Abstract
We propose the secure procedure for the automated railway update and maintenance. The proposed procedure is derived from the Uptane update framework. Testing and validation phase, additional manual approval procedure and update progress control are integrated into the Uptane framework in order to conform to the railway safety requirements and norms. The possible metadata and repository customization is proposed and specific railway update attacks are discussed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
The industrial partner of our research is an important stakeholder in railway transportation. We can not specify the details of update process due to project specifics. We outline the generic norms and procedures, based on railway specification documents such as [3, 4] and discussion with our partners.
References
Standard: CENELEC - EN 50159. Railway applications - safety-related communication in transmission systems (2010)
Standard: ISA/IEC 62443: Industrial Network and System Security
Standard: EN 50128: railway applications - software for railway control and protection
Standard: EN 50129; railway applications - safety related electronic systems for signalling
Uptane: securing software updates for automobiles (2019). https://uptane.github.io/. Accessed 5 Apr 2019
Airbiquity: OTAmatic update and management (2019). https://www.airbiquity.com/product-offerings/software-and-data-management. Accessed 5 Apr 2019
TUF: The Update Framework (2019). https://theupdateframework.github.io/. Accessed 25 Apr 2019
Uptane IEEE-ISTO Standard for Design and Implementation (2019). https://uptane.github.io/uptane-standard/uptane-standard.html. Accessed 5 Apr 2019
Bellissimo, A., Burgess, J., Fu, K.: Secure software updates: disappointments and new challenges. In: Proceedings of the 10th Conference on USENIX Security Symposium-Volume 10, p. 22. USENIX Association (2001)
Cappos, J., Samuel, J., Baker, S., Hartman, J.: A look in the mirror: attacks on package managers. In: Proceedings of the 15th ACM Conference on Computer and Communication Security, pp. 565–574. ACM Press, New York (2008)
Samuel, J., Mathewson, N., Cappos, J., Dingledine, R.: Survivable key compromise in software update systems. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 61–72. ACM Press, New York (2010)
Asokan, N., Nyman, T., Rattanavipanon, N., Sagedhi, A.-R., Tsudik, G.: ASSURED: architecture for secure software update of realistic embedded devices. In: Proceedings of EMSOFT 2018, Turin, Italy, article No. 16. IEEE Press, Piscataway (2018)
Lewi, K., Kim, W., Maykov, I., Weis, S., Facebook: Securing update propagation with homomorphic hashing (2019). https://eprint.iacr.org/2019/227.pdf. Accessed 24 June 2019
Acknowledgements
I would like to thank Dr. Florentin Rochet and François Koeune (UCL, Crypto group) for the valuable comments on the paper and Eric Denayer and Michel Rousseau (Alstom research) for the valuable discussions on the railway update process. This work has been funded in part by the Walloon Region (competitiveness pole Logistics in Wallonia) through the project Digitrans (convention number 7618).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Galibus, T. (2020). Securing Software Updates for Trains. In: Nadjm-Tehrani, S. (eds) Critical Information Infrastructures Security. CRITIS 2019. Lecture Notes in Computer Science(), vol 11777. Springer, Cham. https://doi.org/10.1007/978-3-030-37670-3_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-37670-3_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-37669-7
Online ISBN: 978-3-030-37670-3
eBook Packages: Computer ScienceComputer Science (R0)