CPL - Chalmers Publication Library
| Utbildning | Forskning | Styrkeområden | Om Chalmers | In English In English Ej inloggad.

Security Aspects of Wireless Vehicle-to-Infrastructure Environments

Dennis K. Nilsson (Institutionen för data- och informationsteknik, Datorteknik (Chalmers))
Göteborg : Chalmers University of Technology, 2008. - 157 s.

In recent years, information technology has entered the automobile domain. Most of the functionality in a vehicle is controlled by electronics and software. There exist two main administrative functions: diagnostics and software update. Diagnostics is used to identify defective components and faulty software. The software update procedure is used to install new software in the vehicle. These administrative functions have to date been performed locally owing to the requirement of physical access to the vehicle. As this is considered inconvenient and inefficient, there is an emerging trend among automobile manufacturers to perform wireless diagnostics and software updates. This wireless vehicle-to-infrastructure environment, where the automobile manufacturer establishes a wireless connection to a vehicle, introduces a number of security threats. The vehicle domain has traditionally dealt mainly with safety concerns; however, the introduction of an intelligent attacker in this domain causes new problems and creates a need to consider security. This thesis focuses on the security aspects of wireless vehicle-to-infrastructure environments. Security threats for a hierarchical wireless vehicle network are first identified, and a set of security recommendations are presented. Furthermore, allowing external wireless communication with the previously isolated in-vehicle network introduces new attack vectors to the vehicle. The criticality of these attacks shows the imminent need for security protection. Moreover, the security aspects of similar areas of research, such as authentication of wireless hand-held devices and key management in wireless process control systems, are investigated. Lessons learned from security issues in these areas could be taken into consideration when designing security for the wireless vehicle-to-infrastructure environment to avoid the same mistakes. Last, based on the lessons learned and the challenges identified, solutions for the wireless vehicle-to-infrastructure environment are suggested.

Nyckelord: Vehicle-to-infrastructure, security, wireless, in-vehicle networks, attacks

Denna post skapades 2008-04-07.
CPL Pubid: 69896