This content is not included in your SAE MOBILUS subscription, or you are not logged in.
Selftrust - A Practical Approach for Trust Establishment
ISSN: 0148-7191, e-ISSN: 2688-3627
Published April 14, 2020 by SAE International in United States
Annotation ability available
In recent years, with increase in external connectivity (V2X, telematics, mobile projection, BYOD) the automobile is becoming a target of cyberattacks and intrusions. Any such intrusion reduces customer trust in connected cars and negatively impacts brand image (like the recent Jeep Cherokee hack).
To protect against intrusion, several mechanisms are available. These range from a simple secure CAN to a specialized symbiote defense software. A few systems (e.g. V2X) implement detection of an intrusion (defined as a misbehaving entity). However, most of the mechanisms require a system-wide change which adds to the cost and negatively impacts the performance.
In this paper, we are proposing a practical and scalable approach to intrusion detection. Some benefits of our approach include use of existing security mechanisms such as TrustZone® and watermarking with little or no impact on cost and performance. In addition, our approach is scalable and does not require any system-wide changes.
To detect intrusions, we propose a combination of TrustZone® secure space approach along with a mechanism of static and dynamic watermarks. The current scope of research is restricted to architectures which provide a secure space to execute software. The research is an enhancement over the current TrustZone® implementation for device control post intrusion.
In conclusion, the proposed approach is a simple and scalable mechanism for detection and control of intrusion.
CitationAbhyankar, R. and A, S., "Selftrust - A Practical Approach for Trust Establishment," SAE Technical Paper 2020-01-0720, 2020, https://doi.org/10.4271/2020-01-0720.
- Kiening, A. et al. , “Trust Assurance Levels of Cybercars in V2X Communication.”
- Beningo, J. , “Executing Secure Functions from Non-Secure Code Using Arm TrustZone.”
- “Security on ARM TRUSTZONE,” https://www.arm.com/products/security-on-arm/trustzone.
- Zhang, J. , “Trust Management for Vanets: Challenges, Desired Properties and Future Directions,” Int. J. Distributed System Technologies, Jan. 2012.
- Ma, S., Wolfson, O., and Lin, J. . “A Survey on Trust Management for Intelligent Transportation System,” in Proceedings of the 4th ACM SIGSPATIAL International Workshop on Computational Transportation Science, CTS ‘11, 18-23, New York, NY, 2011. ACM.
- TrustZone® , “TEE and Trusted Video Path Implementation Considerations.”
- Zou, Q., Chan, W., Gui, K., Chen, Q. et al. , “The Study of Secure CAN Communication for Automotive Applications,” SAE Technical Paper 2017-01-1658, 2017. https://doi.org/10.4271/2017-01-1658.
- Real-Time Environment (RTE) Technical White Paper, Pub. No. 204-360-03-A4-CEF, Compro Computer Services, Inc., Melbourne, Florida.