Experiences from implementing the ETSI ITS SecuredMessage service

Nasser Nowdehi, T. Olovsson
{"title":"Experiences from implementing the ETSI ITS SecuredMessage service","authors":"Nasser Nowdehi, T. Olovsson","doi":"10.1109/IVS.2014.6856587","DOIUrl":null,"url":null,"abstract":"Cooperative intelligent transport systems supporting secure vehicle to vehicle and vehicle to infrastructure communications, is becoming a very important topic. The aim of this paper is to share our experiences from implementing the ETSI Intelligent Transport System (ITS) SecuredMessage and sign/verify services on an existing ETSI ITS communication stack (ITSC). We have followed the new ETSI TS 103 097 v1.1.1 standard when implementing the security services, and have made our best to create a robust and secure implementation. Our goal has been to identify flaws and vulnerabilities in our implementation that are caused by weaknesses or deficiencies in the standard and in its description of services. We have then performed an analysis of the protocol, its headers and created test cases used to test our implementation. Several problems were found, and we have also repeated the tests with another, supposedly very stable implementation, provided by Fraunhofer FOKUS. To our surprise, this system also showed unexpected behavior as our system. We show that these problems are the result of weaknesses and complexities in the design of the standard. We present the problems found in our implementation and show what part in the standard was causing the problems. We show that several problems in the standard, mainly due to their complexity, open up for misinterpretation leading to various types of implementation errors. We conclude the paper with proposing changes to the standard to prevent other implementations from repeating the same mistakes.","PeriodicalId":254500,"journal":{"name":"2014 IEEE Intelligent Vehicles Symposium Proceedings","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE Intelligent Vehicles Symposium Proceedings","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IVS.2014.6856587","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 15

Abstract

Cooperative intelligent transport systems supporting secure vehicle to vehicle and vehicle to infrastructure communications, is becoming a very important topic. The aim of this paper is to share our experiences from implementing the ETSI Intelligent Transport System (ITS) SecuredMessage and sign/verify services on an existing ETSI ITS communication stack (ITSC). We have followed the new ETSI TS 103 097 v1.1.1 standard when implementing the security services, and have made our best to create a robust and secure implementation. Our goal has been to identify flaws and vulnerabilities in our implementation that are caused by weaknesses or deficiencies in the standard and in its description of services. We have then performed an analysis of the protocol, its headers and created test cases used to test our implementation. Several problems were found, and we have also repeated the tests with another, supposedly very stable implementation, provided by Fraunhofer FOKUS. To our surprise, this system also showed unexpected behavior as our system. We show that these problems are the result of weaknesses and complexities in the design of the standard. We present the problems found in our implementation and show what part in the standard was causing the problems. We show that several problems in the standard, mainly due to their complexity, open up for misinterpretation leading to various types of implementation errors. We conclude the paper with proposing changes to the standard to prevent other implementations from repeating the same mistakes.
实施ETSI ITS SecuredMessage服务的经验
协同智能交通系统支持安全的车与车、车与基础设施通信,正成为一个非常重要的课题。本文的目的是分享我们在现有的ETSI智能交通系统通信堆栈(ITSC)上实施ETSI智能交通系统(ITS)安全消息和签署/验证服务的经验。在实现安全服务时,我们遵循新的ETSI TS 103 097 v1.1.1标准,并尽最大努力创建一个健壮且安全的实现。我们的目标是识别我们实现中的缺陷和漏洞,这些缺陷和漏洞是由标准及其服务描述中的弱点或缺陷引起的。然后,我们对协议、它的头进行了分析,并创建了测试用例来测试我们的实现。发现了几个问题,我们也用Fraunhofer FOKUS提供的另一个应该非常稳定的实现重复了测试。令我们惊讶的是,这个系统也像我们的系统一样表现出意想不到的行为。我们表明,这些问题是由于标准设计中的弱点和复杂性造成的。我们提出了在我们的实现中发现的问题,并展示了标准中的哪个部分导致了问题。我们展示了标准中的几个问题,主要是由于它们的复杂性,导致了误解,导致了各种类型的实现错误。最后,我们提出了对标准的修改建议,以防止其他实现重复同样的错误。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信