liu.seSearch for publications in DiVA
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Decentralized Firmware Attestation for In-Vehicle Networks
Linköping University, Department of Computer and Information Science, Database and information techniques. Linköping University, Faculty of Science & Engineering.
Linköping University, Department of Computer and Information Science. Linköping University, Faculty of Science & Engineering.
Linköping University, Department of Computer and Information Science, Software and Systems. Linköping University, Faculty of Science & Engineering.ORCID iD: 0000-0003-1916-3398
Linköping University, Department of Computer and Information Science, Database and information techniques. Linköping University, Faculty of Science & Engineering.ORCID iD: 0000-0002-9829-9287
2021 (English)In: ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS, ISSN 2378-962X, Vol. 5, no 1, article id 7Article in journal (Refereed) Published
Abstract [en]

Todays vehicles are examples of Cyber-Physical Systems (CPS) controlled by a large number of electronic control units (ECUs), which manage everything from heating to steering and braking. Due to the increasing complexity and inter-dependency of these units, it has become essential for an ECU to be able to ensure the integrity of the firmware running on other ECUs to guarantee its own correct operation. Existing solutions for firmware attestation use a centralized approach, which means a single point of failure. In this article, we propose and investigate a decentralized firmware attestation scheme for the automotive domain. The basic idea of this scheme is that each ECU can attest to the state of those ECUs on which it depends. Two flavors of ECU attestation, i.e., parallel and serial solution, were designed, implemented, and evaluated. The two variants were compared in terms of both detection performance (i.e., the ability to identify unauthorized firmware modifications) and timing performance. Our results show that the proposed scheme is feasible to implement and that the parallel solution showed a significant improvement in timing performance over the serial solution.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2021. Vol. 5, no 1, article id 7
Keywords [en]
ECU; attestation; firmware; communication system security; integrity
National Category
Computer Engineering
Identifiers
URN: urn:nbn:se:liu:diva-174161DOI: 10.1145/3418685ISI: 000612579900007Scopus ID: 2-s2.0-85100299272OAI: oai:DiVA.org:liu-174161DiVA, id: diva2:1537215
Note

Funding Agencies|Center for Industrial Informatics (CENIIT) [17.01]; RICS: the research centre on Resilient Information and Control Systems - Swedish Civil Contingencies Agency (MSB)

Available from: 2021-03-15 Created: 2021-03-15 Last updated: 2021-03-22Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Search in DiVA

By author/editor
Rawat, AbhimanyuKhodari, MohammadAsplund, MikaelGurtov, Andrei
By organisation
Database and information techniquesFaculty of Science & EngineeringDepartment of Computer and Information ScienceSoftware and Systems
Computer Engineering

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 116 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf