Applications of Pairing-Based Cryptography on Automotive-Grade Microcontrollers
Bilinear pairings have been successfully used both in cryptanalysis and in the design of new cryptographic primitives, e.g., identity based encryptions and signatures. In this work we discuss some computational results for pairing-based libraries on two automotive-grade controllers as well as on an Android smart-phone. This is relevant as the computational resources of automotive-grade controllers have surged in the recent years and Android-based units are quickly entering the car market, e.g., infotainment units. Identity-based primitives open road for representative applications in automotive-based scenarios where the identity of the vehicle or of the OEM may be used for deriving public keys without relying on PKI. We discuss three potential use-cases: the security of in-vehicle buses, vehicle-to-vehicle communications and software updates that could greatly benefit from compact signatures, identity based encryption or signing as well as from group signatures.
We thank the reviewers for helpful comments that improved our work. This work was supported by a grant of the Romanian Ministry of Research and Innovation, CNCS-UEFISCDI, project number PN-III-P1-1.1.-TE-2016-1317 within PNCDI III (2018–2020).
- 1.AUTOSAR: Specification of Crypto Abstraction Library, 4.2.2 edition (2015)Google Scholar
- 2.AUTOSAR: Specification of Crypto Service Manager, 4.2.2 edition (2015)Google Scholar
- 7.Checkoway, S., et al.: Comprehensive experimental analyses of automotive attack surfaces. In: USENIX Security Symposium, San Francisco (2011)Google Scholar
- 8.De Caro, A., Iovino, V.: jPBC: Java pairing based cryptography. In: Proceedings of the 16th IEEE Symposium on Computers and Communications, ISCC 2011, Kerkyra, pp. 850–855, 28 June–1 July 2011. IEEE (2011)Google Scholar
- 9.Dhondge, K., Song, S., Choi, B.-Y., Park, H.: WiFiHonk: smartphone-based beacon stuffed WiFi Car2X-communication system for vulnerable road user safety. In: IEEE 79th Vehicular Technology Conference (VTC Spring), pp. 1–5. IEEE (2014)Google Scholar
- 10.Groza, B., Briceag, C.: A vehicle collision-warning system based on multipeer connectivity and off-the-shelf smart-devices. In: Cuppens, N., Cuppens, F., Lanet, J.-L., Legay, A., Garcia-Alfaro, J. (eds.) CRiSIS 2017. LNCS, vol. 10694, pp. 115–123. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-76687-4_8CrossRefGoogle Scholar
- 12.Harding, J., et al.: Vehicle-to-vehicle communications: readiness of V2V technology for application. Technical report (2014)Google Scholar
- 13.Hwang, J.Y., Lee, S., Chung, B.-H., Cho, H.S., Nyang, D.: Group signatures with controllable linkability for dynamic membership, vol. 222, pp. 761–778. Elsevier (2013)Google Scholar
- 14.Koscher, K., et al.: Experimental security analysis of a modern automobile. In: IEEE Symposium on Security and Privacy (SP), pp. 447–462. IEEE (2010)Google Scholar
- 16.Miller, C., Valasek, C.: A survey of remote automotive attack surfaces. Black Hat USA (2014)Google Scholar
- 17.Steger, M., Boano, C.A., Römer, K., Karner, M., Hillebrand, J., Rom, W.: Cesar: a testbed infrastructure to evaluate the efficiency of wireless automotive software updates. In: Proceedings of the 20th ACM International Conference on Modelling, Analysis and Simulation of Wireless and Mobile Systems, pp. 311–315. ACM (2017)Google Scholar
- 18.Steger, M., Dorri, A., Kanhere, S.S., Römer, K., Jurdak, R., Karner, M.: Secure wireless automotive software updates using blockchains: a proof of concept. In: Zachäus, C., Müller, B., Meyer, G. (eds.) Advanced Microsystems for Automotive Applications 2017. LNM, pp. 137–149. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-66972-4_12CrossRefGoogle Scholar
- 21.Zhang, C., Lu, R., Lin, X., Ho, P.-H., Shen, X.: An efficient identity-based batch verification scheme for vehicular sensor networks. In: The 27th Conference on Computer Communications (INFOCOM 2008), pp. 246–250. IEEE (2008)Google Scholar