Skip to main content
Top

2024 | OriginalPaper | Chapter

A Tale of Two Automotive Security Services: A Formal Analysis

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Automotive system faced in the past decade an abundance of security services proposed by the scientific literature to strengthen their system security. The solutions solve problems in terms of key distribution, data authentication, or system monitoring. While the volume of research done brings in consequence novel ideas, strong validation and extensive experimentation is a must to prove their viability and correctness. Consequently, the work at hand offers a formal analysis of two existing security services for automotive systems, namely for a Key Distribution Service (KDS) and for a data authentication and aggregation method titled Mixed data authentication for Controller Area Network (MixCAN). While the KDS aims to distribute long-term and short-term cryptographic keys, MixCAN envisions a lightweight authentication protocol through Encrypted Bloom Filters (EBFs). The objective of the formal analysis is to prove the correctness of the mentioned security solutions through a Burrows-Abadi-Needham (BAN) logic analysis.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Martínez-Cruz, A., Ramírez-Gutiérrez, K.A., Feregrino-Uribe, C., Morales-Reyes, A.: Security on in-vehicle communication protocols: issues, challenges, and future research directions. Comput. Commun. 180, 1–20 (2021)CrossRef Martínez-Cruz, A., Ramírez-Gutiérrez, K.A., Feregrino-Uribe, C., Morales-Reyes, A.: Security on in-vehicle communication protocols: issues, challenges, and future research directions. Comput. Commun. 180, 1–20 (2021)CrossRef
2.
go back to reference Pekaric, I., Sauerwein, C., Haselwanter, S., Felderer, M.: A taxonomy of attack mechanisms in the automotive domain. Comput. Stand. Interfaces 78, 103539 (2021)CrossRef Pekaric, I., Sauerwein, C., Haselwanter, S., Felderer, M.: A taxonomy of attack mechanisms in the automotive domain. Comput. Stand. Interfaces 78, 103539 (2021)CrossRef
3.
go back to reference Snyder, T., Byrd, G.: The internet of everything. Computer 50(6), 8–9 (2017)CrossRef Snyder, T., Byrd, G.: The internet of everything. Computer 50(6), 8–9 (2017)CrossRef
4.
go back to reference Rathore, R.S., Hewage, C., Kaiwartya, O., Lloret, J.: In-vehicle communication cyber security: challenges and solutions. Sensors 22(17), 6679 (2022)CrossRef Rathore, R.S., Hewage, C., Kaiwartya, O., Lloret, J.: In-vehicle communication cyber security: challenges and solutions. Sensors 22(17), 6679 (2022)CrossRef
5.
go back to reference Alalewi, A., Dayoub, I., Cherkaoui, S.: On 5G–V2X use cases and enabling technologies: a comprehensive survey. IEEE Access 9, 107710–107737 (2021)CrossRef Alalewi, A., Dayoub, I., Cherkaoui, S.: On 5G–V2X use cases and enabling technologies: a comprehensive survey. IEEE Access 9, 107710–107737 (2021)CrossRef
6.
go back to reference Taeihagh, A., Lim, H.S.M.: Governing autonomous vehicles: emerging responses for safety, liability, privacy, cybersecurity, and industry risks. Transp. Rev. 39(1), 103–128 (2019)CrossRef Taeihagh, A., Lim, H.S.M.: Governing autonomous vehicles: emerging responses for safety, liability, privacy, cybersecurity, and industry risks. Transp. Rev. 39(1), 103–128 (2019)CrossRef
7.
go back to reference Pham, M., Xiong, K.: A survey on security attacks and defense techniques for connected and autonomous vehicles. Comput. Secur. 109, 102269 (2021)CrossRef Pham, M., Xiong, K.: A survey on security attacks and defense techniques for connected and autonomous vehicles. Comput. Secur. 109, 102269 (2021)CrossRef
8.
go back to reference Nanda, A., Puthal, D., Rodrigues, J.J.P.C., Kozlov, S.A.: Internet of autonomous vehicles communications security: overview, issues, and directions. IEEE Wirel. Commun. 26(4), 60–65 (2019)CrossRef Nanda, A., Puthal, D., Rodrigues, J.J.P.C., Kozlov, S.A.: Internet of autonomous vehicles communications security: overview, issues, and directions. IEEE Wirel. Commun. 26(4), 60–65 (2019)CrossRef
9.
go back to reference Genge, B., Haller, P.: Cryptographic key distribution protocol with trusted platform module for securing in-vehicle communications. In: Moldovan, L., Gligor, A. (eds.) The 15th International Conference Interdisciplinarity in Engineering. Inter-Eng 2021. Lecture Notes in Networks and Systems, vol. 386, pp. 796–807. Springer, Cham (2022). https://doi.org/10.1007/978-3-030-93817-8_71 Genge, B., Haller, P.: Cryptographic key distribution protocol with trusted platform module for securing in-vehicle communications. In: Moldovan, L., Gligor, A. (eds.) The 15th International Conference Interdisciplinarity in Engineering. Inter-Eng 2021. Lecture Notes in Networks and Systems, vol. 386, pp. 796–807. Springer, Cham (2022). https://​doi.​org/​10.​1007/​978-3-030-93817-8_​71
11.
go back to reference Lenard, T., Genge, B., Haller, P., Collen, A., Nijdam, N.A.: An automotive reference testbed with trusted security services. Electronics 12(4), 888 (2023)CrossRef Lenard, T., Genge, B., Haller, P., Collen, A., Nijdam, N.A.: An automotive reference testbed with trusted security services. Electronics 12(4), 888 (2023)CrossRef
13.
go back to reference Lauser, T., Zelle, D., Krauß, C.: Security analysis of automotive protocols. In: CSCS 2020: Proceedings of the 4th ACM Computer Science in Cars Symposium, pp. 1–12. ACM, New York (2020) Lauser, T., Zelle, D., Krauß, C.: Security analysis of automotive protocols. In: CSCS 2020: Proceedings of the 4th ACM Computer Science in Cars Symposium, pp. 1–12. ACM, New York (2020)
15.
go back to reference AUTOSAR: Specification of secure onboard communication AUTOSAR CP Release 4.3.1 (2017) AUTOSAR: Specification of secure onboard communication AUTOSAR CP Release 4.3.1 (2017)
16.
go back to reference Mundhenk, P., Steinhorst, S., Lukasiewycz, M., Fahmy, S.A., Chakraborty, S.: Lightweight authentication for secure automotive networks. In: Design, Automation & Test in Europe Conference & Exhibition (DATE), 2015, pp. 285–288. IEEE Conference Publications, New Jersey (2015) Mundhenk, P., Steinhorst, S., Lukasiewycz, M., Fahmy, S.A., Chakraborty, S.: Lightweight authentication for secure automotive networks. In: Design, Automation & Test in Europe Conference & Exhibition (DATE), 2015, pp. 285–288. IEEE Conference Publications, New Jersey (2015)
17.
go back to reference Youn, T.-Y., Lee, Y., Woo, S.: Practical sender authentication scheme for in-vehicle CAN with efficient key management. IEEE Access 8, 86836–86849 (2020)CrossRef Youn, T.-Y., Lee, Y., Woo, S.: Practical sender authentication scheme for in-vehicle CAN with efficient key management. IEEE Access 8, 86836–86849 (2020)CrossRef
18.
go back to reference Van Herrewege, A., Singelee, D., Verbauwhede, I.: CANAuth - a simple, backward compatible broadcast authentication protocol for CAN bus. In: ECRYPT Workshop on Lightweight Cryptography 2011, ser. ECRYPT 2011, pp. 1–7 (2011) Van Herrewege, A., Singelee, D., Verbauwhede, I.: CANAuth - a simple, backward compatible broadcast authentication protocol for CAN bus. In: ECRYPT Workshop on Lightweight Cryptography 2011, ser. ECRYPT 2011, pp. 1–7 (2011)
19.
go back to reference Groza, B., Murvay, S., Herrewege, A.V., Verbauwhede, I.: LiBrA-CAN. ACM Trans. Embed. Comput. Syst. 16(3), 1–28 (2017)CrossRef Groza, B., Murvay, S., Herrewege, A.V., Verbauwhede, I.: LiBrA-CAN. ACM Trans. Embed. Comput. Syst. 16(3), 1–28 (2017)CrossRef
21.
go back to reference Woo, S., Jo, H.J., Kim, I.S., Lee, D.H.: A practical security architecture for in-vehicle CAN-FD. IEEE Trans. Intell. Transp. Syst. 17(8), 2248–2261 (2016)CrossRef Woo, S., Jo, H.J., Kim, I.S., Lee, D.H.: A practical security architecture for in-vehicle CAN-FD. IEEE Trans. Intell. Transp. Syst. 17(8), 2248–2261 (2016)CrossRef
22.
go back to reference ISO: ISO 11898-1:2003 - road vehicles - controller area network (CAN) - Part 1: data link layer and physical signalling. In: International Organization for Standardization (2003) ISO: ISO 11898-1:2003 - road vehicles - controller area network (CAN) - Part 1: data link layer and physical signalling. In: International Organization for Standardization (2003)
23.
go back to reference Lenard, T., Bolboacă, R., Genge, B., Haller, P.: MixCAN: mixed and backward-compatible data authentication scheme for controller area networks. In: 2020 IFIP Networking Conference (Networking), pp. 395–403 (2020) Lenard, T., Bolboacă, R., Genge, B., Haller, P.: MixCAN: mixed and backward-compatible data authentication scheme for controller area networks. In: 2020 IFIP Networking Conference (Networking), pp. 395–403 (2020)
25.
go back to reference Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Trans. Comput. Syst. 8(1), 18–36 (1990)CrossRef Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Trans. Comput. Syst. 8(1), 18–36 (1990)CrossRef
Metadata
Title
A Tale of Two Automotive Security Services: A Formal Analysis
Author
Teri Lenard
Copyright Year
2024
DOI
https://doi.org/10.1007/978-3-031-54674-7_33

Premium Partners