Wlan dialogue from car to car: a question of security

Wlan dialogue from car to car: a question of security

Darmstadt, 2. July 2010 – In the Hessian pilot project Simtd the first cars with Wi-Fi and communicate with each other as with the stations that are built on the test trails. Soon the test fleet with 400 carriages should play critical scenarios, such as braking at the stallend with automatic notification of the subsequent vehicles, as actively tested in the now completed research project. The question remains how certainly the systems must be in the driving network and vaulting.

Traffic light radio

One year after the first Cast forum on data-safe cars, the participants of the International Workshop Mobile Security for Intelligent Cars associated with the communication processes on the micro level, with the cryptographically secured exchange between the ECUs (Electronic Control Units) and the sensors as with the data radio Between vehicles and intelligent pathoges. The requirements of the SIMTD test that constant 20 must be edited in incoming messages and two outgoing messages per second, set the cryptographic methods of narrow limits, especially in verification and authentication. Thus, the C2X communication (CAR TO X) RSA key is used with 1024-bit and 290 byte certificate groove, for the 24-hour pseudonym RSA key with 512 bits and 223 bytes certificate groove. This reported Norbert Bibmeyer (Fraunhofer Sit) and Hagen Stubing (Opel) from the SIMTD test. This test is currently expanded on routes in the Frankfurt urban area. By WLAN, about traffic lights should spark on how long the grunphase will take, which will be communicated to the driver in the cockpit.

Attack over the inlet mirror

Similarly time-critical it goes within the vehicle. Here, within the projects Evita (E-Safety Vehicle Intrusion Protected Applications) and Teresa (Trusted Computing Engineering for Resource Constrained Embedded Systems Application) are researched. Marko Wolf von der Escrypt GmbH presented various hardware modules working with built-in crypto accelerators. The palette ranges from simple modules with AES-128, which communicate with sensors or actuators (Z.B. Pedals) Up to high performance modules with 1 GBit / s data throughput, which can generate and verify 250 signatures based on elliptical curves. Hendrik Schwepche from Eurecom systemed with the Common Transport Protocol of Easis and the interaction with Evita data. He showed over this, with what simple means hacker attacks performed on today’s cars, whose electronics are designed according to the principle security by obscurity. About the unsecured electronic adjustment of the visual mirrors, hackers were able to engage in the data communication in the vehicle, such a theoretical amption. Successfully demonstrated in practice (PDF file) and documented is an attack on the on-board diagnostic interface. Researchers have caught a vehicle and at a standstill on approx. 300 km / h "accelerated".

Like this post? Please share to your friends:
Leave a Reply

;-) :| :x :twisted: :smile: :shock: :sad: :roll: :razz: :oops: :o :mrgreen: :lol: :idea: :grin: :evil: :cry: :cool: :arrow: :???: :?: :!: