TUM Logo

Middleware-based Security for Hyperconnected Applications in Future In-Car Networks

Today’s cars take advantage of powerful electronic platforms and provide more and more sophisticatedconnected services. More than just ensuring the role of a safe transportation mean, they process privateinformation, industrial secrets, communicate with our smartphones, Internet and will soon host third-party applications. Their pervasive computerization makes them vulnerable to common security attacks,against which automotive technologies cannot protect. The transition toward Ethernet/IP-based on-boardcommunication could be a first step to respond to these security and privacy issues. In this paper, we presenta security framework leveraging local and distributed information flow techniques in order to secure theon-board network against internal and external untrusted components. We describe the implementation andintegration of such a framework within an IP-based automotive middleware and provide its evaluation.

Middleware-based Security for Hyperconnected Applications in Future In-Car Networks

EAI Endorsed Transactions on Mobile Communications and Applications

Authors: Alexandre Bouard, Dennis Burgkhardt, and Claudia Eckert
Year/month: 2013/
Booktitle: EAI Endorsed Transactions on Mobile Communications and Applications
Publisher: ICST
Fulltext: bouardmcajournal.pdf

Abstract

Today’s cars take advantage of powerful electronic platforms and provide more and more sophisticatedconnected services. More than just ensuring the role of a safe transportation mean, they process privateinformation, industrial secrets, communicate with our smartphones, Internet and will soon host third-party applications. Their pervasive computerization makes them vulnerable to common security attacks,against which automotive technologies cannot protect. The transition toward Ethernet/IP-based on-boardcommunication could be a first step to respond to these security and privacy issues. In this paper, we presenta security framework leveraging local and distributed information flow techniques in order to secure theon-board network against internal and external untrusted components. We describe the implementation andintegration of such a framework within an IP-based automotive middleware and provide its evaluation.

Bibtex:

@incolletion {
author = { Alexandre Bouard and Dennis Burgkhardt and Claudia Eckert},
title = { Middleware-based Security for Hyperconnected Applications in Future In-Car Networks },
year = { 2013 },
booktitle = { EAI Endorsed Transactions on Mobile Communications and Applications },
publisher = { ICST },
url = {https://www.sec.in.tum.de/i20/publications/middleware-based-security-for-hyperconnected-applications-in-future-in-car-networks/@@download/file/bouardmcajournal.pdf}
}