Skip to main content

Need for secure approach to connected vehicle technology

Accidental or malicious issue of false messages to connected vehicles could result in dire consequences, so secure systems of authentication and certification are likely to be necessary, write Paul Avery and Sandra Dykes. Connectivity among vehicles in urban traffic systems will provide opportunity for beneficial impacts such as congestion reduction and greater safety. However, it also creates security risks with the potential for targeted disruption. Security algorithms, protocols and procedures must take
January 7, 2013 Read time: 8 mins
Figure 2: Using trust factors to improve V2V message factors

Accidental or malicious issue of false messages to connected vehicles could result in dire consequences, so secure systems of authentication and certification are likely to be necessary, write Paul Avery and Sandra Dykes.

Connectivity among vehicles in urban traffic systems will provide opportunity for beneficial impacts such as congestion reduction and greater safety. However, it also creates security risks with the potential for targeted disruption. Security algorithms, protocols and procedures must take into account the unique aspects of vehicle and highway systems. Security for a connected vehicle (CV) environment must go beyond message authentication to consider the broader issue of message trust. This is particularly important if the message could trigger a safety-critical response, potentially creating a risk to drivers and passengers.

Security threat scenarios

There are numerous scenarios in which false information inserted into a connected vehicle system may cause widespread disruption. The level of disruption is determined by several factors: the degree of connectivity in the system; traffic density; and individual vehicle response. The last of these depends in part on the type of control, ranging from fully human-controlled to computer-controlled (automated). Consider these two examples where false messages are inserted into a connected vehicle system:

A driver in heavy traffic is suddenly barraged with urgent but false warnings from the vehicle’s active safety system and the vehicle begins to take evasive action using automatic braking and steering features. Other vehicles react accordingly and the traffic comes to a standstill.

Or, highway drivers at a given location receive an incorrect message that an accident has occurred ahead and closed the highway. An alternate route is proposed, which takes them off the highway onto arterial roadways. Congestion develops on these roads and eventually backs up onto the exit ramp, causing additional congestion on the highway.

These scenarios are plausible, but the point is that systemic disruption is possible if CV messages are falsely generated and then trusted as accurate.

PKI approach to security

The 324 US Department of Transportation’s Research & Innovation Technology Administration recently published a series of reports describing a proposed public key infrastructure (PKI) approach for securing vehicle-to-vehicle (V2V) and vehicle-to-infrastructure communications. A PKI system uses certificates to establish trust in communications. The sender digitally signs the message and attaches a certificate. The recipient uses this to verify the sender’s credentials. However, this verification is accepted only if issued by a trusted certificate authority (CA). The advantage of a PKI system is that it enables vehicles to trust each other regardless of whether they are near roadside equipment.

The most difficult problem with the PKI approach is the distribution, management and revocation of certificates. In theory, a certificate will be revoked if it is used to “spoof” another’s identity or to send incorrect data caused either by equipment malfunction or a deliberate act. Periodically the CA will issue a certificate revocation list (CRL) that enables vehicles to detect when a message comes from a malfunctioning or uncertified source. Even with this brief description, it is clear that there are substantial technical problems in designing a PKI system for 250 million privately owned and operated vehicles with no central registration, licensing, or administrative authority. Further complicating the system, vehicles may be registered in one locale while connecting to Intelligent Transportation Systems infrastructure in a different region, state, or country. Yet more complexity is added by privacy concerns that require message anonymity to deter tracking and monitoring.

 With these issues in mind, let us consider the proposed PKI and certificate management system. This could take the form of any of five different types:

  • On-Board Equipment (OBE) – Dedicated Short Range Communication radio or other vehicle component that stores the certificates and signs the messages.
  • Certificate Authority (CA) – generates certificates and CRLs.• Registration Authority (RA) – validates OBE requests for keys and certificates, obtains them from the CA, and distributes them to the OBEs.

  • Linkage Authority (LA) – maintains a linkage between groups of certificates issued to a single OBE.

  • Misbehavior Detection & Management – collects and analyses misbehaviour reports to detect OBEs whose certificates should be revoked.
The LA and the use of short-term certificates show how privacy concerns complicate the picture. To protect privacy, the certificates use an identifier that cannot be linked to a person or vehicle without assistance from the LA.

To prevent tracking, vehicles change certificates (and identifiers) every five minutes. It is clearly not feasible to issue certificates at this rate, so the RA instead sends the OBE a full year’s worth of five-minute certificates.

This amounts to over 100,000 certificates per year for each vehicle. 

Certificates are encrypted by month, so the OBE must request a new key from the RA each month to unlock the next group of certificates.

The OBE is also issued a long-term certificate but its use is limited to fail-safe conditions when short-term certificates are unavailable.  

Multiple methods have been proposed for detecting defective or rogue source of data, ranging from on-board hardware checks to global sampling of reports from multiple vehicles.

For example, the OBE can compare ECU component identification to detect when it is installed in a different vehicle. At a local level, the OBE can assess the consistency of its own sensor data with incoming messages to check for plausibility. At a global level, infrastructure can randomly collect messages from vehicles to determine if multiple messages contain certificates issued to the same OBE. Misuse detection is critical to the success of connected vehicles and although there are numerous ideas, work in this area is just beginning.  

Problems in managing certificates

An important practical question is how the vehicle OBE will initially register with the RA.  It has been suggested that this should occur when the vehicle arrives at the dealership.  However, this puts the dealer in the position of safeguarding access to certificates, as its computer system could be vulnerable to external hackers and malicious insiders attempting to steal certificates.   
The end of a vehicle’s life raises another practical concern. When a vehicle is junked, the OBE could easily be recovered. Once an attacker has physical possession, there are methods for extracting the OBE’s memory and recovering its certificates. With these recovered credentials, the attacker could obtain new certification and keys from the CA. Assuming that vehicle certificates could be stolen from the junkyard, the dealership computer, or the supply chain, it is conceivable that a black market would spring up, similar to the internet spammer black market for renting botnets. CRLs are insufficient to protect against this scenario; there must also be a method for tracking vehicles’ end-of-life and destroying the OBE memory. 

A third practical concern is the trustworthiness of sensor input to the OBE, as data sent over an internal vehicle bus such as CAN or FlexRay is rarely authenticated. Doing so would be impractical due to size, power and cost constraints. The security approach must consider such issues throughout the vehicle supply chain.

Improving confidence in V2V

The proposed PKI approach is a good starting point for connected vehicle security; however, there remain gaps to complete trust in V2V messages because there are multiple scenarios in which legitimate messages could lack authentication or be signed by an expired certificate. This problem is of less concern for messages from roadside equipment, where tight control over equipment and certificates is possible.

For V2V messages, it is useful to differentiate between authentication and trust. A signed message carries a high level of trust, however other indicators can be used to raise or lower this trust level. A trust level can be established over time, not for a single message, but for an event, by adding contextual information. For example, messages relating to an event will be more highly trusted if they are received from several sources.  On-board sensors can also be used to check the consistency of a message. If a vehicle receives a warning message regarding icy road conditions, but the external temperature sensor reads 74°F, the message can be very likely be considered untrustworthy. 

Messages from roadside equipment, or other “trusted sources,” such as police, fire, and emergency vehicles could be assigned special certificates with a higher degree of trust.  The age of a certificate and the reputation of the agency that issued it may also be used to rate trustworthiness as some states may exert tighter security controls than others. 

Figure 2 illustrates a high-level architecture in which the vehicle uses this multi-factor approach for determining the trust value of a message. CV security, from the individual vehicle to entire traffic systems, will benefit from using message authentication, reputation, context clues, and on-board sensors to determine the reality of a situation, prior to taking action.

Building strong security into the connected vehicle system will come at a cost, but not doing so could incur much greater cost. There is an overlap in methods for assessing trust and in methods for identifying bad or rogue sources of information. Connected vehicle communication requires both. Investment in research to develop and tune these methods offers a viable and efficient path to strengthening the proposed certificate-based security system.

Paul Avery is group leader of research and development within the Cooperative Systems Group at the 5690 Southwest Research Institute (SwRI) in San Antonio, Texas. Sandra Dykes is a principal scientist in commmunications and embeddded systems for SwRI, which has been involved in all phases of the USDOT Connected Vehicle program, including standards development and independent testing and evaluation.

For more information on companies in this article

Related Content

  • Nashville meeting smooth path to Tokyo
    May 29, 2013
    Plans for each ITS World Congress to smoothly transition into its successor took a step forward at the April 2013 ITS America Annual Meeting in April. Dr Hiroyuki Watanabe, organising committee chairman for the 2013 event in Tokyo met Jim Barbaresso, his counterpart for the 2014 follow-on in Detroit, Michigan to progress high-level cooperation. Barbaresso, vice president for ITS at engineering company HNTB and a former president of ITS Michigan, told ITS International there will be a common focus on lesson
  • Road usage charge pilot under way
    November 22, 2012
    The Oregon Department of Transportation (ODOT) is undertaking a pilot project to test the next generation of a road usage charge system designed to address funding gaps caused by a rise in fuel efficiency and a decline in gas tax revenue. Around forty volunteers have begun testing the new system, where, instead of paying the gas tax, automatically added at the pump, pilot participants will pay a per mile charge based on the number of miles they drive. The charge is roughly equal to the amount of gas tax the
  • E-tolling is the new normal
    April 29, 2020
    Electronic tolling has become a cornerstone for the next wave of innovation, says IBTTA’s Bill Cramer. So is this the end of the road for toll plazas?
  • Tampa uses Hyundai vehicles in CV pilot
    June 16, 2020
    Demo of the tech in action on roads is expected in September