An Efficient and Secure Authentication Scheme for In-vehicle Networks in Connected Vehicle

  • Mengjie Duan
  • Shunrong Jiang
  • Liangmin Wang
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 747)


In-vehicle networks which were originally designed to operate in a closed environment without secure concerns are now being connected to external nodes/networks and providing useful services. However, communications with the external world introduce severe security threats to the vehicle. For connected vehicle, many attacks, which were only feasible with physical access to a vehicle, can now be carried out remotely over wireless networks. To overcome this problem, we propose a security protocol to protect in-vehicle networks based on current Controller Area Network specifications. First, we generate the secure in-vehicle networks by using a group key. Then, we make the gateway join the secure in-vehicle networks after authenticating it. Finally, we generate the pair-ware key to ensure the secure communication between the external node and the gateway. The security analysis and performance evaluation show that the proposed scheme is secure and practical.


Connected vehicle In-vehicle networks Controller Area Network Security 



This research is supported by the National Natural Science Foundation of China Grants (No. 61702231), Natural Science Foundation of Jiangsu Province (BK2017 0556), Jiangsu Provincial Research Scheme of Natural Science for Higher Education institutions (No. 17KJB520005), and Key Laboratory for New Technology Application of Road Conveyance of Jiangsu Province (No. BM20082061707).


  1. 1.
  2. 2.
  3. 3.
  4. 4.
    Bariah, L., Shehada, D., Salahat, E., Yeun, C.Y.: Recent advances in vanet security: a survey. In: Vehicular Technology Conference, pp. 1–7 (2016)Google Scholar
  5. 5.
    Biswas, S., Tatchikou, R., Dion, F.: Vehicle-to-vehicle wireless communication protocols for enhancing highway traffic safety. IEEE Commun. Mag. 44(1), 74–82 (2006)CrossRefGoogle Scholar
  6. 6.
    Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F., Kohno, T.: Comprehensive experimental analyses of automotive attack surfaces. In: USENIX Security Symposium, San Francisco (2011)Google Scholar
  7. 7.
    Dutta, R., Mukhopadhyay, S., Collier, M.: Computationally secure self-healing key distribution with revocation in wireless ad hoc networks. Ad Hoc Netw. 8(6), 597–613 (2010)CrossRefGoogle Scholar
  8. 8.
    Groza, B., Murvay, S.: Efficient protocols for secure broadcast in controller area networks. IEEE Trans. Industr. Inf. 9(4), 2034–2042 (2013)CrossRefGoogle Scholar
  9. 9.
    Han, K., Potluri, S.D., Shin, K.G.: On authentication in a connected vehicle: secure integration of mobile devices with vehicular networks. In: ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS), pp. 160–169. IEEE (2013)Google Scholar
  10. 10.
    Hoppe, T., Kiltz, S., Dittmann, J.: Security threats to automotive CAN networks – practical examples and selected short-term countermeasures. In: Harrison, M.D., Sujan, M.-A. (eds.) SAFECOMP 2008. LNCS, vol. 5219, pp. 235–248. Springer, Heidelberg (2008). Scholar
  11. 11.
    Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H.: Experimental security analysis of a modern automobile. In: IEEE Symposium on Security and Privacy, pp. 447–462. IEEE (2010)Google Scholar
  12. 12.
    Lin, C., Sangiovanni-Vincentelli, A.: Cyber-security for the controller area network (CAN) communication protocol. In: 2012 International Conference on Cyber Security (CyberSecurity), pp. 1–7. IEEE (2012)Google Scholar
  13. 13.
    Nilsson, D.K., Larson, U.E., Jonsson, E.: Creating a secure infrastructure for wireless diagnostics and software updates in vehicles. In: Harrison, M.D., Sujan, M.-A. (eds.) SAFECOMP 2008. LNCS, vol. 5219, pp. 207–220. Springer, Heidelberg (2008). Scholar
  14. 14.
    Woo, S., Jin, J.H., Choi, W., Chun, J.Y., Park, J., Lee, D.H.: Identifying ecus using inimitable characteristics of signals in controller area networks. arXiv preprint arXiv:1607.00497 (2016)
  15. 15.
    Schweppe, H., Roudier, Y., Weyl, B., Apvrille, L., Scheuermann, D.: Car2x communication: securing the last meter-a cost-effective approach for ensuring trust in car2x applications using in-vehicle symmetric cryptography. In: IEEE Vehicular Technology Conference, pp. 1–5. IEEE (2011)Google Scholar
  16. 16.
    Shavit, M., Gryc, A., Miucic, R.: Firmware update over the air (fota) for automotive industry. Technical report, SAE Technical Paper (2007)Google Scholar
  17. 17.
    Toor, Y., Muhlethaler, P., Laouiti, A.: Vehicle ad hoc networks: applications and related technical issues. IEEE Commun. Surv. Tutorials 10(3), 74–88 (2008)CrossRefGoogle Scholar
  18. 18.
    Vandenbrink, R.: Dude, your car is pwned. SANSFIRE 2012, Washington, DC (2012)Google Scholar
  19. 19.
    Woo, S., Jin, J.H., Kim, I.S., Lee, D.H.: A practical security architecture for in-vehicle CAN-FD. IEEE Trans. Intell. Transp. Syst. 16, 2248–2261 (2016)CrossRefGoogle Scholar
  20. 20.
    Woo, S., Jin, J.H., Lee, D.H.: A practical wireless attack on the connected car and security protocol for in-vehicle can. IEEE Trans. Intell. Transp. Syst. 16, 993–1006 (2014)Google Scholar
  21. 21.
    Zhang, T., Antunes, H., Aggarwal, S.: Defending connected vehicles against malware: challenges and a solution framework. IEEE Internet Things J. 1(1), 10–21 (2014)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.School of Computer Science and Communication EngineeringJiangsu UniversityZhenjiangChina

Personalised recommendations