Design Automation for Embedded Systems

, Volume 22, Issue 3, pp 215–224 | Cite as

TEE based session key establishment protocol for secure infotainment systems

  • Sungbum Lee
  • Jong-Hyouk LeeEmail author


Most vehicles are now produced with infotainment features. However, as reported in various security conferences, security vulnerabilities associated with an infotainment system can cause serious security issues, e.g., an attacker can control in-vehicle systems through the infotainment system. To address such security issues, in this paper, we propose a session key establishment protocol using Elliptic Curve Cryptography. The proposed protocol enables secure authentication and key distribution between a user device and a telematics control unit. We also shows how a trusted execution environment is used for the proposed protocol. We present detailed protocol operations with conducted security analysis results.


In-vehicle infotainment Trusted execution environment Elliptic Curve Cryptography 



  1. 1.
    Elgaml N, Khattab A, Mourad H-A (2017) Towards low-delay and high-throughput cognitive radio vehicular networks. ICT Express 3(4):183–187CrossRefGoogle Scholar
  2. 2.
    Gragnani GL, Bergamaschi S, Montecucco C (2017) Algorithm for an indoor automatic vehicular system based on active RFIDs. ICT Express 3(4):188–192CrossRefGoogle Scholar
  3. 3.
    Nguyen TDT, Le T-V, Pham H-A (2017) Novel storecarryforward scheme for message dissemination in vehicular ad-hoc networks. ICT Express 3(4):193–198CrossRefGoogle Scholar
  4. 4.
    Ansari S, Boutaleb T, Sinanovic S, Gamio C, Krikidis I (2017) MHAV: multitier heterogeneous adaptive vehicular network with LTE and DSRC. ICT Express 3(4):199–203CrossRefGoogle Scholar
  5. 5.
    Nakamura Y, Harada K, Nishi H (2018) A privacy-preserving sharing method of electricity usage using self-organizing map. ICT Express 4(1):24–29CrossRefGoogle Scholar
  6. 6.
    Mashima D, Serikova A, Cheng Y, Chen B (2018) Towards quantitative evaluation of privacy protection schemes for electricity usage data sharing. ICT Express 4(1):35–41CrossRefGoogle Scholar
  7. 7.
    Ilavendhan A, Saruladha K (2018) Comparative study of game theoretic approaches to mitigate network layer attacks in VANETs. ICT Express 4(1):46–50CrossRefGoogle Scholar
  8. 8.
    Miller C et al (August 2015) Remote exploitation of an unaltered passenger vehicle. Black Hat USAGoogle Scholar
  9. 9.
    Hexa Research (2017) Automotive infotainment market size and forecast, by vehicle (passenger cars, commercial vehicle), by operating system (Linux, QNX, Microsoft) and trend analysis, 2014–2024. Hexa Research, USAGoogle Scholar
  10. 10. Accessed 07 May 2018
  11. 11.
    Klecha M et al (April 2007) System architecture for a modular and distributed solution for next generation car infotainment systems. In: International conference on consumer electronics, 2007. ICCE 2007. Digest of technical papers. IEEEGoogle Scholar
  12. 12.
    Liu Q et al (2003) Digital rights management for content distribution. In: Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003, vol 21, pp 49–58Google Scholar
  13. 13.
    Sabt M et al (December 2015) Trusted execution environment: what it is, and what it is not. Trustcom/BigDataSE/ISPA, 2015 IEEEGoogle Scholar
  14. 14.
    Maene P et al (2018) Hardware-based trusted computing architectures for isolation and attestation. IEEE Trans Comput 67(3):361–374MathSciNetCrossRefzbMATHGoogle Scholar
  15. 15.
    GlobalPlatform (January 2017) Globalplatform device technology TEE sockets API specification version 1.0.1. GPD SPE 100, GlobalPlatformGoogle Scholar
  16. 16.
    Lind J et al (July 2017) Teechain: scalable blockchain payments using trusted execution environments. Preprint. arXiv:1707.05454
  17. 17.
    Liu R et al (June 2017) PROTC: PROTeCting Drone’s peripherals through ARM TrustZone. In: Proceedings of the 3rd workshop on micro aerial vehicle networks, systems, and applications. ACM, pp 1–6Google Scholar
  18. 18.
    He D et al (2016) Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography. IET Commun 10(14):1795–1802CrossRefGoogle Scholar
  19. 19.
    Schnorr C-P (1991) Efficient signature generation by smart cards. J Cryptol 4(3):161–174CrossRefzbMATHGoogle Scholar
  20. 20.
    Lee J-H (2018) BIDaaS: blockchain based ID as a service. IEEE Access 6:2274–2278CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Protocol Engineering LabSangmyung UniversityCheonanSouth Korea

Personalised recommendations