Skip to main content
Log in

TEE based session key establishment protocol for secure infotainment systems

  • Published:
Design Automation for Embedded Systems Aims and scope Submit manuscript

Abstract

Most vehicles are now produced with infotainment features. However, as reported in various security conferences, security vulnerabilities associated with an infotainment system can cause serious security issues, e.g., an attacker can control in-vehicle systems through the infotainment system. To address such security issues, in this paper, we propose a session key establishment protocol using Elliptic Curve Cryptography. The proposed protocol enables secure authentication and key distribution between a user device and a telematics control unit. We also shows how a trusted execution environment is used for the proposed protocol. We present detailed protocol operations with conducted security analysis results.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Elgaml N, Khattab A, Mourad H-A (2017) Towards low-delay and high-throughput cognitive radio vehicular networks. ICT Express 3(4):183–187

    Article  Google Scholar 

  2. Gragnani GL, Bergamaschi S, Montecucco C (2017) Algorithm for an indoor automatic vehicular system based on active RFIDs. ICT Express 3(4):188–192

    Article  Google Scholar 

  3. Nguyen TDT, Le T-V, Pham H-A (2017) Novel storecarryforward scheme for message dissemination in vehicular ad-hoc networks. ICT Express 3(4):193–198

    Article  Google Scholar 

  4. Ansari S, Boutaleb T, Sinanovic S, Gamio C, Krikidis I (2017) MHAV: multitier heterogeneous adaptive vehicular network with LTE and DSRC. ICT Express 3(4):199–203

    Article  Google Scholar 

  5. Nakamura Y, Harada K, Nishi H (2018) A privacy-preserving sharing method of electricity usage using self-organizing map. ICT Express 4(1):24–29

    Article  Google Scholar 

  6. Mashima D, Serikova A, Cheng Y, Chen B (2018) Towards quantitative evaluation of privacy protection schemes for electricity usage data sharing. ICT Express 4(1):35–41

    Article  Google Scholar 

  7. Ilavendhan A, Saruladha K (2018) Comparative study of game theoretic approaches to mitigate network layer attacks in VANETs. ICT Express 4(1):46–50

    Article  Google Scholar 

  8. Miller C et al (August 2015) Remote exploitation of an unaltered passenger vehicle. Black Hat USA

  9. Hexa Research (2017) Automotive infotainment market size and forecast, by vehicle (passenger cars, commercial vehicle), by operating system (Linux, QNX, Microsoft) and trend analysis, 2014–2024. Hexa Research, USA

  10. https://www.genivi.org/. Accessed 07 May 2018

  11. Klecha M et al (April 2007) System architecture for a modular and distributed solution for next generation car infotainment systems. In: International conference on consumer electronics, 2007. ICCE 2007. Digest of technical papers. IEEE

  12. Liu Q et al (2003) Digital rights management for content distribution. In: Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003, vol 21, pp 49–58

  13. Sabt M et al (December 2015) Trusted execution environment: what it is, and what it is not. Trustcom/BigDataSE/ISPA, 2015 IEEE

  14. Maene P et al (2018) Hardware-based trusted computing architectures for isolation and attestation. IEEE Trans Comput 67(3):361–374

    Article  MathSciNet  MATH  Google Scholar 

  15. GlobalPlatform (January 2017) Globalplatform device technology TEE sockets API specification version 1.0.1. GPD SPE 100, GlobalPlatform

  16. Lind J et al (July 2017) Teechain: scalable blockchain payments using trusted execution environments. Preprint. arXiv:1707.05454

  17. Liu R et al (June 2017) PROTC: PROTeCting Drone’s peripherals through ARM TrustZone. In: Proceedings of the 3rd workshop on micro aerial vehicle networks, systems, and applications. ACM, pp 1–6

  18. He D et al (2016) Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography. IET Commun 10(14):1795–1802

    Article  Google Scholar 

  19. Schnorr C-P (1991) Efficient signature generation by smart cards. J Cryptol 4(3):161–174

    Article  MATH  Google Scholar 

  20. Lee J-H (2018) BIDaaS: blockchain based ID as a service. IEEE Access 6:2274–2278

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jong-Hyouk Lee.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This research was supported by a 2018 Research Grant from Sangmyung University.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lee, S., Lee, JH. TEE based session key establishment protocol for secure infotainment systems. Des Autom Embed Syst 22, 215–224 (2018). https://doi.org/10.1007/s10617-018-9212-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10617-018-9212-5

Keywords

Navigation