Skip to main content

An Analysis Platform for the Information Security of In-Vehicle Networks Connected with External Networks

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9241))

Abstract

Most in-vehicle units, which are used for various services such as remote diagnosis, information gathering, telematics, car navigation with communications, etc., are connected to both an external network and an automotive network, referred to as an in-vehicle network. The information security of the in-vehicle network is an important concern. In this paper, we describe the analysis platform that we designed and developed for protection mechanisms to analyze and verify the information security of an in-vehicle network connected with external networks. The platform provides features to analyze messages of the in-vehicle network, to evaluate the effects of attacks on the in-vehicle network, and to verify protection mechanisms for the in-vehicle network. First, we developed a message analysis platform subsystem that analyzes messages of the in-vehicle network and performs send and receive processes in the in-vehicle network. Next, we designed an attack evaluation platform subsystem that evaluates attack mechanisms from servers or attackers on the Internet. We also developed a prototype (MoVIS) of the subsystem. We confirmed the effectiveness of the attack evaluation platform and MoVIS in an actual automobile, which was subjected to spoofing and DoS attacks to the in-vehicle network via the Internet. Finally, we discuss the requirements of the protection verification platform, which provides protection mechanisms and protection features based on the experimental results and the characteristics of the in-vehicle network.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. McCarthy, C., Harnett, K., Carter, A.: Characterization of potential security threats in modern automobiles. Report No. DOT HS 812 074, National Highway Traffic Safety Administration, U.S. Department of Transportation, October 2014

    Google Scholar 

  2. Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F., Kohno, T.: Comprehensive experimental analyses of automotive attack surfaces. In: Proceedings of the 20th USENIX Conference on Security, pp. 77–92, August 2011

    Google Scholar 

  3. International Organization for Standardization: Road vehicles, controller area network (CAN), Part 1: Data link layer and physical signaling. ISO IS11898-1 (2003)

    Google Scholar 

  4. Kleberger, P., Olovsson, T., Jonsson, E.: Security aspects of the in-vehicle network in the connected car. In: Intelligent Vehicles Symposium (IV), pp. 528–533, June 2011

    Google Scholar 

  5. Duri, S., Gruteser, M., Liu, X., Moskowitz, P., Perez, R., Singh, M., Tang, J.: Framework for security and privacy in automotive telematics. In: Proceedings of the 2nd International Workshop on Mobile Commerce (WMC 2002), pp. 25–32, September 2002

    Google Scholar 

  6. Lemke, K., Paar, C., Wolf, M.: Embedded Security in Cars: Securing Current and Future Automotive IT Applications. Springer, Heidelberg (2005). ISBN 978-3540283843

    Google Scholar 

  7. Wolf, M., Weimerskirch, A., Paar, C.: Security in automotive bus systems. In: Proceedings of the Workshop on Embedded Security in Cars (ESCAR 2004) (2004)

    Google Scholar 

  8. Checkoway, S., et al.: Comprehensive experimental analyses of automotive attack surfaces. In: USENIX Security Symposium, August 2011

    Google Scholar 

  9. Studnia, I., Nicomette, V., Alata, E., Deswarte, Y., Kaâniche, M., Laarouchi, Y.: Survey on security threats and protection mechanisms in embedded automotive networks. In: The 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks (DSN 2013), pp. 1–12, June 2013

    Google Scholar 

  10. Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S.: Experimental security analysis of a modern automobile. In: Proceedings of the 2010 IEEE Symposium on Security and Privacy, pp. 447–462, May 2010

    Google Scholar 

  11. Hoppe, T., Kiltz, S., Dittmann, J.: Security threats to automotive can networks – practical examples and selected short-term countermeasures. In: Harrison, M.D., Sujan, M.-A. (eds.) SAFECOMP 2008. LNCS, vol. 5219, pp. 235–248. Springer, Heidelberg (2008)

    Google Scholar 

  12. Herrewege, A., Singelee, D., Verbauwhede, I.: CANAuth-a simple, backward compatible broadcast authentication protocol for CAN bus. In: 9th Embedded Security in Cars Conference, September 2011

    Google Scholar 

  13. Groza, B., Murvay, S., van Herrewege, A., Verbauwhede, I.: LiBrA-CAN: a lightweight broadcast authentication protocol for controller area networks. In: Pieprzyk, J., Sadeghi, A.-R., Manulis, M. (eds.) CANS 2012. LNCS, vol. 7712, pp. 185–200. Springer, Heidelberg (2012)

    Google Scholar 

  14. Oka, D.K., Furue, T., Bayer, S., Vuillaume, C.: Analysis of performing secure remote vehicle diagnostics. In: Computer Security Symposium (CSS 2014), pp. 643–650, October 2014

    Google Scholar 

  15. Wolf, M., Gendrullis, T.: Design, implementation, and evaluation of a vehicular hardware security module. In: Kim, H. (ed.) ICISC 2011. LNCS, vol. 7259, pp. 302–318. Springer, Heidelberg (2012)

    Google Scholar 

  16. Schweppe, H., Roudier, Y.: Security and privacy for in-vehicle networks. In: 2012 IEEE 1st International Workshop on Vehicular Communications, Sensing, and Computing (VCSC), pp. 12–17. IEEE, June 2012

    Google Scholar 

  17. Hank, P., Suermann, T., Müller, S.: Automotive Ethernet, a holistic approach for a next generation in-vehicle networking standard. In: Meyer, G. (ed.) Advanced Microsystems for Automotive Applications 2012, pp. 79–89. Springer, Heidelberg (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hiroyuki Inoue .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Ezaki, T., Date, T., Inoue, H. (2015). An Analysis Platform for the Information Security of In-Vehicle Networks Connected with External Networks. In: Tanaka, K., Suga, Y. (eds) Advances in Information and Computer Security. IWSEC 2015. Lecture Notes in Computer Science(), vol 9241. Springer, Cham. https://doi.org/10.1007/978-3-319-22425-1_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-22425-1_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-22424-4

  • Online ISBN: 978-3-319-22425-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics