TB-Logger: Secure Vehicle Data Logging Method Using Trusted Execution Environment and Blockchain

نویسندگان

چکیده

With the development of IT technologies, event data recorder (EDR) devices are now installed in modern vehicles to record and analyze vehicle-related events. As recorded EDRs began be used as conclusive proof courts, many researchers turned their focus on developing methodologies that can protect from forgery attacks. In general, these existing methods generate verification values for EDR by using a digital signature algorithm. However, do not provide way stored an attacks emergency, such car accident, it is possible properly create value due unexpected sudden events like power supply problem. Thus, this paper, we propose TB-Logger, novel method protects even when there emergency situation. TB-Logger relies trusted execution environment (TEE) attacks, which ultimately result modification, reordering, deletion. addition, utilizes blockchain system store publicly verify generated during event. We evaluated practicality two real vehicles: Hyundai Avante CN7 Tesla Model 3. Through tests, confirmed without incurring any loss.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Teechain: Scalable Blockchain Payments using Trusted Execution Environments

Blockchain protocols such as Bitcoin are gaining traction for exchanging payments in a secure and decentralized manner. Their need to achieve consensus across a large number of participants, however, fundamentally limits their performance. We describe Teechain, a new off-chain payment protocol that utilizes trusted execution environments (TEEs) to perform secure, efficient and scalable fund tra...

متن کامل

SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment

ARM TrustZone, which provides a Trusted Execution Environment (TEE), normally plays a role in keeping security-sensitive resources safe. However, to properly control access to the resources, it is not enough to just isolate them from the Rich Execution Environment (REE). In addition to the isolation, secure communication should be guaranteed between security-critical resources in the TEE and le...

متن کامل

Mobile devices as secure eid reader using trusted execution environments

This work presents a prototype implementation of a smartphone as secure eID reader using NFC technology. The presented approach aims to reach a security level close to standalone smart card readers. This security level will be allowed by the means of a trusted execution environment (TEE) which allows strong isolation and separation for critical applications and provides trusted, not interceptab...

متن کامل

Using Blockchain and smart contracts for secure data provenance management

Blockchain technology has evolved from being an immutable ledger of transactions for cryptocurrencies to a programmable interactive environment for building distributed reliable applications. Although, blockchain technology has been used to address various challenges, to our knowledge none of the previous work focused on using blockchain to develop a secure and immutable scientific data provena...

متن کامل

Secure and Trusted Application Execution on Embedded Devices

Embedded devices have permeated into our daily lives and significant day-to-day mundane tasks involve a number of embedded systems. These include smart cards, sensors in vehicles and industrial automation systems. Satisfying the requirements for trusted, reliable and secure embedded devices is more vital than ever before. This urgency is also strengthened further by the potential advent of the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2023

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2023.3253626