSISTENT DATA STORAGE IN AUTOMOTIVE INDUSTRY
DOI:
https://doi.org/10.24867/10BE06NegulicKeywords:
Generic secure system, cryptographyAbstract
This paper will describe the design and implementation of a generic secure system solution for persistent data storage in the C programming language, in the AUTOSAR environment. Also, data protection methods, symmetric, AES and asymmetric, RSA, encryption algorithms have been implemented.
References
[1] M. Jovanović et al, "Programska implementacija sistema za prikupljanje i obradu signala sa elektronskih kontrolnih jedinica u automobilskoj mreži," Telekomunikacioni forum TELFOR, Beograd, Srbija, 2015.
[2] D.C. Schmidt, "Guest Editor's Introduction: Model-Driven Engineering," IEEE Computer, vol 39, no., pp. 25-31, Feb. 2006.
[3] Ricardo Aler Mur, "Automatic Inductive Programming Archived 2016-03-04 at the Wayback Machine", ICML 2006 Tutorial. June 2006.
[4] D. L. Parnas. "Software Aspects of Strategic Defense Systems." American Scientist. November 1985.
[5] Daemen, Joan; Rijmen, Vincent (March 9, 2003). "AES Proposal: Rijndael" (PDF). National Institute of Standards and Technology. p. 1. Archived (PDF) from the original on 5 March 2013. Retrieved 21 February 2013.
[6] "Announcing the ADVANCED ENCRYPTION STANDARD (AES)" (PDF). Federal Information Processing Standards Publication 197. United States National Institute of Standards and Technology (NIST). November 26, 2001. Archived (PDF) from the original on March 12, 2017. Retrieved October 2, 2012.
[7] Rivest, R.; Shamir, A.; Adleman, L. (February 1978). "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems" (PDF). Communications of the ACM. 21 (2): 120–126. CiteSeerX 10.1.1.607.2677. doi:10.1145/359340.359342.
[8] "Tegra K1 Next-Gen Mobile Processor", 2017. http://www.nvidia.com/object/tegra-k1-processor.html.
[9] "Linux For Tegra R21.5", 2017. https://developer.nvidia.com/linux-tegra-r215.
[2] D.C. Schmidt, "Guest Editor's Introduction: Model-Driven Engineering," IEEE Computer, vol 39, no., pp. 25-31, Feb. 2006.
[3] Ricardo Aler Mur, "Automatic Inductive Programming Archived 2016-03-04 at the Wayback Machine", ICML 2006 Tutorial. June 2006.
[4] D. L. Parnas. "Software Aspects of Strategic Defense Systems." American Scientist. November 1985.
[5] Daemen, Joan; Rijmen, Vincent (March 9, 2003). "AES Proposal: Rijndael" (PDF). National Institute of Standards and Technology. p. 1. Archived (PDF) from the original on 5 March 2013. Retrieved 21 February 2013.
[6] "Announcing the ADVANCED ENCRYPTION STANDARD (AES)" (PDF). Federal Information Processing Standards Publication 197. United States National Institute of Standards and Technology (NIST). November 26, 2001. Archived (PDF) from the original on March 12, 2017. Retrieved October 2, 2012.
[7] Rivest, R.; Shamir, A.; Adleman, L. (February 1978). "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems" (PDF). Communications of the ACM. 21 (2): 120–126. CiteSeerX 10.1.1.607.2677. doi:10.1145/359340.359342.
[8] "Tegra K1 Next-Gen Mobile Processor", 2017. http://www.nvidia.com/object/tegra-k1-processor.html.
[9] "Linux For Tegra R21.5", 2017. https://developer.nvidia.com/linux-tegra-r215.
Downloads
Published
2020-10-25
Issue
Section
Electrotechnical and Computer Engineering