Cited time in webofscience Cited time in scopus

Full metadata record

DC Field Value Language
dc.contributor.author Baek, Youngmi -
dc.contributor.author Shin, Seongjoo -
dc.date.accessioned 2023-01-16T14:10:15Z -
dc.date.available 2023-01-16T14:10:15Z -
dc.date.created 2022-06-16 -
dc.date.issued 2022-04 -
dc.identifier.issn 1424-8220 -
dc.identifier.uri http://hdl.handle.net/20.500.11750/17449 -
dc.description.abstract Automotive cyber-physical systems are in transition from the closed-systems to open-networking systems. As a result, in-vehicle networks such as the controller area network (CAN) have become essential to connect to inter-vehicle networks through the various rich interfaces. Newly exposed security concerns derived from this requirement may cause in-vehicle networks to pose threats to automotive security and driver’s safety. In this paper, to ensure a high level of security of the in-vehicle network for automotive CPS, we propose a novel lightweight and practical cyber defense platform, referred to as CANon (CAN with origin authentication and non-repudiation), to be enabled to detect cyber-attacks in real-time. CANon is designed based on the hierarchical approach of centralized-session management and distributed-origin authentication. In the former, a gateway node manages each initialization vector and session of origin-centric groups consisting of two more sending and receiving nodes. In the latter, the receiving nodes belonging to the given origin-centric group individually perform the symmetric key-based detection against cyber-attacks by verifying each message received from the sending node, namely origin authentication, in real-time. To improve the control security, CANon employs a one-time local key selected from a sequential hash chain (SHC) for authentication of an origin node in a distributed mode and exploits the iterative hash operations with randomness. Since the SHC can constantly generate and consume hash values regardless of their memory capacities, it is very effective for resource-limited nodes for in-vehicle networks. In addition, through implicit key synchronization within a given group, CANon addresses the challenges of a key exposure problem and a complex key distribution mechanism when performing symmetric key-based authentication. To achieve lightweight cyber-attack detection without imposing an additive load on CAN, CANon uses a keyed-message authentication code (KMAC) activated within a given group. The detection performance of CANon is evaluated under an actual node of Freescale S12XF and virtual nodes operating on the well-known CANoe tool. It is seen that the detection rate of CANon against brute-force and replay attacks reaches 100% when the length of KMAC is over 16 bits. It demonstrates that CANon ensures high security and is sufficient to operate in real-time even on low-performance ECUs. Moreover, CANon based on several software modules operates without an additive hardware security module at an upper layer of the CAN protocol and can be directly ported to CAN-FD (CAN with Flexible Data rate) so that it achieves the practical cyber defense platform. © 2022 by the authors. Licensee MDPI, Basel, Switzerland. -
dc.language English -
dc.publisher MDPI -
dc.title CANon: Lightweight and Practical Cyber-Attack Detection for Automotive Controller Area Networks -
dc.type Article -
dc.identifier.doi 10.3390/s22072636 -
dc.identifier.scopusid 2-s2.0-85127131351 -
dc.identifier.bibliographicCitation Sensors, v.22, no.7 -
dc.description.isOpenAccess TRUE -
dc.subject.keywordAuthor in-vehicle network -
dc.subject.keywordAuthor sequential hash chain -
dc.subject.keywordAuthor one-time key -
dc.subject.keywordAuthor controller area network -
dc.subject.keywordPlus AUTHENTICATION -
dc.citation.number 7 -
dc.citation.title Sensors -
dc.citation.volume 22 -
Files in This Item:

There are no files associated with this item.

Appears in Collections:
ETC 1. Journal Articles

qrcode

  • twitter
  • facebook
  • mendeley

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE