Secure over-the-air software updates in connected vehicles: A survey

Abstract Current trends forecast that Over-the-Air (OTA) software updates will be highly significant for future connected vehicles. The OTA update will enable upgrading the vehicle functionalities or bug fixations in the embedded software installed on its Electronic Control Units (ECUs) remotely. The introduction of OTA updates in the automotive industry has brought many advantages for both the Original Equipment Manufacturer (OEM) and the driver/owner. However, in terms of security, OTA updates are highly critical as they need complete access to the in-vehicle communication network. This survey highlights and discusses OTA software updates in the automotive sector, mainly from the security perspective. The major objective of this survey is to deliver a comprehensive outline of various research directions and approaches in OTA update technologies in vehicles. At first, we discuss the connected vehicle technology and then integrate the relationship of OTA update features with the connected vehicle. We further discuss both promising and secure OTA update approaches, that have gained a lot of attention recently. Furthermore, we present a comprehensive comparative study of the existing OTA update approaches on the basis of strengths, weaknesses and evaluation setup. The survey also focuses on the existing vehicle features that support OTA updates, and customer satisfaction and usability. Finally, we identify possible future research directions of OTA updates for automobiles, particularly in the area of security.

[1]  Justin Cappos,et al.  Mercury: Bandwidth-Effective Prevention of Rollback Attacks Against Community Repositories , 2017, USENIX Annual Technical Conference.

[2]  Muhammad Sabir Idrees,et al.  Secure Automotive On-Board Protocols: A Case of Over-the-Air Firmware Updates , 2011, Nets4Cars/Nets4Trains.

[3]  Stephen Flowerday,et al.  Smartphone information security awareness: A victim of operational pressures , 2014, Comput. Secur..

[4]  Mohd Murtadha Mohamad,et al.  A Survey of Security and Privacy in Connected Vehicles , 2015 .

[5]  Paul Rook,et al.  Controlling software projects , 1986, Softw. Eng. J..

[6]  Kathiresh Mayilsamy,et al.  An integrated approach for data security in vehicle diagnostics over internet protocol and software update over the air , 2018, Comput. Electr. Eng..

[7]  S. Balaji,et al.  WATEERFALLVs V-MODEL Vs AGILE: A COMPARATIVE STUDY ON SDLC , 2012 .

[8]  Jerry den Hartog,et al.  Security and privacy for innovative automotive applications: A survey , 2018, Comput. Commun..

[9]  David W. Keith,et al.  Impact of the Volkswagen emissions control defeat device on US public health , 2015 .

[10]  Pedro Isaias,et al.  Information System Development Life Cycle Models , 2015 .

[11]  Bill Canis Issues with Federal Motor Vehicle Safety Standards , 2017 .

[12]  Nick Mathewson,et al.  Survivable key compromise in software update systems , 2010, CCS '10.

[13]  Yves Deswarte,et al.  Survey on security threats and protection mechanisms in embedded automotive networks , 2013, 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W).

[14]  Vijay Gopalakrishnan,et al.  Managing Massive Firmware-Over-The-Air Updates for Connected Cars in Cellular Networks , 2017, CarSys@MobiCom.

[15]  Qusay H. Mahmoud,et al.  Cyber physical systems security: Analysis, challenges and solutions , 2017, Comput. Secur..

[16]  Antonello Calabrò,et al.  A tour of secure software engineering solutions for connected vehicles , 2018, Software Quality Journal.

[17]  Michael Karner,et al.  An Efficient and Secure Automotive Wireless Software Update Framework , 2018, IEEE Transactions on Industrial Informatics.

[18]  Vijay Gopalakrishnan,et al.  Connected cars in cellular network: a measurement study , 2017, Internet Measurement Conference.

[19]  K. Mansour,et al.  AiroDiag: A sophisticated tool that diagnoses and updates vehicles software over air , 2012, 2012 IEEE International Electric Vehicle Conference.

[20]  Salil S. Kanhere,et al.  Secure Wireless Automotive Software Updates Using Blockchains: A Proof of Concept , 2017 .

[21]  Péter Gáspár,et al.  Security issues and vulnerabilities in connected car systems , 2015, 2015 International Conference on Models and Technologies for Intelligent Transportation Systems (MT-ITS).

[22]  Carlos Eduardo de Andrade,et al.  Minimizing flowtime in a flowshop scheduling problem with a biased random-key genetic algorithm , 2019, Expert Syst. Appl..

[23]  Shucheng Yu,et al.  Investigating and securing communications in the Controller Area Network (CAN) , 2017, 2017 International Conference on Computing, Networking and Communications (ICNC).

[24]  Lei Sun,et al.  A Framework for Self-Verification of Firmware Updates over the Air in Vehicle ECUs , 2008, 2008 IEEE Globecom Workshops.

[25]  Wenyuan Xu,et al.  Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study , 2010, USENIX Security Symposium.

[26]  S. Mahmud,et al.  Secure software upload in an intelligent vehicle via wireless communication links , 2005, IEEE Proceedings. Intelligent Vehicles Symposium, 2005..

[27]  Stefan Savage,et al.  Fast and Vulnerable: A Story of Telematic Failures , 2015, WOOT.

[28]  Shwetak N. Patel,et al.  Experimental Security Analysis of a Modern Automobile , 2010, 2010 IEEE Symposium on Security and Privacy.

[29]  Ulf E. Larson,et al.  Securing vehicles against cyber attacks , 2008, CSIIRW '08.

[30]  Kevin Fu,et al.  Secure Software Updates: Disappointments and New Challenges , 2006, HotSec.

[31]  Syed Masud Mahmud,et al.  Analysis of a Secure Software Upload Technique in Advanced Vehicles using Wireless Links , 2007, 2007 IEEE Intelligent Transportation Systems Conference.

[32]  Klaus Grimm Software technology in an automotive company - major challenges , 2003, 25th International Conference on Software Engineering, 2003. Proceedings..

[33]  Bart Preneel,et al.  Fast, Furious and Insecure: Passive Keyless Entry and Start Systems in Modern Supercars , 2019, IACR Trans. Cryptogr. Hardw. Embed. Syst..

[34]  Hemanth Kumar,et al.  Enhancing connected car adoption: Security and over the air update framework , 2016, 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT).

[35]  Alan Wassyng,et al.  Safe and Secure Automotive Over-the-Air Updates , 2018, SAFECOMP.

[36]  Christoph Schmittner,et al.  Status of the Development of ISO/SAE 21434 , 2018, EuroSPI.

[37]  Anja Lehmann,et al.  Zone Encryption with Anonymous Authentication for V2V Communication , 2020, 2020 IEEE European Symposium on Security and Privacy (EuroS&P).

[38]  Tae-Sung Kim,et al.  Security risk assessment framework for smart car using the attack tree analysis , 2017, Journal of Ambient Intelligence and Humanized Computing.

[39]  Liam Kilmartin,et al.  Intra-Vehicle Networks: A Review , 2015, IEEE Transactions on Intelligent Transportation Systems.

[40]  Vijay Gopalakrishnan,et al.  Scheduling software updates for connected cars with limited availability , 2019, Appl. Soft Comput..

[41]  Neville A. Stanton,et al.  Effects of adaptive cruise control and highly automated driving on workload and situation awareness: A review of the empirical evidence , 2014 .

[42]  Kay Römer,et al.  Generic framework enabling secure and efficient automotive wireless SW updates , 2016, 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA).

[43]  D. de Waard,et al.  Behavioral adaptation of young and older drivers to an intersection crossing advisory system. , 2015, Accident; analysis and prevention.

[44]  D.K. Nilsson,et al.  Secure Firmware Updates over the Air in Intelligent Vehicles , 2008, ICC Workshops - 2008 IEEE International Conference on Communications Workshops.

[45]  Mikael Asplund,et al.  Decentralized Firmware Attestation for In-Vehicle Networks , 2019, Proceedings of the 5th on Cyber-Physical System Security Workshop - CPSS '19.

[46]  Yossi Lichtenstein,et al.  Strategies for Competing in the Automotive Industry's Software Ecosystem: Standards and Bottlenecks , 2019, IEEE Software.

[47]  Hovav Shacham,et al.  Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.

[48]  Lei Chen,et al.  Cooperative Intersection Management: A Survey , 2016, IEEE Transactions on Intelligent Transportation Systems.

[49]  Radovan Miucic,et al.  Firmware Update Over The Air (FOTA) for Automotive Industry , 2007 .

[50]  Salil S. Kanhere,et al.  BlockChain: A Distributed Solution to Automotive Security and Privacy , 2017, IEEE Communications Magazine.

[51]  Subra Ganesan,et al.  Firmware over the air for automotive, Fotamotive , 2014, IEEE International Conference on Electro/Information Technology.

[52]  Takeshi Kato,et al.  Approaches for Vehicle Cyber-Security in the US , 2017 .

[53]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[54]  Sanjay Jha,et al.  SEDA: Secure Over-the-Air Code Dissemination Protocol for the Internet of Things , 2018, IEEE Transactions on Dependable and Secure Computing.

[55]  Jiajia Liu,et al.  In-Vehicle Network Attacks and Countermeasures: Challenges and Future Directions , 2017, IEEE Network.

[56]  Alois Knoll,et al.  Future cars: necessity for an adaptive and distributed multiple independent levels of security architecture , 2013, HiCoNS '13.

[57]  Eric Sax,et al.  A Generic System for Automotive Software Over the Air (SOTA) Updates Allowing Efficient Variant and Release Management , 2018, Advances in Intelligent Systems and Computing.

[58]  Paul C. van Oorschot,et al.  Secure Software Installation on Smartphones , 2011, IEEE Security & Privacy.

[59]  Ahmad-Reza Sadeghi,et al.  ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices , 2018, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[60]  Ulf Lindqvist,et al.  Key management and secure software updates in wireless process control environments , 2008, WiSec '08.

[61]  Gene Tsudik,et al.  Secure Code Update for Embedded Devices via Proofs of Secure Erasure , 2010, ESORICS.