[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Secure Automotive On-Board Protocols: A Case of Over-the-Air Firmware Updates

  • Conference paper
Communication Technologies for Vehicles (Nets4Cars/Nets4Trains 2011)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 6596))

Included in the following conference series:

Abstract

The software running on electronic devices is regularly updated, these days. A vehicle consists of many such devices, but is operated in a completely different manner than consumer devices. Update operations are safety critical in the automotive domain. Thus, they demand for a very well secured process. We propose an on-board security architecture which facilitates such update processes by combining hardware and software modules. In this paper, we present a protocol to show how this security architecture is employed in order to achieve secure firmware updates for automotive control units.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 35.99
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 44.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Bar-El, H.: Intra-vehicle information security framework. In: Proceedings of the 7th escar Conference, Düsseldorf, Germany (2009)

    Google Scholar 

  2. Busse, M., Pleil, M.: Data exchange concepts for gateways. Technical Report Deliverable D1.2-10, EASIS Project (2006)

    Google Scholar 

  3. C2C-CC. Car2Car Communication Consortium, http://www.car-to-car.org/

  4. Escherich, R., Ledendecker, I., Schmal, C., Kuhls, B., Grothe, C., Scharberth, F.: SHE – Secure Hardware Extension – Functional Specification Version 1.1

    Google Scholar 

  5. Ruddle, A., et al.: Security Requirements for Automotive On-Board Networks based on Dark-side Scenarios. Technical Report Deliverable D2.3, EVITA Project (2009)

    Google Scholar 

  6. Weyl, B., et al.: Secure On-board Architecture Specification. Technical Report Deliverable D3.2, EVITA Project (2010)

    Google Scholar 

  7. Schweppe, H., et al.: Secure On-Board Protocols Specification. Technical Report Deliverable D3.3, EVITA Project (2010)

    Google Scholar 

  8. Koscher, K., et al.: Experimental Security Analysis of a Modern Automobile. In: Proc. of the 31st IEEE Symposium on Security and Privacy (May 2010)

    Google Scholar 

  9. Rahmani, M., et al.: A novel network architecture for in-vehicle audio and video streams. In: IFIP – BcN (2007)

    Google Scholar 

  10. GST. Global systems for telematics, EU FP6 project, http://www.gst-forum.org/

  11. Hergenhan, A., Heiser, G.: Operating Systems Technology for Converged ECUs. Embedded Security in Cars (2008)

    Google Scholar 

  12. Kim, J., Chou, P.H.: Remote progressive firmware update for flash-based networked embedded systems. In: ISLPED 2009, pp. 407–412 (2009)

    Google Scholar 

  13. Kosch, T.: Local Danger Warning based on Vehicle Ad-hoc Networks: Prototype and Simulation. In: WIT 2004, pp. 3–7 (2004)

    Google Scholar 

  14. Mahmud, S.M., Shanker, S., Hossain, I.: Secure software upload in an intelligent vehicle via wireless communication links. In: Proc. IEEE Intelligent Vehicles Symposium, pp. 588–593 (2005)

    Google Scholar 

  15. Miehling, T., Vondracek, P., Huber, M., Chodura, H., Bauersachs, G.: HIS flashloader specification version 1.1. Technical report, HIS Consortium (2006)

    Google Scholar 

  16. Nilsson, D.K., Larson, U.E.: Secure Firmware Updates Over the Air in Intelligent Vehicles. In: Proc. ICC Workshops (2008)

    Google Scholar 

  17. Nilsson, D.K., Sun, L., Nakajima, T.: A Framework for Self-Verification of Firmware Updates Over the Air in Vehicle ECUs. In: GLOBECOM (2008)

    Google Scholar 

  18. Nilsson, D.K., et al.: Key management and secure software updates in wireless process control environments. In: WiSec 2008 (2008)

    Google Scholar 

  19. Towards a secure automotive platform. White paper, secunet (2009)

    Google Scholar 

  20. SeVeCOM. Secure Vehicle Communication, http://www.sevecom.org/

  21. Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S.: Google Android: A State-of-the-Art Review of Security Mechanisms (2009)

    Google Scholar 

  22. IEEE WAVE. Wireless Access in Vehicular Environments, IEEE standard 1609.2

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Idrees, M.S., Schweppe, H., Roudier, Y., Wolf, M., Scheuermann, D., Henniger, O. (2011). Secure Automotive On-Board Protocols: A Case of Over-the-Air Firmware Updates. In: Strang, T., Festag, A., Vinel, A., Mehmood, R., Rico Garcia, C., Röckl, M. (eds) Communication Technologies for Vehicles. Nets4Cars/Nets4Trains 2011. Lecture Notes in Computer Science, vol 6596. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19786-4_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-19786-4_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-19785-7

  • Online ISBN: 978-3-642-19786-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics