Advertisement

Security Approach for In-Vehicle Networking Using Blockchain Technology

  • Maher SalemEmail author
  • Moayyad Mohammed
  • Ali Rodan
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 29)

Abstract

Security is nonnegotiable key point for in-vehicle networking. However, all communication between Electrical Control Unites (ECU) still suffer from security drawbacks like highly processing time or preserving confidentiality, integrity and authenticity. In this paper, we propose an approach to assess the feasibility of a private Blockchain technology to overcome the aforementioned drawbacks. In this approach, we consider in-vehicle networking contains two parts, namely, central (or connected) gateway (cGW) and switches. cGW and switches are Blockchain nodes, wherein Blockchain consensus protocols are what keep all the nodes on a network synchronized with each other. The approach considers any communication type between ECUs as an individual event, which can be a transaction, data entry or application execution. A use case of secure communication between two ECUs is presented as an evaluation mechanism for securing in-vehicle networking using the proposed Blockchain approach.

References

  1. 1.
    Wolf, M., Weimerskirch, A., Paar, C.: Secure in-vehicle communication. In: Lemke, K., Paar, C., Wolf, M. (eds.) Embedded Security in Cars. Springer, Berlin (2006)Google Scholar
  2. 2.
    Hank, P., Müller, S., Vermesan, O., Van Den Keybus, J.: Automotive Ethernet: in-vehicle networking and smart mobility. In: DATE 2013 Proceedings of the Conference on Design, Automation and Test in Europe, Grenoble, France, pp. 1735–1739. IEEE (2013)Google Scholar
  3. 3.
    Wu, Z., Zhao, J., Zhu, Y., Li, Q.: Research on vehicle cybersecurity based on dedicated security hardware and ECDH algorithm. In: Intelligent and Connected Vehicles Symposium, SAE Technical Paper 2017-01-2005 (2017)Google Scholar
  4. 4.
    101 Blockchains Homepage. https://101blockchains.com. Accessed 12 Dec 2018
  5. 5.
    Dorri, A., Steger, M., Kanhere, S.S., Jurdak, R.: BlockChain: a distributed solution to automotive security and privacy. IEEE Commun. Mag. 55(12), 119–125 (2017)CrossRefGoogle Scholar
  6. 6.
    Rajbahadur, G.K., Malton, A.J., Walenstein, A., Hassan, A.E.: A survey of anomaly detection for connected vehicle cybersecurity and safety. In: IEEE Intelligent Vehicles Symposium (IV), Changshu, China, pp. 421–426 (2018)Google Scholar
  7. 7.
    Thuen, C.: Commonalities in Vehicle Vulnerabilities. IOActive, Seattle (2018)Google Scholar
  8. 8.
    Li, H., Lu, R., Mahmoud, M.: Security and privacy of connected vehicular cloud computing. IEEE Netw. 32(3), 4–6 (2018)CrossRefGoogle Scholar
  9. 9.
    Singh, M., Kim, S.: Security analysis of intelligent vehicles: challenges and scope. In: International SoC Design Conference (ISOCC), Seoul, South Korea, pp. 13–14 (2017)Google Scholar
  10. 10.
    NXP Homepage. https://www.nxp.com/docs/en/white-paper/FVNECUA4WP.pdf. Accessed 12 Dec 2018
  11. 11.
    Onuma, Y., Terashima, Y., Kiyohara, R.: ECU software updating in future vehicle networks. In: International Conference on Advanced Information Networking and Applications Workshops (WAINA), Taipei, Taiwan, pp. 35–40 (2017)Google Scholar
  12. 12.
    Zeng, W., Khalid, M., Chowdhury, S.: In-vehicle networks outlook: achievements and challenegs. IEEE Commun. Surv. Tutorials 18(3), 1552–1571 (2018)CrossRefGoogle Scholar
  13. 13.
    Wang, C., Zhao, Z., Gong, L., Zhu, L., Liu, Z., Cheng, X.: A distributed anomaly detection system for in-vehicle network using HTM. IEEE Access 6, 9091–9098 (2017)CrossRefGoogle Scholar
  14. 14.
    Woo, S., Jo, H.J., Lee, D.H.: A practical wireless attack on the connected car and security protocol for in-vehicle CAN. IEEE Trans. Intell. Transp. Syst. 16(2), 993–1006 (2015)Google Scholar
  15. 15.
    Petit, J., Shladover, S.E.: Potential cyberattacks on automated vehicles. IEEE Trans. Intell. Transp. Syst. 16(2), 546–556 (2015)Google Scholar
  16. 16.
    Dardanelli, A., Maggi, F., Tanelli, M., Zanero, S., Savaresi, S., Kochanek, R., Holz, T.: A security layer for smartphone-to-vehicle communication over bluetooth. IEEE Embed. Syst. Lett. 5(3), 34–37 (2013)CrossRefGoogle Scholar
  17. 17.
    Fernández, P.J., Santa, J., Bernal, F., Skarmeta, A.: Securing vehicular IPv6 communications. IEEE Trans. Dependable Secure Comput. 13(1), 46–58 (2016)CrossRefGoogle Scholar
  18. 18.
    Salem, M., Buehler, U.: Transforming voluminous data flow into continuous connection vectors for IDS. Int. J. Internet Technol. Secured Trans. 5(4), 307–326 (2014)CrossRefGoogle Scholar
  19. 19.
    Ferrag, M.A., Derdour, M., Mukherjee, M., Derhab, A., Maglaras, M., Janicke, H.: Blockchain technologies for the Internet of Things: research issues and challenges. In: CoRR - Computing Research Repository - arXiv, pp. 1–14 (2018)Google Scholar
  20. 20.
    Alam, S.: Securing vehicle Electronic Control Unit (ECU) communications and stored data. School of Computing, Queen’s University, Kingston, Ontario, Canada (2018)Google Scholar
  21. 21.
    Cebe, M., Erdin, E., Akkaya, K., Aksu, H., Uluagac, S.: Block4Forensic: an integrated lightweight blockchain framework for forensics applications of connected vehicles. IEEE Commun. Mag. 56, 50–57 (2018)CrossRefGoogle Scholar
  22. 22.
    Yang, Z., Yang, K., Lei, L., Zheng, K., Leung, V.C.M.: Blockchain-based decentralized trust management in vehicular networks. IEEE Internet Things (2018)Google Scholar
  23. 23.
    Jiang, T., Fang, H., Wang, H.: Blockchain-based Internet of vehicles: distributed network architecture and performance analysis. IEEE Internet Things (2018)Google Scholar
  24. 24.
  25. 25.
  26. 26.
    Sharma, P.K., Moon, S.Y., Park, J.H.: Block-VN: a distributed blockchain based vehicular network architecture in Smart City. J. Inf. Process. Syst. 13(1), 184–195 (2017)Google Scholar
  27. 27.
  28. 28.
    Wang, X.A., Yang, X., Li, C., Liu, Y., Ding, Y.: Improved functional proxy re-encryption schemes for secure cloud data sharing. Comput. Sci. Inf. Syst. 15(3), 585–614 (2018)CrossRefGoogle Scholar
  29. 29.
    Wang, X.A., Liu, Y., Zhang, Z., Yang, X.: Improved group-oriented proofs of cloud storage in IoT setting. Concurrency Comput. Pract. Exp. 30(21), e4781 (2018)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of Computer Information and SciencesHigher Colleges of TechnologyFujairahUnited Arab Emirates

Personalised recommendations