TUHH Open Research
Help
  • Log In
    New user? Click here to register.Have you forgotten your password?
  • English
  • Deutsch
  • Communities & Collections
  • Publications
  • Research Data
  • People
  • Institutions
  • Projects
  • Statistics
  1. Home
  2. TUHH
  3. Publication References
  4. Security Process for Adopting Machine to Machine Communication for Maintenance in Transportation with a Focus on Key Establishment
 
Options

Security Process for Adopting Machine to Machine Communication for Maintenance in Transportation with a Focus on Key Establishment

Publikationstyp
Conference Paper
Date Issued
2023-09
Sprache
English
Author(s)
Fröschle, Sibylle B.  orcid-logo
Secure Cyber-Physical Systems E-15  
Kubisch, Martin  
TORE-URI
https://hdl.handle.net/11420/45022
Citation
The Fifteenth International Conference on Advances in System Simulation (SIMUL 2023)
Contribution to Conference
The Fifteenth International Conference on Advances in System Simulation, SIMUL 2023  
Publisher Link
https://www.thinkmind.org/index.php?view=article&articleid=simul_2023_1_90_50045
Machine to machine communication over wireless networks is increasingly adopted to improve service and maintenance processes in transportation, e.g. at airports, ports, and automotive service stations. This brings with it the challenge of how to set up a session key so that the communication can be cryptographically secured. While there is a vast design space of key establishment methods available, there is a lack of process of how to engineer a solution while considering both security and safety: how to assess the threats and risks that come with a particular key establishment method? And how to iteratively refine a key establishment method under development such that risk is mitigated to an acceptable level? In this paper, we put forward an approach that addresses these questions. Moreover, we illustrate our approach by means of a real-world use case: TAGA - a Touch and Go Assistant in the Aerospace Domain. Finally, we highlight the crucial role that simulation has to play in this security process for safety.
TUHH
Weiterführende Links
  • Contact
  • Send Feedback
  • Cookie settings
  • Privacy policy
  • Impress
DSpace Software

Built with DSpace-CRIS software - Extension maintained and optimized by 4Science
Design by effective webwork GmbH

  • Deutsche NationalbibliothekDeutsche Nationalbibliothek
  • ORCiD Member OrganizationORCiD Member Organization
  • DataCiteDataCite
  • Re3DataRe3Data
  • OpenDOAROpenDOAR
  • OpenAireOpenAire
  • BASE Bielefeld Academic Search EngineBASE Bielefeld Academic Search Engine
Feedback