4.7 Article

Security Enhancement for Real-Time Parallel In-Vehicle Applications by CAN FD Message Authentication

Journal

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TITS.2020.3000783

Keywords

Task analysis; Real-time systems; Bandwidth; Authentication; Automotive engineering; Automobiles; Authentication; in-vehicle applications; security

Funding

  1. National Natural Science Foundation of China [61932010, 61702172, 61672217, 61972139]
  2. CCF-Tencent Open Fund [CCF-TecentRAGR20190119]
  3. National Technical Committee of Auto Standardization Research Foundation of China [BZ201908]
  4. Natural Science Foundation of Hunan Province [2018JJ3076]
  5. Open Research Project of the State Key Laboratory of Synthetical Automation for Process Industries (SAPI), Northeastern University, China [PAL-N201803]
  6. Electronic Information and Control of Fujian University Engineering Research Center, Minjiang University, China [MJXY-KF-EIC1902]
  7. Fundamental Research Funds for the Central Universities, Hunan University, China

Ask authors/readers for more resources

The study proposes a security enhancement for CAN FD in-vehicle communication through a two-stage method, aiming to improve the security of in-vehicle applications.
Controller Area Network with Flexible Data-rate (CAN FD) is beneficial for the in-vehicle communication of Internet of Connected Vehicles (IoCVs) because of its high bandwidth and data field length. However, CAN FD lacks a security authentication mechanism, making it extremely vulnerable to masquerade attacks. This study proposes the security enhancement for a real-time parallel in-vehicle application adopting a two-stage method. The first stage obtains the lower bound of an in-vehicle application by quickly abandoning most of sequences, while the second stage enhances security by adding Message Authentication Codes (MACs) to messages taking advantage of the laxity interval from the lower bound to the deadline. Experiments with an example and the adaptive cruise control in-vehicle application show the advantage of the proposed two-stage method in increasing the total byte size of MACs.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available