Secure message authentication protocol for can (controller area network).

Download
2020
Mertol, Sarp
The widespread communication of vehicles with each other and road infrastructure has raised concerns about how to ensure network security of the electronic control units (ECUs) in the vehicle. The fact that networks such as the Controller Area Network (CAN), which is commonly used in in-vehicle communications, will also be connected to external networks (e.g. 3G / 4G mobile networks) will allow malicious adversaries to benefit from the vulnerability of the CAN. The authentication of messages of ECUs in the vehicle is required to ensure that in-vehicle communications are secured. However, the cryptographic algorithms and protocols that can be used for this message verification process should be selected considering the real-time communication requirement in the vehicle.

Suggestions

Controller area network with offset scheduling: improved offset assignment algorithms and computation of response time distributions
Batur, Ahmet; Schmidt, Klaus Werner; Schmidt, Şenan Ece; Department of Electrical and Electronics Engineering (2018)
The Controller Area Network (CAN) is the most widely-used in-vehicle communication bus in the automotive industry. CAN enables the exchange of data among different electronic control units (ECUs) of a vehicle via messages. The basic requirement for the design of CAN is to guarantee that the worst-case response time (WCRT) of each message is smaller than its specified deadline. Hereby, it is generally desired to achieve small WCRTs that leave sufficient slack to the message deadline. In addition, it has to b...
Adaptable Safety and Security in V2X Systems
VİLLARREAL VASQUEZ, Miguel; BHARGAVA, Bharat; Angın, Pelin (2017-06-30)
With the advances in the areas of mobile computing and wireless communications, V2X systems have become a promising technology enabling deployment of applications providing road safety, traffic efficiency and infotainment. Due to their increasing popularity, V2X networks have become a major target for attackers, making them vulnerable to security threats and network conditions, and thus affecting the safety of passengers, vehicles and roads. Existing research in V2X does not effectively address the safety, ...
Tracking Reported Vehicles in Traffic Management and Information System using Intelligent Junctions
Elci, Atilla; RAHNAMA, BEHNAM; Amintabar, Amirhasan (2010-05-01)
This study highlights a security scenario involving vehicles in a Traffic Management and Information System (TMIS) network. TMIS and its nodal architecture, nicknamed Intelligent Junction (IJ), are summarized from our recent work. System design sets an example to a software architecture implementing autonomous semantic agents through semantic web services, junction-based sensor networks, local- and wide-area networking through wire/wireless integrated communication infrastructure. It is so construed as to p...
UAVs assessment in software-defined IoT networks: An overview
Al-Turjman, Fadi; Abujubbeh, Mohammad; Malekloo, Arman; Mostarda, Leonardo (Elsevier BV, 2020-01-15)
The technological advancements in the ubiquitous IoT era and the ever-growing desire of communities to enforce smart cities with security and safety of user data as their priority, mini Unmanned Aerial Vehicles (UAVs), or drones, are perceived as a tool for raising living standards by meeting the requirements of societies. Traditionally in UAV communication links, meshed ad hoc networks were among the first options of connectivity. However, the increased demand for deploying multi-UAV networks necessitates ...
Software tool development for the automated configuration of flexray networks for in vehicle communication
Öztürk, Can; Schmidt, Şenan Ece; Schmidt, Klaus Werner; Department of Electrical and Electronics Engineering (2013)
The increasing use of electronic components in today’s automobiles demands more powerful in-vehicle network communication protocols. FlexRay protocol, which is expected to be the de-facto standard in the near future, is a deterministic, fault tolerant and fast protocol designed for in vehicle communication. For proper operation of a FlexRay network the communication schedule needs to be computed and the nodes need to be configured before startup. Current software tools that are geared towards FlexRay only d...
Citation Formats
S. Mertol, “Secure message authentication protocol for can (controller area network).,” Thesis (M.S.) -- Graduate School of Applied Mathematics. Cryptography., Middle East Technical University, 2020.