This content is not included in your SAE MOBILUS subscription, or you are not logged in.
Research on Vehicle Cybersecurity Based on Dedicated Security Hardware and ECDH Algorithm
ISSN: 0148-7191, e-ISSN: 2688-3627
Published September 23, 2017 by SAE International in United States
This content contains downloadable datasetsAnnotation ability available
Vehicle cybersecurity consists of internal security and external security. Dedicated security hardware will play an important role in car’s internal and external security communication. TPM (Trusted Platform Module) can serve as the security cornerstone when vehicle connects with external entity or constructs a trusted computing environment. Based on functions such as the storage of certificate, key derivation and integrity testing, we research the principle of how to construct a trusted environment in a vehicle which has telematics unit. HSM (Hardware Security Module) can help to realize the onboard cryptographic communication securely and quickly so as to protect data. For certain AURIX MCU consisting of HSM, the experiment result shows that cheaper 32-bit HSM’s AES calculating speed is 25 times of 32-bit main controller, so HSM is an effective choice to realize cybersecurity. After comparing two existing methods that realize secure CAN communication, A Modified SECURE CAN scheme is proposed, and differences of the three schemes are analyzed. Result shows that considering both communication time and attacks such as replay attack and eavesdropping, the Modified SECURE CAN communication has more advantage in practical applications. In a secure system, key derivation and management is a critical question. After comparing the computational efficiency of the RSA and ECC algorithm, an improved key derivation scheme to realize one-time pad is proposed based on ECDH algorithm. Key derivation among 3 ECUs is realized and derivation time is tested.
CitationWu, Z., Zhao, J., Zhu, Y., and Li, Q., "Research on Vehicle Cybersecurity Based on Dedicated Security Hardware and ECDH Algorithm," SAE Technical Paper 2017-01-2005, 2017, https://doi.org/10.4271/2017-01-2005.
Data Sets - Support Documents
|[Unnamed Dataset 1]|
|[Unnamed Dataset 2]|
|[Unnamed Dataset 3]|
|[Unnamed Dataset 4]|
|[Unnamed Dataset 5]|
|[Unnamed Dataset 6]|
- Hamida Elyes Ben, Hassan Noura and Wassim Znaidi. “Security of Cooperative Intelligent Transport Systems: Standards, Threats Analysis and Cryptographic Countermeasures.” Electronics 2015, doi:10.3390.
- Glas B., Klimm A., Muller-Glaser K., and Becker J., “Configuration measurement for FPGA-based trusted platforms,” Proc. IEEE/IFIP Int. Symp. Rapid Syst. Prototyping, Jun. 2009.
- Samuel. W., HyoJin., J., and DongHoon., L., “A practical wireless attack on the connected car and security protocol for in-vehicle CAN,” IEEE Trans. Intell. Transp. Syst., Apr. 2015.
- Groza B. and Murvay S., “Efficient protocols for secure broadcast in controller area networks,” IEEE Trans. Ind. Informat., Nov. 2013.
- Lin C. W. and Sangiovanni Vincentelli A., “Cyber-security for the Controller Area Network (CAN) communication protocol,” in Proc. Conf. IASE Int. Conf. Cyber Security, 2012.
- Nicholas Jansma, Brandon Arrendondo, “Performance Comparison of Elliptic Curve and RSA Digital Signatures”, April 2004.