Eriko Ando
Hitachi
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Eriko Ando.
international conference on advanced applied informatics | 2016
Eriko Ando; Makoto Kayashima; Norishita Komoda
The use of connected cars has been spreading recently. Security for connected cars is very important because an attacker can access connected cars remotely. Security requirements defined based on risk assessment are necessary to protect connected cars from attackers. However, the conventional risk assessment technique mostly depends on the evaluators security knowledge. Therefore, we propose a security requirement definition methodology for connected car systems. The proposed methodology is based on the security requirements definition methodology in IoT (Internet of Things) systems, which consists of four processes: modelization of target system, definition of security problems, consideration of security requirements, and decision of security function components. We applied the methodology in IoT systems to connected car systems. In particular, the risk assessment, which is executed to define security problems, uses CVSS v3 which was released in 2015. We can assess the risk of connected car systems objectively by using the base metrics of CVSS v3.
international conference on its telecommunications | 2011
Eriko Ando; Yuki Horita; Kunihiko Miyazaki
Services such as sending a pre-crash sensing warning and traffic condition warning are expected to be provided in car-to-car/infrastructure (C2X) communication systems. Maintaining message integrity is essential for these services because wrong messages may cause collision accidents and congestion. A message authentication code (MAC) generated by using a symmetric key is used to authenticate a message. The sender and receiver of a message must possess the same symmetric key before initiating communications. In the mentioned warning services, the sender of a message cannot know who receives the message, because the message is broadcast. Moreover, it is difficult for a road-side unit (RSU) to distribute a key to an onboard unit (OBU) because an OBU cannot always communicate with a RSU. Therefore, key distribution is a problem in C2X communication systems. We thus propose a protocol for key distribution. In the protocol, all OBUs and RSUs that exist in a certain area possess the same key. An OBU obtains the keys for the area in which the OBU is present and for the area to which the OBU will go next. The protocol enables a vehicle to verify message integrity by using a symmetric key in C2X communication systems.
Archive | 2005
Yasuko Fukuzawa; Shuichi Ishida; Eriko Ando; Susumu Matsui
Archive | 2008
Hiromitsu Kato; Akitoshi Shimura; Eriko Ando; Takeiki Aizono
Archive | 2004
Eriko Ando; Yasuko Fukuzawa; Shuichi Ishida; Susumu Matsui; 英里子 安藤; 進 松井; 修一 石田; 寧子 福澤
Archive | 2005
Eriko Ando; Shuichi Ishida; Yasuko Fukuzawa; Susumu Matsui; Tetsuo Manchu
Archive | 2005
Eriko Ando; Yasuko Fukuzawa; Shuichi Ishida; Hideyuki Kawamura; Susumu Matsui; 英里子 安藤; 進 松井; 英之 河村; 修一 石田; 寧子 福澤
Archive | 2007
Hiromitsu Kato; Eriko Ando; Yasuko Fukuzawa
Archive | 2012
Eriko Ando; Yasuko Fukuzawa; Kenichi Sakai; Hiroshi Taoka; Senji Emi; Shuichi Ishida; Yosuke Shima; Hiroshi Konuki; 英里子 安藤; 洋 小貫; 庸介 嶋; 宣治 江見; 田岡 浩志; 修一 石田; 寧子 福澤; 憲一 酒井
Archive | 2010
Ken Naganuma; Eriko Ando; Yusuke Mishina; Takayoshi Fujioka