Authenticated and Secure Automotive Service Discovery with DNSSEC and DANE

03/27/2023
by   Mehmet Mueller, et al.
0

Automotive softwarization is progressing and future cars are expected to operate a Service-Oriented Architecture on multipurpose compute units, which are interconnected via a high-speed Ethernet backbone. The AUTOSAR architecture foresees a universal middleware called SOME/IP that provides the service primitives, interfaces, and application protocols on top of Ethernet and IP. SOME/IP lacks a robust security architecture, even though security is an essential in future Internet-connected vehicles. In this paper, we augment the SOME/IP service discovery with an authentication and certificate management scheme based on DNSSEC and DANE. We argue that the deployment of well-proven, widely tested standard protocols should serve as an appropriate basis for a robust and reliable security infrastructure in cars. Our solution enables on-demand service authentication in offline scenarios, easy online updates, and remains free of attestation collisions. We evaluate our extension of the common vsomeip stack and find performance values that fully comply with car operations.

READ FULL TEXT
research
06/25/2023

Universal Session Protocol: A Novel Approach to Session Management

Currently, the TCP/IP model enables exploitation of vulnerabilities anon...
research
03/24/2023

Dynamic Service-Orientation for Software-Defined In-Vehicle Networks

Modern In-Vehicle Networks (IVNs) are composed of a large number of devi...
research
06/17/2019

The Prototype of Decentralized Multilateral Co-Governing Post-IP Internet Architecture and Its Testing on Operator Networks

The Internet has become the most important infrastructure of modern soci...
research
12/21/2021

Network Anomaly Detection in Cars: A Case for Time-Sensitive Stream Filtering and Policing

Connected cars are vulnerable to cyber attacks. Security challenges aris...
research
06/05/2018

NDN, CoAP, and MQTT: A Comparative Measurement Study in the IoT

This paper takes a comprehensive view on the protocol stacks that are un...
research
08/16/2023

Evaluating IP Blacklists Effectiveness

IP blacklists are widely used to increase network security by preventing...
research
01/07/2022

Apples and Cars: a Comparison of Security

Cybersecurity has gained importance for cars that increasingly rely on s...

Please sign up or login with your details

Forgot password? Click here to reset