scholarly journals Fortifying Vehicular Security through Low Overhead Physically Unclonable Functions

2022 ◽  
Vol 18 (1) ◽  
pp. 1-18
Author(s):  
Carson Labrado ◽  
Himanshu Thapliyal ◽  
Saraju P. Mohanty

Within vehicles, the Controller Area Network (CAN) allows efficient communication between the electronic control units (ECUs) responsible for controlling the various subsystems. The CAN protocol was not designed to include much support for secure communication. The fact that so many critical systems can be accessed through an insecure communication network presents a major security concern. Adding security features to CAN is difficult due to the limited resources available to the individual ECUs and the costs that would be associated with adding the necessary hardware to support any additional security operations without overly degrading the performance of standard communication. Replacing the protocol is another option, but it is subject to many of the same problems. The lack of security becomes even more concerning as vehicles continue to adopt smart features. Smart vehicles have a multitude of communication interfaces an attacker could exploit to gain access to the networks. In this work, we propose a security framework that is based on physically unclonable functions (PUFs) and lightweight cryptography (LWC). The framework does not require any modification to the standard CAN protocol while also minimizing the amount of additional message overhead required for its operation. The improvements in our proposed framework result in major reduction in the number of CAN frames that must be sent during operation. For a system with 20 ECUs, for example, our proposed framework only requires 6.5% of the number of CAN frames that is required by the existing approach to successfully authenticate every ECU.

Electronics ◽  
2021 ◽  
Vol 10 (19) ◽  
pp. 2442
Author(s):  
Cheongmin Ji ◽  
Taehyoung Ko ◽  
Manpyo Hong

In vehicles, dozens of electronic control units are connected to one or more controller area network (CAN) buses to exchange information and send commands related to the physical system of the vehicles. Furthermore, modern vehicles are connected to the Internet via telematics control units (TCUs). This leads to an attack vector in which attackers can control vehicles remotely once they gain access to in-vehicle networks (IVNs) and can discover the formats of important messages. Although the format information is kept secret by car manufacturers, CAN is vulnerable, since payloads are transmitted in plain text. In contrast, the secrecy of message formats inhibits IVN security research by third-party researchers. It also hinders effective security tests for in-vehicle networks as performed by evaluation authorities. To mitigate this problem, a method of reverse-engineering CAN payload formats is proposed. The method utilizes classification algorithms to predict signal boundaries from CAN payloads. Several features were uniquely chosen and devised to quantify the type-specific characteristics of signals. The method is evaluated on real-world and synthetic CAN traces, and the results show that our method can predict at least 10% more signal boundaries than the existing methods.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Zi-An Zhao ◽  
Yu Sun ◽  
Dawei Li ◽  
Jian Cui ◽  
Zhenyu Guan ◽  
...  

Intravehicular communication relies on controller area network (CAN) protocol to deliver messages and instructions among different electronic control units (ECU). Unfortunately, inherent defects in CAN include the absence of confidentiality and integrity mechanism, enabling adversaries to launch attacks from wired or wireless interfaces. Although various CAN cryptographic protocols have been proposed for entity authentication and secure communication, the redundancy in the key establishment phase weakens their availability in large-scale CAN. In this paper, we propose a scalable security protocol suite for intravehicular networks and reduce the communication costs significantly. A new type of attack, suspension attack, is identified for the existing protocols and mitigated in our protocol by leveraging a global counter scheme. We formally verify the security properties of the proposed protocol suite through the AVISPA tool. The simulation results indicate that the communication and computation efficiency are improved in our protocol.


Author(s):  
Polly Taylor

Nociceptive threshold (NT) testing is widely used for the study of pain and its alleviation. The end point is a normal behavioural response which may be affected by restraint or unfamiliar surroundings leading to erroneous data. Remotely controlled thermal and mechanical NT testing systems were developed to allow free movement during testing and were evaluated in cats, dogs, sheep, horses and camels. Thermal threshold (TT) testing incorporated a heater and temperature sensor held against the animal’s shaved skin. Mechanical threshold (MT) testing incorporated a pneumatic actuator attached to a limb containing a 1 - 2mm radiused pin pushed against the skin. Both stimuli were driven from battery powered control units attached on the animal’s back, controlled remotely via infra-red radiation from a hand held component. Threshold reading was held automatically and displayed digitally on the unit. The system was failsafe with a safety cutout at a preset temperature or force as appropriate. The animals accepted the equipment and behaved normally in their home environment enabling recording of reproducible TT (38.5 – 49.8°C) and MT (2.7 – 10.1N); precise values depended on species, the individual and the stimulus characteristics. Remote controlled NT threshold testing appears to be a viable refinement for pain research.


2013 ◽  
pp. 323-342
Author(s):  
Rodrigo Lange ◽  
Rômulo Silva de Oliveira

In recent years, the automotive industry has witnessed an exponential growth in the number of vehicular embedded applications, leading to the adoption of distributed implementations for systems in the powertrain and chassis domains. The Controller Area Network (CAN) protocol has been a de facto standard for intra-vehicular communications, while the FlexRay Communication System is being promoted as the future de facto standard for network interconnections of applications related to X-by-wire systems. Due to the characteristics of CAN and FlexRay, the coexistence of both protocols in the same vehicle is expected, leading to the use of gateways to manage the information exchange between electronic control units connected to different network segments. This chapter describes the main characteristics of CAN and FlexRay protocols, surveying the literature addressing schedulability and time analysis in both FlexRay and CAN protocols. The chapter also outlines the state-of-the-art in research about gateways for intra-vehicular communication networks.


2021 ◽  
Vol 7 (1) ◽  
Author(s):  
Teng-Yun Chen ◽  
Xiao Jiang ◽  
Shi-Biao Tang ◽  
Lei Zhou ◽  
Xiao Yuan ◽  
...  

AbstractQuantum key distribution (QKD) enables secure key exchanges between two remote users. The ultimate goal of secure communication is to establish a global quantum network. The existing field tests suggest that quantum networks are feasible. To achieve a practical quantum network, we need to overcome several challenges including realizing versatile topologies for large scales, simple network maintenance, extendable configuration and robustness to node failures. To this end, we present a field operation of a quantum metropolitan-area network with 46 nodes and show that all these challenges can be overcome with cutting-edge quantum technologies. In particular, we realize different topological structures and continuously run the network for 31 months, by employing standard equipment for network maintenance with an extendable configuration. We realize QKD pairing and key management with a sophisticated key control centre. In this implementation, the final keys have been used for secure communication such as real-time voice telephone, text messaging and file transmission with one-time pad encryption, which can support 11 pairs of users to make audio calls simultaneously. Combined with intercity quantum backbone and ground–satellite links, our metropolitan implementation paves the way toward a global quantum network.


Sensors ◽  
2020 ◽  
Vol 20 (3) ◽  
pp. 777 ◽  
Author(s):  
Anees Abbas ◽  
Niamat Hussain ◽  
Min-Joo Jeong ◽  
Jiwoong Park ◽  
Kook Sun Shin ◽  
...  

This paper presents the design and realization of a compact ultra-wideband (UWB) antenna with a rectangular notch wireless area network (WLAN) band that has controllable notched bandwidth and center frequency. The UWB characteristics of the antenna are achieved by truncating the lower ends of the rectangular microstrip patch, and the notch characteristics are obtained by using electromagnetic bandgap (EBG) structures. EBGs consist of two rectangular metallic conductors loaded on the back of the radiator, which is connected to the patch by shorting pins. A rectangular notch at the WLAN band with high selectivity is realized by tuning the individual resonant frequencies of the EBGs and merging them. Furthermore, the results show that the bandwidth and frequency of the rectangular notch band could be controlled according to the on-demand rejection band applications. In the demonstration, the rectangular notch band was shifted to X-band satellite communication by tuning the EBG parameters. The simulated and measured results show that the proposed antenna has an operational bandwidth from 3.1–12.5 GHz for |S11| < -10 with a rectangular notch band from 5–6 GHz, thus rejecting WLAN band signals. The antenna also has additional advantages: the overall size of the compact antenna is 16 × 25 × 1.52 mm3 and it has stable gain and radiation patterns.


Author(s):  
Ahmad MK Nasser ◽  
Di Ma ◽  
Priya Muralidharan

AUTOSAR, a worldwide development partnership among automotive parties to establish an open and standardized software architecture for electronic control units (ECUs), has seen great success in recent years by being widely adopted in deeply embedded automotive ECUs. Increasing the security resilience of AUTOSAR based systems is a crucial step in securing safety critical automotive systems. We study AUTOSAR safety mechanisms and demonstrate how they can be used as attack vectors to degrade the vehicle safety.We show the need to harmonize the fail-safe response with the secure state of the system. And we evaluate the overlap in the properties of safety mechanisms with security objectives to highlight methods for hardening automotive systems security.  


Author(s):  
Tain-Lieng Kao ◽  
San-Yuan Wang ◽  
Ming-Hua Wu

Due to the development of modern techniques, in the recent years, electronic vehicles and autopilot systems have beensignificant emerged in automobile and IT industrial. This leads the electronics automotive systems and auto-control systems consistedof a lot of high performance Electronic Control Units(ECUs) connected by controller area network (CAN). For realizing morecomplicated design in ECUs, this work integrates real-time OS and network management function. The results improve the CANbusnodes&#39; designing level to as a gateway to interconnect CANbus nodes. As the number of CANbus nodes increase, the verification processis more and more complicated and takes much time. For speeding up the verification process, this work uses CANoe package toprogram the testing script for automotive verification environment. Then the engineer can connect the testing device by CAN to theenvironment for automatic verification. The engineer can define the network messages of the CANbus nodes and tune the design asthe validating progress. The testing results present as XML format and can be transferred to HTML pages for readability. Hence, thiswork realizes an automatic verification environment for CANbus in-vehicle networks.


Network security has been great concern with recent technical advancement in wireless communication. And for that, a secured system is to be developed to provide data security over wireless transmission. This paper presents wireless body area network (WBAN) with cryptographic AES algorithm which monitors patient biomedical parameters based on sensors, Arduino and ZigBee. WBAN provides real-time measurements of patients health based on biomedical sensor. AES cryptographic algorithm is implemented for secure communication over wireless network by encryption and decryption of physiological parameters. Implementation of algorithm using Arduino has been communicated by ZigBee network to provide security to the encrypted data (cipher text) on medium cost devices. This ensures security of data for medical rehabilitation and monitoring of patients. The main purpose of this paper is to help a physician to treat patients during emergency by monitoring patients round the clock (24*7). This paper is helpful for elderly and disabled people with no assistance to measure and send the results to the doctor immediately


Sign in / Sign up

Export Citation Format

Share Document