Skip to main content

Attack Potential and Efficient Security Enhancement of Automotive Bus Networks Using Short MACs with Rapid Key Change

  • Conference paper
Communication Technologies for Vehicles (Nets4Cars/Nets4Trains/Nets4Aircraft 2014)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 8435))

Included in the following conference series:

Abstract

A number of successful attacks on automotive bus systems has been published recently. However, only a limited amount of detailed studies about attack surfaces as well as efficient security mechanisms have been proposed. Therefore, a general study of possible attacks regarding content manipulation on popular automotive bus systems is provided in this work. Additionally, a new authentication scheme for bus messages is proposed, which overcomes some of the limitations imposed by previously suggested technologies. Thereby, a combination of the upcoming SHA-3 standard with standard HMAC authentication is used to achieve a highly secure system, while keeping the introduced overhead very low.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Memorandum of Understanding for OEMs within the CAR 2 CAR Communication Consortium on Deployment Strategy for cooperative ITS in Europe, v 4.0102 (June 2011)

    Google Scholar 

  2. CANlog4. giN - Gesellschaft für industrielle Netzwerke (December 2013), http://gin.de/index.php?device=1004&lang=en

  3. ISO 11898-1:2003 Road vehicles – Controller area network (CAN) – Part 1: Data link layer and physical signalling (February 2013)

    Google Scholar 

  4. ISO 17458-2:2013 Road vehicles – FlexRay communications system – Part 2: Data link layer specification (January 2013)

    Google Scholar 

  5. ISO/DIS 17987-3 Road vehicles – Local Interconnect Network (LIN) – Part 3: Protocol specification (November 2013)

    Google Scholar 

  6. TTX-Connexion. TTTech (December 2013), http://www.tttech.com/products/automotive/testing-tools/signal-routing/ttx-connexion/

  7. Al-Kuwari, S., Wolthusen, D.: On the Feasibility of Carrying Out Live Real-Time Forensics for Modern Intelligent Vehicles. In: Forensics in Telecommunications, Information and Multimedia: Third International ICST Conf., pp. 207–223 (2010)

    Google Scholar 

  8. Bellare, M., Canetti, R., Krawczyk, H.: Keying Hash Functions for Message Authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1–15. Springer, Heidelberg (1996)

    Google Scholar 

  9. Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: The Keccak sponge function family (June 2013), http://keccak.noekeon.org/

  10. Chang, S., Perlner, R., Burr, W.E., Turan, M.S., Kelsey, J.M., Paul, S., Bassham, L.E.: Third Round Report of the SHA-3 Cryptographic Hash Algorithm Competition. Tech. rep., NIST (November 2012)

    Google Scholar 

  11. Dworkin, M.: Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication. NIST Special Publication 800-38B, NIST (May 2005)

    Google Scholar 

  12. Dworkin, M.: Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC. NIST Special Publication 800-38D, NIST (November 2007)

    Google Scholar 

  13. Groza, B., Murvay, S., van Herrewege, A., Verbauwhede, I.: LiBrA-CAN: A Lightweight Broadcast Authentication Protocol for Controller Area Networks. In: Pieprzyk, J., Sadeghi, A.-R., Manulis, M. (eds.) CANS 2012. LNCS, vol. 7712, pp. 185–200. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  14. Koscher, K., et al.: Experimental Security Analysis of a Modern Automobile. In: 31st IEEE Symposium on Security and Privacy, vol. 31 (2010)

    Google Scholar 

  15. Krawczyk, H., Bellare, M., Canetti, R.: HMAC: Keyed-Hashing for Message Authentication. Tech. Rep. RFC2104, Network Working Group, IETF (February 1997)

    Google Scholar 

  16. Miller, C., Valasek, C.: Adventures in Automotive Networks and Control Units (2013), http://illmatics.com/car_hacking.pdf

  17. Moser, M.: Trust Evaluation and Trust Assurance, Protection Profiles, 7th CAR 2 CAR Forum (November 2013)

    Google Scholar 

  18. MOST Cooperation: MOST Specification (July 2010)

    Google Scholar 

  19. M’Raihi, D., Bellare, M., Naccache, D., Ranen, O.: HOTP: An HMAC-Based One-Time Password Algorithm. Tech. Rep. RFC: 4226, Network Working Group, IETF (December 2005)

    Google Scholar 

  20. Nisch, P.: Security Issues in Modern Automotive Systems (June 2012), http://www.panisch.com/wp-content/uploads/2012/06/Security_Issues_in_Modern_Automotive_Cars.pdf

  21. Paar, C., Pelzl, J.: Understanding Cryptography, 2nd edn. Springer (2010)

    Google Scholar 

  22. Schweppe, H., Roudier, Y.: Security Issues in Vehicular Systems: Threats, Emerging Solutions and Standards. In: 5th Conference on Network Architectures and Information Systems Security (May 2010)

    Google Scholar 

  23. Schweppe, H., Roudier, Y., Weyl, B., Apvrille, L.: Car2X Communication: Securing the Last Meter - A Cost-Effective Approach for Ensuring Trust in Car2X Applications Using In-Vehicle Symmetric Cryptography. In: 2011 IEEE Vehicular Technology Conference (VTC Fall), pp. 1–5 (September 2011)

    Google Scholar 

  24. Van Herrewege, A., Singelee, D., Verbauwhede, I.: CANAuth - A Simple, Backward Compatible Broadcast Authentication Protocol for CAN bus. In: ECRYPT Workshop on Lightweight Cryptography 2011 (January 2011)

    Google Scholar 

  25. Wolf, M., Weimerskirch, A., Paar, C.: Security in Automotive Bus Systems. In: Proceedings of the Workshop on Embedded Security in Cars (escar) 2004 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Bittl, S. (2014). Attack Potential and Efficient Security Enhancement of Automotive Bus Networks Using Short MACs with Rapid Key Change. In: Sikora, A., Berbineau, M., Vinel, A., Jonsson, M., Pirovano, A., Aguado, M. (eds) Communication Technologies for Vehicles. Nets4Cars/Nets4Trains/Nets4Aircraft 2014. Lecture Notes in Computer Science, vol 8435. Springer, Cham. https://doi.org/10.1007/978-3-319-06644-8_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-06644-8_11

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-06643-1

  • Online ISBN: 978-3-319-06644-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics