Vehicular networks will enable a range of novel applications to enhance road traffic efficiency, safety, and reduce fuel consumption. As for other cyber-physical systems, security is essential to the deployment of these applications and standardisation efforts are ongoing. In this paper, we perform a systematic security evaluation of a vehicular platooning protocol through a thorough analysis of the protocol and security standards. We tackle the complexity of the resulting model with a proof strategy based on a relation on keys. The key relation forms a partial order, which encapsulates both secrecy and authenticity dependencies. We show that our order-aware approach makes the verification feasible and proves strong authenticity properties along with secrecy of all keys used throughout the protocol.
翻译:关于其他网络物理系统,安全是部署这些应用的关键,标准化工作正在进行之中。在本文件中,我们通过对议定书和安全标准的透彻分析,对车辆排队程序进行系统的安全评估。我们用基于钥匙关系的证据战略来处理由此形成的模式的复杂性。关键关系构成一个部分秩序,既包含保密性,又包含真实性依赖性。我们显示,我们的有秩序方法使得核查可行,并证明在整个议定书中所使用的所有钥匙的保密性。