Featured Research

from universities, journals, and other organizations

On The Road To Secure Car-to-car Communications

Date:
September 28, 2009
Source:
ICT Results
Summary:
A new research project works out how to keep car-to-car data transmissions private and secure from malicious hackers.

A European research project works out how to keep car-to-car data transmissions private and secure from malicious hackers.

You pull out to overtake a slow lorry. Suddenly the lorry swerves into your path. You hit the brakes hard and avert a full-on collision by a whisker.

Thanking your luck, you drive on. But little do you know that the crash was not prevented by your lightening reflexes. Instead it took clever collaboration between the lorry, your car and the cars behind.

While you were stuck behind the lorry, a communications system mounted on your car had connected with one on the lorry. When the lorry swerved, your car immediately knew that it was in your path and automatically applied the brakes.

The extra fraction of a second's braking before you took over made all the difference. And a multi-car pile up was prevented by similar messages as they were relayed from your car to the vehicles behind.

The future in the fast lane

ICT is driving forward a new era of more efficient and safer road travel for European citizens. Just as ABS brake technology dramatically cut accidents and fatalities in the 1980s, vehicle-to-vehicle and vehicle-to-infrastructure communication will make our roads safer still.

But there is a big question to answer before the technology becomes widely adopted: is the communication link secure?

Imagine the chaos that a hacker could cause by sending bogus messages to vehicles. They could tell one car of an accident ahead, make the driver brake hard and actually cause an accident behind. They could invent fake traffic jams, encourage drivers to take alternative routes, then enjoy speeding along clear roads. Insecure communication systems could also let criminals track individual cars (e.g. celebrities, politicians) or harass drivers with unwanted alerts or spam messages.

“Car-makers and equipment manufacturers have to be certain that communication channels between cars and roadside infrastructure are secure from hackers and criminals and that their privacy is maintained,” explains Trialog’s Antonio Kung, coordinator of a European research project that has proposed a blueprint for secure car-to-car (C2C) connections.

The SEVECOM project brought together leading car and equipment manufacturers and ICT research institutes to agree on a security architecture that everyone could easily 'bolt on' to their proprietary C2C applications and ensure secure data transmission.

“The idea was to develop a general solution that conformed to all existing industry standards,” says Kung. “We have developed a way to add a security module to C2C systems.”

“We are interested in the communication 'tube' used to exchange messages among cars and between cars and infrastructure. Our project has looked at technologies and policies that will make the tube secure. We have not developed any new encryption systems,” Kung stresses.

“There's plenty of secure encryption methodologies, but what doesn't exist is the architecture. SEVECOM brought together stakeholders to agree what building blocks to use, where they should go and when they should be used.”

Automobiles anonymous

One of the project's most important proposals is that car communication should not use a fixed ID tag in its transmissions, which would open up the potential for cars to be tracked.

“Instead,” says Kung, “we think that cars should use pseudonyms which get changed several times, for example every time the ignition is turned on or at regular times during a trip. This would make malicious wireless communication tracking of individual vehicles almost impossible.”

The project was made more complicated because an international standard protocol for C2C communication has still not been agreed.

“We had to design a flexible architecture so that it could easily be adapted to conform to a standard once it has been agreed,” explains Kung. “The security module had to be independent of all the other communication technology and protocols involved in transmitting data.”

SEVECOM is now promoting its architecture to other EU-funded projects working in car-to-car and car-to-infrastructure communication systems, like CVIS. CVIS is developing integrated solutions for installation in the vehicle and roadside equipment to allow vehicles to interact with each other and with operators of road infrastructure. CVIS will use SEVECOM’s architecture to provide security in its applications.

SEVECOM received funding from the ICT strand of the EU’s Sixth Framework Programme for research.


Story Source:

The above story is based on materials provided by ICT Results. Note: Materials may be edited for content and length.


Cite This Page:

ICT Results. "On The Road To Secure Car-to-car Communications." ScienceDaily. ScienceDaily, 28 September 2009. <www.sciencedaily.com/releases/2009/09/090915101351.htm>.
ICT Results. (2009, September 28). On The Road To Secure Car-to-car Communications. ScienceDaily. Retrieved July 30, 2014 from www.sciencedaily.com/releases/2009/09/090915101351.htm
ICT Results. "On The Road To Secure Car-to-car Communications." ScienceDaily. www.sciencedaily.com/releases/2009/09/090915101351.htm (accessed July 30, 2014).

Share This




More Matter & Energy News

Wednesday, July 30, 2014

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

Climate Change Could Cost Billions, According To White House

Climate Change Could Cost Billions, According To White House

Newsy (July 29, 2014) A report from the White House warns not curbing greenhouse gas emissions could cost the U.S. billions. Video provided by Newsy
Powered by NewsLook.com
Stranded Whale Watching Boat Returns to Boston

Stranded Whale Watching Boat Returns to Boston

Reuters - US Online Video (July 29, 2014) Passengers stuck overnight on a whale watching boat return safely to Boston. Linda So reports. Video provided by Reuters
Powered by NewsLook.com
Baluchistan Mining Eyes an Uncertain Future

Baluchistan Mining Eyes an Uncertain Future

AFP (July 29, 2014) Coal mining is one of the major industries in Baluchistan but a lack of infrastructure and frequent accidents mean that the area has yet to hit its potential. Duration: 01:58 Video provided by AFP
Powered by NewsLook.com
Easier Nuclear Construction Promises Fall Short

Easier Nuclear Construction Promises Fall Short

AP (July 29, 2014) The U.S. nuclear industry started building its first new plants using prefabricated Lego-like blocks meant to save time and prevent the cost overruns that crippled the sector decades ago. So far, it's not working. (July 29) Video provided by AP
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:

Breaking News:
from the past week

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile: iPhone Android Web
Follow: Facebook Twitter Google+
Subscribe: RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins