Page 61 - ATZ11 November 2019 Professional
P. 61

In this way, new attack vectors can   REQUIREMENTS                tem is only as strong as its weakest
            arise which the automotive industry                                 entity or unsecured interface of its
            and the end consumer have not yet   The requirements for virtual vehicle    communication channels. Therefore,
            encountered. With a virtual vehicle key   keys have included more than the just   a security-conscious orchestration
            in particular, the interconnectedness   above-mentioned analysis of the entire   of all entities in their diversity is of
            extends deep into the vehicle system   ecosystem and new attack vectors. Many   decisive importance.
            until the immobilizer is deactivated. If   years of experience in insurer internal   This makes it even more important
            the ecosystem is insufficiently designed,   theft and security research, industry-spe-  for the automotive industry during the
            far-reaching risks arise that a vehicle   cific regulation and compensation pro-  design of the ecosystem, not to restrict
            user cannot assess in everyday life.   cesses and the protection of customers   itself to the entity vehicle and its inter-
            Therefore, the responsibility for virtual   against unjustified suspicion also char-  faces to other entities, but to consider the
            keys must not simply be delegated to   acterize these technical guidelines.  entire spectrum of security measures in
            the customer.                       The requirements are structured into   combination. On the vehicle side, the
              FIGURE 3 shows schematically possible   four chapters [2]. In the first part, the   selection of parts that are now to be cer-
            attack vectors on the ecosystem of vir-  requirements for the overall system   tified specifically for safety-critical appli-
            tual vehicle keys. Unauthorized access    based on the current IT basic protection   cations remains important.
            to backend or communication channels   of the BSI are found. These are followed   When designing and implementing
            enables access to the entire ecosystem.  by the requirements for the design and   usage authorizations, the access authori-
              An important attack vector from the   implementation of the usage concept on   zation must be separated from the driv-
            viewpoint of motor insurance is a total   a mobile device. Finally, the backend   ing authorization. For example, an ac -
            theft. A classic theft is committed at the   requirements are formulated as a data-   cess authorization in the trunk for a
            scene of a crime by direct manipulation   bundling entity sensitive to remote at -  courier service must not lead to the sub-
            of the vehicle, such as smashing a win-  tacks. The last part of the requirements   sequent deactivation of the immobilizer.
            dow. The physical proximity to the vic-  deals with forensics in an event of a total   On the procedural side of the system,
            tim and the danger of being discovered   theft and describes transparent data log-  a multi-factor authentication is required.
            can now be replaced by a remote attack   ging and a consistent manufacturer-in-  For an inexperienced user, the additional
            and executed by manipulating data or   dependent revocation procedure for   effort seems unnecessary and time-theft-
            compromising security mechanisms    assigned user authorizations.   ing at first glance. From the perspective
            at the backend, from anywhere in the   The new access and driving authoriza-  of IT security, this fundamentally in -
            world. This creates new attack vectors,   tion systems for networked vehicles must   creases the security of the application
            the so-called cyber risks, which the   in general be protected against unautho-  and makes unauthorized manipulation
            insurance industry is not familiar with   rized access and manipulation in order   significantly more difficult. In order to
            and has not yet gained any empirical   to guarantee the security of the overall   be able to close any potential vulnerabili-
            experience.                       system. The virtual vehicle key ecosys-  ties afterwards, the implementation of an
                                                                                over-the-air interface for remote updates
                                                                                over the lifetime of a vehicle model is
                                                                                essential.
                                                                                  The storage of sensitive data must
                                                                                be performed exclusively on a tamper-
                                                                                proof storage environment in order to
                                                                                protect this data and the security-critical
                                                                                operations against all types of soft-
                                                                                ware-based attacks (for example privi-
                                                                                lege escalation attacks). The transmis-
                                                                                sion channels must be protected against
                                                                                already known relay attacks on keyless
                                                                                locking systems, such as keyless entry
                                                                                and go, and against attacks known from
                                                                                the IT industry, such as side channel
                                                                                attacks and spoofing of entities.
                                                                                  Every reported total theft must be
                                                                                checked for plausibility by the insurers.
                                                                                If a claim occurs, the policyholder must
                                                                                fulfil his contractual obligations and pro-
                                                                                vide information regarding the circum-
                                                                                stances and hand over the complete set
                                                                                of keys to the insurer for checking the
                                                                                completeness of the key set. With virtual
                                                                                keys on smartphones, this process is
            FIGURE 3 Attack vectors on the ecosystem virtual vehicle key (© AZT)  very difficult to manage from a data pro-
            ATZ worldwide 11|2019                                                                            55
   56   57   58   59   60   61   62   63   64   65   66