This content is not included in
your SAE MOBILUS subscription, or you are not logged in.
Selftrust - A Practical Approach for Trust Establishment
Technical Paper
2020-01-0720
ISSN: 0148-7191, e-ISSN: 2688-3627
Annotation ability available
Sector:
Language:
English
Abstract
In recent years, with increase in external connectivity (V2X, telematics, mobile projection, BYOD) the automobile is becoming a target of cyberattacks and intrusions. Any such intrusion reduces customer trust in connected cars and negatively impacts brand image (like the recent Jeep Cherokee hack).
To protect against intrusion, several mechanisms are available. These range from a simple secure CAN to a specialized symbiote defense software. A few systems (e.g. V2X) implement detection of an intrusion (defined as a misbehaving entity). However, most of the mechanisms require a system-wide change which adds to the cost and negatively impacts the performance.
In this paper, we are proposing a practical and scalable approach to intrusion detection. Some benefits of our approach include use of existing security mechanisms such as TrustZone® and watermarking with little or no impact on cost and performance. In addition, our approach is scalable and does not require any system-wide changes.
To detect intrusions, we propose a combination of TrustZone® secure space approach along with a mechanism of static and dynamic watermarks. The current scope of research is restricted to architectures which provide a secure space to execute software. The research is an enhancement over the current TrustZone® implementation for device control post intrusion.
In conclusion, the proposed approach is a simple and scalable mechanism for detection and control of intrusion.
Authors
Topic
Citation
Abhyankar, R. and A, S., "Selftrust - A Practical Approach for Trust Establishment," SAE Technical Paper 2020-01-0720, 2020, https://doi.org/10.4271/2020-01-0720.Also In
References
- Kiening , A. et al.
- Beningo , J.
- https://www.embedded.com/electronics-blogs/say-what-/4460376/Executing-secure-functions-from-non-secure-code-using-Arm-TrustZone
- https://www.arm.com/products/security-on-arm/trustzone
- Zhang , J. Trust Management for Vanets: Challenges, Desired Properties and Future Directions Int. J. Distributed System Technologies Jan. 2012
- Ma , S. , Wolfson , O. , and Lin , J. A Survey on Trust Management for Intelligent Transportation System Proceedings of the 4th ACM SIGSPATIAL International Workshop on Computational Transportation Science, CTS ‘11 New York, NY 2011
- TrustZone®
- Zou , Q. , Chan , W. , Gui , K. , Chen , Q. et al. The Study of Secure CAN Communication for Automotive Applications SAE Technical Paper 2017-01-1658 2017 https://doi.org/10.4271/2017-01-1658