not interfere with more critical ones. Matters are
further complicated by the sharing of
communication buses by applications of mixed
criticality and or security, ranging from the mundane
(such as courtesy lights) to safety critical (such as
stability control and braking). These concerns extend
to civil aviation as well. For example the US Federal
Aviation Administration expressed concerns about
the fact that there exists connectivity between
“passenger domain computer systems [and] airplane
critical systems and data networks.” (Federal
Register, 2008)
While there are still few actual attacks, the ease
with which researchers have managed to exploit
vulnerabilities in vehicular platforms has made
evident the need for increased vigilance. Borrowing
from legacy networks researchers have suggested
the well tried methods of protection, such as
firewalling (Keromytis A. et al., 2007), Intrusion
Detection monitors (Muter M., 2009), and so on.
However, none of these techniques addresses the
root problem of these vulnerabilities, namely that the
basic design of the internal network allows anybody
to talk to anybody else. Even in cases where there
are multiple networks, bridged by specific ECUs,
actual attacks have demonstrated that such bridges
offer only nominal resistance to attackers (Eckert C
et al., 2013).
On the other hand, trying to impose a
comprehensive system to control communications
within the vehicular platform using traditional
techniques, such as packet filters on all ECUs is
guarantied to cause configuration problems both
during initial integration, but also during the
upgrades throughout the lifetime of the platform.
The reason is that static access control matrices are
not effective in a changing environment and must be
augmented either by update procedures (e.g. during
reconfiguration) or by a more flexible mechanism.
Moreover, as the number of ECUs increases, so does
the number of the filters that must be configured on
each ECU. Clearly this does not scale well, and is
likely to lead to configuration errors that may stop
the vehicle from functioning as intended, or, worse,
create vulnerabilities that a potential attacker can
exploit.
In addition to access control, we must also
consider what type of security protection we must
grant the various communications links (Laarouchi
Y. et al., 2008). The resource-constrained nature of
embedded environments, and the time-critical nature
of some of these communications implies that we
need to be more selective in the type of protection
we apply to these links (Mahmoud B. et al., 2010).
Moreover, traditional algorithms may be too
resource hungry and could be replaced by low
latency, low power ones such as elliptic curve
cryptography or compressed certificates (Olive M.,
2001).
A technique called the “distributed firewall”
(Ioannidis S. et al., 2000) whereby security policy is
defined centrally and distributed to all computing
platforms in the network offers great promise in
achieving the goal of total control over all
communication links. The key differentiation
between the distributed firewall and the installation
of packet filters on every ECU is that in the latter
case there is no easy way to specify the security
parameters of the communications links and that the
packet filters must be installed in each ECU
separately,. In the case of the distributed firewall, the
security policy is centrally managed and can
accommodate link security parameters.
Nevertheless, creating this security policy is a
very difficult task requiring detailed knowledge of
possible communication paths between all possible
components of the system, making system evolution
(whereby such interactions may change), labor
intensive and error prone.
Our approach is to integrate the evolution of the
security policy into the software development
workflow, allowing the policy to adapt to changing
circumstances during development, integration and
maintenance, so that on one hand the intentions of
the initial designer are preserved, while, on the other
hand, the policy is customized to the requirements of
the actual operational platform.
For example, the designer of a subsystem may
require a communications link to, say, a temperature
sensor, and include appropriate policy to this effect.
Latter, when this subsystem is integrated into a
vehicular platform, the basic policy may be
augmented by the system designer. For example,
depending on the way the particular subsystem is
integrated into the overall architecture, certain
aspects of the communication policy (such as link
integrity, privacy, priority) may need to be specified.
Later on during final integration the policy will be
further refined to include the actual parameters that
define the communications link (e.g. source and
destination addresses, integrity and/or encryption
algorithms, authentication methods and so on).
However, this is not sufficient as adaptations to
the policy may subvert it, or may misinterpret
assumptions made earlier on in the development
process. We, therefore, require that policy is
protected from design all the way to the actual
platform. In order to achieve this, we created a
ICISSP2015-1stInternationalConferenceonInformationSystemsSecurityandPrivacy
156