SEVECOM is an FP6 funded European research project that is working on keeping car-to-car data transmissions private and secure from malicious hackers.
ICT (Information & Communication Technology) is driving forward a new era of more efficient and safer road travel for European citizens. Just as ABS brake technology dramatically cut accidents and fatalities in the 1980s, vehicle-to-vehicle and vehicle-to-infrastructure communication will make our roads safer still.
But there is a big question to answer before the technology becomes widely adopted: is the communication link secure?
Imagine the chaos that a hacker could cause by sending bogus messages to vehicles. They could tell one car of an accident ahead, make the driver brake hard and actually cause an accident behind. They could invent fake traffic jams, encourage drivers to take alternative routes, then enjoy speeding along clear roads. Insecure communication systems could also let criminals track individual cars (e.g. celebrities, politicians) or harass drivers with unwanted alerts or spam messages.
“Car-makers and equipment manufacturers have to be certain that communication channels between cars and roadside infrastructure are secure from hackers and criminals and that their privacy is maintained,” explains Trialog’s Antonio Kung, coordinator of a European research project that has proposed a blueprint for secure car-to-car (C2C) connections.
The SEVECOM project brought together leading car and equipment manufacturers and ICT research institutes to agree on a architecture that everyone could easily ‘bolt on’ to their proprietary C2C applications and ensure secure data transmission.
“The idea was to develop a general solution that conformed to all existing industry standards,” says Kung. “We have developed a way to add a security module to C2C systems.”
“We are interested in the communication ‘tube’ used to exchange messages among cars and between cars and infrastructure. Our project has looked at technologies and policies that will make the tube secure. We have not developed any new encryption systems,” Kung stresses.
“There’s plenty of secure encryption methodologies, but what doesn’t exist is the architecture. SEVECOM brought together stakeholders to agree what building blocks to use, where they should go and when they should be used.”
One of the project’s most important proposals is that car communication should not use a fixed ID tag in its transmissions, which would open up the potential for cars to be tracked.
“Instead,” says Kung, “we think that cars should use pseudonyms which get changed several times, for example every time the ignition is turned on or at regular times during a trip. This would make malicious wireless communication tracking of individual vehicles almost impossible.”
The project was made more complicated because an international standard protocol for C2C communication has still not been agreed.
“We had to design a flexible architecture so that it could easily be adapted to conform to a standard once it has been agreed,” explains Kung. “The security module had to be independent of all the other communication technology and protocols involved in transmitting data.”
SEVECOM is now promoting its architecture to otherprojects working in car-to-car and car-to-infrastructure communication systems, like CVIS. CVIS is developing integrated solutions for installation in the vehicle and roadside equipment to allow vehicles to interact with each other and with operators of road infrastructure. CVIS will use SEVECOM’s architecture to provide security in its applications.
Courtesy: ICT, European Commission.