05/01/2015
The way we access and manage vehicles is undergoing a significant transformation, moving away from traditional physical keys towards sophisticated digital solutions. This shift is driven by the increasing demand for convenience, enhanced security, and seamless integration with the connected ecosystem. At the forefront of this innovation is Bosch, offering a scalable and secure vehicle access solution designed for manufacturers. As a comprehensive system provider, Bosch equips manufacturers with the necessary hardware, intuitive web and smart device applications, and robust cloud services for the secure sharing of digital keys. This allows for flexible management of digital keys, either through a dedicated fleet management user interface or by integrating with existing third-party transport management systems. By leveraging cutting-edge technologies such as Ultra-Wideband (UWB), Bluetooth Low Energy (BLE), and Near Field Communication (NFC), manufacturers can confidently roll out digital vehicle access systems for their trucks and buses, effectively replacing outdated traditional methods.

- Understanding the Core Technology
- System Integration and Key Management
- Security: The Paramount Concern
- The Future of Vehicle Access
- Frequently Asked Questions (FAQs)
- 1. Can I still use my physical key with a digital access system?
- 2. What happens if my phone battery dies?
- 3. Is it safe to share my digital key?
- 4. What if my phone is lost or stolen?
- 5. How does the system handle multiple users and vehicles?
- 6. Which technologies are most commonly used for digital vehicle access?
- 7. How secure is the digital key itself?
Understanding the Core Technology
At its heart, a digital vehicle access system replaces the physical car key with a secure digital credential stored on a user's smartphone or another smart device. This credential communicates with the vehicle using various short-range wireless technologies. Let's delve into the primary technologies involved:
Ultra-Wideband (UWB)
UWB is a radio technology that uses a small portion of the available radio spectrum to transmit data over a short distance. Its key advantage for vehicle access is its exceptional precision in location. Unlike other technologies that might only indicate proximity, UWB can determine the exact position of a device relative to the vehicle, often within centimetres. This allows for highly accurate and secure "walk-up" and "walk-away" locking/unlocking. Imagine approaching your vehicle, and it automatically unlocks as you get close, and locks itself as you move away – all without needing to take your phone out of your pocket. UWB's ability to differentiate between a user standing right next to the car and someone holding a phone in an adjacent building is a significant security enhancement, drastically reducing the risk of relay attacks where a signal is amplified to trick the car into thinking the authorised user is present.
Bluetooth Low Energy (BLE)
BLE is a power-efficient wireless communication protocol designed for short-range data transfer. It's widely used in many consumer electronics, including smartphones, smartwatches, and fitness trackers. In vehicle access systems, BLE facilitates communication between the user's device and the vehicle. While not as precise as UWB for location, BLE is excellent for establishing a secure connection and exchanging data, such as digital key information and commands for locking/unlocking. Its low power consumption ensures that the user's device battery is not unduly drained. BLE can be used for a more general proximity-based access, where the vehicle unlocks when the authorised device is within a certain range.
Near Field Communication (NFC)
NFC is a short-range wireless technology that operates at very close distances, typically a few centimetres. It's the same technology used for contactless payments. For vehicle access, NFC can be used for a more deliberate interaction. For instance, a user might need to tap their smartphone on a specific reader on the car door handle to unlock it. This provides an extra layer of security and confirmation, ensuring that the access is intentional. NFC is also useful for initial key provisioning or for situations where a more direct and secure handshake is required.
System Integration and Key Management
Bosch's approach as a full-service system provider means they handle the entire ecosystem. This includes the secure storage and management of digital keys. Manufacturers can integrate this system into their vehicle platforms, and fleet managers can oversee access permissions.
The digital key itself is a piece of encrypted data that securely identifies the authorised user to the vehicle. This data is typically managed through a secure element on the user's smartphone, providing a hardware-level security foundation. When a user needs to grant access to another individual, such as a family member or a delivery driver, they can do so remotely through the application. This digital key sharing is managed securely via cloud services, ensuring that only authorised individuals can access the vehicle and for the duration specified by the owner.
The flexibility offered by Bosch allows manufacturers to choose the combination of UWB, BLE, and NFC that best suits their needs. Some might opt for a combination for enhanced security and user experience, while others might start with a simpler BLE-based system. This scalability is crucial for widespread adoption.
Security: The Paramount Concern
The question of whether intelligent networked vehicles are secure is paramount. The provided technical analysis delves into the security of a specific designed authentication scheme, using tools like Proverif to verify its robustness. Proverif is a cryptographic protocol analysis tool that can automatically check if a protocol meets certain security properties.
The analysis confirms that the designed scheme provides strong security guarantees. Let's break down the key security features verified:
Mutual Authentication
The system ensures that both parties involved in the communication (e.g., two devices, or a device and a server) verify each other's identity before proceeding. The queries like query inj-event(DCB_accepted_DCA) ==> inj-event(DCA_proved_itself) and query inj-event(DCA_accepted_DCB) ==> inj-event(DCB_proved_itself) are designed to test this. If these queries return TRUE, it means that for a device to accept the other party, the other party must have first proven its identity. This prevents unauthorised devices from impersonating legitimate ones.
Key Agreement and Confidentiality
Secure communication relies on establishing shared secret keys that are known only to the communicating parties. The query query attacker(SKAB), which is effectively query not attacker(SKAB), checks if the session keys (like SK a,b) are transmitted securely without being leaked to an attacker. A TRUE result here indicates that the confidentiality of the session keys is maintained, meaning eavesdroppers cannot intercept and decipher the communication.

Resistance to Attacks
The informal security analysis further elaborates on how the system defends against common attack vectors:
- Eavesdropping Attacks: Sensitive data, including session keys and nonces (random numbers used in cryptographic protocols), are encrypted using strong algorithms like AES256. While identities (DCID a and DCID b) might be transmitted in plaintext in some messages, this information alone is insufficient to compromise the system, as the core authentication and key agreement rely on secure processes involving a trusted server (SSC) that manages identity-key pairs.
- Replay Attacks: Each message includes a timestamp. This ensures that messages are fresh and have not been replayed from a previous communication session. Any attempt to reuse an old message would be detected because the timestamp would be invalid.
- Man-in-the-Middle and Camouflage Attacks: These attacks involve intercepting and altering messages or generating fraudulent ones. The system counters these by ensuring that all long-term and session keys are stored securely. Any tampering with encrypted messages will cause the communication to fail. Furthermore, even if an attacker manages to modify or forge identities, the system includes consistency checks between identities in plaintext and ciphertext, which would detect such manipulations, leading to the failure of the security scheme.
The Future of Vehicle Access
Digital vehicle access systems represent a significant leap forward in automotive technology. They offer unparalleled convenience, allowing users to interact with their vehicles more intuitively than ever before. Beyond personal vehicles, these systems are particularly transformative for fleet management, enabling efficient control over vehicle access, sharing, and utilisation. The robust security measures, verified through rigorous testing and analysis, ensure that this convenience does not come at the expense of safety. As Bosch and other industry leaders continue to innovate, we can expect even more sophisticated and integrated access solutions that will further define the connected vehicle experience.
Frequently Asked Questions (FAQs)
1. Can I still use my physical key with a digital access system?
Most systems are designed to offer a hybrid approach. While the digital key is the primary method, a traditional key fob or physical key is often provided as a backup or for situations where the digital credential might not be accessible.
2. What happens if my phone battery dies?
This is a critical consideration. Manufacturers often implement fail-safe mechanisms. Some systems might allow a limited number of "emergency" accesses using the vehicle's internal battery, while others will require the backup physical key. It's essential to check the specific implementation for your vehicle.
Yes, the systems are designed for secure sharing. You can grant temporary or permanent access to trusted individuals through the accompanying app. The system logs who accessed the vehicle and when, providing an audit trail.
4. What if my phone is lost or stolen?
You can remotely disable or revoke the digital key associated with your lost or stolen phone through the manufacturer's portal or app. This immediately prevents unauthorised access to your vehicle.
5. How does the system handle multiple users and vehicles?
The system is scalable. You can manage digital keys for multiple vehicles on a single app, and multiple users can be granted access to a single vehicle, with granular control over their permissions.
6. Which technologies are most commonly used for digital vehicle access?
The most common technologies include Bluetooth Low Energy (BLE) for general proximity access, Near Field Communication (NFC) for tap-to-unlock functionality, and Ultra-Wideband (UWB) for highly precise location-based access.
7. How secure is the digital key itself?
Digital keys are typically stored in a secure element on the smartphone, which is a hardware-based security chip. This, combined with strong encryption and authentication protocols, makes the digital key highly secure.
If you want to read more articles similar to Digital Vehicle Access: The Future of Key Management, you can visit the Automotive category.
