Security enhancement in In-vehicle Controller Area Networks by Electronic Control Unit authentication

被引:0
|
作者
Lakshmanan, Murugesan [1 ]
Natarajan, Senthil Kumar [2 ]
机构
[1] Arasan Ganesan Polytech Coll, Elect & Commun Engn, Sivakasi, India
[2] Mepco Schlenk Engn Coll, Elect & Elect Engn, Sivakasi, India
关键词
Authentication; Security; Electronic Control Unit; Encryption; In-vehicle network; Controller Area Network; International Data Encryption Algorithm;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Controller Area Network (CAN), the most popular network of Electronic Control Units (ECUs) was designed by Bosch in 1990s to prioritize reliability and safety but with absence of security. An attacker can take control of the ECUs and probably harm the safety critical operations inside the vehicle. Hence, security especially ECU authentication is most important for CAN. In this paper, an ECU authentication scheme named Security Enhancement using Truncated Message Authentication Code (SETMAC) for CAN is proposed. The authentication code generated using International Data Encryption Algorithm (IDEA) is truncated to four bytes to accommodate the message data into the maximum payload size of eight bytes. 8-bit message counter is incorporated among the ECUs to provide opposition to replay attacks. The proposed algorithm avoids the need of an extra frame for sending authentication messages and thus effectively reduces the bus load. The algorithm is tested with CANoe software using the CAN data set captured from a real vehicle. The simulation results show that the proposed authentication algorithm can be implemented in existing real time CAN bus networks in 500kb/s and 1Mb/s bit rates at maximum busloads of 25.05% and 12.52% respectively.
引用
收藏
页码:228 / 243
页数:16
相关论文
共 50 条
  • [31] Locating Wire Short Fault for In-Vehicle Controller Area Network with Resistance Estimation Approach
    Du, Xinyu
    Jiang, Shengbing
    Nagose, Atul
    Zhang, Yilu
    Wienckowski, Natalie
    SAE INTERNATIONAL JOURNAL OF PASSENGER CARS-ELECTRONIC AND ELECTRICAL SYSTEMS, 2016, 9 (01): : 93 - 99
  • [32] DivaCAN: Detecting in-vehicle intrusion attacks on a controller area network using ensemble learning
    Khan, Muneeb Hassan
    Javed, Abdul Rehman
    Iqbal, Zafar
    Asim, Muhammad
    Awad, Ali Ismail
    COMPUTERS & SECURITY, 2024, 139
  • [33] Anonymous Authentication for Wireless Body Area Networks With Provable Security
    He, Debiao
    Zeadally, Sherali
    Kumar, Neeraj
    Lee, Jong-Hyouk
    IEEE SYSTEMS JOURNAL, 2017, 11 (04): : 2590 - 2601
  • [34] TACAN: Transmitter Authentication through Covert Channels in Controller Area Networks
    Ying, Xuhang
    Bernieri, Giuseppe
    Conti, Mauro
    Poovendran, Radha
    ICCPS '19: PROCEEDINGS OF THE 2019 10TH ACM/IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS, 2019, : 23 - 34
  • [35] LiBrA-CAN: Lightweight Broadcast Authentication for Controller Area Networks
    Groza, Bogdan
    Murvay, Stefan
    Van Herrewege, Anthony
    Verbauwhede, Ingrid
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2017, 16 (03)
  • [36] Covert Channel-Based Transmitter Authentication in Controller Area Networks
    Ying, Xuhang
    Bernieri, Giuseppe
    Conti, Mauro
    Bushnell, Linda
    Poovendran, Radha
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2665 - 2679
  • [37] AN IN-VEHICLE COMMUNICATIONS LSI SET FOR AUTOMOTIVE ELECTRONIC CONTROL-SYSTEMS
    KIMURA, T
    MURAKAMI, K
    IEICE TRANSACTIONS ON ELECTRONICS, 1993, E76C (12) : 1767 - 1773
  • [38] Sender Authentication for Automotive In-Vehicle Networks through Dual Analog Measurements to Determine the Location of the Transmitter
    Moreno, Carlos
    Fischmeister, Sebastian
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2019, : 596 - 605
  • [39] Security Enhancement of Robust User Authentication Framework for Wireless Sensor Networks
    Jiang Qi
    Ma Zhuo
    Ma Jianfeng
    Li Guangsong
    CHINA COMMUNICATIONS, 2012, 9 (10) : 103 - 111
  • [40] Cryptanalysis and Security Enhancement of Three Authentication Schemes in Wireless Sensor Networks
    Li, Wenting
    Li, Bin
    Zhao, Yiming
    Wang, Ping
    Wei, Fushan
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,