State of the Art: Embedding Security in Vehicles

被引:73
作者
Wolf, Marko [1 ]
Eweimerskirch, Andre [2 ]
Wollinger, Thomas [2 ]
机构
[1] Ruhr Univ Bochum, Horst Gortz Inst IT Secur, Univ Str, D-44780 Bochum, Germany
[2] Escrypt Embedded Secur GmbH, D-44801 Bochum, Germany
关键词
D O I
10.1155/2007/74706
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
For new automotive applications and services, information technology (IT) has gained central importance. IT-related costs in car manufacturing are already high and they will increase dramatically in the future. Yet whereas safety and reliability have become a relatively well-established field, the protection of vehicular IT systems against systematic manipulation or intrusion has only recently started to emerge. Nevertheless, IT security is already the base of some vehicular applications such as immobilizers or digital tachographs. To securely enable future automotive applications and business models, IT security will be one of the central technologies for the next generation of vehicles. After a state-of-the-art overview of IT security in vehicles, we give a short introduction into cryptographic terminology and functionality. This contribution will then identify the need for automotive IT security while presenting typical attacks, resulting security objectives, and characteristic constraints within the automotive area. We will introduce core security technologies and relevant security mechanisms followed by a detailed description of critical vehicular applications, business models, and components relying on IT security. We conclude our contribution with a detailed statement about challenges and opportunities for the automotive IT community for embedding IT security in vehicles. Copyright (C) 2007 MarkoWolf et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
引用
收藏
页数:16
相关论文
共 29 条
[1]  
Amendola S., 2004, TECH REP
[2]  
Anderson R, 1998, LECT NOTES COMPUT SC, V1485, P111, DOI 10.1007/BFb0055859
[3]  
Bishop M.A., 2003, COMPUTER SECURITY AR
[4]  
Capkun S, 2005, IEEE INFOCOM SER, P1917
[5]   Watermarking, tamper-proofing, and obfuscation - Tools for software protection [J].
Collberg, CS ;
Thomborson, C .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2002, 28 (08) :735-746
[6]  
Daemen J., 1998, P 1 ADV ENCR STAND A
[7]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[8]  
Gieschen Consultancy, 2005, REP IP THEFT 22 MASS
[9]   The security and privacy of smart vehicles [J].
Hubaux, JP ;
Capkun, S ;
Luo, J .
IEEE SECURITY & PRIVACY, 2004, 2 (03) :49-55
[10]  
ISO/IEC, 1996, TR133351 ISOIEC TR