Security-Aware Obfuscated Priority Assignment for Automotive CAN Platforms

被引:22
|
作者
Lukasiewycz, Martin [1 ]
Mundhenk, Philipp [1 ]
Steinhorst, Sebastian [1 ]
机构
[1] TUM CREATE Ltd, Singapore, Singapore
基金
新加坡国家研究基金会;
关键词
Design; Algorithms; Performance; CAN; priority assignment; automotive; security; CONTROLLER-AREA-NETWORK; OPTIMIZATION;
D O I
10.1145/2831232
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security in automotive in-vehicle networks is an increasing problem with the growing connectedness of road vehicles. This article proposes a security-aware priority assignment for automotive controller area network (CAN) platforms with the aim of mitigating scaling effects of attacks on vehicle fleets. CAN is the dominating field bus in the automotive domain due to its simplicity, low cost, and robustness. While messages might be encrypted to enhance the security of CAN systems, their priorities are usually identical for automotive platforms, comprising generally a large number of vehicle models. As a result, the identifier uniquely defines which message is sent, allowing attacks to scale across a fleet of vehicles with the same platform. As a remedy, we propose a methodology that is capable of determining obfuscated message identifiers for each individual vehicle. Since identifiers directly represent message priorities, the approach has to take the resulting response time variations into account while satisfying application deadlines for each vehicle schedule separately. Our approach relies on Quadratically Constrained Quadratic Program (QCQP) solving in two stages, specifying first a set of feasible fixed priorities and subsequently bounded priorities for each message. With the obtained bounds, obfuscated identifiers are determined, using a very fast randomized sampling. The experimental results, consisting of a large set of synthetic test cases and a realistic case study, give evidence of the efficiency of the proposed approach in terms of scalability. The results also show that the diversity of obtained identifiers is effectively optimized with our approach, resulting in a very good obfuscation of CAN messages in in-vehicle communication.
引用
收藏
页数:27
相关论文
共 50 条
  • [41] Security-Aware Industrial Wireless Sensor Network Deployment Optimization
    Cao, Bin
    Zhao, Jianwei
    Gu, Yu
    Fan, Shanshan
    Yang, Peng
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (08) : 5309 - 5316
  • [42] Security-Aware Scheduling Method for Time-Sensitive Networking
    Lu Y.
    Xie W.
    Wang H.
    Chen Z.
    Cheng Z.
    Pan W.
    Qin J.
    Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2023, 51 (05): : 1 - 12
  • [43] Security-Aware Resource Allocation for Mobile Cloud Computing Systems
    Liu, Yanchen
    Lee, Myung J.
    24TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS ICCCN 2015, 2015,
  • [44] Towards security-Aware 5G slice embedding
    Jmila, Houda
    Blanc, Gregory
    COMPUTERS & SECURITY, 2021, 100
  • [45] Security-Aware Resource Allocation in the Edge-Cloud Continuum
    Soumplis, Polyzois
    Kontos, Georgios
    Kretsis, Aristotelis
    Kokkinos, Panagiotis
    Nanos, Anastassios
    Varvarigos, Emmanouel
    2023 IEEE 12TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING, CLOUDNET, 2023, : 161 - 169
  • [46] Security-aware dual-hop communication for amplify-and-forward relay networks
    Ding, Fei
    Sun, Xiaojun
    Ding, Xiaojin
    Su, Ruoyu
    Zhang, Dengyin
    Zhu, Hongbo
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (09)
  • [47] A Security-aware Safety Management Framework for IoT-integrated Bikes
    Razzaque, M. A.
    Clarke, Siobhan
    2015 IEEE 2ND WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2015, : 92 - 97
  • [48] Security-Aware Cost Optimized Dynamic Service Function Chain Scheduling
    Dubba, Sudha
    Killi, Balaprakasa Rao
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2025, 33 (01)
  • [49] Automation of service-based security-aware business processes in the Cloud
    Lins, Fernando
    Damasceno, Julio
    Medeiros, Robson
    Sousa, Erica
    Rosa, Nelson
    COMPUTING, 2016, 98 (09) : 847 - 870
  • [50] Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes
    Sun, Li
    Ren, Pinyi
    Du, Qinghe
    Wang, Yichen
    Gao, Zhenzhen
    IEEE COMMUNICATIONS LETTERS, 2015, 19 (03) : 463 - 466