This content is not included in
your SAE MOBILUS subscription, or you are not logged in.
Research on Vehicle Cybersecurity Based on Dedicated Security Hardware and ECDH Algorithm
Technical Paper
2017-01-2005
ISSN: 0148-7191, e-ISSN: 2688-3627
This content contains downloadable datasets
Annotation ability available
Sector:
Language:
English
Abstract
Vehicle cybersecurity consists of internal security and external security. Dedicated security hardware will play an important role in car’s internal and external security communication. TPM (Trusted Platform Module) can serve as the security cornerstone when vehicle connects with external entity or constructs a trusted computing environment. Based on functions such as the storage of certificate, key derivation and integrity testing, we research the principle of how to construct a trusted environment in a vehicle which has telematics unit. HSM (Hardware Security Module) can help to realize the onboard cryptographic communication securely and quickly so as to protect data. For certain AURIX MCU consisting of HSM, the experiment result shows that cheaper 32-bit HSM’s AES calculating speed is 25 times of 32-bit main controller, so HSM is an effective choice to realize cybersecurity. After comparing two existing methods that realize secure CAN communication, A Modified SECURE CAN scheme is proposed, and differences of the three schemes are analyzed. Result shows that considering both communication time and attacks such as replay attack and eavesdropping, the Modified SECURE CAN communication has more advantage in practical applications. In a secure system, key derivation and management is a critical question. After comparing the computational efficiency of the RSA and ECC algorithm, an improved key derivation scheme to realize one-time pad is proposed based on ECDH algorithm. Key derivation among 3 ECUs is realized and derivation time is tested.
Recommended Content
Technical Paper | Hardware and Software Constraints for Automotive Firewall Systems? |
Technical Paper | Hardware/Software Co-Design of an Automotive Embedded Firewall |
Authors
Topic
Citation
Wu, Z., Zhao, J., Zhu, Y., and Li, Q., "Research on Vehicle Cybersecurity Based on Dedicated Security Hardware and ECDH Algorithm," SAE Technical Paper 2017-01-2005, 2017, https://doi.org/10.4271/2017-01-2005.Data Sets - Support Documents
Title | Description | Download |
---|---|---|
Unnamed Dataset 1 | ||
Unnamed Dataset 2 | ||
Unnamed Dataset 3 | ||
Unnamed Dataset 4 | ||
Unnamed Dataset 5 | ||
Unnamed Dataset 6 |
Also In
References
- Hamida Elyes Ben , Hassan Noura and Wassim Znaidi Security of Cooperative Intelligent Transport Systems: Standards, Threats Analysis and Cryptographic Countermeasures Electronics 2015 10.3390
- Glas B. , Klimm A. , Muller-Glaser K. , and Becker J. Configuration measurement for FPGA-based trusted platforms Proc. IEEE/IFIP Int. Symp. Rapid Syst. Prototyping Jun. 2009
- Samuel. W. , HyoJin. , J. , and DongHoon. , L. A practical wireless attack on the connected car and security protocol for in-vehicle CAN IEEE Trans. Intell. Transp. Syst. Apr. 2015
- Groza B. and Murvay S. Efficient protocols for secure broadcast in controller area networks IEEE Trans. Ind. Informat. Nov. 2013
- Lin C. W. and Sangiovanni Vincentelli A. Cyber-security for the Controller Area Network (CAN) communication protocol Proc. Conf. IASE Int. Conf. Cyber Security 2012
- Nicholas Jansma , Brandon Arrendondo Performance Comparison of Elliptic Curve and RSA Digital Signatures April 2004