Log Your Car: Reliable Maintenance Services Record

  • Hafizah Mansor
  • Konstantinos Markantonakis
  • Raja Naeem Akram
  • Keith Mayes
  • Iakovos Gurulian
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10143)


A maintenance services logging system is a useful tool for car owners to keep track of the car’s condition and also can increase the market value of the car. Logging systems range from manual, paper-based, to automated, cloud-based systems. The automated process provides ease of use and availability of the records. A secure protocol is required to ensure that the workshop and service record are authentic, and hence the records are reliable. In this paper, we propose a secure protocol for automated maintenance services logging systems, through the use of a mobile application called AutoLOG. The multiple electronic control units (ECUs) used to support the connected and intelligent vehicle’s technology are used to support the digital automated logging system. The car is the trusted entity that generates the log. The records are stored in an authorised mobile device and uploaded onto a cloud server to ensure availability. The proposed protocol is implemented to measure the performance and is formally analysed using Scyther and CasperFDR, with no known attack found.


Mobile Device Cloud Server Mobile Application Controller Area Network Electronic Control Unit 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    aCar - Car Management, Mileage. Accessed 22 Oct 2016
  2. 2.
  3. 3.
  4. 4.
  5. 5.
    Fake Car Service Histories Spot One In 8 Easy Steps. Accessed 22 Oct 2016
  6. 6.
  7. 7.
    How to Spot a Fake Service History. Accessed 22 Oct 2016
  8. 8.
    Motoriety. Accessed 22 Oct 2016
  9. 9.
  10. 10.
    The Value of a Full Service History. Accessed 22 Oct 2016
  11. 11.
    Toyota Service History. Accessed 22 Oct 2016
  12. 12.
    Amouzegar, F., Patel, A.: Vehicle maintenance notification system using RFID technology. Int. J. Comput. Theor. Eng. 5(2), 312 (2013)CrossRefGoogle Scholar
  13. 13.
    Boss, G.J., Finn, P.G., II Rick, A.H., O’Connell, B.M., Seaman, J.W., Walker, K.R.: Tracking Vehicle Maintenance using Sensor Detection, US Patent 8,311,698, November 2012Google Scholar
  14. 14.
    Cremers, C.: Scyther User Manual, draft edition, February 2014Google Scholar
  15. 15.
    Cremers, C., Mauw, S.: Operational Semantics and Verification of Security Protocols. Springer, Heidelberg (2012)CrossRefzbMATHGoogle Scholar
  16. 16.
    Cremers, C.J.F.: The scyther tool: verification, falsification, and analysis of security protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 414–418. Springer, Heidelberg (2008). doi: 10.1007/978-3-540-70545-1_38 CrossRefGoogle Scholar
  17. 17.
  18. 18.
    Hartwich, F.: CAN with Flexible Data Rate (2012)Google Scholar
  19. 19.
    Henniger, O.: EVITA: E-Safety Vehicle Intrusion Protected Applications. Technical report, EVITA (2011)Google Scholar
  20. 20.
    Henniger, O., Apvrille, L., Fuchs, A., Roudier, Y., Ruddle, A., Weyl, B.: Security requirements for automotive on-board networks. In: 2009 9th International Conference on Intelligent Transport Systems Telecommunications (ITST), pp. 641–646. IEEE (2009)Google Scholar
  21. 21.
    Hiraoka, H., Iwanami, N., Fujii, Y., Seya, T., Ishizuka, H.: Network agents for life cycle support of mechanical parts. In: 2003 3rd International Symposium on Environmentally Conscious Design and Inverse Manufacturing, EcoDesign 2003, pp. 61–64. IEEE (2003)Google Scholar
  22. 22.
    Road vehicles – Controller Area Network (CAN) – part 1: Data link layer and physical signalling. Standard, International Organization for Standardization, February 2013Google Scholar
  23. 23.
    Lowe, G.: A hierarchy of authentication specifications. In: Proceedings of the 10th Computer Security Foundations Workshop, pp. 31–43. IEEE (1997)Google Scholar
  24. 24.
    Lowe, G.: Casper: a compiler for the analysis of security protocols. J. Comput. Secur. 6(1), 53–84 (1998)CrossRefGoogle Scholar
  25. 25.
    Makowitz, R., Temple, C.: FlexRay- a communication network for automotive control systems. In: 2006 IEEE International Workshop on Factory Communication Systems, pp. 207–212 (2006)Google Scholar
  26. 26.
    Mavropoulos, O., Mouratidis, H., Fish, A., Panaousis, E., Kalloniatis, C.: Apparatus: reasoning about security requirements in the internet of things. In: Krogstie, J., Mouratidis, H., Su, J. (eds.) CAiSE 2016. LNBIP, vol. 249, pp. 219–230. Springer, Heidelberg (2016). doi: 10.1007/978-3-319-39564-7_21 Google Scholar
  27. 27.
    Media Oriented Systems Transport Specifications (2006)Google Scholar
  28. 28.
    Microchip. High-Speed CAN Transceiver (2003). Accessed 22 Oct 2016
  29. 29.
    Microchip. PIC18F2480/2580/4480/4580 Data Sheet (2007). Accessed 22 Oct 2016
  30. 30.
    Microchip. Starter Kit I/O Expansion Board Information Sheet (2010). Accessed 22 Oct 2016
  31. 31.
    Microchip. CAN BUS Analyzer Users Guide (2011). Accessed 22 Oct 2016
  32. 32.
    Microchip. CAN/LIN/J2602 PICtail (Plus) Daughter Board Users Guide (2011). Accessed 22 Oct 2016
  33. 33.
    Microchip. MCP2200 Breakout Module User’s Guide (2012). Accessed 22 Oct 2016
  34. 34.
    Microchip. PIC32MZ Embedded Connectivity (EC) Adapter Board Information Sheet (2013). Accessed 22 Oct 2016
  35. 35.
    Microchip. PIC32MZ Embedded Connectivity (EC) Starter Kit Users Guide (2013). Accessed 22 Oct 2016
  36. 36.
    Microchip. Wi-Fi G Demo Board Users Guide (2013). Accessed 22 Oct 2016
  37. 37.
    Microchip. PIC32MZ Embedded Connectivity (EC) Family (2015). Accessed 22 Oct 2016
  38. 38.
    Miranda, P., Siekkinen, M., Waris, H.: TLS and energy consumption on a mobile device: a measurement study. In: 2011 IEEE Symposium on Computers and Communications (ISCC), pp. 983–989. IEEE (2011)Google Scholar
  39. 39.
    Petroulakis, N.E., Askoxylakis, I.G., Traganitis, A., Spanoudakis, G.: A privacy-level model of user-centric cyber-physical systems. In: Marinos, L., Askoxylakis, I. (eds.) HAS 2013. LNCS, vol. 8030, pp. 338–347. Springer, Heidelberg (2013). doi: 10.1007/978-3-642-39345-7_36 CrossRefGoogle Scholar
  40. 40.
    Ruff, M.: Evolution of local interconnect network (LIN) solutions. In: 2003 IEEE 58th Vehicular Technology Conference, VTC 2003-Fall, vol. 5, pp. 3382–3389. IEEE (2003)Google Scholar
  41. 41.
    SAE J1962 Revised APR2002. Standard, SAE Vehicle Electrical and Electronics Diagnostics Systems Standards Committee, April 2002Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Hafizah Mansor
    • 1
  • Konstantinos Markantonakis
    • 1
  • Raja Naeem Akram
    • 1
  • Keith Mayes
    • 1
  • Iakovos Gurulian
    • 1
  1. 1.Information Security Group, Smart Card Centre, Royal HollowayUniversity of LondonLondonUK

Personalised recommendations