Towards a distributed secure in-vehicle communication architecture for modern vehicles

被引:40
|
作者
Patsakis, Constantinos [1 ]
Dellios, Kleanthis [2 ]
Bouroche, Melanie [1 ]
机构
[1] Coll Green, Trinity Coll, Sch Comp Sci & Stat, Distributed Syst Grp, Dublin 2, Ireland
[2] Univ Piraeus, Dept Informat, Piraeus, Greece
关键词
Immobilizer; In-vehicle communication; Security; Authentication; ECU; ECM;
D O I
10.1016/j.cose.2013.11.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modem automotive vehicles are becoming a collection of interconnected embedded subsystems, where the mechanical parts are controlled by electronic ones and the vehicle is transformed into a mobile information system. However, the industry standards for in-vehicle communication are not following long-established computer security policies. This trend not only makes vehicles prone to thefts and automated attacks, but also endangers passengers safety. This paper analyzes current practices and standards of the automotive industry, highlighting several vulnerabilities that stress the need to change the way that in-vehicle communication is handled. To this end, we present a novel vehicle security architecture that supports two new features; users with different access rights and roles, and mutual authentication of ECUs. These features can enable a more distributed security architecture and prevent many attacks, or at least trigger adequate alarms to detect and mitigate them, or allow backtracking. (C) 2013 Elsevier Ltd. All rights reserved.
引用
收藏
页码:60 / 74
页数:15
相关论文
共 50 条
  • [21] On Using TLS to Secure In-Vehicle Networks
    Zelle, Daniel
    Krauss, Christoph
    Strauss, Hubert
    Schmidt, Karsten
    [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [22] Digital Watermarks for Secure In-Vehicle Networks
    Potnuru, Manikanta
    Maddala, Dhanush Venkata Subba Rao
    Potnuru, Koushik
    Krislmarah, Jaya Rama
    Koti, Chohan
    Krishna, A. V. Praveen
    [J]. 2024 4TH INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND SOCIAL NETWORKING, ICPCSN 2024, 2024, : 134 - 140
  • [23] In-Vehicle Hybrid Electrical Architecture
    Laifenfeld, Moshe
    Philosof, Tal
    [J]. 2014 IEEE 28TH CONVENTION OF ELECTRICAL & ELECTRONICS ENGINEERS IN ISRAEL (IEEEI), 2014,
  • [24] Automotive Electrical and Electronic Architecture Security via Distributed In-Vehicle Traffic Monitoring
    Waszecki, Peter
    Mundhenk, Philipp
    Steinhorst, Sebastian
    Lukasiewycz, Martin
    Karri, Ramesh
    Chakraborty, Samarjit
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2017, 36 (11) : 1790 - 1803
  • [25] In-Vehicle Power Line Communication
    Pittolo, Alberto
    de Piante, Marco
    Versolatto, Fabio
    Tonello, Andrea M.
    [J]. IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2016, 11 (02): : 43 - 51
  • [26] Research on Secure Communication on In-Vehicle Ethernet Based on Post-Quantum Algorithm NTRUEncrypt
    Zhu, Yuan
    Liu, Yipeng
    Wu, Mingzhi
    Li, Jinzhao
    Liu, Shiyang
    Zhao, Jianning
    [J]. ELECTRONICS, 2022, 11 (06)
  • [27] Finger Printing of Engine Control Units by Using Frequency Response for Secure In-Vehicle Communication
    Hafeez, Azeem
    Tayyab, Muhammad
    Zolo, Carmen
    Awad, Selim
    [J]. 2018 14TH INTERNATIONAL COMPUTER ENGINEERING CONFERENCE (ICENCO), 2018, : 79 - 83
  • [28] Realization of communication between in-vehicle information and Internet based on in-vehicle gateway
    Qu, Liangdong
    Liu, Yanheng
    Wei, Da
    Gui, Wenbo
    [J]. Yi Qi Yi Biao Xue Bao/Chinese Journal of Scientific Instrument, 2008, 29 (11): : 2330 - 2334
  • [29] An Attribute-Isolated Secure Communication Architecture for Intelligent Connected Vehicles
    Han, Mu
    Wan, Ailan
    Zhang, Fengwei
    Ma, Shidian
    [J]. IEEE TRANSACTIONS ON INTELLIGENT VEHICLES, 2020, 5 (04): : 545 - 555
  • [30] Secure in-vehicle systems against Trojan attacks
    Yoshikawa, Masaya
    Sugioka, Kyota
    Nozaki, Yusuke
    Asahi, Kensaku
    [J]. 2015 IEEE/ACIS 14TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS), 2015, : 29 - 33