Skip to main content

CPN Based Analysis of In-Vehicle Secure Communication Protocol

  • Conference paper
  • First Online:
Quality, Reliability, Security and Robustness in Heterogeneous Networks (QShine 2016)

Abstract

Security in the domain of In-Vehicle communication becomes criticial issue when modules from different vendors allowed interacting with car. Authentication and information secrecy issues must be solved by car vendors. Many research works were held about authentication of car accessory devices and their secure communication with central unit (HUD). In this work we have analyzed one of the recently published In-Vehicle Secure protocol. Multiple replay attacks were discovered during analysis of the protocol. CPN (Coloured Petri Nets) tool was applied to anlyze and demonstrate the flaw in given secure message exchange protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jensen, K.: A brief introduction to colored petri nets. In: Workshop on the Applicability of Formal Models, Aarhus, Denmark, pp. 55–58, 2 June 1998

    Google Scholar 

  2. Jensen, K.: An introduction to the theoretical aspects of colored petri nets. In: Workshop on the Applicability of Formal Models, Aarhus, Denmark (1998)

    Google Scholar 

  3. Long, S.: Analysis of concurrent security protocols using colored petri nets. In: 2009 International Conference on Networking and Digital Society (2009)

    Google Scholar 

  4. Basyouni, A.M.: Analysis of wireless cryptographic protocols. Master’s thesis, Queen’s University Kingston, Ontario, Canada (1997)

    Google Scholar 

  5. Moon, H.: A study on formal specification and analysis of cryptographic protocols using colored petri nets. Master’s thesis, Kwangju Institute of Science and Technology, Korea (1998)

    Google Scholar 

  6. www.cpntools.org – CPN Tools Homepage

  7. Basyouni, A.M., Tavares, S.E.: New approach to cryptographic protocol analysis using coloured petri nets. Queen’s University Kingston, Ontario (1997)

    Google Scholar 

  8. Sornkhom, P., Permpoontanalarp, Y.: Security analysis of Micali’s fair contract signing protocol by using coloured petri nets. In: Proceedings of 9th ACIS International Conference Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD (2008)

    Google Scholar 

  9. Seifi, Y., Suriadi, S., Foo, E., Boyd, C.: Analysis of two authorization protocols using colored petri nets. Int. J. Inf. Secur. (2014)

    Google Scholar 

  10. Chen, L., Ryan, M.: Attack, solution and verification for shared authorisation data in TCG TPM. In: Degano, P., Guttman, J.D. (eds.) FAST 2009. LNCS, vol. 5983, pp. 201–216. Springer, Heidelberg (2010). doi:10.1007/978-3-642-12459-4_15

    Chapter  Google Scholar 

  11. Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198–208 (1983)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgments

This work was supported by the IT R&D program of MOTIE/KEIT. [Project No.: 10060105, Development vehicle Authentication, Security, Device monitoring, Predictive Maintenance platform using OTP-based HSM].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rustam Rakhimov Igorevich .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Igorevich, R.R., Shin, D., Min, D. (2017). CPN Based Analysis of In-Vehicle Secure Communication Protocol. In: Lee, JH., Pack, S. (eds) Quality, Reliability, Security and Robustness in Heterogeneous Networks. QShine 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 199. Springer, Cham. https://doi.org/10.1007/978-3-319-60717-7_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-60717-7_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-60716-0

  • Online ISBN: 978-3-319-60717-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics