Design of a message authentication protocol for CAN FD based on Chaskey lightweight MAC

被引:11
作者
Carel, Guillaume [1 ]
Isshiki, Ryunosuke [2 ]
Kusaka, Takuya [2 ]
Nogami, Yasuyuki [2 ]
Araki, Shunsuke [3 ]
机构
[1] Grenoble INP Esisar Adv Syst & Networks, Valence, France
[2] Okayama Univ, Grad Sch Nat Sci & Technol, Okayama, Japan
[3] Kyushu Inst Technol, Fac Comp Sci & Syst Engn, Fukuoka, Fukuoka, Japan
来源
2018 SIXTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING WORKSHOPS (CANDARW 2018) | 2018年
关键词
CAN FD; message authentication; Chaskey; lightweight MAC;
D O I
10.1109/CANDARW.2018.00057
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The development of the autonomous driving and the connected services severely increase security threats on old automotive technologies that are still present on-board vehicles since the long incremental process were employed. For example, the Controller Area Network (CAN) bus, which was standardized in 1991, can be connected to modern Linux embedded computer nodes where evil attacker might be able to exploit a vulnerability on the nodes. However, it is not easy to implement countermeasures on the CAN bus, since the strict requirements and limited performances of CAN specification. That is one of the major reason for the new standard CAN Flexible Data-rate (CAN FD) has been released in 2012 by Bosch to fill the gap between these challenges and the CAN protocol. In this research, a new simple authentication protocol for CAN FD is proposed, and the protocol is evaluated by experiments. The results show that the proposed protocol prevents infected nodes from usurping identity of a critical node and forge messages, with practical computational complexity on modern low-power embedding boards.
引用
收藏
页码:267 / 271
页数:5
相关论文
共 5 条
[1]  
[Anonymous], 2015, CONTROLLER AREA NETW
[2]  
[Anonymous], 291926 ISOIEC DIS
[3]  
Checkoway S., 2011, P 20 USENIX C SECR S
[4]  
Greenberg A., HACKERS REMOTELY KIL
[5]  
Mouha N., 2014, 2014386 CRPT EPRINT