Security protocol for controller area network using ECANDC compression algorithm
- 24 November 2016
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE) in 2016 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC)
Abstract
Controller area network (CAN) is the most extensively used embedded network protocol in vehicles. However, CAN is vulnerable to malicious security attacks as it enables unauthorized access in a relatively straightforward manner. In the last ten years, security attacks in vehicles have been increasing and reported in several documents. In this paper, we propose a security protocol for CAN system based on AES-128 encryption and HMAC function. In addition, by combining with CAN data compression algorithm, it is shown that the efficiency of the proposed algorithm can be significantly increased. We simulate the proposed security protocol using the CANoe software. The CAN bus load is measured using CANcaseXL device. Experimental results show that the average message delay with 20 ECUs is within 0.13ms and the bus load can be reduced by 18.41% using the proposed security protocol compared with the uncompressed message. Our results indicate that the proposed security protocol is suitable for use in real-time in-vehicle system.Keywords
This publication has 5 references indexed in Scilit:
- Efficient controller area network data compression for automobile applicationsFrontiers of Information Technology & Electronic Engineering, 2014
- A Practical Wireless Attack on the Connected Car and Security Protocol for In-Vehicle CANIEEE Transactions on Intelligent Transportation Systems, 2014
- Cyber-Security for the Controller Area Network (CAN) Communication ProtocolPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2012
- Experimental Security Analysis of a Modern AutomobilePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- Keying Hash Functions for Message AuthenticationLecture Notes in Computer Science, 1996