Exploiting Partial Order of Keys to Verify Security of a Vehicular Group Protocol
AI-generated Key Points
- The paper focuses on the security evaluation of a vehicular platooning protocol designed to enhance road traffic efficiency, safety and reduce fuel consumption.
- The authors perform a systematic analysis of the protocol and security standards to ensure secure deployment of these applications.
- They use a proof strategy based on a relation on keys to tackle the complexity of the resulting model.
- The key relation forms a partial order that encapsulates both secrecy and authenticity dependencies.
- The authors compare different proof strategies such as Bare TAMARIN, Lemma reuse, Oracle only and Order-aware.
- Their order-aware approach makes verification feasible and proves strong authenticity properties along with secrecy of all keys used throughout the protocol.
- The paper provides a formal analysis of Ensemble - a pre-standardization vehicular group formation protocol with key establishment and distribution - through defining secrecy and authentication relations applied in a proof strategy based on their partial order.
- The authors automate key hierarchy extraction from TAMARIN models by creating oracles to guide prover based on ordering keys while using ASN.1 definitions from standards as well as compilers to generate sample packets for refining message protocols avoiding misinterpretations or ambiguities from multiple documents.
- They discuss weaknesses found within IEEE and ETSI security message formats when appropriate checks are not performed by vehicles.
- They suggest that formally describing agent behavior towards received data and appropriate security checks could be a point of discussion in the context of standardization work.
- Finally, they believe that an automated security analysis should be able to derive without manual intervention the ideal tuning for TAMARIN in formal analysis of several complex protocols while contributing to future work on analyzing vehicular platooning.
Authors: Felipe Boeira, Mikael Asplund
Abstract: Vehicular networks will enable a range of novel applications to enhance road traffic efficiency, safety, and reduce fuel consumption. As for other cyber-physical systems, security is essential to the deployment of these applications and standardisation efforts are ongoing. In this paper, we perform a systematic security evaluation of a vehicular platooning protocol through a thorough analysis of the protocol and security standards. We tackle the complexity of the resulting model with a proof strategy based on a relation on keys. The key relation forms a partial order, which encapsulates both secrecy and authenticity dependencies. We show that our order-aware approach makes the verification feasible and proves strong authenticity properties along with secrecy of all keys used throughout the protocol.
Ask questions about this paper to our AI assistant
You can also chat with multiple papers at once here.
Assess the quality of the AI-generated content by voting
Score: 0
Why do we need votes?
Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.
The previous summary was created more than a year ago and can be re-run (if necessary) by clicking on the Run button below.
Similar papers summarized with our AI tools
Navigate through even more similar papers through a
tree representationLook for similar papers (in beta version)
By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.
Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.