Design of a CANFD to SOME/IP Gateway Considering Security for In-Vehicle Networks

被引:12
作者
Zuo, Zheng [1 ]
Yang, Shichun [1 ]
Ma, Bin [1 ]
Zou, Bosong [2 ]
Cao, Yaoguang [1 ]
Li, Qiangwei [1 ]
Zhou, Sida [1 ]
Li, Jichong [1 ]
机构
[1] Beihang Univ, Sch Transportat Sci & Engn, Beijing 102206, Peoples R China
[2] China Software Testing Ctr, Beijing 100038, Peoples R China
关键词
vehicle; CAN; CANFD; Ethernet; SOME; IP; gateway; security; MAC; AEAD; CHALLENGES;
D O I
10.3390/s21237917
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
In recent years, Ethernet has been introduced into vehicular networks to cope with the increasing demand for bandwidth and complexity in communication networks. To exchange data between controller area network (CAN) and Ethernet, a gateway system is required to provide a communication interface. Additionally, the existence of networked devices exposes automobiles to cyber security threats. Against this background, a gateway for CAN/CAN with flexible data-rate (CANFD) to scalable service-oriented middleware over IP (SOME/IP) protocol conversion is designed, and security schemes are implemented in the routing process to provide integrity and confidentiality protections. Based on NXP-S32G, the designed gateway is implemented and evaluated. Under most operating conditions, the CPU and the RAM usage are less than 5% and 20 MB, respectively. Devices running a Linux operating system can easily bear such a system resource overhead. The latency caused by the security scheme accounts for about 25% of the entire protocol conversion latency. Considering the security protection provided by the security scheme, this overhead is worthwhile. The results show that the designed gateway can ensure a CAN/CANFD to SOME/IP protocol conversion with a low system resource overhead and a low latency while effectively resisting hacker attacks such as frame forgery, tampering, and sniffing.
引用
收藏
页数:25
相关论文
共 46 条
[1]  
Agrawal Megha, 2019, Security and Safety Interplay of Intelligent Software Systems. ESORICS 2018 International Workshops, ISSA 2018 and CSITS 2018. Revised Selected Papers: Lecture Notes in Computer Science (LNCS 11552), P77, DOI 10.1007/978-3-030-16874-2_6
[2]   Cyberattacks and Countermeasures for In-Vehicle Networks [J].
Aliwa, Emad ;
Rana, Omer ;
Perera, Charith ;
Burnap, Peter .
ACM COMPUTING SURVEYS, 2021, 54 (01)
[3]   Cyber security challenges and solutions for V2X communications: A survey [J].
Alnasser, Aljawharah ;
Sun, Hongjian ;
Jian, Jing .
COMPUTER NETWORKS, 2019, 151 :52-67
[4]  
Andreas L, TRENDS FUTURE EE ARC
[5]  
[Anonymous], Advances in Cryptology - CRYPTO'93. Ed. by, DOI [DOI 10.1007/3-540-48329-2_21, 10.1007/3-540-48329-2_21]
[6]  
[Anonymous], 2004, IEEE Standard for Local and Metropolitan Area Networks Part 16: Air Interface for Fixed Broadband Wireless Access Systems, P1
[7]  
[Anonymous], 2010, IEEE Standard for Information Technology-Local and Metropolitan Area Networks-Specific RequirementsPart 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 6: Wireless Access in Vehicular Environments, DOI DOI 10.1109/IEEESTD.2010.5514475
[8]  
AUTOSAR, 2019, AUT FDN REL R19 11
[9]   TOUCAN A proTocol tO secUre Controller Area Network [J].
Bella, Giampaolo ;
Biondi, Pietro ;
Costantino, Gianpiero ;
Matteucci, Ilaria .
PROCEEDINGS OF THE ACM WORKSHOP ON AUTOMOTIVE CYBERSECURITY (AUTOSEC '19), 2019, :3-8
[10]   Design of a message authentication protocol for CAN FD based on Chaskey lightweight MAC [J].
Carel, Guillaume ;
Isshiki, Ryunosuke ;
Kusaka, Takuya ;
Nogami, Yasuyuki ;
Araki, Shunsuke .
2018 SIXTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING WORKSHOPS (CANDARW 2018), 2018, :267-271