Abstract
Security in the domain of In-Vehicle communication becomes criticial issue when modules from different vendors allowed interacting with car. Authentication and information secrecy issues must be solved by car vendors. Many research works were held about authentication of car accessory devices and their secure communication with central unit (HUD). In this work we have analyzed one of the recently published In-Vehicle Secure protocol. Multiple replay attacks were discovered during analysis of the protocol. CPN (Coloured Petri Nets) tool was applied to anlyze and demonstrate the flaw in given secure message exchange protocol.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Jensen, K.: A brief introduction to colored petri nets. In: Workshop on the Applicability of Formal Models, Aarhus, Denmark, pp. 55–58, 2 June 1998
Jensen, K.: An introduction to the theoretical aspects of colored petri nets. In: Workshop on the Applicability of Formal Models, Aarhus, Denmark (1998)
Long, S.: Analysis of concurrent security protocols using colored petri nets. In: 2009 International Conference on Networking and Digital Society (2009)
Basyouni, A.M.: Analysis of wireless cryptographic protocols. Master’s thesis, Queen’s University Kingston, Ontario, Canada (1997)
Moon, H.: A study on formal specification and analysis of cryptographic protocols using colored petri nets. Master’s thesis, Kwangju Institute of Science and Technology, Korea (1998)
www.cpntools.org – CPN Tools Homepage
Basyouni, A.M., Tavares, S.E.: New approach to cryptographic protocol analysis using coloured petri nets. Queen’s University Kingston, Ontario (1997)
Sornkhom, P., Permpoontanalarp, Y.: Security analysis of Micali’s fair contract signing protocol by using coloured petri nets. In: Proceedings of 9th ACIS International Conference Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD (2008)
Seifi, Y., Suriadi, S., Foo, E., Boyd, C.: Analysis of two authorization protocols using colored petri nets. Int. J. Inf. Secur. (2014)
Chen, L., Ryan, M.: Attack, solution and verification for shared authorisation data in TCG TPM. In: Degano, P., Guttman, J.D. (eds.) FAST 2009. LNCS, vol. 5983, pp. 201–216. Springer, Heidelberg (2010). doi:10.1007/978-3-642-12459-4_15
Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198–208 (1983)
Acknowledgments
This work was supported by the IT R&D program of MOTIE/KEIT. [Project No.: 10060105, Development vehicle Authentication, Security, Device monitoring, Predictive Maintenance platform using OTP-based HSM].
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Igorevich, R.R., Shin, D., Min, D. (2017). CPN Based Analysis of In-Vehicle Secure Communication Protocol. In: Lee, JH., Pack, S. (eds) Quality, Reliability, Security and Robustness in Heterogeneous Networks. QShine 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 199. Springer, Cham. https://doi.org/10.1007/978-3-319-60717-7_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-60717-7_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-60716-0
Online ISBN: 978-3-319-60717-7
eBook Packages: Computer ScienceComputer Science (R0)