scholarly journals Design of a CANFD to SOME/IP Gateway Considering Security for In-Vehicle Networks

Sensors ◽  
2021 ◽  
Vol 21 (23) ◽  
pp. 7917
Author(s):  
Zheng Zuo ◽  
Shichun Yang ◽  
Bin Ma ◽  
Bosong Zou ◽  
Yaoguang Cao ◽  
...  

In recent years, Ethernet has been introduced into vehicular networks to cope with the increasing demand for bandwidth and complexity in communication networks. To exchange data between controller area network (CAN) and Ethernet, a gateway system is required to provide a communication interface. Additionally, the existence of networked devices exposes automobiles to cyber security threats. Against this background, a gateway for CAN/CAN with flexible data-rate (CANFD) to scalable service-oriented middleware over IP (SOME/IP) protocol conversion is designed, and security schemes are implemented in the routing process to provide integrity and confidentiality protections. Based on NXP-S32G, the designed gateway is implemented and evaluated. Under most operating conditions, the CPU and the RAM usage are less than 5% and 20 MB, respectively. Devices running a Linux operating system can easily bear such a system resource overhead. The latency caused by the security scheme accounts for about 25% of the entire protocol conversion latency. Considering the security protection provided by the security scheme, this overhead is worthwhile. The results show that the designed gateway can ensure a CAN/CANFD to SOME/IP protocol conversion with a low system resource overhead and a low latency while effectively resisting hacker attacks such as frame forgery, tampering, and sniffing.

2021 ◽  
pp. 481-493
Author(s):  
Sarika Singh ◽  
Gargi Phadke

For any system to secure them industrial control system plays an important role in it. It helps to design the isolated procure system, specialized communication mechanisms is used to help for the setup. And with the help of this setup the flexibility, safety, threats, and vulnerabilities are the most important things to make. To secure them from risk assessment and other protection measurement need to specify with good instruments and security. The paper describes technical aspects on Denial of Service (Dos) attack. We also identify how smart grid communication networks works in security technical implementation guides of the different countries as a defense information systems agency. A brief chronicle of cyber storm on ICS; common challenges, some mitigation of those challenge, all levels of the multi-layered ICS architecture. This paper demonstrates railway control systems (RCS) compliance estimation of immovable control system design, operational scenarios that can be used for mitigation measures and security assessment.


2016 ◽  
Vol 6 (2) ◽  
pp. 1-10
Author(s):  
Chaima Bensaid ◽  
Sofiane Boukli Hacene ◽  
Kamel Mohamed Faraoun

Vehicular networks or VANET announce as the communication networks of the future, where the mobility is the main idea. These networks should be able to interconnect vehicles. The optimal goal is that these networks will contribute to safer roads and more effective in the future by providing timely information to drivers and concerned authorities. They are therefore vulnerable to many types of attacks among them the black hole attack. In this attack, a malicious node disseminates spurious replies for any route discovery in order to monopolize all data communication and deteriorate network performance. Many studies have focused on detecting and isolating malicious nodes in VANET. In this paper, the authors present two mechanisms to detect this attack. The main goal is detecting as well as bypass cooperative black hole attack. The authors' approaches have been evaluated by the detailed simulation study with NS2 and the simulation results shows an improvement of protocol performance.


Author(s):  
Carlos Alberto Luján-Ramírez ◽  
Jesús Sandoval-Gío ◽  
Agustín Alfonso Flores-Novelo ◽  
Juan Alberto Ojeda-Arana

Over time, the CAN (Controller Area Network) communication bus has been implemented in different technological sectors, within which, depending on the application, the bus implementation may change. On the other hand, the design and implementation of digital controls based on experimental data is a well-known topic in the automation industry where the acquisition system is of great importance. In this document, a heuristic study of the behavior of a Full CAN network is reported to implement digital controllers in two interconnected control loops. This study takes into account the access time to the bus and the amount of data sent when observing the response to disturbances. The design of two digital controllers is presented based on the parametric identification of two plants: a DC motor with an electromagnetic brake and a pneumatic levitator. Using PSoC® microcontrollers, a Full CAN network is implemented, where the digital controllers exchange data by randomly accessing the bus. A specially designed interface allows visualizing the speed and amount of data transferred under different operating conditions of the control loops. At the document end, the experimental data obtained are discussed.


2021 ◽  
Author(s):  
Mohammad S. Yazdi

Smart grid is a utility network, with advanced information and communications technologies for improved control, efficiency, reliability and safety in electric power distribution and management. Smart grid communication network consists of three interconnected communication networks: home area network (HAN), neighborhood area network (NAN), and wide area network (WAN). Our thesis is focused on NAN. The information flow in smart grid communication networks has different Quality of Service (QoS) requirements in terms of packet loss rate, throughput, and latency. By deploying QoS mechanisms, we can get the real time feedbacks which can be used to supply electricity based on need, thus reducing the wastage of electricity. First, we conducted Opnet simulations for NAN. We evaluated two technologies, Zigbee and wireless local area network (WLAN), for NAN. The simulation results demonstrate that latency can be reduced for the data flow with a higher priority with an appropriate QoS mechanism. Next, we proposed an optimal resource allocation scheme to reduce delay and provide differentiated services, in terms of latency, to different classes of traffic in the NAN. The problem is formulated into a linear programming (LP) problem, which can be solved efficiently. The simulation results and comparison demonstrates that the proposed resource allocation scheme can provide overall lower latency of the various data flows. Our method also lowers the delay of the data flow with a higher priority.


2013 ◽  
pp. 323-342
Author(s):  
Rodrigo Lange ◽  
Rômulo Silva de Oliveira

In recent years, the automotive industry has witnessed an exponential growth in the number of vehicular embedded applications, leading to the adoption of distributed implementations for systems in the powertrain and chassis domains. The Controller Area Network (CAN) protocol has been a de facto standard for intra-vehicular communications, while the FlexRay Communication System is being promoted as the future de facto standard for network interconnections of applications related to X-by-wire systems. Due to the characteristics of CAN and FlexRay, the coexistence of both protocols in the same vehicle is expected, leading to the use of gateways to manage the information exchange between electronic control units connected to different network segments. This chapter describes the main characteristics of CAN and FlexRay protocols, surveying the literature addressing schedulability and time analysis in both FlexRay and CAN protocols. The chapter also outlines the state-of-the-art in research about gateways for intra-vehicular communication networks.


Author(s):  
Jonathan Bishop

Sexual harassment has been a problem within organisations for some time. Its manifestation in electronic communication networks can be seen to amount to cyber-bullying or cyber-stalking. Through looking at records relating to an instance of sexual harassment at a higher education institution, including from that member of staff's workplace, and those created by referrals to the police, the court service, and their workplace, this chapter shows how a piece of assistive technology called the ‘Protective Technology for Ensuring Guardianship of Environmental Resources' (PROTEGER) can automatically detect sexual harassment narratives. In this context, ‘environmental resources' should refer to both humans and documents. Human resource managers would be better equipped to deal with disputes between staff if PROTEGER was running on their local area network as it might not be a matter of one member of staff's word against another's.


Author(s):  
Jonika Lamba ◽  
Esha Jain

Cybersecurity is not just about fortification of data. It has wide implications such as maintaining safety, privacy, integrity, and trust of the patients in the healthcare sector. This study methodically reviews the need for cybersecurity amid digital transformation with the help of emerging technologies and focuses on the application and incorporation of blockchain and the internet of things (IoT) to ensure cybersecurity in the well-being of the business. It was found in the study that worldwide, advanced technology has been used in managing the flow of data and information, India should focus on maintaining the same IT-enabled infrastructure to reduce causalities in the nation and on the other hand improve administration, privacy, and security in the hospital sector. Depending on the network system, resource allocation, and mobile devices, there is a need to prioritize the resources and efforts in the era of digitalization.


Author(s):  
Md Alimul Haque ◽  
Shameemul Haque ◽  
Kailash Kumar ◽  
Narendra Kumar Singh

The role of the internet of things (IoT) and cyberspace in a digital society is well recognized, and they have become tremendously popular due to certain features like the ability to ease the operational process of businesses and instant communication. Recent developments in the fields of wireless communication networks like 4G, 5G, and 6G with IoT applications have greatly benefited human welfare. Still, the rapid growth of various IoT applications focuses on automating different tasks and are trying to empower the inanimate physical objects to act without any human intervention. It has also contributed to unethical practices by hackers who use new tools and techniques to penetrate more complex or well-controlled environments and produce increased damage and even remain under the cover. The main objective of this chapter is to improve understanding of the challenges to secure future digital infrastructure while it is still evolving. In this context, a detailed review of the security-related issues, challenges, threats, and countermeasures in the IoT applications is presented.


Energies ◽  
2019 ◽  
Vol 12 (8) ◽  
pp. 1442 ◽  
Author(s):  
Chun-Hung Liu ◽  
Jyh-Cherng Gu

Distributed energy resources (DERs) are being widely interconnected to electrical power grids. The dispersed and intermittent generational mixes bring technical and economic challenges to the power systems in terms of stability, reliability, and interoperability. In practice, most of the communication technologies in DER are provided by proprietary communication protocols, which are not designed for the prevention of cyber security over a wide area network, and methodology of DER integration is not unified. This has made it technically difficult for power utilities and aggregators to monitor and control the DER systems after they are interconnected with the electrical grids. Moreover, peer to peer communication between DER systems as well as local intelligent computation is required to reduce decision latency and enhance the stability of the smart grid or microgrid. In this paper, the first, novel architecture of IEC 61850 XMPP (extensible messaging and presence protocol) of the edge computing gateway, involving advanced concepts and technologies, was developed and completely studied to counter the abovementioned challenges. The results show that the proposed architecture can enhance the DER system’s effective integration, security in data communication and transparency for interoperability. The novel and advanced concepts involve first modeling the topology of the photovoltaic (PV) station to IEC 61850 information models according to the IEC 61850-7-4 logical nodes and the DER-specific logical nodes defined in IEC 61850-7-420. This guarantees the interoperability between DER and DER, DER and utility and DER and the energy service operator. The second step was to map the information models to IEC 61850-8-2 XMPP for the specific communication protocol in DER applications. XMPP protocol, a publish/subscribe communication mechanism, is recommended in DER applications because of its characteristics of cybersecurity and authenticated encryption. After that we enabled the edge computing capability for data processing and the analytics of the DER side for time-critical missions. The aggregated data was then sent to the control center in the cloud. By applying the edge computing architecture, the system reduced decision latency, improved data privacy and enhanced security. The goal of this paper was to introduce the practical methodologies of these novel concepts to academics and industrial engineers.


Sign in / Sign up

Export Citation Format

Share Document