Security-Aware Obfuscated Priority Assignment for Automotive CAN Platforms

被引:22
|
作者
Lukasiewycz, Martin [1 ]
Mundhenk, Philipp [1 ]
Steinhorst, Sebastian [1 ]
机构
[1] TUM CREATE Ltd, Singapore, Singapore
基金
新加坡国家研究基金会;
关键词
Design; Algorithms; Performance; CAN; priority assignment; automotive; security; CONTROLLER-AREA-NETWORK; OPTIMIZATION;
D O I
10.1145/2831232
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security in automotive in-vehicle networks is an increasing problem with the growing connectedness of road vehicles. This article proposes a security-aware priority assignment for automotive controller area network (CAN) platforms with the aim of mitigating scaling effects of attacks on vehicle fleets. CAN is the dominating field bus in the automotive domain due to its simplicity, low cost, and robustness. While messages might be encrypted to enhance the security of CAN systems, their priorities are usually identical for automotive platforms, comprising generally a large number of vehicle models. As a result, the identifier uniquely defines which message is sent, allowing attacks to scale across a fleet of vehicles with the same platform. As a remedy, we propose a methodology that is capable of determining obfuscated message identifiers for each individual vehicle. Since identifiers directly represent message priorities, the approach has to take the resulting response time variations into account while satisfying application deadlines for each vehicle schedule separately. Our approach relies on Quadratically Constrained Quadratic Program (QCQP) solving in two stages, specifying first a set of feasible fixed priorities and subsequently bounded priorities for each message. With the obtained bounds, obfuscated identifiers are determined, using a very fast randomized sampling. The experimental results, consisting of a large set of synthetic test cases and a realistic case study, give evidence of the efficiency of the proposed approach in terms of scalability. The results also show that the diversity of obtained identifiers is effectively optimized with our approach, resulting in a very good obfuscation of CAN messages in in-vehicle communication.
引用
收藏
页数:27
相关论文
共 50 条
  • [21] Security-Aware Collaboration Plan Recommendation for Dynamic Multiple Workflow Processes
    Du, Yanhua
    Sun, Zijian
    Hu, Hesuan
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (01) : 100 - 113
  • [22] Security-aware Routing and Scheduling for Control Applications on Ethernet TSN Networks
    Mahfouzi, Rouhollah
    Aminifar, Amir
    Samii, Soheil
    Eles, Petru
    Peng, Zebo
    ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2020, 25 (01)
  • [23] Security-Aware Virtual Network Embedding Algorithm Based on Reinforcement Learning
    Zhang, Peiying
    Wang, Chao
    Jiang, Chunxiao
    Benslimane, Abderrahim
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (02): : 1095 - 1105
  • [24] Holistic Runtime Performance and Security-aware Monitoring in Public Cloud Environment
    Jha, Devki Nandan
    Lenton, Graham
    Asker, James
    Blundell, David
    Wallom, David
    2022 22ND IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING (CCGRID 2022), 2022, : 1052 - 1059
  • [25] How Does Refactoring Impact Security When Improving Quality? A Security-Aware Refactoring Approach
    Abid, Chaima
    Kessentini, Marouane
    Alizadeh, Vahid
    Dhouadi, Mouna
    Kazman, Rick
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2022, 48 (03) : 864 - 878
  • [26] Makespan and Security-Aware Workflow Scheduling for Cloud Service Cost Minimization
    Li, Liying
    Zhou, Chengliang
    Cong, Peijin
    Shen, Yufan
    Zhou, Junlong
    Wei, Tongquan
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2024, 12 (02) : 609 - 624
  • [27] Security-aware optimal actuator placement in vehicle platooning
    Basiri, Mohammad Hossein
    Pirani, Mohammad
    Azad, Nasser L.
    Fischmeister, Sebastian
    ASIAN JOURNAL OF CONTROL, 2022, 24 (04) : 1557 - 1574
  • [28] Security-aware job allocation in mobile cloud computing
    Nawrocki, Piotr
    Pajor, Jakub
    Sniezynski, Bartlomiej
    Kolodziej, Joanna
    21ST IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING (CCGRID 2021), 2021, : 713 - 719
  • [29] Developing security-aware resource management strategies for workflows
    He, Ligang
    Chaudhary, Nadeem
    Jarvis, Stephen A.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 38 : 61 - 68
  • [30] A Security-Aware Framework for Designing Industrial Engineering Processes
    Dedousis, Panagiotis
    Stergiopoulos, George
    Arampatzis, George
    Gritzalis, Dimitris
    IEEE ACCESS, 2021, 9 : 163065 - 163085