In-Vehicle Network Security Using Secure Element

被引:2
作者
Takemori, Keisuke [1 ]
Mizoguchi, Seiichiro [1 ]
Kawabata, Hideaki [1 ]
Kubota, Ayumu [1 ]
机构
[1] KDDI R&D Labs, Fujimino 3568502, Japan
关键词
CAN; MAC; secure element; secure boot; key exchange;
D O I
10.1587/transfun.E99.A.208
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As there are no security mechanisms in the vehicle controller area network (CAN) protocol, it is easy to inject fake packets, codes and electric control units (ECUs) in the CAN to hijack vehicle control. Security countermeasures for both the CAN and the ECU are urgently required to improve driving safety. In this paper, we propose in-vehicle network securities using the hardware secure elements as follows: (i) secure boot of ECU, (ii) authentication of an ECU, (iii) authentication of a CAN packet, and (iv) cipher key exchange procedures from a master ECU to slave ECUs. The security algorithms are implemented in a subscriber identity module card (SIM) embedded in the master ECU's board and in a hardware security module (HSM) embedded in a slave ECU. The SIM generates and distributes cipher keys to the authenticated HSM. Then, the HSM generates a media authentication code (MAC) for the CAN packet by using the cipher keys.
引用
收藏
页码:208 / 216
页数:9
相关论文
共 21 条
[1]  
[Anonymous], 2015, ILLMATICS
[2]  
AUTOSAR, SEC ONB COMM
[3]  
Berg J., 2015, SECURE GATEWAY CONCE
[4]  
Checkoway S., 2011, 20 USENIX SECURITY S
[5]  
European Commission,, 2010, 'A Comprehensive Approach on Personal Data Protection in the European Union' (Communication) COM (2010) 609 final.
[6]  
EVITA Project, HARDW SEC MOD
[7]  
Ezaki T., 2014, P IEICE IA2014 71 JA
[8]  
Federal Trade Commission (FTC), 2010, END DO NOT TRACK FAC
[9]  
Haga T., 2015, P IEICE SCIS2015 JAP
[10]  
Hata M., 2011, P IPSJ CSS2011 JAP O, P624