Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

TEE based session key establishment protocol for secure infotainment systems

TEE based session key establishment protocol for secure infotainment systems Most vehicles are now produced with infotainment features. However, as reported in various security conferences, security vulnerabilities associated with an infotainment system can cause serious security issues, e.g., an attacker can control in-vehicle systems through the infotainment system. To address such security issues, in this paper, we propose a session key establishment protocol using Elliptic Curve Cryptography. The proposed protocol enables secure authentication and key distribution between a user device and a telematics control unit. We also shows how a trusted execution environment is used for the proposed protocol. We present detailed protocol operations with conducted security analysis results. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Design Automation for Embedded Systems Springer Journals

TEE based session key establishment protocol for secure infotainment systems

Loading next page...
 
/lp/springer_journal/tee-based-session-key-establishment-protocol-for-secure-infotainment-dhWzUpkA90
Publisher
Springer Journals
Copyright
Copyright © 2018 by Springer Science+Business Media, LLC, part of Springer Nature
Subject
Engineering; Circuits and Systems; Computer-Aided Engineering (CAD, CAE) and Design; Special Purpose and Application-Based Systems
ISSN
0929-5585
eISSN
1572-8080
DOI
10.1007/s10617-018-9212-5
Publisher site
See Article on Publisher Site

Abstract

Most vehicles are now produced with infotainment features. However, as reported in various security conferences, security vulnerabilities associated with an infotainment system can cause serious security issues, e.g., an attacker can control in-vehicle systems through the infotainment system. To address such security issues, in this paper, we propose a session key establishment protocol using Elliptic Curve Cryptography. The proposed protocol enables secure authentication and key distribution between a user device and a telematics control unit. We also shows how a trusted execution environment is used for the proposed protocol. We present detailed protocol operations with conducted security analysis results.

Journal

Design Automation for Embedded SystemsSpringer Journals

Published: Jun 2, 2018

References