This content is not included in
your SAE MOBILUS subscription, or you are not logged in.
Security Needs for the Future Intelligent Vehicles
Technical Paper
2006-01-1426
ISSN: 0148-7191, e-ISSN: 2688-3627
Annotation ability available
Sector:
Language:
English
Abstract
The need for active safety, highway guidance, telematics, traffic management, cooperative driving, driver convenience and automatic toll payment will require future intelligent vehicles to communicate with other vehicles as well as with the road-side infrastructure. However, inter-vehicle and vehicle to roadside infrastructure communications will impose some security threats against vehicles' safety and their proprietary information. To avoid collisions, a vehicle should receive messages only from other authentic vehicles. The internal buses and electronics of a vehicle must also be protected from intruders and other people with malicious intents. Otherwise, a person can inject incorrect messages into an authentic vehicle's internal communication system and then make the vehicle transmit wrong information to the other vehicles within the vicinity. Such an event may have catastrophic consequences. Thus, a detailed study of the security needs of the future vehicles is very important.
In this paper, we will present the results of a comprehensive study related to various types of security threats against a vehicle's electronic communication system. The paper will identify various types of security attacks against a vehicle's electronic system. The paper will also address various issues that are related to the design of secure microcontrollers, secure electronic modules, secure communications through the vehicle's internal buses and privacy-protected secure peer-to- peer communications.
Recommended Content
Topic
Citation
Jenkins, M. and Mahmud, S., "Security Needs for the Future Intelligent Vehicles," SAE Technical Paper 2006-01-1426, 2006, https://doi.org/10.4271/2006-01-1426.Also In
SAE 2006 Transactions Journal of Passenger Cars: Electronic and Electrical Systems
Number: V115-7; Published: 2007-03-30
Number: V115-7; Published: 2007-03-30
References
- Wolf M. Weimerskirch A. Paar C. “Security in Automotive Bus Systems” 2004 http://www.escrypt.com/escrypt_engl/download/Siche re_Bussysteme_escar04.pdf
- Stallings W. Cryptography and Network Security 3rd NJ Pearson Education 2003
- Spillman R. J. Classical and Contemporary Cryptology 1st Upper Saddle River, NJ Pearson Prentice Hall 2005
- Schneier B. Applied Cryptography: Protocols, Algorithms, and Source Code In C 2nd New York John Wiley & Sons, Inc. 1996
- The Crash Avoidance Metrics Partnership Vehicle Safety Communications Consortium “Vehicle Safety Communications Project Task 3 Final Report Identify Intelligent Vehicle Safety Applications Enabled by DSRC” Tech. Rep. DOT HS 809 859
- Mahmud S. M. “Bluetooth Technology” 2005 July 12 2005 http://ece.eng.wayne.edu/∼smahmud
- Hubaux J. Capkun S. Luo J. “The Security and Privacy of Smart Vehicles” IEEE SECURITY & PRIVACY http://lcawww.epfl.ch/Publications/luo/HubauxCL04.pdf
- Raya M. Hubaux J. “Security Aspects of Inter- Vehicle Communications” 5th Swiss Transport Research Conference Monte Verità / Ascona March 2005 http://infoscience.epfl.ch/getfile.py?docid=5377&nam e=RayaH05A&format=pdf&version=1
- Luo J. Hubaux J. “A Survey of Inter-Vehicle Communication” EPFL, Tech. Rep.
- LIN Consortium “ LIN Specification Package ” Munich, Germany 2003
- Etschberger K. Controller Area Network Basics, Protocols, Chips, and Applications 1st Weingarten, Germany IXXAT Press 2001
- FlexRay Consortium “ FlexRay Communications System Protocol Specification ” 2005
- MOST Corporation “ MOST Specification ” Karlsruhe, Germany 2005
- Denton T. Automobile Electrical and Electronic Systems Third: SAE International 2004
- Shaked Y. Wool A. “Cracking the Bluetooth PIN” International Conference On Mobile Systems, Applications And Services 2005 Seattle, Washington ACM Press http://portal.acm.org/citation.cfm?id=1067170.106717 6
- Fluhrer S. Mantin I. Shamir A. “Weaknesses in the Key Scheduling Algorithm of RC4” Eight Annual Workshop on Selected Areas in Cryptography August 2001 http://www.drizzle.com/∼aboba/IEEE/rc4_ksaproc.pdf
- Stubblefirel A. Ioannidis J. Rubin A. D. “Using the Fluhrer, Mantin, and Shamir Attack to Break WEP” AT&T Labs, Tech. Rep. TD-4ZCPZZ 2001
- Hoglund G. McGraw G. Exploiting Software 1st Boston Addison Wesley 2004
- Kaspersky K. Hacker Disassembling Uncovered 1st A-List 2003
- Koziol J. Litchfield D. Aitel D. Anley C. Eren S. Mehta N. Hassell R. The Shellcoder's Handbook, Discovering and Exploiting Security Holes Wiley 2004
- Kuhn M. G. “Cipher Instruction Search Attack on the Bus-Encryption Security Microcontroller DS5002FP” IEEE TRANSACTIONS ON COMPUTERS 1998 http://www3.informatik.uni- erlangen.de/Publications/Articles/kuhn_ToC.pdf
- Kocher P. C. “Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems” Advances in Cryptology - CRYPTO'96 1996 http://www.cryptography.com/resources/whitepapers/TimingAttacks.pdf
- Kocher P. Jaffe J. Jun B. “Differential Power Analysis” Advances in Cryptology - Crypto 99 Proceedings 1999 Springer-Verlag
- Kuhn M. G. Anderson R. “Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations” Proc. Int. Wkshp. on Information Hiding 1998 http://www.cl.cam.ac.uk/∼mgk25/ih98-tempest.pdf
- Boneh D. DeMillo R. Lipton R. J. “On the Importance of Eliminating Errors in Cryptographic Computations” Journal of Cryptology 2001 http://www.springerlink.com/(bqots0mra0zffjeos0sq11 n4)/app/home/contribution.asp?referrer=parent&back to=issue,3,5;journal,20,37;linkingpublicationresults,1: 100359,1
- Zarki El M. Mehrotra S. Tsudik G. Venkatasubramanian N. “Security Issues in a Future Vehicular Network” European Wireless http://www.ics.uci.edu/∼dsm/papers/sec001.pdf