Skip to main content

A Hardware Based Solution for Freshness of Secure Onboard Communication in Vehicles

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11387))

Abstract

Information Technology has become eminent in the development of modern cars. More than 50 Electronic Control Units (ECUs) realize vehicular functions in hardware and software, ranging from engine control and infotainment to future autonomous driving systems. Not only the connections to the outside world pose new threats, also the in-vehicle communication between ECUs, realized with bus systems like CAN, needs to be protected against manipulation and replay of messages. Multiple countermeasures were presented in the past making use of Message Authentication Codes and specific values to provide message freshness, most prominently AUTOSAR’s Secure Onboard Communication (SecOC). However, the currently considered solutions exhibit deficiencies which are hard if not impossible to overcome within the scope of the respective approaches. In this paper we present a new, hardware-based approach that avoids these deficiencies and formally prove its freshness properties.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. AUTOSAR: Specification of Module Secure Onboard Communication, Classic Platform, December 2017

    Google Scholar 

  2. Chavez, M.L., Rosete, C.H., Henriquez, F.R.: Achieving confidentiality security service for CAN. In: 15th International Conference on Electronics, Communications and Computers, CONIELECOMP 2005, pp. 166–170, February 2005

    Google Scholar 

  3. Elend, B., Adamson, T.: Cyber security enhancing CAN transceivers. In: Proceedings of the 16th International CAN Conference (2017)

    Google Scholar 

  4. Grimm, R., Ochsenschläger, P.: Binding cooperation, a formal model for electronic commerce. Comput. Netw. 37, 171–193 (2001)

    Article  Google Scholar 

  5. Groza, B., Murvay, S., van Herrewege, A., Verbauwhede, I.: LiBrA-CAN: a lightweight broadcast authentication protocol for controller area networks. In: Pieprzyk, J., Sadeghi, A.-R., Manulis, M. (eds.) CANS 2012. LNCS, vol. 7712, pp. 185–200. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-35404-5_15

    Chapter  Google Scholar 

  6. Gürgens, S., Ochsenschläger, P., Rudolph, C.: Authenticity and provability — a formal framework. In: Davida, G., Frankel, Y., Rees, O. (eds.) InfraSec 2002. LNCS, vol. 2437, pp. 227–245. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45831-X_16

    Chapter  Google Scholar 

  7. Road vehicles - Controller Area Network (CAN). Standard, International Organization for Standardization, Geneva, CH, December 2015

    Google Scholar 

  8. Koscher, K., et al.: Experimental security analysis of a modern automobile. In: 2010 IEEE Symposium on Security and Privacy, pp. 447–462, May 2010. https://doi.org/10.1109/SP.2010.34

  9. Lu, S.: Vehicle Survivability and Travel Mileage Schedules. NHTSA’s National Center for Statistics and Analysis, Washington, DOT HS 809 952 edn. (2006)

    Google Scholar 

  10. Miller, C., Valasek, C.: A survey of remote automotive attack surfaces. In: Black Hat USA (2014)

    Google Scholar 

  11. Nilsson, D.K., Larson, U.E., Jonsson, E.: Efficient in-vehicle delayed data authentication based on compound message authentication codes. In: 2008 IEEE 68th Vehicular Technology Conference, pp. 1–5, September 2008

    Google Scholar 

  12. Nürnberger, S., Rossow, C.: – vatiCAN – vetted, authenticated CAN bus. In: Gierlichs, B., Poschmann, A.Y. (eds.) CHES 2016. LNCS, vol. 9813, pp. 106–124. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-53140-2_6

    Chapter  Google Scholar 

  13. Radu, A.-I., Garcia, F.D.: LeiA: a lightweight authentication protocol for CAN. In: Askoxylakis, I., Ioannidis, S., Katsikas, S., Meadows, C. (eds.) ESORICS 2016. LNCS, vol. 9879, pp. 283–300. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-45741-3_15

    Chapter  Google Scholar 

  14. Schweppe, H., et al.: EVITA deliverable D3.3: secure on-board protocols specifcation. Technical report, EVITA, July 2011

    Google Scholar 

  15. Siddiqui, A.S., Gui, Y., Plusquellic, J., Saqib, F.: Secure communication over CAN bus. In: 2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 1264–1267, August 2017

    Google Scholar 

  16. Szilagyi, C., Koopman, P.: Flexible multicast authentication for time-triggered embedded control network applications. In: 2009 IEEE/IFIP International Conference on Dependable Systems Networks, pp. 165–174, June 2009

    Google Scholar 

  17. Ueda, H., Kurachi, R., Takada, H., Mizutani, T., Inoue, M., Horihata, S.: Security authentication system for in-vehicle network. SEI Tech. Rev. 81, 5–9 (2015)

    Google Scholar 

  18. Zou, Q., et al.: The study of secure CAN communication for automotive applications. In: SAE Technical Paper. SAE International, March 2017

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sigrid Gürgens .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gürgens, S., Zelle, D. (2019). A Hardware Based Solution for Freshness of Secure Onboard Communication in Vehicles. In: Katsikas, S., et al. Computer Security. SECPRE CyberICPS 2018 2018. Lecture Notes in Computer Science(), vol 11387. Springer, Cham. https://doi.org/10.1007/978-3-030-12786-2_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-12786-2_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-12785-5

  • Online ISBN: 978-3-030-12786-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics