Secure Over-the-Air (OTA) Update Mechanisms for ADAS

Abstract

This research aims to develop robust, resilient, and user-friendly over-the-air (OTA) software update mechanisms for advanced driver assistance systems (ADAS) in modern vehicles. The study conducts a comprehensive review on existing OTA update approaches, identifies security threats and vulnerabilities, and proposes an algorithm that incorporates cryptographic techniques, secure authentication, firmware validation, and rollback protection. The methodology utilized in this study involves secure package generation, distribution, installation, and monitoring, as well as adhering to automotive cybersecurity standards, such as ISO/SAE 21434 and UNECE WP.29. Extensive evaluation of OTA systems is important as it helps to assess their resilience against adversarial attacks, ensures regulatory compliance, and optimizes usability through user studies. The results demonstrate successful execution of secure OTA update mechanisms, preventing risks, fostering reliability and safety of ADAS software updates. The case studies highlight real-world deployments, best practices, and the effectiveness of the developed solution in improving automotive cybersecurity and functional safety.

Country : USA

1 Alex Mathew

  1. Department of Cybersecurity, Bethany College, USA

IRJIET, Volume 8, Issue 4, April 2024 pp. 34-38

doi.org/10.47001/IRJIET/2024.804004

References

  1. Danahata, Amos. "Package Verification Failed - Make It Stop!" XDA Forums, 14 Jan. 2022, xdaforums.com/t/package-verification-failed-make-it-stop.4388055/.
  2. Fareed, Mohammad, and Ali A. Yassin. "Privacy-preserving multi-factor authentication and role-based access control scheme for the E-healthcare system." Bulletin of Electrical Engineering and Informatics, vol. 11, no. 4, 2022, pp. 2131-2141.
  3. Faster Capital. "Cryptography Based Security: Enhancing Message Authentication Codes." FasterCapital, 7 Mar. 2024, fastercapital.com/content/Cryptography-based-security--Enhancing-Message-Authentication-Codes.html.
  4. Federal Student Aid. "Verification, Updates, and Corrections." FSA Partner Connect, 28 Mar. 2021, fsapartners.ed.gov/knowledge-center/fsa-handbook/2022-2023/application-and-verification-guide/ch4-verification-updates-and-corrections.
  5. Li, Yufeng, et al. "Complying with ISO 26262 and ISO/SAE 21434: A Safety and Security Co-Analysis Method for Intelligent Connected Vehicle." Sensors, vol. 24, no. 6, 2024, p. 1848.
  6. Mahmood, Shahid, et al. "Systematic threat assessment and security testing of automotive over-the-air (OTA) updates." Vehicular Communications, vol. 35, 2022, p. 100468.
  7. Mehta, Aryan A., et al. "Securing the Future: A Comprehensive Review of Security Challenges and Solutions in Advanced Driver Assistance Systems." IEEE Access, vol. 12, 2024, pp. 643-678.
  8. Nandavar, Sonali, et al. "Exploring the factors influencing acquisition and learning experiences of cars fitted with advanced driver assistance systems (ADAS)." Transportation Research Part F: Traffic Psychology and Behaviour, vol. 94, 2023, pp. 341-352.
  9. Novikov, Ivan. "Streamline Your Online Security with DTLS: A Guide." Wallarm, 26 Feb. 2024, www.wallarm.com/what/what-is-datagram-transport-layer-security-dtls.
  10. Safitra, Muhammad F., et al. "Counterattacking Cyber Threats: A Framework for the Future of Cybersecurity." Sustainability, vol. 15, no. 18, 2023, p. 13369.
  11. Shankar, Gauri, et al. "Improved Multisignature Scheme for Authenticity of Digital Document in Digital Forensics Using Edward-Curve Digital Signature Algorithm." Security and Communication Networks, vol. 2023, 2023, pp. 1-18.
  12. Sheik, Al T., et al. "Securing Cloud-Assisted Connected and Autonomous Vehicles: An In-Depth Threat Analysis and Risk Assessment." Sensors, vol. 24, no. 1, 2023, p. 241.
  13. SiBrain Technologies. "Exploring Secure Boot Mechanisms in Embedded Systems: Ensuring Firmware Integrity and Authenticity." LinkedIn, 10 Mar. 2024, www.linkedin.com/pulse/exploring-secure-boot-mechanisms-embedded-systems-ensuring-4pdlf.
  14. Xu, Dingjie, et al. "Integrity Authentication Based on Blockchain and Perceptual Hash for Remote-Sensing Imagery." Remote Sensing, vol. 15, no. 19, 2023, p. 4860.
  15. Şeker, Özlem, et al. "MARAS: Mutual Authentication and Role-Based Authorization Scheme for Lightweight Internet of Things Applications." Sensors, vol. 23, no. 12, 2023, p. 5674.