This content is not included in your SAE MOBILUS subscription, or you are not logged in.
Optimizing CAN Bus Security with In-Place Cryptography
ISSN: 0148-7191, e-ISSN: 2688-3627
Published January 16, 2019 by SAE International in United States
This content contains downloadable datasetsAnnotation ability available
Today’s vehicles rely on multiple interconnected networks of Electronic Control Units (ECUs) that govern almost every automotive function - from engine timing and traction control to side-mirror adjustment and GPS. In-vehicle networks used for inter-ECU communication, most commonly the CAN bus, were not designed with cybersecurity in mind, and as a result, communication by corrupt devices connected to the bus is not authenticated.
A multitude of attack vectors allow attackers to control a device on the bus; reports abound of successful hacking of vehicles, by exploiting vulnerable devices and by spoofing messages.
Such remote-connectivity and physical-access exploit types must be prevented, to mitigate the threats of impersonation, eavesdropping, replay and reversing.
We present the IVAS, In-Vehicle Authentication Scheme. IVAS is an in-place cryptographic scheme: the first CAN messaging solution to ensure both authentication and confidentiality without additional data such as authentication tags.
When adequate encryption is used, an adversary’s chances of successfully injecting a spoofed message are equal to the chances for a random message. There is a need for a validation method that deterministically differentiates between random messages and legitimate CAN commands.
We take advantage of both static and dynamic redundancy existing in CAN bus traffic, eliminating the need for extra bandwidth.
A mathematical proof of the security level of our AE (Authenticated Encryption) scheme is presented, showing that both confidentiality and authenticity are included.
No changes to the application code, protocol or chipset are entailed, and runtime key exchange is not required. In addition, any type of serial data bus can be secured by IVAS, so that varied ECUs can work together.
The IVAS solution for securing the CAN bus stands out in its ability to authenticate sender integrity and data integrity, blocking malicious messages without adding payloads.
|Journal Article||Approaches for Secure and Efficient In-Vehicle Key Management|
|Journal Article||Safe and Secure Software Updates Over The Air for Electronic Brake Control Systems|
CitationHarel, A. and Hezberg, A., "Optimizing CAN Bus Security with In-Place Cryptography," SAE Technical Paper 2019-01-0098, 2019, https://doi.org/10.4271/2019-01-0098.
Data Sets - Support Documents
|Unnamed Dataset 1|
|Unnamed Dataset 2|
|Unnamed Dataset 3|
|Unnamed Dataset 4|
|Unnamed Dataset 5|
|Unnamed Dataset 6|
|Unnamed Dataset 7|
|Unnamed Dataset 8|
- Nowdehi , N. , Lautenbach , A. , and Olovsson , T. In-Vehicle CAN Message Authentication: An Evaluation Based on Industrial Criteria IEEE 2017
- Pfeiffer , O. https://www.cancrypt.eu/docs/CANcrypt_FirstEdition_Excerpt.pdf
- Ziermann , T. , Wildermann , S. , and Teich , J. CAN+: A New Backward-Compatible Controller Area Network (CAN) Protocol with up to 16x Higher Data Rates 2009 Design, Automation & Test in Europe Conference & Exhibition April 20-24, 2009 1088 1093
- Van Herrewege , A. , Singelee , D. , and Verbauwhede , I. Canauth - A Simple, Backward Compatible Xpage Authentication Protocol for CAN Bus ECRYPT Workshop on Lightweight Cryptography 2011 https://www.researchgate.net/publication/235323481
- Schweppe , H. , Roudier , Y. , Weyl , B. , Apvrille , L. et al. Car2x Communication: Securing the Last Meter - A Cost-Effective Approach for Ensuring Trust in Car2x Applications Using In-Vehicle Symmetric Cryptography Vehicular Technology Conference (VTC Fall) 2011
- Hartkopp , O. , Reuber , C. , and Schilling , R. Macan - Message Authenticated CAN escar Conference Berlin, Germany 2012
- Kurachi , R. , Matsubara , Y. , Takada , H. , Adachi , N. et al. Cacan-Centralized Authentication System in CAN (Controller Area Network) Embedded Security in Cars 2014
- Bellare , M. and Namprempre , C. Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm Journal of Cryptology 21 4 469 491 2008
- Goldreich , O. Foundations of Cryptography: Volume 2, Basic Applications Cambridge University Press 2009
- Shipmon , D.T. , Gurevitch , J.M. , Piselli , P.M. , Edwards , S.
- Muller , E. , Assent , I. , Iglesias , P. , Mulle , Y. et al. Outlier Ranking via Subspace Analysis in Multiple Views of the Data Data Mining (ICDM), 2012 IEEE 12th International Conference 529 538
- Wei , L. , Kumar , N. , Lolla , V. , Keogh , E. et al. Assumption-Free Anomaly Detection in Time Series Proceedings of the 17th International Conference on Scientific and Statistical Database Management 2005 237 240
- Pang , S.K. https://www.youtube.com/watch?v=zU6OL3Ba6j8