DOI QR코드

DOI QR Code

차량간 보안 통신에서 융합 해시함수를 이용하여 공격에 안전한 통신방법 검증

Verification of a Communication Method Secure against Attacks Using Convergence Hash Functions in Inter-vehicular Secure Communication

  • 이상준 (아주자동차대학 자동차디지털튜닝전공) ;
  • 배우식 (아주자동차대학)
  • Lee, Sang-Jun (Dept. of Automobile Digital Tuning, Ajou Motor College) ;
  • Bae, Woo-Sik (Dept. of AIS Center, Ajou Motor College)
  • 투고 : 2015.07.25
  • 심사 : 2015.09.20
  • 발행 : 2015.09.28

초록

자동차에 정보기술 도입비율이 높아짐에 따라서 최근 스마트 카, 커넥티드 카로 일컬어지기 시작했다. 스마트자동차 시스템이 적용되어 외부 네트워크에서 차량과 접속하게 되면서 통신보안 위협 또한 증가하고 있다. 차량에 다양한 보안 위협에 대한 모의시험 결과로 관련된 취약성이 사회적 이슈와 기사화 되고 있으며, 자동차 융합 보안통신에 대한 연구가 활발히 진행되고 있다. 자동차 해킹이 일반적인 해킹보다 위험한 것은 운전자의 생명위협 및 사회적인 혼란을 야기할 수 있기 때문이다. 본 논문에서는 차량 대 차량, 차 내부 통신 등에 안전한 통신을 위해 해시함수, 난수, 공개키, 타임스탬프 및 Password 등을 이용하여 융합 프로토콜을 설계하였다. 정형검증 도구인 Casper/FDR을 이용하여 검증하였으며 제안한 프로토콜이 보안적으로 양호하게 동작되며 외부 공격자의 공격에 안전함을 확인하였다.

The increase in applying IT to vehicles has given birth to smart cars or connected cars. As smarts cars become connected with external network systems, threats to communication security are on the rise. With simulation test results supporting such threats to Convergence security in vehicular communication, concerns are raised over relevant vulnerabilities, while an increasing number of studies on secure vehicular communication are published. Hacking attacks against vehicles are more dangerous than other types of hacking attempts because such attacks may threaten drivers' lives and cause social instability. This paper designed a Convergence security protocol for inter-vehicle and intra-vehicle communication using a hash function, nonce, public keys, time stamps and passwords. The proposed protocol was tested with a formal verification tool, Casper/FDR, and found secure and safe against external attacks.

키워드

참고문헌

  1. Atallah, R.F.,Khabbaz, M.J.,Assi, C.M., Vehicular networking: A survey on spectrum access technologies and persisting challenges. Vehicular Communications, Vol. 2, Issue. 3, pp. 125-149, 2015. https://doi.org/10.1016/j.vehcom.2015.03.005
  2. Zhu, X., Lu, Y., Zhu, X., Qiu, S., Lightweight and scalable secure communication in VANET. International Journal of Electronics, Vol. 102, Issue. 5, pp. 765-780, 2015. https://doi.org/10.1080/00207217.2014.938255
  3. Hoque, M.A.,Hong, X.,Dixon, B., Efficient multi-hop connectivity analysis in urban vehicular networks. Vehicular Communications, Vol. 1, Issue. 2, pp. 78-90, 2014. https://doi.org/10.1016/j.vehcom.2014.04.002
  4. Aiash M, Mapp G, Lasebae A, Phan R., A survey on authentication and key agreement protocols in heterogeneous networks. International Journal of Network Security & Its Applications, Vol. 4, No. 4, pp. 199-214, 2012. https://doi.org/10.5121/ijnsa.2012.4413
  5. Keun-Ho Lee, A Security Threats in Wireless Charger Systems in M2M. Journal of the Korea Convergence Society, Vol. 4, No. 1, pp. 27-31, 2013. https://doi.org/10.15207/JKCS.2013.4.1.027
  6. Seung-Hwan Kim, Keun-Ho Lee, User Authentication Risk and Countermeasure in Intelligent Vehicles. Journal of the Korea Convergence Society, Vol. 3, No. 1, pp. 7-11, 2012.
  7. WooSik Bae, Inter-device Mutual authentication and Formal Verification in M2M Environment. The Journal of Digital Convergence, Vol. 12, No. 9, pp. 219-224, 2014. https://doi.org/10.14400/JDC.2014.12.9.219
  8. Qi X., A new authenticated key agreement for session initiation protocol. International Journal of Communication Systems 2011; 25:47-54. DOI: 10.1002/dac.1286.
  9. ISO 26262, Road vehicles - Functional safety, Management of functional safety & Concept phase
  10. Aiash M, Mapp G, Lasebae A, Phan R, Loo J., A formally verified AKA protocol for vertical handover in heterogeneous environments using Casper/FDR. EURASIP Journal on Wireless Communications and Networking, Vol. 57, pp. 1-23, 2012.
  11. M. S. Han, W. S. Bae, Security Verification of a Communication Authentication Protocol in Vehicular Security System. Journal of Digital Convergence, Vol. 12, No. 8, pp. 229-234, 2014. https://doi.org/10.14400/JDC.2014.12.8.229
  12. W. S. Bae, Formal Verification of an RFID Authentication Protocol Based on Hash Function and Secret Code. Wireless Personal Communications An International Journal, Vol. 79, No. 4, pp. 2295-1609, 2014.
  13. G. Lowe. Casper: A compiler for the analysis of security protocols. User Manual and Tutorial. Version 1.12, 2009.
  14. Formal systems (Europe) Ltd.: Failures-Divergence Re finement. FDR2 User Manual, 2011.
  15. PRESERVE(PREparing SEcuRe VEhicle-to-X Communication Systems)Deliverable 1.1, Security Requirements of Vehicle Security Architecture, 2011.
  16. Weis, S. et al., Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. Security in Pervasive Computing, Vol. 2802, pp. 201-212, 2003.