Security architecture for automotive communication networks with CAN FD

被引:3
|
作者
de Andrade, Ricardo [1 ]
Santos, Max Mauro Dias [2 ]
Justo, Joao Francisco [3 ]
Yoshioka, Leopoldo Rideki [3 ]
Hof, Hans -Joachim [4 ]
Kleinschmidt, Joao Henrique [1 ]
机构
[1] Univ Fed ABC, CECS Ctr Engn Modeling & Appl Social Sci, UFABC, Ave Estados, 5001, BR-09210580 Santo Andre, SP, Brazil
[2] Fed Technol Univ Parana UFTPR, Dept Elect Engn, BR-84016210 Ponta Grossa, PR, Brazil
[3] Univ Sao Paulo, Escola Politecn, Ave Prof Luciano Gualberto, 380, BR-05508010 Sao Paulo, SP, Brazil
[4] CARISSMA Inst Elect Connected & Secure Mobil TH I, Esplanade 10, D-85049 Ingolstadt, Bavaria, Germany
关键词
Automotive; cybersecurity; security attacks; security model; and CAN FD bus; PERFORMANCE; CHALLENGES;
D O I
10.1016/j.cose.2023.103203
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern vehicles have dozens of electronic modules, connected through sophisticated intra-vehicle networks, which essentially control all the vehicle functions. Recent studies have shown the vulnerability of vehicular computer systems, but the existing security models are not enough robust yet because the busload and level of cryptographic strategy are not considered enough to be implemented in the frame. This work proposes a new security model for the Controller Area Network with Flexible Data-Rate (CAN FD), based on encryption and authentication. The model divides the frame data field into two blocks. The AES-256 (Advanced Encryption Standard) symmetric key encryption is applied to the first block of the data frame, whose content is the data corresponding to the payload of the frame. The authentication of the data in the first block is executed through the implementation of the HMAC/SHA-256 function and inserted in the second block. Performance analysis has shown that the combination of 32 bytes for the first block and 32 bytes for the second one provides the shortest processing time and 33.33% fewer data compared to frame 48. Results indicated that the proposed security model has a higher encryption performance than existing methods.
引用
收藏
页数:9
相关论文
共 50 条
  • [31] On the Physical Layer Security of Underwater Optical Wireless Communication Networks
    Illi, Elmehdi
    Qaraqe, Marwa
    IEEE JOURNAL OF OCEANIC ENGINEERING, 2024, 49 (02) : 583 - 591
  • [32] A Communication System Architecture for Regional Control of Power Distribution Networks
    Yang, Qiang
    Barria, Javier A.
    Aramburo, Carlos A. Hernandez
    2009 7TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, VOLS 1 AND 2, 2009, : 372 - +
  • [33] Data transmission in automotive applications and security/safety requirements
    Cancellieri, Giovanni
    Battaglioni, Massimo
    2020 AEIT INTERNATIONAL CONFERENCE OF ELECTRICAL AND ELECTRONIC TECHNOLOGIES FOR AUTOMOTIVE (AEIT AUTOMOTIVE), 2020,
  • [34] A Systematic Review on Security Attacks and Countermeasures in Automotive Ethernet
    De Vincenzi, Marco
    Costantino, Gianpiero
    Matteucci, Ilaria
    Fenzl, Florian
    Plappert, Christian
    Rieke, Roland
    Zelle, Daniel
    ACM COMPUTING SURVEYS, 2024, 56 (06)
  • [35] Security risk and response analysis of typical application architecture of information and communication blockchain
    Zhao, Hongwei
    Zhang, Moli
    Wang, Shi
    Li, Entang
    Guo, Zhenhua
    Sun, Dianmin
    NEURAL COMPUTING & APPLICATIONS, 2021, 33 (13) : 7661 - 7671
  • [36] Formal timing analysis of CAN-to-Ethernet gateway strategies in automotive networks
    Daniel Thiele
    Johannes Schlatow
    Philip Axer
    Rolf Ernst
    Real-Time Systems, 2016, 52 : 88 - 112
  • [37] Formal timing analysis of CAN-to-Ethernet gateway strategies in automotive networks
    Thiele, Daniel
    Schlatow, Johannes
    Axer, Philip
    Ernst, Rolf
    REAL-TIME SYSTEMS, 2016, 52 (01) : 88 - 112
  • [38] Security Patterns for Automotive Systems
    Cheng, Betty H. C.
    Doherty, Bradley
    Polanco, Nick
    Pasco, Matthew
    2019 ACM/IEEE 22ND INTERNATIONAL CONFERENCE ON MODEL DRIVEN ENGINEERING LANGUAGES AND SYSTEMS COMPANION (MODELS-C 2019), 2019, : 54 - 63
  • [39] Enhancing ECU identification security in CAN networks using distortion modeling and neural networks
    Hafeez, Azeem
    Malik, Hafiz
    Irtaza, Aun
    Uddin, Md Zia
    Noori, Farzan M.
    FRONTIERS IN COMPUTER SCIENCE, 2024, 6
  • [40] Security Implications of a Satellite Communication Device on Wireless Networks Using Pentesting
    Gurren, Jordan
    Harish, Avanthika Vineetha
    Tam, Kimberly
    Jones, Kevin
    2023 19TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, WIMOB, 2023, : 292 - 298