Skip to main content
Log in

Function-based connection protocol development and verification for secure communication in vehicle environment

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

The latest advancement of information communication technology has facilitated the development of multifunctional high-performance vehicular communication system and the great strides in user convenience. Still, due to the nature of inter-vehicle communication and that of the communication system between internal and external devices, problems of intruders’ attacks arise in transmission sections. Any successful attack on vehicular operating, steering, controlling and imaging systems by intruders would end up in grave safety and privacy issues. In this regard, the need for safe and secure vehicular communication is considered important. In the same vein, the importance of research on hardware security and secure communication protocols is emphasized. This Paper designed a secure vehicular communication protocol using hash locks, random numbers and time-stamps. The proposed protocol was experimentally tested with the formal verification tool Casper/FDR and proved to be secure against diverse attacks from intruders. In brief, the proposed protocol turned out to be safe against deadlock and livelock and to finish without trouble.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Stephen, C., Damon, M., Brain, K., Danny, A., Hovav, S., Stefan, S., Karl, K., Alexei, C., Franziska, R., Tadayoshi, K.: Comprehensive experimental analyses of automotive attack surfaces. SEC’11, pp. 1–16 (2011)

  2. Papadimitratos, P., de La Fortelle, A., Evensen, K., Brignolo, R., Cosenza, S.: Vehicular communication systems: enabling technologies, applications, and future outlook on intelligent transportation. IEEE Commun. Mag. 11(1), 84–95 (2009)

  3. ISO 26262, Road vehicles: functional safety, Management of Functional Safety and Concept Phase

  4. Papadimitratos, P., Gligor, V., Hubaux, J.-P.: Securing Vehicular Communications Assumptions, Requirements, and Principles. In Workshop on Embedded Security in Cars (ESCAR), Berlin, Germany (2006)

  5. Lowe, G.: Casper: a compiler for the analysis of security protocols. User Manual and Tutorial, Version 1.12 (2009)

  6. Formal Systems (Europe) Ltd, Oxford University Computing Laboratory: Failures-Divergence Renement, 19th FDR2 User Manual (2010)

  7. Mitra, M.: Privacy for RFID systems to prevent tracking and cloning. Int. J. Comput. Sci. Netw. Secur. 8(1), 1–5 (2008)

    Google Scholar 

  8. PRESERVE (Preparing Secure Vehicle-to-X Communication Systems) Deliverable 1.1, Security Requirements of Vehicle Security Architecture (June 2011)

  9. Hoare, C.A.R.: Communicating Sequential Processes. Prentice-Hall, Upper Saddle River (1985)

    MATH  Google Scholar 

  10. Weis, S., Sarma, S., Rivest, R., Engels, D.: Security and privacy aspects of low-cost radio frequency identification systems. Security in Pervasive Computing, LNCS2802, pp. 201–202 (2005)

  11. Lee, H.M., Park, D.S., Lee, G.: FRASystem: fault tolerant system using agents in distributed computing systems. Clust. Comput. 14(1), 15–25 (2011)

    Article  Google Scholar 

  12. Chen, J., Cao, K., Li, K., Sun, Y.: Distributed sensor activation algorithm for target tracking with binary sensor networks. Clust. Comput. 14(1), 55–64 (2011)

    Article  Google Scholar 

  13. Lee, D.H., Jeom, G.K., Kuinam, J.K.: A study on abnormal event correlation analysis for convergence security monitor. Clust. Comput. 16(2), 219–227 (2013)

    Article  Google Scholar 

  14. Jung, E.-Y., Kim, J., Chung, K.-Y., Dong, K.P.: Mobile healthcare application with EMR interoperability for diabetes patients. Clust. Comput. 17(3), 871–880 (2014)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Woo Sik Bae.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bae, W.S. Function-based connection protocol development and verification for secure communication in vehicle environment. Cluster Comput 18, 761–769 (2015). https://doi.org/10.1007/s10586-015-0441-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-015-0441-0

Keywords

Navigation