The advent of autonomous vehicles requires machine-to-machine interaction to support services for charging the vehicle, running on designated/programmed routes, and following the rules and regulations. The charging/refueling stations are emerging-industry that is compelling service-markets to enable the machine-to-machine interaction. That in turn necessitates supporting the standardized features such as socket-outlets and the power to enable electric vehicles to be charged. This economic shift also introduces vulnerabilities that could result in security and safety concerns; e.g., for the computing on wheels platforms and communications modules with the support infrastructure. In this paper, we consider the security vulnerabilities, e.g., hardware and embedded security primitives that can enforce secure authentication in fog computing environment. That in turn enables secure interactions between the adapting network of vehicles and charging stations. The paper discusses the use of hardware security and trust primitives and authentication protocol for enabling secure autonomous machine-to-machine framework.
|