Formally verifiable features in embedded vehicular security systems
- 1 October 2009
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
In an overview paper called State of the Art: Embedding Security in Vehicles, Wolf et al. give a general state-of- the-art overview of IT security in vehicles and describe core security technologies and relevant security mechanisms. In this paper we show that a formal analysis of many of the related properties is possible. This indicates that many expected aspects in the design of vehicular security can be verified formally. Our presentation is based on a recent paper by the second author et al. where a new attestation-based vehicular security systems is represented. We briefly summarize the general properties required in the design of vehicular IT security and verify that the new architecture given by Oguma et al. suggests new desirable security aspects.Keywords
This publication has 10 references indexed in Scilit:
- Automatic verification of correspondences for security protocols*Journal of Computer Security, 2009
- New Attestation Based Security Architecture for In-Vehicle CommunicationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Hiding Names: Private Authentication in the Applied Pi CalculusLecture Notes in Computer Science, 2003
- A hierarchy of authentication specificationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Expanding automotive electronic systemsComputer, 2002
- A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion AttacksThe Computer Journal, 2002
- Open Issues in Formal Methods for Cryptographic Protocol AnalysisLecture Notes in Computer Science, 2001
- A Practical Implementation of Hierarchically Structured Key Predistribution System and Its EvaluationLecture Notes in Computer Science, 2000
- On Some Methods for Unconditionally Secure Key Distribution and Broadcast EncryptionDesigns, Codes and Cryptography, 1997
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983