How to Secure the Connected Car
Doktorsavhandling, 2009

In recent years, information technology has entered the automobile domain. Most of the functionality in a car is now controlled by electronics and software. There is a trend among automobile manufacturers to perform administrative procedures such as diagnostics and firmware updates over a wireless communication channel and to provide various services that allow hand-held devices such as cell phones and PDAs to interact with the vehicle. Thus emerges the notion of the connected car. As external wireless communication is allowed to interact with the vehicle, a number of security risks are introduced. Achieving proper authentication and secure communication thus becomes a critical issue. The vehicle domain has traditionally only dealt with safety concerns; however, the security risks create a need to consider an intelligent attacker and appropriate security solutions in this domain. This thesis focuses on how to secure the connected car. A defense-in-depth perspective is employed to do this by means of different approaches. Various measures for prevention including authentication and integrity principles for vehicle-to-infrastructure and device-to-vehicle communication are applied. In addition, measures for prevention, detection and deflection of attacks targeting the in-vehicle network are developed. After an attack has occurred, forensics is performed to reconstruct the event and aid in locating the cyber criminals responsible. Achieving a proper level of security in the car is a challenge, given the environment, the usage scenarios and the safety concerns. Thus, while security solutions must be adapted to support the specific characteristics of the connected car, applying only one security solution for a safety-critical system such as a car may not be sufficient. Several protection mechanisms based on different approaches should be incorporated to secure the connected car and to ensure the safety of its driver and passengers.

in-vehicle networks

firmware updates

attacks

connected car

defense-in-depth

Security

diagnostics

wireless

HC2
Opponent: Professor Dieter Gollmann, Technische Universität Hamburg-Harburg, Germany

Författare

Dennis Nilsson

Chalmers, Data- och informationsteknik, Datorteknik

Combining Physical and Digital Evidence in Vehicle Environments

3rd International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2008; Berkeley, CA; United States; 22 May 2008 through 22 May 2008,; (2008)p. 10-14

Paper i proceeding

Simulated Attacks on CAN Buses: Vehicle virus

Proceedings of the Fifth IASTED Asian Conference on Communication Systems and Networks (ASIACSN), April 2-4, 2008, Langkawi, Malaysia,; (2008)

Paper i proceeding

Vehicle ECU Classification Based on Safety-Security Characteristics

Proceedings of 13th IET Road Transport Information and Control - RTIC2008, May 20-22, 2008, Manchester, UK,; (2008)

Paper i proceeding

A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay

Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems (CISIS), October 23-24, 2008, Genova, Italy,; (2008)p. 84-91

Paper i proceeding

A Defense-in-Depth Approach to Securing the Wireless Vehicle Infrastructure

Journal of Networks,; Vol. 4(2009)p. 552-564

Artikel i vetenskaplig tidskrift

Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle Networks

International Journal of Digital Crime and Forensics,; Vol. 1(2009)p. 28-41

Artikel i vetenskaplig tidskrift

Efficient In-Vehicle Delayed Data Authentication Based on Compound Message Authentication Codes

IEEE Vehicular Technology Conference,; (2008)

Paper i proceeding

How to Secure Bluetooth-based Pico Networks

Proceedings of the 26th International Conference on Computer Safety, Reliability, and Security (SAFECOMP), September 18-21, 2007, Nuremberg, Germany.,; (2007)p. 209-223

Paper i proceeding

Auxiliary Channel Diffie-Hellman Encrypted Key-Exchange Authentication

5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2008; Hong Kong; Hong Kong; 28 July 2008 through 31 July 2008,; (2008)

Paper i proceeding

Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles

Proceedings of the 27th International Conference on Computer Safety, Reliability, and Security (SAFECOMP), September 22-25, 2008, Newcastle, UK,; (2008)p. 207-220

Paper i proceeding

Low-Cost Key Management for Hierarchical Wireless Vehicle Networks

Proceedings of the IEEE Intelligent Vehicles Symposium, June 4-6, 2008, Eindhoven, The Netherlands,; (2008)p. 476-481

Paper i proceeding

Unidirectional Auxiliary Channel Challenge-Response Authentication

7th Annual Wireless Telecommunications Symposium, WTS 2008; Ponoma, CA; United States; 24 April 2008 through 26 April 2008,; (2008)p. 84-91

Paper i proceeding

An Approach to using Honeypots in In-Vehicle Networks

68th Semi-Annual IEEE Vehicular Technology, VTC 2008-Fall, Conference; Calgary, AB; Canada; 21 September 2008 through 24 September 2008,; (2008)

Paper i proceeding

Secure Firmware Updates over the Air in Intelligent Vehicles

ICC 2008 - 2008 IEEE International Conference on Communications Workshops; Beijing; China; 19 May 2008 through 23 May 2008,; (2008)p. 380-384

Paper i proceeding

A Framework for Self-Verification of Firmware Updates over the Air in Vehicle ECUs

Proceedings of the Third IEEE Workshop on Automotive Networking and Applications (AutoNet) co-located with IEEE GLOBECOM, November 30 - December 4, 2008, New Orleans, LA, USA,; (2008)

Paper i proceeding

Ämneskategorier

Datorteknik

ISBN

978-91-7385-245-6

Doktorsavhandlingar vid Chalmers tekniska högskola. Ny serie: 2926

Technical report D - Department of Computer Science and Engineering, Chalmers University of Technology and Göteborg University: 60D

HC2

Opponent: Professor Dieter Gollmann, Technische Universität Hamburg-Harburg, Germany