Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Secure message authentication protocol for can (controller area network).
Download
index.pdf
Date
2020
Author
Mertol, Sarp
Metadata
Show full item record
This work is licensed under a
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
.
Item Usage Stats
282
views
134
downloads
Cite This
The widespread communication of vehicles with each other and road infrastructure has raised concerns about how to ensure network security of the electronic control units (ECUs) in the vehicle. The fact that networks such as the Controller Area Network (CAN), which is commonly used in in-vehicle communications, will also be connected to external networks (e.g. 3G / 4G mobile networks) will allow malicious adversaries to benefit from the vulnerability of the CAN. The authentication of messages of ECUs in the vehicle is required to ensure that in-vehicle communications are secured. However, the cryptographic algorithms and protocols that can be used for this message verification process should be selected considering the real-time communication requirement in the vehicle.
Subject Keywords
Controller Area Network (Computer network).
,
Controller Area Network
,
Message Authentication Protocol
,
Message Authentication Code
,
Network Security
,
Replay Attack.
URI
http://etd.lib.metu.edu.tr/upload/12625136/index.pdf
https://hdl.handle.net/11511/45308
Collections
Graduate School of Applied Mathematics, Thesis
Suggestions
OpenMETU
Core
Controller area network with offset scheduling: improved offset assignment algorithms and computation of response time distributions
Batur, Ahmet; Schmidt, Klaus Werner; Schmidt, Şenan Ece; Department of Electrical and Electronics Engineering (2018)
The Controller Area Network (CAN) is the most widely-used in-vehicle communication bus in the automotive industry. CAN enables the exchange of data among different electronic control units (ECUs) of a vehicle via messages. The basic requirement for the design of CAN is to guarantee that the worst-case response time (WCRT) of each message is smaller than its specified deadline. Hereby, it is generally desired to achieve small WCRTs that leave sufficient slack to the message deadline. In addition, it has to b...
Adaptable Safety and Security in V2X Systems
VİLLARREAL VASQUEZ, Miguel; BHARGAVA, Bharat; Angın, Pelin (2017-06-30)
With the advances in the areas of mobile computing and wireless communications, V2X systems have become a promising technology enabling deployment of applications providing road safety, traffic efficiency and infotainment. Due to their increasing popularity, V2X networks have become a major target for attackers, making them vulnerable to security threats and network conditions, and thus affecting the safety of passengers, vehicles and roads. Existing research in V2X does not effectively address the safety, ...
Tracking Reported Vehicles in Traffic Management and Information System using Intelligent Junctions
Elci, Atilla; RAHNAMA, BEHNAM; Amintabar, Amirhasan (2010-05-01)
This study highlights a security scenario involving vehicles in a Traffic Management and Information System (TMIS) network. TMIS and its nodal architecture, nicknamed Intelligent Junction (IJ), are summarized from our recent work. System design sets an example to a software architecture implementing autonomous semantic agents through semantic web services, junction-based sensor networks, local- and wide-area networking through wire/wireless integrated communication infrastructure. It is so construed as to p...
UAVs assessment in software-defined IoT networks: An overview
Al-Turjman, Fadi; Abujubbeh, Mohammad; Malekloo, Arman; Mostarda, Leonardo (Elsevier BV, 2020-01-15)
The technological advancements in the ubiquitous IoT era and the ever-growing desire of communities to enforce smart cities with security and safety of user data as their priority, mini Unmanned Aerial Vehicles (UAVs), or drones, are perceived as a tool for raising living standards by meeting the requirements of societies. Traditionally in UAV communication links, meshed ad hoc networks were among the first options of connectivity. However, the increased demand for deploying multi-UAV networks necessitates ...
Software tool development for the automated configuration of flexray networks for in vehicle communication
Öztürk, Can; Schmidt, Şenan Ece; Schmidt, Klaus Werner; Department of Electrical and Electronics Engineering (2013)
The increasing use of electronic components in today’s automobiles demands more powerful in-vehicle network communication protocols. FlexRay protocol, which is expected to be the de-facto standard in the near future, is a deterministic, fault tolerant and fast protocol designed for in vehicle communication. For proper operation of a FlexRay network the communication schedule needs to be computed and the nodes need to be configured before startup. Current software tools that are geared towards FlexRay only d...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
S. Mertol, “Secure message authentication protocol for can (controller area network).,” Thesis (M.S.) -- Graduate School of Applied Mathematics. Cryptography., Middle East Technical University, 2020.