certificate, described in the previous Section 3.3. We
do not show the code here, but we remind the readers
that it is publicly available online.
4.3 Security Properties
In Tamarin, security properties are defined as 1st-
order logic formulas, which we use to define the prop-
erties that must be true in order to guarantee ”end-
to-end security” for the communications protected by
OSCORE: (i) The OSCORE master secret actually
remains secret (from the point of view of the adver-
sary) during the certificate enrollment process and the
establishment of the Security Context. (ii) The mes-
sages between services and end-devices are secret, i.e.
no one except the destination of a message can de-
crypt its payload. (iii) The messages between services
and end-devices are authenticated, i.e. both the ser-
vice and the device are certain they talk to each other,
and replay-protected, i.e. an adversary cannot record
an encrypted message and send it a second time to
trick its recipient. Altogether, it ensures that a de-
vice can establish a secure end-to-end channel with
a service and that they can communicate safely even
through an untrusted C-ITS network. No man-in-the-
middle can spy on their communication or imperson-
ate them, and no replay attack is possible.
5 CONCLUSION
In this paper, we present a solution, compatible with
the C-ITS automotive standards and entirely based
on standardized (or soon-to-be standardized) open-
source protocols, to get end-to-end security between
a resource-constrained IoT device and a distant back-
end server, including through an un-trusted vehic-
ular network. It leverages the newly standardized
OSCORE protocol as an application-layer encryption
mechanism to secure a payload even through relays
and proxy forwarding, and it covers the whole life-
cycle of a device, from the original Certificate Enroll-
ment to the communication between service and end-
device through the initial OSCORE Security Context
establishment. Further, we analyzed our solution us-
ing the Tamarin Prover, a well-known and reputable
security analysis tool, and guarantee that our specifi-
cations provide authenticity and secrecy even against
an adversary in full control of the network.
ACKNOWLEDGMENT
This research has partly been funded by the H2020
ECSEL SECREDAS (Grant ID: 783119) and partly
by the H2020 CONCORDIA (Grant ID: 830927).
REFERENCES
Basin, D., Dreier, J., Hirschi, L., Radomirovic, S., Sasse,
R., and Stettler, V. (2018a). A formal analysis of
5g authentication. In Proceedings of the 2018 ACM
SIGSAC Conference on Computer and Communica-
tions Security, pages 1383–1396. ACM.
Basin, D., Radomirovic, S., and Schmid, L. (2018b).
Alethea: A provably secure random sample voting
protocol. In 2018 IEEE 31st Computer Security Foun-
dations Symposium (CSF), pages 283–297. IEEE.
Bormann, C. and Hoffman, P. (October 2013). Concise Bi-
nary Object Representation (CBOR). RFC 7049, In-
ternet Engineering Task Force (IETF).
Cremers, C., Horvat, M., Hoyland, J., Scott, S., and van der
Merwe, T. (2017). A comprehensive symbolic analy-
sis of tls 1.3. In Proceedings of the 2017 ACM SIGSAC
Conference on Computer and Communications Secu-
rity, pages 1773–1788. ACM.
Dolev, D. and Yao, A. (1983). On the security of public key
protocols. IEEE Transactions on information theory,
29(2):198–208.
Festag, A. (2014). Cooperative intelligent transport systems
standards in europe. IEEE Communications Maga-
zine, 52(12):166–172.
La
ˇ
stinec, J. (2017). Security extension of automotive com-
munication protocols using ethernet/ip. Information
Sciences and Technologies Bulletin of the ACM Slo-
vakia, page 49.
Meier, S., Schmidt, B., Cremers, C., and Basin, D. (2013).
The tamarin prover for the symbolic analysis of secu-
rity protocols. In International Conference on Com-
puter Aided Verification (CAV’13), pages 696–701.
Springer.
Nowacki, G., Krysiuk, C., Kopczewski, R., and Paszukow,
B. (2012). Development and standardization of in-
telligent transport systems. International Journal on
Marine Navigation and Safety of Sea Transportation,
6(3).
Postel, J. (August 1980). User Datagram Protocol. RFC
768, Internet Engineering Task Force (IETF).
Pritikin, M., Yee, P., and Harkins, D. (October 2013). En-
rollment over Secure Transport. RFC 7030, Internet
Engineering Task Force (IETF).
Rescorla, E., Barnes, R., and Tschofenig, H. (October
2020). Compact TLS 1.3. Active Internet-Draft, In-
ternet Engineering Task Force (IETF).
Rescorla, E. and Modadugu, N. (January 2012). Datagram
Transport Layer Security Version 1.2. RFC 6347, In-
ternet Engineering Task Force (IETF).
Establishing End-to-End Secure Channel for IoT Devices through an Untrusted C-ITS Network
569