Exploiting Partial Order of Keys to Verify Security of a Vehicular Group Protocol
Vehicular networks will enable a range of novel applications to enhance road traffic efficiency, safety, and reduce fuel consumption. As for other cyber-physical systems, security is essential to the deployment of these applications and standardisation efforts are ongoing. In this paper, we perform...
Saved in:
Published in | 2022 IEEE 35TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2022) pp. 305 - 318 |
---|---|
Main Authors | , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.08.2022
|
Series | Proceedings IEEE Computer Security Foundations Symposium |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Vehicular networks will enable a range of novel applications to enhance road traffic efficiency, safety, and reduce fuel consumption. As for other cyber-physical systems, security is essential to the deployment of these applications and standardisation efforts are ongoing. In this paper, we perform a systematic security evaluation of a vehicular platooning protocol through a thorough analysis of the protocol and security standards. We tackle the complexity of the resulting model with a proof strategy based on a relation on keys. The key relation forms a partial order, which encapsulates both secrecy and authenticity dependencies. We show that our order-aware approach makes the verification feasible and proves authenticity properties along with secrecy of all keys used throughout the protocol. |
---|---|
ISBN: | 9781665484176 9781665484183 1665484187 1665484179 |
DOI: | 10.1109/CSF54842.2022.9919664 |