Abstract
The software running on electronic devices is regularly updated, these days. A vehicle consists of many such devices, but is operated in a completely different manner than consumer devices. Update operations are safety critical in the automotive domain. Thus, they demand for a very well secured process. We propose an on-board security architecture which facilitates such update processes by combining hardware and software modules. In this paper, we present a protocol to show how this security architecture is employed in order to achieve secure firmware updates for automotive control units.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Bar-El, H.: Intra-vehicle information security framework. In: Proceedings of the 7th escar Conference, Düsseldorf, Germany (2009)
Busse, M., Pleil, M.: Data exchange concepts for gateways. Technical Report Deliverable D1.2-10, EASIS Project (2006)
C2C-CC. Car2Car Communication Consortium, http://www.car-to-car.org/
Escherich, R., Ledendecker, I., Schmal, C., Kuhls, B., Grothe, C., Scharberth, F.: SHE – Secure Hardware Extension – Functional Specification Version 1.1
Ruddle, A., et al.: Security Requirements for Automotive On-Board Networks based on Dark-side Scenarios. Technical Report Deliverable D2.3, EVITA Project (2009)
Weyl, B., et al.: Secure On-board Architecture Specification. Technical Report Deliverable D3.2, EVITA Project (2010)
Schweppe, H., et al.: Secure On-Board Protocols Specification. Technical Report Deliverable D3.3, EVITA Project (2010)
Koscher, K., et al.: Experimental Security Analysis of a Modern Automobile. In: Proc. of the 31st IEEE Symposium on Security and Privacy (May 2010)
Rahmani, M., et al.: A novel network architecture for in-vehicle audio and video streams. In: IFIP – BcN (2007)
GST. Global systems for telematics, EU FP6 project, http://www.gst-forum.org/
Hergenhan, A., Heiser, G.: Operating Systems Technology for Converged ECUs. Embedded Security in Cars (2008)
Kim, J., Chou, P.H.: Remote progressive firmware update for flash-based networked embedded systems. In: ISLPED 2009, pp. 407–412 (2009)
Kosch, T.: Local Danger Warning based on Vehicle Ad-hoc Networks: Prototype and Simulation. In: WIT 2004, pp. 3–7 (2004)
Mahmud, S.M., Shanker, S., Hossain, I.: Secure software upload in an intelligent vehicle via wireless communication links. In: Proc. IEEE Intelligent Vehicles Symposium, pp. 588–593 (2005)
Miehling, T., Vondracek, P., Huber, M., Chodura, H., Bauersachs, G.: HIS flashloader specification version 1.1. Technical report, HIS Consortium (2006)
Nilsson, D.K., Larson, U.E.: Secure Firmware Updates Over the Air in Intelligent Vehicles. In: Proc. ICC Workshops (2008)
Nilsson, D.K., Sun, L., Nakajima, T.: A Framework for Self-Verification of Firmware Updates Over the Air in Vehicle ECUs. In: GLOBECOM (2008)
Nilsson, D.K., et al.: Key management and secure software updates in wireless process control environments. In: WiSec 2008 (2008)
Towards a secure automotive platform. White paper, secunet (2009)
SeVeCOM. Secure Vehicle Communication, http://www.sevecom.org/
Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S.: Google Android: A State-of-the-Art Review of Security Mechanisms (2009)
IEEE WAVE. Wireless Access in Vehicular Environments, IEEE standard 1609.2
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Idrees, M.S., Schweppe, H., Roudier, Y., Wolf, M., Scheuermann, D., Henniger, O. (2011). Secure Automotive On-Board Protocols: A Case of Over-the-Air Firmware Updates. In: Strang, T., Festag, A., Vinel, A., Mehmood, R., Rico Garcia, C., Röckl, M. (eds) Communication Technologies for Vehicles. Nets4Cars/Nets4Trains 2011. Lecture Notes in Computer Science, vol 6596. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19786-4_20
Download citation
DOI: https://doi.org/10.1007/978-3-642-19786-4_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-19785-7
Online ISBN: 978-3-642-19786-4
eBook Packages: Computer ScienceComputer Science (R0)