Publication result detail

Safety and Security of the Car-Sharing System

ARM, J.; DVORSKÝ, P.; FIEDLER, P.; FALCOU, C.; ORLICKÝ, J.

Original Title

Safety and Security of the Car-Sharing System

English Title

Safety and Security of the Car-Sharing System

Type

Paper in proceedings (conference paper)

Original Abstract

In the SECREDAS project, the car-sharing system embodies one of the laboratory demonstrators (pilots). The system consists of an embedded device for car access, a backend server, and a mobile app. In addition, the system can be easily adapted to an access control system in general, such as car fleet management. Our team designed, implemented, and validated the system in a laboratory environment, therefore TRL (Technology Readiness Level) 4 was achieved. The implementation was also supported by design patterns developed in the project. Moreover, we addressed the security, safety, and privacy issues. This article reports the progress of work and the results achieved. Key aspects such as Identity management, Representative State Transfer (REST) API (Application Programming Interface), threat assessment and key transfer methods are also described in more detail. In this work, the symmetric rent token (car key) is heavily used; however, other techniques are presented. Copyright (c) 2022 The Authors This is an open access article under the BY-NC-ND license (https://creativecommons.org/license/by-nc-nd/4.0/)

English abstract

In the SECREDAS project, the car-sharing system embodies one of the laboratory demonstrators (pilots). The system consists of an embedded device for car access, a backend server, and a mobile app. In addition, the system can be easily adapted to an access control system in general, such as car fleet management. Our team designed, implemented, and validated the system in a laboratory environment, therefore TRL (Technology Readiness Level) 4 was achieved. The implementation was also supported by design patterns developed in the project. Moreover, we addressed the security, safety, and privacy issues. This article reports the progress of work and the results achieved. Key aspects such as Identity management, Representative State Transfer (REST) API (Application Programming Interface), threat assessment and key transfer methods are also described in more detail. In this work, the symmetric rent token (car key) is heavily used; however, other techniques are presented. Copyright (c) 2022 The Authors This is an open access article under the BY-NC-ND license (https://creativecommons.org/license/by-nc-nd/4.0/)

Keywords

Security; car sharing; authentication; identity management; safety; privacy

Key words in English

Security; car sharing; authentication; identity management; safety; privacy

Authors

ARM, J.; DVORSKÝ, P.; FIEDLER, P.; FALCOU, C.; ORLICKÝ, J.

RIV year

2023

Released

20.05.2022

Publisher

ELSEVIER

Location

AMSTERDAM

Book

IFAC Conference on Programmable Devices and Embedded Systems (PDES)

ISBN

2405-8963

Periodical

IFAC-PapersOnLine

Volume

55

Number

4

State

United Kingdom of Great Britain and Northern Ireland

Pages from

121

Pages to

126

Pages count

6

URL

BibTex

@inproceedings{BUT179281,
  author="Jakub {Arm} and Petr {Dvorský} and Petr {Fiedler} and Cyrille {Falcou} and Jan {Orlický}",
  title="Safety and Security of the Car-Sharing System",
  booktitle="IFAC Conference on Programmable Devices and Embedded Systems (PDES)",
  year="2022",
  journal="IFAC-PapersOnLine",
  volume="55",
  number="4",
  pages="121--126",
  publisher="ELSEVIER",
  address="AMSTERDAM",
  doi="10.1016/j.ifacol.2022.06.020",
  issn="2405-8971",
  url="https://www.sciencedirect.com/science/article/pii/S2405896322003354?via%3Dihub"
}