This content is not included in your SAE MOBILUS subscription, or you are not logged in.

Towards a Blockchain Framework for Autonomous Vehicle System Integrity

Journal Article
11-04-01-0002
ISSN: 2572-1046, e-ISSN: 2572-1054
Published May 05, 2021 by SAE International in United States
Towards a Blockchain Framework for Autonomous Vehicle System Integrity
Sector:
Citation: Chan, K., Pasco, M., and Cheng, B., "Towards a Blockchain Framework for Autonomous Vehicle System Integrity," SAE Int. J. Transp. Cyber. & Privacy 4(1):19-38, 2021, https://doi.org/10.4271/11-04-01-0002.
Language: English

References

  1. Daimi , K. , Saed , M. , Bone , S. , and Robb , J. Securing Vehicle’s Electronic Control Units ICNS 2016 Herndon, VA 2016
  2. Avatefipour , O. and Malik , H. 2018
  3. Checkoway , S. , McCoy , D. , Kantor , B. , Anderson , D. et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces USENIX Security Symposium San Francisco, CA 4 447 462 2011
  4. Greenberg , A. Hackers Remotely Kill a Jeep on the Highway—With Me in It Wired 7 2015 21
  5. Miller , C. and Valasek , C. 2015
  6. Parkinson , S. , Ward , P. , Wilson , K. , and Miller , J. Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges IEEE Transactions on Intelligent Transportation Systems 18 11 2017 2898 2915
  7. McNair , B.E. 1994
  8. Rowland , C.H. 2002
  9. Schmittner , C. and Macher , G. Automotive Cybersecurity Standards—Relation and Overview Computer Safety, Reliability, and Security (SAFECOMP 2019) Lecture Notes in Computer Science Romanovsky , A. , Troubitsyna , E. , Gashi , I. , Schoitsch , E. et al. 11699 Cham Springer 2019
  10. Cheng , B.H.C. 2021
  11. Kuppusamy , T.K. , DeLong , L.A. , and Cappos , J. Uptane: Security and Customizability of Software Updates for Vehicles IEEE Vehicular Technology Magazine 13 2018 66 73
  12. Füst , S. , Mössinger , J. , Bunzel , S. , Weber , T. et al. AUTOSAR—A Worldwide Standard Is on the Road 14th International VDI Congress Electronic Systems for Vehicles Baden-Baden 62 5 2009
  13. Baza , M. , Nabil , M. , Lasla , N. , Fidan , K. et al. Blockchain-Based Firmware Update Scheme Tailored for Autonomous Vehicles 2019 IEEE Wireless Communications and Networking Conference (WCNC) Marrakech, Morocco 1 7 2019
  14. Falco , G. and Siegel , J.E. 2020
  15. Deshpande , V. , George , L. , and Badis , H. SaFe: A Blockchain and Secure Element Based Framework for Safeguarding Smart Vehicles 2019 12th IFIP Wireless and Mobile Networking Conference (WMNC) Paris, France 181 188 2019
  16. Alam , M. , Iqbal , S. , Zulkernine , M. , and Liem , C. Securing Vehicle ECU Communications and Stored Data ICC 2019—2019 IEEE International Conference on Communications (ICC) Shanghai, China 1 6 2019
  17. Salem , M. , Mohammed , M. , and Rodan , A. Security Approach for In-Vehicle Networking Using Blockchain Technology Advances in Internet, Data and Web Technologies Barolli , L. , Xhafa , F. , Khan , Z.A. , and Odhabi , H. Cham Springer International Publishing 2019 504 515
  18. Kent , D. , Cheng , B.H.C. , and Siegel , J. Assuring Vehicle Update Integrity Using Asymmetric Public Key Infrastructure (PKI) and Public Key Cryptography (PKC) SAE Int. J. Transp. Cyber. & Privacy 2 2 2019 141 158 https://doi.org/10.4271/11-02-02-0013
  19. Banerjee , M. , Lee , J. , Chen , Q. , and Choo , K.-K.R. Blockchain-Based Security Layer for Identification and Isolation of Malicious Things in IoT: A Conceptual Design 2018 27th International Conference on Computer Communication and Networks (ICCCN) Hangzhou, China 1 6 2018
  20. ISO Standard 1993
  21. Nilsson , D.K. , Phung , P.H. , and Larson , U. Vehicle ECU Classification Based on Safety-Security Characteristics IET Road Transport Information and Control—RTIC 2008 and ITS United Kingdom Members’ Conference Manchester 1 7 2008
  22. Mahmud , S.M. , Shanker , S. , and Hossain , I. Secure Software Upload in an Intelligent Vehicle via Wireless Communication Links IEEE Proceedings. Intelligent Vehicles Symposium, 2005 Las Vegas, NV 588 593 2005
  23. Mansour , K. , Farag , W. , and ElHelw , M. AiroDiag: A Sophisticated Tool That Diagnoses and Updates Vehicles Software over Air 2012 IEEE International Electric Vehicle Conference Greenville, SC 1 7 2012
  24. Steger , M. , Karner , M. , Hillebrand , J. , Rom , W. et al. Generic Framework Enabling Secure and Efficient Automotive Wireless SW Updates 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA) Berlin, Germany 1 8 2016
  25. Halder , S. , Ghosal , A. , and Conti , M. Secure Over-the-Air Software Updates in Connected Vehicles: A Survey Computer Networks 178 2020 107343
  26. Carsten , P. , Andel , T.R. , Yampolskiy , M. , and McDonald , J.T. In-Vehicle Networks: Attacks, Vulnerabilities, and Proposed Solutions Proceedings of the 10th Annual Cyber and Information Security Research Conference, CISR ‘15 New York 2015
  27. Wang , Q. 2017
  28. Sanwald , S. , Kaneti , L. , Stottinger , M. , and Bohner , M. Secure Boot Revisited: Challenges for Secure Implementations in the Automotive Domain SAE Int. J. Transp. Cyber. & Privacy 2 2 2020 69 81 https://doi.org/10.4271/11-02-02-0008
  29. Ueda , H. , Kurachi , R. , Takada , H. , Mizutani , T. et al. Security Authentication System for In-Vehicle Network SEI Technical Review 81 2015 5 9
  30. Wang , Q. and Sawhney , S. VeCure: A Practical Security Framework to Protect the Can Bus of Vehicles 2014 International Conference on the Internet of Things (IOT) Cambridge, MA 13 18 2014
  31. Farag , W.A. CANTrack: Enhancing Automotive CAN Bus Security Using Intuitive Encryption Algorithms 2017 7th International Conference on Modeling, Simulation, and Applied Optimization (ICMSAO) Marrakesh, Morocco 1 5 2017
  32. Koushanfar , F. , Sadeghi , A.-R. , and Seudie , H. EDA for Secure and Dependable Cybercars: Challenges and Opportunities Proceedings of the 49th Annual Design Automation Conference San Francisco, CA 220 228 2012
  33. Nakamoto , S. 2008 https://bitcoin.org/bitcoin.pdf https://git.dhimmel.com/bitcoin-whitepaper/ 2020
  34. Aggarwal , D. , Brennen , G. , Lee , T. , Santha , M. et al. Quantum Attacks on Bit-Coin, and How to Protect against Them Ledger 3 68 90 2018
  35. Baliga , A. Understanding Blockchain Consensus Models Persistent 2017 4 2017 1 14
  36. He , X. , Alqahtani , S. , Gamble , R. , and Papa , M. Securing Over-The-Air IoT Firmware Updates Using Blockchain Proceedings of the International Conference on Omni-Layer Intelligent Systems, COINS2019 New York 164 171 2019
  37. Yohan , A. , Lo , N.-W. , and Achawapong , S. Blockchain-Based Firmware Update Framework for Internet-of-Things Environment Proceedings of the International Conference on Information and Knowledge Engineering (IKE) Las Vegas, NV 151 155 2018
  38. Bjelica , M.Z. and Lukac , Z. Central Vehicle Computer Design: Software Taking Over IEEE Consumer Electronics Magazine 8 2019 84 90
  39. Cheng , B.H.C. 2015
  40. Gai , P. and Violante , M. Automotive Embedded Software Architecture in the Multi-core Age 2016 21th IEEE European Test Symposium (ETS) Amsterdam, the Netherlands 1 8 2016
  41. Goebel , A. , Mader , R. , and Tripon , O. Performance and Freedom from Interference—A Contradiction in Embedded Automotive Multi-core Applications? ARCS2017; 30th International Conference on Architecture of Computing Systems Vienna, Austria 1 9 2017
  42. Brooke , L. 2019 https://www.sae.org/news/2019/12/aptiv-centralizing-av-computing 2020
  43. Van den Herrewegen , J. and Garcia , F.D. Beneath the Bonnet: A Breakdown of Diagnostic Security Computer Security Lopez , J. , Zhou , J. , and Soriano , M. Cham Springer International Publishing 2018 305 324
  44. Nakamoto , Y. , Yabuuchi , K. , and Osaki , T. Virtual Software Execution Environments for Distributed Embedded Control Systems 2011 14th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops Newport Beach, CA 288 296 2011
  45. Lind , K. and Heldal , R. On the Relationship between Functional Size and Software Code Size Proceedings of the 2010 ICSE Workshop on Emerging Trends in Software Metrics Cape Town, South Africa 47 52 2010
  46. Brickell , E.F. , Hall , C.D. , Cihula , J.F. , and Uhlig , R. 2011
  47. Sun , B. , Chen , X. , Xu , C. , and Joseph , H. 2015
  48. McCorkendale , B. and Ferrie , P. 2011
  49. Sivakumar , P. , Sandhya Devi , R.S. , Neeraja Lakshmi , A. , VinothKumar , B. et al. Automotive Grade Linux Software Architecture for Automotive Infotainment System 2020 International Conference on Inventive Computation Technologies (ICICT) Coimbatore, India 391 395 2020
  50. Automotive Grade Linux 2019 https://www.automotivelinux.org/
  51. Gerg , I. An Overview and Example of the Buffer-Overflow Exploit IAnewsletter 7 4 2005 16 21
  52. Kaspersky ICS CERT 2019
  53. Ruff , M. Evolution of Local Interconnect Network (LIN) Solutions 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. N0.03CH37484) Orlando, FL 5 3382 3389 2003
  54. Lin , I.-C. , and Liao , T.-C. A Survey of Blockchain Security Issues and Challenges IJ Network Security 19 5 2017 653 659
  55. Dougherty , C. , Sayre , K. , Seacord , R. , Svoboda , D. et al. 2009
  56. Martin , H. , Ma , Z. , Schmittner , C. , Winkler , B. et al. Combined Automotive Safety and Security Pattern Engineering Approach Reliability Engineering and System Safety 198 2020 106773
  57. Cheng , B.H.C. , Doherty , B. , Polanco , N. , and Pasco , M. Security Patterns for Automotive Systems 22nd ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion, MODELS Companion 2019 Munich, Germany 2019 Burgueño , L. , Pretschner , A. , Voss , S. , Chaudron , M. et al. 54 63
  58. Cheng , B.H.C. , Doherty , B. , Polanco , N. , and Pasco , M. Security Patterns for Connected and Automated Automotive Systems† Journal of Automotive Software Engineering 1 2020 51 77

Cited By