Analysis of the DoIP Protocol for Security Vulnerabilities

被引:2
|
作者
Wachter, Patrick [1 ]
Kleber, Stephan [1 ]
机构
[1] Mercedes Benz Tech Innovat GmbH, Ulm, Germany
关键词
DoIP; security assessment; formal analysis; network protocol;
D O I
10.1145/3568160.3570229
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
DoIP, which is defined in ISO 13400, is a transport protocol stack for diagnostic data. Diagnostic data is a potential attack vector at vehicles, so secure transmission must be guaranteed to protect sensitive data and the vehicle. Previous work analyzed a draft version and earlier versions of the DoIP protocol without Transport Layer Security (TLS). No formal analysis exists for the DoIP protocol. The goal of this work is to investigate the DoIP protocol for design flaws that may lead to security vulnerabilities and possible attacks to exploit them. For this purpose, we deductively analyze the DoIP protocol in a first step and subsequently confirm our conclusions formally. For the formal analysis, we use the prover Tamarin. Based on the results, we propose countermeasures to improve the DoIP's security. We show that the DoIP protocol cannot be considered secure mainly because the security mechanisms TLS and client authentication in the DoIP protocol are not mandatory. We propose measures to mitigate the vulnerabilities that we confirm to remain after activating TLS. These require only a minor redesign of the protocol.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Security issues and vulnerabilities of the SNMP protocol
    Chatzimisios, P
    [J]. 2004 1st International Conference on Electrical and Electronics Engineering (ICEEE), 2004, : 74 - 77
  • [2] An Overview of the EMV Protocol and Its Security Vulnerabilities
    El Madhoun, Nour
    Bertin, Emmanuel
    Pujolle, Guy
    [J]. PROCEEDINGS OF THE 2018 FOURTH INTERNATIONAL CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV), 2018,
  • [3] Protocol fuzzing to find security vulnerabilities of RabbitMQ
    Kwon, Soonhong
    Son, Sang-Jin
    Choi, Yangseo
    Lee, Jong-Hyouk
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (23):
  • [4] SURVEY OF SECURITY VULNERABILITIES IN SESSION INITIATION PROTOCOL
    Geneiatakis, Dimitris
    Dagiuklas, Tasos
    Kambourakis, Georgios
    Lambrinoudakis, Costas
    Gritzalis, Stefanos
    Ehlert, Sven
    Sisalem, Dorgham
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2006, 8 (03): : 68 - 81
  • [5] Analysis of Security Vulnerabilities and Countermeasures
    Son, Hyun-Min
    Joo, Nak-Keun
    Choi, Hyun-Taek
    Lee, Hyun-Cheol
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (02): : 200 - 206
  • [6] An analysis of Bluetooth security vulnerabilities
    Hager, CT
    Midkiff, SF
    [J]. WCNC 2003: IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE RECORD, VOLS 1-3, 2003, : 1825 - 1831
  • [7] Vulnerabilities of RFID Security Protocol Based on Chaotic Maps
    Akgun, Mete
    Caglayan, M. Ufuk
    [J]. 2014 IEEE 22ND INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2014, : 648 - 653
  • [8] Study of security and effectiveness of DoIP in vehicle networks
    Ajin, V. W.
    Kumar, Lekshmy D.
    Joy, James
    [J]. PROCEEDINGS OF IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2016), 2016,
  • [9] On the Detection and Analysis of Software Security Vulnerabilities
    Wijesiriwardana, Chaman
    Wimalaratne, Prasad
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON IOT AND ITS APPLICATIONS (IEEE ICIOT), 2017,
  • [10] Forecasting IT security vulnerabilities - An empirical analysis
    Yasasin, Emrah
    Prester, Julian
    Wagner, Gerit
    Schryen, Guido
    [J]. COMPUTERS & SECURITY, 2020, 88