Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.

Secure free-floating car sharing for offline cars

: Dmitrienko, Alexandra; Plappert, Christian


Association for Computing Machinery -ACM-; Association for Computing Machinery -ACM-, Special Interest Group on Security, Audit and Control -SIGSAC-:
CODASPY 2017, Seventh ACM on Conference on Data and Application Security and Privacy. Proceedings : Scottsdale, Arizona, USA, March 22 - 24, 2017
New York: ACM, 2017
ISBN: 978-1-4503-4523-1
Conference on Data and Application Security and Privacy (CODASPY) <7, 2017, Scottsdale/Ariz.>
Fraunhofer SIT ()
BLE; NFC; access control; car sharing; desfire EV1

In this paper, we present a new access control system for free-floating car sharing, which achieves a number of appealing features not available in the state-of-the-art solutions. First of all, it does not require online connection for cars, and, therefore, allows car sharing providers to expand their services to areas without reliable network coverage (e.g., with blind spots). Second, the solution is compatible to RFID cards -- the most commonly deployed authentication tokens in car sharing, and can be deployed on standard mobile platforms with various hardware features. Third, it is fully compatible with off-the-shelf cars and does not require any intrusive modifications to car's internals. These new properties can be achieved due to a novel system design which deploys two-factor authentication and combines an RFID card (the real one or emulated in software) with a "soft" authentication token stored on a mobile platform. Such a combination increases security of the solution, preserves backward compatibility to RFID technology and enables great flexibility in protection of authentication secrets on the mobile platform. To demonstrate such a flexibility, we present a platform security concept which can be instantiated in various deployment options and provides the means to achieve best possible security given available hardware.
We implemented our solution on Android and instantiated the platform security concept in three different deployment options. We evaluate security of our solution and report performance measurements.