Difference between revisions of "SCOTT:WP14"
From its-wiki.no
Josef.Noll (Talk | contribs) (Created page with "{{#set:Page Link=[[{{FULLPAGENAME}}|{{{BASEPAGENAME|}}}]]}} {{TOCright}} ={{PAGENAME}} - Secure Car access = ==Partners in {{PAGENAME}}== {{#ask: Workpackage::{{FULLPAGENAM...") |
Josef.Noll (Talk | contribs) |
||
Line 1: | Line 1: | ||
+ | {{Workpackage | ||
+ | |WP Title=Secure Car Access Solution | ||
+ | |Page Title=WP14 - Secure Car Access Solution | ||
+ | |Project=SCOTT | ||
+ | |Lead partner=NXP AT | ||
+ | |Partner=NXP AT, NXP NL, UiO, | ||
+ | |Objective=Consumers demand more convenience features for their cars. Present passive keyless entry and keyless go systems are based on communications taking place in part using low frequency magnetic induction technology and in part using VHF or UHF radio communications. The proposed secure car access system will add wireless distance bounding technologies in an attempt to identify and prevent certain types of malicious attacks on these systems. Present day car access systems have been demonstrated to be vulnerable to a family of attacks known as “relay attacks”. | ||
+ | |||
+ | In order to provide secure access capabilities to the car manufacturers and ultimately to the consumers a technology is required to both identify and defend successfully against such attacks. Distance bounding between car and car key has been proposed as an effective defence to ensure a “secure” and “trustable” wireless solution. | ||
+ | |||
+ | We propose to address the challenges with the following objectives: | ||
+ | * Develop a radio communications based distance bounding sub-system as an extension to a commercial passive keyless entry system. | ||
+ | * Choose system parameters for the distance bounding sub-system such that the chances of success for a malicious user are minimized. | ||
+ | * Demonstrate the immunity of the proposed solution against selected malicious attacks. | ||
+ | }} | ||
{{#set:Page Link=[[{{FULLPAGENAME}}|{{{BASEPAGENAME|}}}]]}} | {{#set:Page Link=[[{{FULLPAGENAME}}|{{{BASEPAGENAME|}}}]]}} | ||
{{TOCright}} | {{TOCright}} | ||
− | |||
==Partners in {{PAGENAME}}== | ==Partners in {{PAGENAME}}== | ||
{{#ask: [[Workpackage::{{FULLPAGENAME}}]] [[Partner::+]]| ?Page Title |?Lead partner | ?Partner | format=template | template=Partner_listing | {{#ask: [[Workpackage::{{FULLPAGENAME}}]] [[Partner::+]]| ?Page Title |?Lead partner | ?Partner | format=template | template=Partner_listing |
Revision as of 11:25, 23 June 2017
WP14 - Secure Car Access Solution
WP Title: | Secure Car Access Solution |
---|---|
Project: | SCOTT |
Lead partner: | NXP AT |
Leader: | |
Contributors: | NXP AT, NXP NL, UiO |
Objective
Consumers demand more convenience features for their cars. Present passive keyless entry and keyless go systems are based on communications taking place in part using low frequency magnetic induction technology and in part using VHF or UHF radio communications. The proposed secure car access system will add wireless distance bounding technologies in an attempt to identify and prevent certain types of malicious attacks on these systems. Present day car access systems have been demonstrated to be vulnerable to a family of attacks known as “relay attacks”.
In order to provide secure access capabilities to the car manufacturers and ultimately to the consumers a technology is required to both identify and defend successfully against such attacks. Distance bounding between car and car key has been proposed as an effective defence to ensure a “secure” and “trustable” wireless solution.
We propose to address the challenges with the following objectives:
- Develop a radio communications based distance bounding sub-system as an extension to a commercial passive keyless entry system.
- Choose system parameters for the distance bounding sub-system such that the chances of success for a malicious user are minimized.
- Demonstrate the immunity of the proposed solution against selected malicious attacks.
Partners in WP14
- BB23.C HW supported security mechanisms (Virtual Vehicle Research Center, VTT, AVL, Johannes Kepler Universität, TUG, UiO, F-SECURE, TU Delft, IMEC, AIT, FEV, Nokia, Virtual Vehicle Research Center)
- BB23.D Integrated Safety&Security Development (Nokia, AVL, KTH, INDRA, VEMCO, Universidad Politécnica de Madrid, Politechnika Gdanska, IT, Nokia, Virtual Vehicle Research Center)
- BB23.O Security Core - Identification, Authentication and Communication (Nokia, CISC, EAB, F-SECURE, Linz Center of Mechatronics GmbH, PRE, UiO, SBA, VTT, VEMCO, Nokia, Virtual Vehicle Research Center)
- BB23.P Spatial-based authorization and authentication (Politechnika Gdanska, VEMCO, Politechnika Gdanska, PRE, TYCO, University College Cork)
- BB24.I Semantic Attribute Based Access Control (S-ABAC) (UiO, UiO, Wolffia, Smart Innovation Norway)
- BB25.B Energy efficient & resource optimized component concepts for WSNs (NXP NL, NXP NL, NXP AT, AVL)