Skip to main content
Top
Published in: Design Automation for Embedded Systems 3/2018

02-06-2018

TEE based session key establishment protocol for secure infotainment systems

Authors: Sungbum Lee, Jong-Hyouk Lee

Published in: Design Automation for Embedded Systems | Issue 3/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Most vehicles are now produced with infotainment features. However, as reported in various security conferences, security vulnerabilities associated with an infotainment system can cause serious security issues, e.g., an attacker can control in-vehicle systems through the infotainment system. To address such security issues, in this paper, we propose a session key establishment protocol using Elliptic Curve Cryptography. The proposed protocol enables secure authentication and key distribution between a user device and a telematics control unit. We also shows how a trusted execution environment is used for the proposed protocol. We present detailed protocol operations with conducted security analysis results.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Elgaml N, Khattab A, Mourad H-A (2017) Towards low-delay and high-throughput cognitive radio vehicular networks. ICT Express 3(4):183–187CrossRef Elgaml N, Khattab A, Mourad H-A (2017) Towards low-delay and high-throughput cognitive radio vehicular networks. ICT Express 3(4):183–187CrossRef
2.
go back to reference Gragnani GL, Bergamaschi S, Montecucco C (2017) Algorithm for an indoor automatic vehicular system based on active RFIDs. ICT Express 3(4):188–192CrossRef Gragnani GL, Bergamaschi S, Montecucco C (2017) Algorithm for an indoor automatic vehicular system based on active RFIDs. ICT Express 3(4):188–192CrossRef
3.
go back to reference Nguyen TDT, Le T-V, Pham H-A (2017) Novel storecarryforward scheme for message dissemination in vehicular ad-hoc networks. ICT Express 3(4):193–198CrossRef Nguyen TDT, Le T-V, Pham H-A (2017) Novel storecarryforward scheme for message dissemination in vehicular ad-hoc networks. ICT Express 3(4):193–198CrossRef
4.
go back to reference Ansari S, Boutaleb T, Sinanovic S, Gamio C, Krikidis I (2017) MHAV: multitier heterogeneous adaptive vehicular network with LTE and DSRC. ICT Express 3(4):199–203CrossRef Ansari S, Boutaleb T, Sinanovic S, Gamio C, Krikidis I (2017) MHAV: multitier heterogeneous adaptive vehicular network with LTE and DSRC. ICT Express 3(4):199–203CrossRef
5.
go back to reference Nakamura Y, Harada K, Nishi H (2018) A privacy-preserving sharing method of electricity usage using self-organizing map. ICT Express 4(1):24–29CrossRef Nakamura Y, Harada K, Nishi H (2018) A privacy-preserving sharing method of electricity usage using self-organizing map. ICT Express 4(1):24–29CrossRef
6.
go back to reference Mashima D, Serikova A, Cheng Y, Chen B (2018) Towards quantitative evaluation of privacy protection schemes for electricity usage data sharing. ICT Express 4(1):35–41CrossRef Mashima D, Serikova A, Cheng Y, Chen B (2018) Towards quantitative evaluation of privacy protection schemes for electricity usage data sharing. ICT Express 4(1):35–41CrossRef
7.
go back to reference Ilavendhan A, Saruladha K (2018) Comparative study of game theoretic approaches to mitigate network layer attacks in VANETs. ICT Express 4(1):46–50CrossRef Ilavendhan A, Saruladha K (2018) Comparative study of game theoretic approaches to mitigate network layer attacks in VANETs. ICT Express 4(1):46–50CrossRef
8.
go back to reference Miller C et al (August 2015) Remote exploitation of an unaltered passenger vehicle. Black Hat USA Miller C et al (August 2015) Remote exploitation of an unaltered passenger vehicle. Black Hat USA
9.
go back to reference Hexa Research (2017) Automotive infotainment market size and forecast, by vehicle (passenger cars, commercial vehicle), by operating system (Linux, QNX, Microsoft) and trend analysis, 2014–2024. Hexa Research, USA Hexa Research (2017) Automotive infotainment market size and forecast, by vehicle (passenger cars, commercial vehicle), by operating system (Linux, QNX, Microsoft) and trend analysis, 2014–2024. Hexa Research, USA
11.
go back to reference Klecha M et al (April 2007) System architecture for a modular and distributed solution for next generation car infotainment systems. In: International conference on consumer electronics, 2007. ICCE 2007. Digest of technical papers. IEEE Klecha M et al (April 2007) System architecture for a modular and distributed solution for next generation car infotainment systems. In: International conference on consumer electronics, 2007. ICCE 2007. Digest of technical papers. IEEE
12.
go back to reference Liu Q et al (2003) Digital rights management for content distribution. In: Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003, vol 21, pp 49–58 Liu Q et al (2003) Digital rights management for content distribution. In: Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003, vol 21, pp 49–58
13.
go back to reference Sabt M et al (December 2015) Trusted execution environment: what it is, and what it is not. Trustcom/BigDataSE/ISPA, 2015 IEEE Sabt M et al (December 2015) Trusted execution environment: what it is, and what it is not. Trustcom/BigDataSE/ISPA, 2015 IEEE
14.
go back to reference Maene P et al (2018) Hardware-based trusted computing architectures for isolation and attestation. IEEE Trans Comput 67(3):361–374MathSciNetCrossRefMATH Maene P et al (2018) Hardware-based trusted computing architectures for isolation and attestation. IEEE Trans Comput 67(3):361–374MathSciNetCrossRefMATH
15.
go back to reference GlobalPlatform (January 2017) Globalplatform device technology TEE sockets API specification version 1.0.1. GPD SPE 100, GlobalPlatform GlobalPlatform (January 2017) Globalplatform device technology TEE sockets API specification version 1.0.1. GPD SPE 100, GlobalPlatform
16.
17.
go back to reference Liu R et al (June 2017) PROTC: PROTeCting Drone’s peripherals through ARM TrustZone. In: Proceedings of the 3rd workshop on micro aerial vehicle networks, systems, and applications. ACM, pp 1–6 Liu R et al (June 2017) PROTC: PROTeCting Drone’s peripherals through ARM TrustZone. In: Proceedings of the 3rd workshop on micro aerial vehicle networks, systems, and applications. ACM, pp 1–6
18.
go back to reference He D et al (2016) Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography. IET Commun 10(14):1795–1802CrossRef He D et al (2016) Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography. IET Commun 10(14):1795–1802CrossRef
19.
20.
go back to reference Lee J-H (2018) BIDaaS: blockchain based ID as a service. IEEE Access 6:2274–2278CrossRef Lee J-H (2018) BIDaaS: blockchain based ID as a service. IEEE Access 6:2274–2278CrossRef
Metadata
Title
TEE based session key establishment protocol for secure infotainment systems
Authors
Sungbum Lee
Jong-Hyouk Lee
Publication date
02-06-2018
Publisher
Springer US
Published in
Design Automation for Embedded Systems / Issue 3/2018
Print ISSN: 0929-5585
Electronic ISSN: 1572-8080
DOI
https://doi.org/10.1007/s10617-018-9212-5

Other articles of this Issue 3/2018

Design Automation for Embedded Systems 3/2018 Go to the issue

Premium Partner