Skip to main content

Need for secure approach to connected vehicle technology

Accidental or malicious issue of false messages to connected vehicles could result in dire consequences, so secure systems of authentication and certification are likely to be necessary, write Paul Avery and Sandra Dykes. Connectivity among vehicles in urban traffic systems will provide opportunity for beneficial impacts such as congestion reduction and greater safety. However, it also creates security risks with the potential for targeted disruption. Security algorithms, protocols and procedures must take
January 7, 2013 Read time: 8 mins
Figure 2: Using trust factors to improve V2V message factors

Accidental or malicious issue of false messages to connected vehicles could result in dire consequences, so secure systems of authentication and certification are likely to be necessary, write Paul Avery and Sandra Dykes.

Connectivity among vehicles in urban traffic systems will provide opportunity for beneficial impacts such as congestion reduction and greater safety. However, it also creates security risks with the potential for targeted disruption. Security algorithms, protocols and procedures must take into account the unique aspects of vehicle and highway systems. Security for a connected vehicle (CV) environment must go beyond message authentication to consider the broader issue of message trust. This is particularly important if the message could trigger a safety-critical response, potentially creating a risk to drivers and passengers.

Security threat scenarios

There are numerous scenarios in which false information inserted into a connected vehicle system may cause widespread disruption. The level of disruption is determined by several factors: the degree of connectivity in the system; traffic density; and individual vehicle response. The last of these depends in part on the type of control, ranging from fully human-controlled to computer-controlled (automated). Consider these two examples where false messages are inserted into a connected vehicle system:

A driver in heavy traffic is suddenly barraged with urgent but false warnings from the vehicle’s active safety system and the vehicle begins to take evasive action using automatic braking and steering features. Other vehicles react accordingly and the traffic comes to a standstill.

Or, highway drivers at a given location receive an incorrect message that an accident has occurred ahead and closed the highway. An alternate route is proposed, which takes them off the highway onto arterial roadways. Congestion develops on these roads and eventually backs up onto the exit ramp, causing additional congestion on the highway.

These scenarios are plausible, but the point is that systemic disruption is possible if CV messages are falsely generated and then trusted as accurate.

PKI approach to security

The 324 US Department of Transportation’s Research & Innovation Technology Administration recently published a series of reports describing a proposed public key infrastructure (PKI) approach for securing vehicle-to-vehicle (V2V) and vehicle-to-infrastructure communications. A PKI system uses certificates to establish trust in communications. The sender digitally signs the message and attaches a certificate. The recipient uses this to verify the sender’s credentials. However, this verification is accepted only if issued by a trusted certificate authority (CA). The advantage of a PKI system is that it enables vehicles to trust each other regardless of whether they are near roadside equipment.

The most difficult problem with the PKI approach is the distribution, management and revocation of certificates. In theory, a certificate will be revoked if it is used to “spoof” another’s identity or to send incorrect data caused either by equipment malfunction or a deliberate act. Periodically the CA will issue a certificate revocation list (CRL) that enables vehicles to detect when a message comes from a malfunctioning or uncertified source. Even with this brief description, it is clear that there are substantial technical problems in designing a PKI system for 250 million privately owned and operated vehicles with no central registration, licensing, or administrative authority. Further complicating the system, vehicles may be registered in one locale while connecting to Intelligent Transportation Systems infrastructure in a different region, state, or country. Yet more complexity is added by privacy concerns that require message anonymity to deter tracking and monitoring.

 With these issues in mind, let us consider the proposed PKI and certificate management system. This could take the form of any of five different types:

  • On-Board Equipment (OBE) – Dedicated Short Range Communication radio or other vehicle component that stores the certificates and signs the messages.
  • Certificate Authority (CA) – generates certificates and CRLs.• Registration Authority (RA) – validates OBE requests for keys and certificates, obtains them from the CA, and distributes them to the OBEs.

  • Linkage Authority (LA) – maintains a linkage between groups of certificates issued to a single OBE.

  • Misbehavior Detection & Management – collects and analyses misbehaviour reports to detect OBEs whose certificates should be revoked.
The LA and the use of short-term certificates show how privacy concerns complicate the picture. To protect privacy, the certificates use an identifier that cannot be linked to a person or vehicle without assistance from the LA.

To prevent tracking, vehicles change certificates (and identifiers) every five minutes. It is clearly not feasible to issue certificates at this rate, so the RA instead sends the OBE a full year’s worth of five-minute certificates.

This amounts to over 100,000 certificates per year for each vehicle. 

Certificates are encrypted by month, so the OBE must request a new key from the RA each month to unlock the next group of certificates.

The OBE is also issued a long-term certificate but its use is limited to fail-safe conditions when short-term certificates are unavailable.  

Multiple methods have been proposed for detecting defective or rogue source of data, ranging from on-board hardware checks to global sampling of reports from multiple vehicles.

For example, the OBE can compare ECU component identification to detect when it is installed in a different vehicle. At a local level, the OBE can assess the consistency of its own sensor data with incoming messages to check for plausibility. At a global level, infrastructure can randomly collect messages from vehicles to determine if multiple messages contain certificates issued to the same OBE. Misuse detection is critical to the success of connected vehicles and although there are numerous ideas, work in this area is just beginning.  

Problems in managing certificates

An important practical question is how the vehicle OBE will initially register with the RA.  It has been suggested that this should occur when the vehicle arrives at the dealership.  However, this puts the dealer in the position of safeguarding access to certificates, as its computer system could be vulnerable to external hackers and malicious insiders attempting to steal certificates.   
The end of a vehicle’s life raises another practical concern. When a vehicle is junked, the OBE could easily be recovered. Once an attacker has physical possession, there are methods for extracting the OBE’s memory and recovering its certificates. With these recovered credentials, the attacker could obtain new certification and keys from the CA. Assuming that vehicle certificates could be stolen from the junkyard, the dealership computer, or the supply chain, it is conceivable that a black market would spring up, similar to the internet spammer black market for renting botnets. CRLs are insufficient to protect against this scenario; there must also be a method for tracking vehicles’ end-of-life and destroying the OBE memory. 

A third practical concern is the trustworthiness of sensor input to the OBE, as data sent over an internal vehicle bus such as CAN or FlexRay is rarely authenticated. Doing so would be impractical due to size, power and cost constraints. The security approach must consider such issues throughout the vehicle supply chain.

Improving confidence in V2V

The proposed PKI approach is a good starting point for connected vehicle security; however, there remain gaps to complete trust in V2V messages because there are multiple scenarios in which legitimate messages could lack authentication or be signed by an expired certificate. This problem is of less concern for messages from roadside equipment, where tight control over equipment and certificates is possible.

For V2V messages, it is useful to differentiate between authentication and trust. A signed message carries a high level of trust, however other indicators can be used to raise or lower this trust level. A trust level can be established over time, not for a single message, but for an event, by adding contextual information. For example, messages relating to an event will be more highly trusted if they are received from several sources.  On-board sensors can also be used to check the consistency of a message. If a vehicle receives a warning message regarding icy road conditions, but the external temperature sensor reads 74°F, the message can be very likely be considered untrustworthy. 

Messages from roadside equipment, or other “trusted sources,” such as police, fire, and emergency vehicles could be assigned special certificates with a higher degree of trust.  The age of a certificate and the reputation of the agency that issued it may also be used to rate trustworthiness as some states may exert tighter security controls than others. 

Figure 2 illustrates a high-level architecture in which the vehicle uses this multi-factor approach for determining the trust value of a message. CV security, from the individual vehicle to entire traffic systems, will benefit from using message authentication, reputation, context clues, and on-board sensors to determine the reality of a situation, prior to taking action.

Building strong security into the connected vehicle system will come at a cost, but not doing so could incur much greater cost. There is an overlap in methods for assessing trust and in methods for identifying bad or rogue sources of information. Connected vehicle communication requires both. Investment in research to develop and tune these methods offers a viable and efficient path to strengthening the proposed certificate-based security system.

Paul Avery is group leader of research and development within the Cooperative Systems Group at the 5690 Southwest Research Institute (SwRI) in San Antonio, Texas. Sandra Dykes is a principal scientist in commmunications and embeddded systems for SwRI, which has been involved in all phases of the USDOT Connected Vehicle program, including standards development and independent testing and evaluation.

For more information on companies in this article

Related Content

  • EETS: still struggling to become reality
    December 4, 2013
    Erich Erker, Norbert Schindler, Peter Tschulik from Siemens Electronic Tolling examine the barriers to EETS deployment. Tolling in Europe was introduced to pay for the construction and operation of individual tunnels, bridges and highways and has evolved in major steps. The original manual tolling systems were highly disruptive to traffic flow and required the creation of large toll plazas, with multiple lanes and toll booths to ensure an acceptable throughput. With the introduction of Dedicated Short Range
  • Camera technology a flexible and cost-effective option
    June 7, 2012
    Perceptions of machine vision being an expensive solution are being challenged by developments in both core technologies and ancillaries. Here, Jason Barnes and David Crawford look at the latest developments in the sector. A notable aspect of machine vision is the flexibility it offers in terms of how and how much data is passed around a network. With smart cameras, processing capabilities at the front end mean that only that which is valid need be communicated back to a central processor of any descripti
  • Priority boosts ridership and cuts congestion
    May 4, 2016
    Transit priority is proving a win-win in Europe and Australia. David Crawford reports. Technology that integrates with the Australian-originated Sydney Coordinated Adaptive Traffic System (SCATS) is driving bus signal priority and performance analysis initiatives on both sides of the world; in its homeland, with a major deployment in 2015, and in the capital of the Republic of Ireland.
  • AVs could worsen air quality, says report
    March 15, 2021
    Canadian experts say need for data also threatens privacy and increases cybersecurity risk