Security Needs for the Future Intelligent Vehicles

The need for active safety, highway guidance, telematics, traffic management, cooperative driving, driver convenience and automatic toll payment will require future intelligent vehicles to communicate with other vehicles as well as with the road-side infrastructure. However, inter-vehicle and vehicle to roadside infrastructure communications will impose some security threats against vehicles’ safety and their proprietary information. To avoid collisions, a vehicle should receive messages only from other authentic vehicles. The internal buses and electronics of a vehicle must also be protected from intruders and other people with malicious intents. Otherwise, a person can inject incorrect messages into an authentic vehicle’s internal communication system and then make the vehicle transmit wrong information to the other vehicles within the vicinity. Such an event may have catastrophic consequences. Thus, a detailed study of the security needs of the future vehicles is very important. In this paper, we will present the results of a comprehensive study related to various types of security threats against a vehicle’s electronic communication system. The paper will identify various types of security attacks against a vehicle’s electronic system. The paper will also address various issues that are related to the design of secure microcontrollers, secure electronic modules, secure communications through the vehicle’s internal buses and privacy-protected secure peer-topeer communications.

[1]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[2]  Markus G. Kuhn,et al.  Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations , 1998, Information Hiding.

[3]  M. J. Zaman,et al.  Bluetooth technology , 2002, IEEE Students Conference, ISCON '02. Proceedings..

[4]  Adi Shamir,et al.  Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.

[5]  Dave Aitel,et al.  The Shellcoder's Handbook: Discovering and Exploiting Security Holes , 2004 .

[6]  Maxim Raya,et al.  Security Aspects of Inter-Vehicle Communications , 2005 .

[7]  Richard J. Spillman,et al.  Classical and Contemporary Cryptology , 2004 .

[8]  Srdjan Capkun,et al.  The security and privacy of smart vehicles , 2004, IEEE Security & Privacy Magazine.

[9]  Siva Sai Yerubandi,et al.  Differential Power Analysis , 2002 .

[10]  Jun Luo,et al.  A Survey of Inter-Vehicle Communication , 2004 .

[11]  Christof Paar,et al.  Security in Automotive Bus Systems , 2004 .

[12]  William Stallings,et al.  Cryptography and network security , 1998 .

[13]  Markus G. Kuhn,et al.  Cipher Instruction Search Attack on the Bus-Encryption Security Microcontroller DS5002FP , 1998, IEEE Trans. Computers.

[14]  Avishai Wool,et al.  Cracking the Bluetooth PIN , 2005, MobiSys '05.

[15]  Tom Denton,et al.  Automobile Electrical And Electronic Systems , 1995 .

[16]  John Ioannidis,et al.  Using the Fluhrer, Mantin, and Shamir Attack to Break WEP , 2002, NDSS.

[17]  Paul C. Kocher,et al.  Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.