Skip to main content

2019 | OriginalPaper | Buchkapitel

CarINA - Car Sharing with IdeNtity Based Access Control Re-enforced by TPM

verfasst von : Bogdan Groza, Lucian Popa, Pal-Stefan Murvay

Erschienen in: Computer Safety, Reliability, and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Car sharing and car access control from mobile devices is an increasingly relevant topic. While numerous proposals started to appear, practical deployments ask for simple solutions, that are easy to implement and yet secure. In this work we explore the use of TPM 2.0 functionalities along with identity-based signatures in order to derive a flexible solution for gaining access to a vehicle. While TPM 2.0 specifications do not have support for identity-based primitives we can easily bootstrap identity-based private keys for Shamir’s signature scheme from regular RSA functionalities of TPM 2.0. In this way, key distribution becomes more secure as it is re-enforced by hardware and the rest of the functionalities can be carried from software implementations on mobile phones and in-vehicle controllers. We test the feasibility of the approach on modern Android devices and in-vehicle controllers as well as with a recent TPM circuit from Infineon.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat Busold, C., et al.: Smart keys for cyber-cars: secure smartphone-based NFC-enabled car immobilizer. In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, pp. 233–242. ACM (2013) Busold, C., et al.: Smart keys for cyber-cars: secure smartphone-based NFC-enabled car immobilizer. In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, pp. 233–242. ACM (2013)
7.
8.
Zurück zum Zitat Francillon, A., Danev, B., Capkun, S.: Relay attacks on passive keyless entry and start systems in modern cars. In: NDSS (2011) Francillon, A., Danev, B., Capkun, S.: Relay attacks on passive keyless entry and start systems in modern cars. In: NDSS (2011)
9.
Zurück zum Zitat Glas, B., Sander, O., Stuckert, V., Muller-Glaser, K.D., Becker, J.: Car-to-car communication security on reconfigurable hardware. In: VTC Spring 2009-IEEE 69th Vehicular Technology Conference, pp. 1–5. IEEE (2009) Glas, B., Sander, O., Stuckert, V., Muller-Glaser, K.D., Becker, J.: Car-to-car communication security on reconfigurable hardware. In: VTC Spring 2009-IEEE 69th Vehicular Technology Conference, pp. 1–5. IEEE (2009)
13.
Zurück zum Zitat Guillou, L.C., Ugon, M., Quisquater, J.J.: Cryptographic authentication protocols for smart cards. Comput. Netw. 36(4), 437–451 (2001)CrossRef Guillou, L.C., Ugon, M., Quisquater, J.J.: Cryptographic authentication protocols for smart cards. Comput. Netw. 36(4), 437–451 (2001)CrossRef
16.
Zurück zum Zitat Steger, M., et al.: An efficient and secure automotive wireless software update framework. IEEE Trans. Ind. Inf. 14(5), 2181–2193 (2018)CrossRef Steger, M., et al.: An efficient and secure automotive wireless software update framework. IEEE Trans. Ind. Inf. 14(5), 2181–2193 (2018)CrossRef
17.
20.
Zurück zum Zitat Verdult, R., Garcia, F.D., Balasch, J.: Gone in 360 seconds: Hijacking with hitag2. In: Proceedings of the 21st USENIX Conference on Security Symposium, p. 37. USENIX Association (2012) Verdult, R., Garcia, F.D., Balasch, J.: Gone in 360 seconds: Hijacking with hitag2. In: Proceedings of the 21st USENIX Conference on Security Symposium, p. 37. USENIX Association (2012)
21.
Zurück zum Zitat Wei, Z., Yanjiang, Y., Wu, Y., Weng, J., Deng, R.H.: HIBS-KSharing: hierarchical identity-based signature key sharing for automotive. IEEE Access 5, 16314–16323 (2017)CrossRef Wei, Z., Yanjiang, Y., Wu, Y., Weng, J., Deng, R.H.: HIBS-KSharing: hierarchical identity-based signature key sharing for automotive. IEEE Access 5, 16314–16323 (2017)CrossRef
22.
Zurück zum Zitat Wetzels, J.: Broken keys to the kingdom: security and privacy aspects of RFID-based car keys. arXiv preprint arXiv:1405.7424 (2014) Wetzels, J.: Broken keys to the kingdom: security and privacy aspects of RFID-based car keys. arXiv preprint arXiv:​1405.​7424 (2014)
Metadaten
Titel
CarINA - Car Sharing with IdeNtity Based Access Control Re-enforced by TPM
verfasst von
Bogdan Groza
Lucian Popa
Pal-Stefan Murvay
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-26250-1_17

Premium Partner