TY - GEN
T1 - Design of a message authentication protocol for CAN FD based on chaskey lightweight MAC
AU - Carel, Guillaume
AU - Isshiki, Ryunosuke
AU - Kusaka, Takuya
AU - Nogami, Yasuyuki
AU - Araki, Shunsuke
N1 - Funding Information:
ACKNOWLEDGMENTS This research was supported by JSPS KAKENHI Grant-in-Aid for Scientific Research (A) Number 16H01723.
Publisher Copyright:
© 2018 IEEE.
PY - 2018/12/26
Y1 - 2018/12/26
N2 - The development of the autonomous driving and the connected services severely increase security threats on old automotive technologies that are still present on-board vehicles since the long incremental process were employed. For example, the Controller Area Network (CAN) bus, which was standardized in 1991, can be connected to modern Linux embedded computer nodes where evil attacker might be able to exploit a vulnerability on the nodes. However, it is not easy to implement countermeasures on the CAN bus, since the strict requirements and limited performances of CAN specification. That is one of the major reason for the new standard CAN Flexible Data-rate (CAN FD) has been released in 2012 by Bosch to fill the gap between these challenges and the CAN protocol. In this research, a new simple authentication protocol for CAN FD is proposed, and the protocol is evaluated by experiments. The results show that the proposed protocol prevents infected nodes from usurping identity of a critical node and forge messages, with practical computational complexity on modern low-power embedding boards.
AB - The development of the autonomous driving and the connected services severely increase security threats on old automotive technologies that are still present on-board vehicles since the long incremental process were employed. For example, the Controller Area Network (CAN) bus, which was standardized in 1991, can be connected to modern Linux embedded computer nodes where evil attacker might be able to exploit a vulnerability on the nodes. However, it is not easy to implement countermeasures on the CAN bus, since the strict requirements and limited performances of CAN specification. That is one of the major reason for the new standard CAN Flexible Data-rate (CAN FD) has been released in 2012 by Bosch to fill the gap between these challenges and the CAN protocol. In this research, a new simple authentication protocol for CAN FD is proposed, and the protocol is evaluated by experiments. The results show that the proposed protocol prevents infected nodes from usurping identity of a critical node and forge messages, with practical computational complexity on modern low-power embedding boards.
KW - CAN FD
KW - Chaskey
KW - Lightweight MAC
KW - Message authentication
UR - http://www.scopus.com/inward/record.url?scp=85061429617&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85061429617&partnerID=8YFLogxK
U2 - 10.1109/CANDARW.2018.00057
DO - 10.1109/CANDARW.2018.00057
M3 - Conference contribution
AN - SCOPUS:85061429617
T3 - Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018
SP - 267
EP - 271
BT - Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 6th International Symposium on Computing and Networking Workshops, CANDARW 2018
Y2 - 27 November 2018 through 30 November 2018
ER -