Skip to main content
Top

2009 | Book

Security Engineering for Vehicular IT Systems

Improving the Trustworthiness and Dependability of Automotive IT Applications

insite
SEARCH

About this book

Information technology is the driving force behind almost all innovations in the automotive industry, with perhaps 90% of all innovations in cars based on digital electronics and software. Dozens of networked microprocessors and several h- dred megabytes of software can be found in a common compact class car, contr- ling engine and driving functions, assisting the driver and enabling various c- fort, infotainment and safety functions. One crucial aspect of digital systems in vehicles is their security. Whereas software safety is a relatively well-established (if not necessarily well-understood) ?eld, the protection of automotive IT s- tems against malicious manipulations has only recently started to emerge. Even though many European car manufacturers have lately established R&D groups that are dedicated to embedded security in cars, so far there has not been an a- encompassing reference of this topic. The book by Dr. Marko Wolf ?lls this gap, and is by far the most comprehensive treatment of IT security in vehicles available today. A particular challenge of au- motive IT security is its interdisciplinary nature. Dr. Wolf has done an outstanding job incorporating disjoint areas in one comprehensive treatment. The book ranges from the relevant security technologies to a systematic analysis of security risks all the way to solution using state-of-the-art security methods. Despite the fact that much of the material is based on results from the research community, Dr.

Table of Contents

Frontmatter

The Preliminaries

Frontmatter
1. Introduction
Abstract
This chapter provides the motivation for the necessity of vehicular IT security, outlines this work, and summarizes the corresponding research contributions.
Marko Wolf
2. Related Work
Abstract
A great many of articles has been published, see for example [BFM+03, CTG03, Dri02, EM00, HRS98, Moo90, Pol95, SV05, ZP93], that treat IT safety and reliability issues of vehicular electronics against random technical failures in detail. However, analyses that also consider malicious human manipulations, this means, that treat vehicular IT security issues, are still very rare. The few available publications are restricted to vehicular niche applications such as immobilizers [Bac97, Ulk00], the upcoming digital tachographs [And98], or vehicular closure mechanisms [SKC00] that actually employ security technologies in a limited and isolated manner.
Marko Wolf
3. Brief Background in Security and Cryptography
Abstract
This chapter briefly provides necessary background knowledge in security and cryptography. It provides a brief introduction into symmetric-key and asymmetrickey cryptography, introduces several cryptographic primitives, and provides the basics in Trusted Computing and cryptanalysis. This chapter further gives brief descriptions of several cryptographic schemes that are important in the automotive context. It lastly gives some rough ideas for execution performance and required resources for cryptographic implementations in hardware and software. Parts of this chapter are based on published research in [AES+07, EGP+07, WWW07].
Marko Wolf

The Threats

Frontmatter
4. Security-Critical Vehicular Applications
Abstract
This chapter identifies various security-critical vehicular applications. This includes vehicular mechanisms and components, IT-based business models, legal applications as well as communication and safety applications that are current state-of-the-art, but also includes several future security-critical vehicular applications. Parts of this chapter are based on published research in [BEPW07, LPW06, WWW07].
Marko Wolf
5. Attackers and Attacks in the Automotive Domain
Abstract
This chapter identifies several current and future attacking scenarios and classifies corresponding attackers characteristic in the automotive domain. It further presents some feasible logical and physical attacks that could be conducted by the afore classified attackers. Parts of this chapter are based on published research in [BEWW07, PWW04b, WWW07].
Marko Wolf
6. Security Analysis and Characteristical Constraints in the Automotive Domain
Abstract
Based on the threat analysis in Chapter 5, this chapter describes how to identify the particular security objectives of the entities involved in typical automotive security-critical applications. It then describes how to deduce the corresponding security requirements to fulfill the before identified security objectives. It further indicates characteristical technical and non-technical constraints as well as characteristical advantages that have to be faced while establishing IT security in the automotive domain. Parts of this chapter are based on published research in [PW08, WWW07].
Marko Wolf

The Protection

Frontmatter
7. Vehicular Security Technologies
Abstract
This chapter provides an overview about general vehicular security technologies such as physical security measures, vehicular security modules, and vehicular security architectures. These technologies serve as basis to implement identified security requirements using the security mechanisms described in the next chapter. Parts of this chapter are based on published research in [BEPW07, BEWW07, HSW06, SSW06].
Marko Wolf
8. Vehicular Security Mechanisms
Abstract
This chapter provides an introduction into feasible security mechanisms applicable in the automotive domain to fulfill the identified security objectives and necessary security requirements. Parts of this chapter are based on published research in [AES+07, HPWW05, HSW06, PWW04a, PWW04c, PWW05, SSS+06, SSW06, WWW07].
Marko Wolf
9. Organizational Security
Abstract
This chapter provides an introduction into organizational security aspects in the automotive domain. It covers general challenges for organizational security in vehicular engineering and some specific organizational security aspects during the typical lifecycle of a vehicle or a vehicular component.
Marko Wolf
Backmatter
Metadata
Title
Security Engineering for Vehicular IT Systems
Author
Marko Wolf
Copyright Year
2009
Publisher
Vieweg+Teubner
Electronic ISBN
978-3-8348-9581-3
Print ISBN
978-3-8348-0795-3
DOI
https://doi.org/10.1007/978-3-8348-9581-3

Premium Partner