This content is not included in your SAE MOBILUS subscription, or you are not logged in.
Securing the Secret Key
ISSN: 0148-7191, e-ISSN: 2688-3627
Published January 16, 2019 by SAE International in United States
This content contains downloadable datasetsAnnotation ability available
Recent advances in automotive technologies have paved way to a new era of connectivity. Advanced Driver Assistance Systems are getting deployed in automobiles; many companies are developing driverless cars; connected cars are no more a work of mere research.  Vehicle manufacturers are developing ways to interface mobile devices with vehicles. However, all these advances in technology has introduced security risks. Unlike traditional computing systems, the security risk of an automobile can be fatal and can result in loss of lives . The in-vehicle network of an automobile was originally designed to operate in a closed environment and hence network security was not considered during its design . Several studies have already shown that an in-vehicle network can be easily compromised and an intruder can take full control of the vehicle. Researchers are working on various ways to solve this problem. Securing the in-vehicle communication by encrypting the messages is one such way. This depends on the strength of the secret key used to encrypt the messages. In an automobile, these secret keys will be inside the automobile itself. If the in-vehicle network is compromised, then the secret keys will get exposed to intruders. There should be mechanisms to secure the secret keys. In this paper, we propose a way of securing the secret key for automotive network.
CitationSS, N., "Securing the Secret Key," SAE Technical Paper 2019-01-0097, 2019, https://doi.org/10.4271/2019-01-0097.
Data Sets - Support Documents
|Unnamed Dataset 1|
- Author , A.B. and Author , C.D. Title of the article The Journal 110 120 2000
- Gao P. , Kaas H.-W. , Mohr D. , and Wee D. Disruptive Trends that will Transform the Auto Industry McKinsey&Company 2016
- Kam , R. https://iapp.org 2016
- http://harborresearch.com 2016
- Charette , R.N. 2009
- Navet , N. and Simonot-Lion , F. 2013
- Naone , E. 2011
- Rao , K.P. and Muthukrishnan , B. 2014
- http://www.gao.gov/products/GAO-16-350 2011
- Checkoway , S. , McCoy , D. , Kantor , B. , Anderson , D. et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces Wagner , D. Proceedings of USENIX Security 2011 USENIX 2011
- Checkoway , S. , McCoy , D. , Kantor , B. , Anderson , D. et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces USENIX Security 2011
- Carsten , P. , Andel , T.R. , Yampolskiy , M. , and McDonald , J.T. In-Vehicle Networks: Attacks, Vulnerabilities, and Proposed Solutions Proceedings of the 10th Annual Cyber and Information Security Research Conference 2015
- Koscher , K. , Czeskis , A. , Roesner , F. , Patel , S. et al. Experimental Security Analysis of a Modern Automobile IEEE Symposium on Security and Privacy 2010