Skip to main content
European Commission logo
TRIMIS

E-safety Vehicle Intrusion proTected Applications

Project

EVITA - E-safety Vehicle Intrusion proTected Applications


Funding origin:
European
European Union
STRIA Roadmaps:
Connected and automated transport (CAT)
Connected and automated transport
Transport mode:
Road
Road
Transport sectors:
Passenger transport
Passenger transport
Freight transport
Freight transport
Project website:
Duration:
Start date: 01/07/2008,
End date: 31/12/2011

Status: Finished
Funding details:
Total cost:
€5 890 309
EU Contribution:
€3 825 993

Overview

Background & policy context:

Future automotive safety applications based on vehicle-to-vehicle and vehicle-to-infrastructure communication have been identified as a means for decreasing the number of fatal traffic accidents. Examples of such applications are local danger warnings and electronic emergency brakes. While these functionalities inspire a new era of traffic safety, new security requirements need to be considered in order to prevent attacks on these systems. Examples of such threats are forced malfunctioning of safety-critical components or the interference with the traffic flow by means of fake messages.

Objectives:

Secure and trustworthy intra-vehicular communication is the basis for trustworthy communication among cars or between cars and the infrastructure. Therefore, the objective of the EVITA project was to design, verify, and prototype an architecture for automotive on-board networks where security-relevant components are protected against tampering and sensitive data are protected against compromise when transferred inside a vehicle.

By focusing on the protection of the intra-vehicle communication, EVITA complemented other e-safety related projects that focus on the protection of the vehicle-to-X communication.

Furthermore, it is desirable to have a standardised solution for secure automotive on-board networks. This is because:

  • this will reduce technical barriers arising from companies developing different solutions independently;
  • all over the world, the automotive industry faces similar security problems;
  • standards enable third-party semiconductor manufacturers to independently start chip development and production.

Methodology:

Starting from identifying the necessary industrial use cases regarding assembly and field maintenance and compiling profound scenarios of possible threats, the overall security requirements are defined. On this basis a secure trust model will be compiled and a secure on-board architecture and protocol will be specified, verified, validated and, lastly, demonstrated. EVITA will release the architecture and protocol specification as an open standard.

The work plan is as follows:

  1. Security requirements analysis

    Starting from relevant use cases and security threat scenarios, security requirements for on-board networks will be specified. Also legal requirements on privacy, data protection, and liability issues will be considered.

  2. Secure on-board architecture design

    Based on the security requirements and the automotive constraints, a secure on-board architecture and secure on-board communications protocols will be designed. The security functions will be partitioned between software and hardware. The root of trust will be placed in hardware security modules that may be realised as extensions to automotive controllers or as dedicated security controller chips.

    In order to ensure that the identified requirements are satisfied, selected parts of the secure on-board architecture and the communications protocols will be modelled using UML and automata and verified using a set of different but complementary model-based verification tools.

  3. Implementation

    For prototyping, FPGA's will be used to extend standard automotive controllers with the functionality of cryptographic coprocessors. The low-level drivers for interacting with the hardware will be partially generated from UML models.

    For even faster prototyping, the security functionality will also be implemented purely in software. An API will be defined so that applications on top of this API can use the cryptographic functions regardless of whether they are provided in hardware or software. All developed code will be validated to ensure its correctness.

  4. Prototype-based demonstration

    The secure on-board communication will be deployed inside a lab car demonstrating e-safety applications based on vehicle-to-X communication. Cryptographic methods will ensure the integrity and authenticity of information exchanged within the vehicle and will protect the electronic control units against theft, tampering, and unauthorised cloning.

    Releasing t

Contribute! Submit your project

Do you wish to submit a project or a programme? Head over to the Contribute page, login and follow the process!

Submit