| Until recently, road vehicles were the realm of mechanical engineers. But with theplummeting costs of electronic components and the permanent willingness of themanufacturers to increase road safety and to differentiate themselves from their competitors,vehicles are becoming"computers on wheels", or rather"computer networks on wheels".For example, a modern car typically contains several tens of interconnected processors; itusually has a central computer as well as an EDR (Event Data Recorder), reminiscent of the"black boxes"used in avionics. Optionally, it also has a GPS (Global Positioning System)receiver, a navigation system, and one or several radars. The interest in a growing numberof applications designed for passenger safety, such as emergency braking, traffic jamdetection and cooperative driving, as well as in applications aiming at the comfort ofpassengers, such as games, chat-rooms and vehicle data-sharing.With improving computation capability and storage, many issues have to bere-considered,such as how to safely work together between the interior parts of thevehicles; how to ensure the integrity and security of the vehicle embedded operating systemand the sensitive information in the vehicles; how to build the trusted relations betweenvehicles. At the same time, the modern vehicles is devoted to merge wirelesscommunication technology and mechanical control technology, and the modern vehiclescan support remote communications, with the existence of the dynamic factors of thenetwork (network size, information real-time, vehicle speed, individual vehicle'slocation ),all of above will introduce new security challenges for vehicles and vehiclescommunication networks.The existing security system, several aspects of these security issues are not in-depthand comprehensive study. The real-time and integrity of the information, the uniquenessand credibility of identity, and the security of communication between mobility vehicles arenot fully considered. Security system alone can not appendages of a vehicle withmechanical systems, but should not be a security problem vehicle communication systemand installation of the system after the patch, but should be part of the system as acommunication vehicle, and other core technologies common progress and development,and eventually become Vehicle Communication System indispensable components.The concept of trusted computing is proposed by the Trusted Computing Group TCG,and its main purpose is to end by enhancing the security of information networks toguarantee the security of the whole significance lies in the information network to build a trust system, each participating end - with a legal identity and credibility, credibility that isverifiable, and it is the same with the concept of trusted in the sociology. In such a trustedenvironment, the term and terminal problems, can be reasonable evidence, so that tofacilitate monitoring and management. Mobile Trusted Module MTM is proposed formobile terminal as a trusted hardware in the Trusted Computing Group in 2007, whichincludes authentication, data integrity checking, security, storage, and trusted boot functions.These security features ensure the integrity of the hardware and software, configurationfiles ,then to further ensure the credibility of the terminal. This is a trusted computing willbe the thoughts and vehicle communications systems combine to build a credible vehicleplatforms to ensure that endpoint security solution based on network security issues.In this paper, we address the security of these networks. We provide a detailed threatanalysis and devise appropriate security architecture. We also describe some major designdecisions still to be made, which in some cases have more than mere technical implications.The trusted computing concept can be combined in the vehicle platform, adding MTMtrusted device in the current vehicle hardware control structure, gives a credibleimplementation plan to construct a credible vehicle platform. Trusted vehicle platformdesign includes the credibility of I / O design, credible and reliable hardware, systemsoftware, system architecture design, not only ensures security, but also to meet thescalability and availability requirements. Based on the protection of the vehicles entitiessystem, vehicle and vehicle users as well as servers are seen as three separate entities toprotect the safety of vehicle communications systems, focusing on how to solve the coreproblem about the vehicle's information storage itself,and about mutual authenticationbetween the user and the vehicle, and about the server verify the identity and the integrityof the vehicle platform, and about transmission of information safely between vehicles.In this paper, we can combine the trusted vehicle platform with the PKI technology, thesecurity system is divided into threeabstractio levels of the transport layer, service layer andapplication layer. In the transport layer, can resolve the security problems by the mutualauthentication between vehicles,vehicle users and servers. In the service layer, can resolvethe security problems by constructing secure communications model between vehicles. Asthe certification process with the participation of the hardware, so it can resist a dictionaryattack, if a user attempts failed, the vehicle system can refused its re-try and isolate this user.Before the communication between the vehicle systems, vehicles build trustedcommunication channels through the mutual authentication mechanism .certificationprocess also needs the help of the integrity t measurement, key management and otherfunctions of the MTM, if both authentication is successful, then begin sending encryptedinformation. |