Open Access

Vulnerability of FlexRay and Countermeasures

Published May 23, 2019 by SAE International in United States
Vulnerability of FlexRay and Countermeasures
Sector:
Citation:
Language: English

References

  1. Koscher, K., Czeskis, A., Roesner, F., Patel, S. et al. , “Experimental Security Analysis of a Modern Automotive,” in IEEE Symposium on Security and Privacy 2010, 2010, 447-462.
  2. Miller, C. and Valasek, C. , “Remote Exploitation of an Unaltered Passenger Vehicle,” DEFCON 23, 2015.
  3. Nilsson, D.K., Larson, U.E., and Jonsson, E. , “Efficient In-Vehicle Delayed Data Authentication Based on Compound Message Authentication Codes,” in Vehicular Technology Conference, 2008.
  4. Hoppe, T., Klitz, S., and Dittmann, J. , “Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures,” in Computer Safety, Reliability and Security, SAFECOMP’08, 2009.
  5. Nilsson, D.K, Larson, U.E., Picasso, F., and Jonsson, E. , “A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay,” in CISIS 2008, ASC 53, 2009, 84-91.
  6. Huse, M.I. , “FlexRay Analysis, Configuration Parameter Estimation, and Adversaries,” Master’s thesis, Norwegian University of Science and Technology, 2017.
  7. Takahashi, J. , “Automotive Attacks to Induce Abnormal Vehicle Behaviors on FlexRay,” in Symposium on Cryptography and Information Security, 2018.
  8. Murvey, P.S. and Groza, B. , “Practical Security Exploits of the FlexRay in-Vehicle Communication Protocol,” in International Conference on Risks and Security of Internet and Systems, 2018.
  9. Vasile, P., Groza, B., and Murvay, S. , “Performance Analysis of Broadcast Authentication Protocols on CAN-FD and FlexRay,” in Workshop on Embedded System Security, 2015.
  10. Mousa, A.R., NourElDeen, P., Azer, M., and Allam, M. , “Lightweight Authentication Protocol Deployment over FlexRay,” in International Conference on Informatics and Systems, 2016.
  11. Wolf, M., Weimerskirch, A., and Paar, C. , “Secure in-Vehicle Communication,” In: Embedded Security in Cars. (Berlin Heidelberg, Springer, 2006), 95-109.
  12. FlexRay Communications System Protocol Specification Version 3.0,1, 2010.
  13. FlexRay Communications System Electrical Physical Layer Specification Version 2.1 Rev. B, 2006.
  14. NXP Semiconductors , DEVKIT-MPC5748G, https://www.nxp.com/docs/en/data-sheet/MPC5748G.pdf
  15. Vector, VN7640 , https://www.vector.com/int/en/products/products-a-z/hardware/network-interfaces/vn7640/
  16. NXP Semiconductors , TJA1085, https://www.nxp.com/docs/en/data-sheet/TJA1085.pdf
  17. FlexRay Communications System Preliminary Central Bus Guardian Specification Version 2.0.9.
  18. AUTOSAR , Specification of Onboard Communication, https://www.autosar.org/fileadmin/user_upload/standards/classic/4-3/AUTOSAR_SWS_SecureOnboardCommunication.pdf
  19. Müter, M., Groll, A., and Freiling, F. , “Anomaly Detection for in-Vehicle Networks Using a Sensor-Based Approach,” Journal of Information Assurance and Security 6(2):132-140, 2011.
  20. Chen, F., Tanabe, M., Anzai, J., Wakabayashi, T. et al. , “SINDbAD: Stateful-Inspection-Driver Based Anomaly Detection System for in-Vehicle CAN Network,” in Symposium on Cryptography and Information Security, 2017.
  21. Choi, W., Jo, H.J., Woo, S., Chun, J.Y. et al. , “Identifying ECUs Using Inimitable Characteristics of Signals in Controller Area Networks,” IEEE Transactions on Vehicular Technology 4757-4770, 2018.

Cited By