Abstract

Fleet Management (FM) deals with the management of transport, distribution, and logistics of national and international goods exchange, in which many operators worldwide are involved. Fleet management involves many security-relevant participating entities, such as vehicles, FM mobile clients, smart trackers with goods, drivers, etc. Existing automated fleet management systems are basically vulnerable to physical replacement attacks when managed by mass-produced electronic identities. Analog Physical Unclonable Functions (PUFs) failed to serve as unclonable electronic identities due to being costly, unstable and inefficient for such mass-usage. We propose in this paper to deploy the Secret Unknown Ciphers (SUCs) techniques introduced a decade ago as digital low-cost clone-resistant identities to be embedded in selected participating electronic Fleet Management System (FMS) units. SUCs, as stable self-created digital modules to be embedded in future smart non-volatile (NV)-FPGA devices, are expected to cover all emerging FMS physical security requirements. Such information-retaining units (when switched-off) are emerging to become widely used as ultra-low-power mass-products in automotive environment. We propose a new FMS security architecture based on embedding SUC modules in each security-relevant entity in the FMS such as vehicles, mobile clients, smart trackers and goods. This paper investigates the expected technical impacts when using SUCs technology as physical security anchors in a standard FMS configuration. Several SUC-related generic security protocols adapted to the FM environment show how to securely-link tracing of goods, tracks routing, and personnel in such FM system. It is also shown how to combine other biometric fingerprints to simplify personal liability and enhance the security management in such globally-operating automated procedures. The presented security analysis of the resulting FMS shows that the major security concerns in existing FMSs can be resolved. One major advantage of SUC technique, is that device-manufacturers can be largely-excluded as security players. The FPGA technology required for the SUC solution is currently not available and is thought for future use. The concept is ultimately applicable if the future electronic mass products would deploy self-reconfiguring non-volatile (flash-based) System on Chip smart units. Such units are expected to dominate future Internet of Things (IoT) ultra-low-energy applications, as power-off does not lose any information. The proposed SUC strategy is highly flexible, scalable, and applicable to cover a large class of globally operating protection mechanisms similar to those of the addressed FMS scenarios.

Highlights

  • Nowadays, the need to monitor goods transport and deployed vehicles during their activities is growing as globalized goods exchange is growing worldwide

  • The enrollment process is divided into two parts: management of fleet entities which can be done by into the fleet on the FMSof web portal, and(mobile, driver registration, smart-tracker) which can be done by the fleet manager on the web portal, and driver registration, which can be done on the Fleet Management (FM) mobile application by the driver

  • A novel security architecture mapped onto future Fleet Management System (FMS) is proposed

Read more

Summary

Introduction

The need to monitor goods transport and deployed vehicles during their activities is growing as globalized goods exchange is growing worldwide. Do not secure all FMS entities (driver, vehicle, mobile, goods) sufficiently, and the open communication paths are making the system vulnerable to wide spectrum of attacks [7]. Such geographically distributed system offers large areas of security gaps like the injection of falsified data and especially, faking position information of vehicles and goods. We propose to embed a low-cost and consistent digital clone-resistant technology, coined as Secret Unknown Ciphers (SUC), in some future FMS entities as unclonable structures to serve as security anchors for the FMSs operating on open and global networks.

Related Work on the Security of FM Systems
Modern Operational FMS Architectures
Sample Modern FM Functional System Architecture
Threat Models and FM-Adversary Types
Assumed Attack Scenarios on Existing FMS
Proposed Enhanced Security Requirements for Future FMS
Proposed New Low Energy Highly Secured FM Structures
Proposed New Clone-Resistant Modules for FMS Components
Clone-Resistant Module for FM Electronic Entities
1: TA injects a software packageand called “GENIE”
4: The challenges the SUC
Combining Biometric Fingerprints as Additional Security Enhancement
Proposed FMS Security Architecture
Sample integration of proposed unclonable identities into
Clone-Resitant
Clone-resitant
Clone-Resitant Smart Tracker and Goods
FM Backend Server with Physical SUC Security
SUC-Related Security Enhancement Protocols
Overview on the System Security Workflow
3: Mutually authenticated imitated and presented authentically to to FMS m mand
Owner Enrollment Setup Process for Clone-Resistant Entities
Enrolling Fleet Management Entities Using SUCs
Sample Driver Registration Protocol
Objective
Driver Actions and System Events Protocol
FMS-Actions Protocol load
Secured Unclonable and Undeniable Position Tracking
10. Secure
F M S 2 must
F M S 1 requests a ticket for the visiting with S U C v from FMS2
Security analysis
Cloning Complexity of FM Entities
Impersonation
Location Tracking Attacks on FMS
Eavesdropping Attacks on FMS Communication Links
Replay Attack
Conclusions

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.