Abstract
The latest advancement of information communication technology has facilitated the development of multifunctional high-performance vehicular communication system and the great strides in user convenience. Still, due to the nature of inter-vehicle communication and that of the communication system between internal and external devices, problems of intruders’ attacks arise in transmission sections. Any successful attack on vehicular operating, steering, controlling and imaging systems by intruders would end up in grave safety and privacy issues. In this regard, the need for safe and secure vehicular communication is considered important. In the same vein, the importance of research on hardware security and secure communication protocols is emphasized. This Paper designed a secure vehicular communication protocol using hash locks, random numbers and time-stamps. The proposed protocol was experimentally tested with the formal verification tool Casper/FDR and proved to be secure against diverse attacks from intruders. In brief, the proposed protocol turned out to be safe against deadlock and livelock and to finish without trouble.
Similar content being viewed by others
References
Stephen, C., Damon, M., Brain, K., Danny, A., Hovav, S., Stefan, S., Karl, K., Alexei, C., Franziska, R., Tadayoshi, K.: Comprehensive experimental analyses of automotive attack surfaces. SEC’11, pp. 1–16 (2011)
Papadimitratos, P., de La Fortelle, A., Evensen, K., Brignolo, R., Cosenza, S.: Vehicular communication systems: enabling technologies, applications, and future outlook on intelligent transportation. IEEE Commun. Mag. 11(1), 84–95 (2009)
ISO 26262, Road vehicles: functional safety, Management of Functional Safety and Concept Phase
Papadimitratos, P., Gligor, V., Hubaux, J.-P.: Securing Vehicular Communications Assumptions, Requirements, and Principles. In Workshop on Embedded Security in Cars (ESCAR), Berlin, Germany (2006)
Lowe, G.: Casper: a compiler for the analysis of security protocols. User Manual and Tutorial, Version 1.12 (2009)
Formal Systems (Europe) Ltd, Oxford University Computing Laboratory: Failures-Divergence Renement, 19th FDR2 User Manual (2010)
Mitra, M.: Privacy for RFID systems to prevent tracking and cloning. Int. J. Comput. Sci. Netw. Secur. 8(1), 1–5 (2008)
PRESERVE (Preparing Secure Vehicle-to-X Communication Systems) Deliverable 1.1, Security Requirements of Vehicle Security Architecture (June 2011)
Hoare, C.A.R.: Communicating Sequential Processes. Prentice-Hall, Upper Saddle River (1985)
Weis, S., Sarma, S., Rivest, R., Engels, D.: Security and privacy aspects of low-cost radio frequency identification systems. Security in Pervasive Computing, LNCS2802, pp. 201–202 (2005)
Lee, H.M., Park, D.S., Lee, G.: FRASystem: fault tolerant system using agents in distributed computing systems. Clust. Comput. 14(1), 15–25 (2011)
Chen, J., Cao, K., Li, K., Sun, Y.: Distributed sensor activation algorithm for target tracking with binary sensor networks. Clust. Comput. 14(1), 55–64 (2011)
Lee, D.H., Jeom, G.K., Kuinam, J.K.: A study on abnormal event correlation analysis for convergence security monitor. Clust. Comput. 16(2), 219–227 (2013)
Jung, E.-Y., Kim, J., Chung, K.-Y., Dong, K.P.: Mobile healthcare application with EMR interoperability for diabetes patients. Clust. Comput. 17(3), 871–880 (2014)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Bae, W.S. Function-based connection protocol development and verification for secure communication in vehicle environment. Cluster Comput 18, 761–769 (2015). https://doi.org/10.1007/s10586-015-0441-0
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-015-0441-0