is no definition of which cryptographicalgorithms can
be used, apart from MD5 and SHA which someone
can infer from the text, what key lengths are sup-
ported, how passwords are generated (in case of pub-
lic key algorithms). So we may deduce that all the
previous versions are lacking the software support of
standard encryption mechanismsfrom the framework.
Cars that are more than 1-2 years old, the encryption
of data and the use of authentication mechanisms was
left on the manufacturers and whether they cooperate
to encrypt the messages by the same way or leave it
plaintext. In the new standard, despite the new addi-
tions and the disclosure of possible attack, data en-
cryption has not become the default policy for data
communication, while there is no referece for authen-
tication with the rest of the system.
Two very common standards that are being used
in vehicle hardware communication, are CAN (Con-
troller Area Network) (CAN) and LIN(Local Inter-
connect Network) (LIN). CAN was introduced by R.
Bosch in 1983, yet it is now covered by ISO 11898.
CAN was originaly designed for automotive applica-
tions, but nowadays it has been widely adopted in the
industry for device automation. On the other hand
LINs are being used for smaller in vehicle systems
and CANs’ subnetworks. Both of these industry stan-
dards are low level protocols and are used as the main
backbone for the communication of the hardware in
the vehicle. Unfortunately, due to their nature, none
of them supports encryption, making them prone to
many attacks, as previously stated.
First types of attack in vehicles where methods
such as breaking and entry, hotwiring, tampering or
even towing and commonly used tools, in order to
connect the battery source to the ignition, the so called
Slim Jim tool to open locks and other formally known
or unknown ways (Auto theft info, 2009; Car theft,
2009). As technology is evolving, all these ways have
also evolved as well, so vehicles nowadays can be
threatened through computerized attacks.
AUTOSAR highlighted vehicle security issues, as
there is major necessity for secure programming of
the Electronic Contol Units (ECUs), but still can be
programmable only by authorized entities, the elec-
tronic immobilizer must always protect the vehicle
from unauthorized driving via specific sets of crypto-
graphic techniques. Furthermore, ECU software con-
fronts the problem of existence of unstructured mul-
tiple unused functions or variants of data and also the
secure diagnosis services.
As immobilizer units, RFID modules and generic
anti-theft mechanisms vary in the way that each au-
tomotive vendor designs them for each vehicle, their
application is based on specific set of cryptographic
routines and services. A very good example of pen-
etrating into these vehicles’ security mechanisms by
exploiting cryptographic primitives is the attacks on
Keeloq algorithm, where a practical key recovery at-
tack (Indesteege et al., 2008; Biham et al., 2007;
Eisenbarth et al., 2008). Another important work by
has proven that the encryption in RFID chipsets used
in vehicles can be cracked without requiring direct
contact, bypassing the security measures of a vehicle
or even of the same immobilizer system (Bono et al.,
2009).
Another vulnerability issue stems from an after-
market product named RFID Zapper. It is an elec-
tronic device that has the capability of permanently
deactivating passive RFID chips without damaging
the chip that is being attacked. Since immobilizers are
based on RFID authentication, it is possible to launch
a DoS on them using proper hardware (RZ, 2010).
Another research revealed vehicle insecurity
through remote exploitation and long dinstance vehi-
cle control. Vulnerabilities where located in the OBD-
II diagnostic port of the vehicles, via the infotain-
ment system of the vehicle (accessories attacks such
as Disk/Mp3 players, USB ports and iPod) and are
indirect physical access methods. They also achieved
short-range wireless access to the vehicles via Blue-
tooth, Remote Keyless Entry, RFIDs, WiFi, and Ded-
icated Short-Range Communications (DSRC). Also
important vulnerability issues where shown through
long-range wireless access attacks exploiting broad-
cast channels and addressable channels (Koscher
et al., 2010),(Checkoway et al., 2011). In another at-
tack scenario (Rouf et al. ,2010), researchers were
able to to track cars and mislead drivers of potential
problems in their vehicles, using as entry point the
wireless tire pressusure monitoring system that mod-
ern cars have, which lack encryption mechanisms.
4 THE PROPOSAL
The first step is to redefine the immobilizer system,
creating a safer environment for all the electronic
modules and the vehicle as an entity. Current immo-
bilizers have in IT terms, an “Accept all” policy to-
wards almost all modules of a vehicle, because only
immobilizer and the vehicle keys are the parts that are
being authenticated and not the vehicle as an entity.
Comparing to IT, no other security policy is applied
or exists for the vehicle components. Therefore, there
is a great need of adopting a “Deny all” policy to-
wards all mechanical and peripheral parts of a vehicle
could result to more secure vehicles and less acts of
thefts. In order to implement this kind of IT security
SecuringIn-vehicleCommunicationandRedefiningtheRoleofAutomotiveImmobilizer
223