Design and verification for transportation system security

Cyber-security has emerged as a pressing issue for transportation systems. Studies have shown that attackers can attack modern vehicles from a variety of interfaces and gain access to the most safety-critical components. Such threats become even broader and more challenging with the emergence of vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication technologies. Addressing the security issues in transportation systems requires comprehensive approaches that encompass considerations of security mechanisms, safety properties, resource constraints, and other related system metrics. In this work, we propose an integrated framework that combines hybrid modeling, formal verification, and automated synthesis techniques for analyzing the security and safety of transportation systems and carrying out design space exploration of both in-vehicle electronic control systems and vehicle-to-vehicle communications. We demonstrate the ideas of our framework through a case study of cooperative adaptive cruise control.

[1]  Ashish Tiwari,et al.  Safety envelope for security , 2014, HiCoNS.

[2]  Panagiotis Papadimitratos,et al.  Secure vehicular communication systems: design and architecture , 2008, IEEE Communications Magazine.

[3]  André Platzer,et al.  KeYmaera: A Hybrid Theorem Prover for Hybrid Systems (System Description) , 2008, IJCAR.

[4]  Alberto L. Sangiovanni-Vincentelli,et al.  Security-aware mapping for CAN-based real-time distributed automotive systems , 2013, 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).

[5]  André Platzer,et al.  Adaptive Cruise Control: Hybrid, Distributed, and Now Formally Verified , 2011, FM.

[6]  Peng Deng,et al.  Robust and extensible task implementations of synchronous finite state machines , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[7]  Philip Koopman,et al.  Flexible multicast authentication for time-triggered embedded control network applications , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.

[8]  John B. Kenney,et al.  Dedicated Short-Range Communications (DSRC) Standards in the United States , 2011, Proceedings of the IEEE.

[9]  Eylem Ekici,et al.  Vehicular Networking: A Survey and Tutorial on Requirements, Architectures, Challenges, Standards and Solutions , 2011, IEEE Communications Surveys & Tutorials.

[10]  Matti Valovirta,et al.  Experimental Security Analysis of a Modern Automobile , 2011 .

[11]  Matthew Green,et al.  Security Analysis of a Cryptographically-Enabled RFID Device , 2005, USENIX Security Symposium.

[12]  Panagiotis Papadimitratos,et al.  Adaptive message authentication for vehicular networks , 2009, VANET '09.

[13]  Adil Mudasir Malla,et al.  Security Attacks with an Effective Solution for DOS Attacks in VANET , 2013 .

[14]  Ludovic Apvrille,et al.  Security requirements for automotive on-board networks , 2009, 2009 9th International Conference on Intelligent Transport Systems Telecommunications, (ITST).

[15]  Bart van Arem,et al.  The Impact of Cooperative Adaptive Cruise Control on Traffic-Flow Characteristics , 2006, IEEE Transactions on Intelligent Transportation Systems.

[16]  A. Kajackas,et al.  Inter-Vehicle Communication: Emergency Message Delay Distributions , 2015 .

[17]  Christof Paar,et al.  Security in Automotive Bus Systems , 2004 .

[18]  Ingrid Verbauwhede,et al.  CANAuth - A Simple, Backward Compatible Broadcast Authentication Protocol for CAN bus , 2011 .

[19]  Natarajan Shankar,et al.  A framework for high-assurance quasi-synchronous systems , 2014, 2014 Twelfth ACM/IEEE Conference on Formal Methods and Models for Codesign (MEMOCODE).

[20]  Erland Jonsson,et al.  Efficient In-Vehicle Delayed Data Authentication Based on Compound Message Authentication Codes , 2008, 2008 IEEE 68th Vehicular Technology Conference.

[21]  Alberto L. Sangiovanni-Vincentelli,et al.  Security-aware mapping for TDMA-based real-time distributed systems , 2014, 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).

[22]  Yunxin Li,et al.  An Overview of the DSRC/WAVE Technology , 2010, QSHINE.

[23]  Mohammed Saeed Al-kahtani,et al.  Survey on security attacks in Vehicular Ad hoc Networks (VANETs) , 2012, 2012 6th International Conference on Signal Processing and Communication Systems.

[24]  Patrick C. Hickey,et al.  Securing the Automobile: a Comprehensive Approach , 2015 .

[25]  Alejandro Quintero,et al.  VANET security surveys , 2014, Comput. Commun..

[26]  Alberto L. Sangiovanni-Vincentelli,et al.  Cyber-Security for the Controller Area Network (CAN) Communication Protocol , 2012, 2012 International Conference on Cyber Security.

[27]  Peng Deng,et al.  Task synthesis for latency-sensitive synchronous block diagram , 2014, Proceedings of the 9th IEEE International Symposium on Industrial Embedded Systems (SIES 2014).

[28]  Tim Leinmüller,et al.  POSITION VERIFICATION APPROACHES FOR VEHICULAR AD HOC NETWORKS , 2006, IEEE Wireless Communications.

[29]  Yves Deswarte,et al.  Survey on security threats and protection mechanisms in embedded automotive networks , 2013, 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W).

[30]  Natarajan Shankar,et al.  PVS: A Prototype Verification System , 1992, CADE.

[31]  Xiaomin Ma,et al.  Delay and Broadcast Reception Rates of Highway Safety Applications in Vehicular Ad Hoc Networks , 2007, 2007 Mobile Networking for Vehicular Environments.

[32]  André Platzer,et al.  Differential Dynamic Logic for Hybrid Systems , 2008, Journal of Automated Reasoning.

[33]  Bruno Dutertre,et al.  Modeling and Verification of a Fault-Tolerant Real-Time Startup Protocol Using Calendar Automata , 2004, FORMATS/FTRTFT.

[34]  Hovav Shacham,et al.  Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.

[35]  Jessica Staddon,et al.  Detecting and correcting malicious data in VANETs , 2004, VANET '04.

[36]  Nathan van de Wouw,et al.  Design and experimental evaluation of cooperative adaptive cruise control , 2011, 2011 14th International IEEE Conference on Intelligent Transportation Systems (ITSC).

[37]  Erland Jonsson,et al.  A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay , 2008, CISIS.

[38]  Xue Liu,et al.  Delay analysis and study of IEEE 802.11p based DSRC safety communication in a highway environment , 2013, 2013 Proceedings IEEE INFOCOM.

[39]  Y. Roudier,et al.  Security and privacy for in-vehicle networks , 2012, 2012 IEEE 1st International Workshop on Vehicular Communications, Sensing, and Computing (VCSC).

[40]  Sangjin Kim,et al.  Privacy-Aware VANET Security: Putting Data-Centric Misbehavior and Sybil Attack Detection Schemes into Practice , 2012, WISA.

[41]  Peng Deng,et al.  Design synthesis and optimization for automotive embedded systems , 2014, ISPD '14.

[42]  Alberto L. Sangiovanni-Vincentelli,et al.  Loosely time-triggered architectures based on communication-by-sampling , 2007, EMSOFT '07.

[43]  Bruno Dutertre,et al.  Yices 2.2 , 2014, CAV.

[44]  Panagiotis Papadimitratos,et al.  SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.

[45]  Alberto L. Sangiovanni-Vincentelli,et al.  Optimizations of an application-level protocol for enhanced dependability in FlexRay , 2009, 2009 Design, Automation & Test in Europe Conference & Exhibition.

[46]  Maarten Steinbuch,et al.  String-Stable CACC Design and Experimental Validation: A Frequency-Domain Approach , 2010, IEEE Transactions on Vehicular Technology.

[47]  Zhiyi Fang,et al.  Securing Vehicular Ad Hoc Networks , 2007, 2007 2nd International Conference on Pervasive Computing and Applications.

[48]  César Muñoz,et al.  An Overview of SAL , 2000 .

[49]  Peng Deng,et al.  A model-based synthesis flow for automotive CPS , 2015, ICCPS.

[50]  Kenneth P. Laberteaux,et al.  STRONG VANET SECURITY ON A BUDGET , 2006 .

[51]  Thomas Peyrin,et al.  Security challenges in automotive hardware/software architecture design , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[52]  Bo Yu,et al.  Detecting Sybil attacks in VANETs , 2013, J. Parallel Distributed Comput..

[53]  Naim Asaj,et al.  Entropy-based anomaly detection for in-vehicle networks , 2011, 2011 IEEE Intelligent Vehicles Symposium (IV).