Skip to main content

An Integrated Safe and Secure Approach for Authentication and Secret Key Establishment in Automotive Cyber-Physical Systems

  • Conference paper
  • First Online:
Intelligent Computing (SAI 2020)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1230))

Included in the following conference series:

Abstract

In this paper, we propose an integrated safe and secure approach for operation in automotive cyber-physical systems (CPS). The proposed approach incorporates a novel protocol for authentication and secret key establishment for electronic control units (ECUs) in automotive CPS. The approach leverages certificates and elliptic curve cryptography (ECC) for authentication and secret key establishment, and symmetric encryption and hash-based message authentication codes for providing confidentiality and integrity, respectively, for messages on in-vehicle bus. To incorporate safety primitives, the approach leverages multicore ECUs and provide fault tolerance by redundant multi-threading (FT-RMT), FT-RMT enhanced by quick error detection (FT-RMT-QED), and FT-RMT with lightweight check-pointing (CP). The proposed approach ensures that the simultaneous integration of security and safety primitives in intra-vehicle ECU communication does not violate real-time constraints of automotive CPS applications. We demonstrate the proposed approach through a steer-by-wire case study. Results verify that our proposed approach integrates confidentiality, integrity, authentication, and secret key establishment in intra-vehicle networks without violating real-time constraints even in the presence of errors in computation and transmission.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Beckschulze, E., Salewski, F., Siegbert, T., Kowalewski, S.: Fault handling approaches on dual-core microcontrollers in safety-critical automotive applications. In: International Symposium On Leveraging Applications of Formal Methods, Verification and Validation, pp. 82–92. Springer (2008)

    Google Scholar 

  2. Fassak, S., El Idrissi, Y.E.H., Zahid, N., Jedra, M.: A secure protocol for session keys establishment between ECUs in the CAN bus. In: Proceedings of IEEE International Conference on Wireless Networks and Mobile Communications (WINCOM), Rabat, Morocco (November 2017)

    Google Scholar 

  3. Federal Information Processing Standards Publication: 186-4. Digital signature standard (DSS) (2013)

    Google Scholar 

  4. Huang, T., Zhou, J., Wang, Y., Cheng, A.: On the security of in-vehicle hybrid network: status and challenges. In: International Conference on Information Security Practice and Experience, pp. 621–637. Springer (2017)

    Google Scholar 

  5. Ishtiaq Roufa, R.M., Mustafaa, H., Travis Taylora, S.O., Xua, W., Gruteserb, M., Trappeb, W., Seskarb, I.: Security and privacy vulnerabilities of in-car wireless networks: a tire pressure monitoring system case study. In: 19th USENIX Security Symposium, Washington DC, pp. 11–13 (2010)

    Google Scholar 

  6. ISO: ISO 26262-1:2018: Road vehicles – Functional safety (December 2018). https://www.iso.org/standard/68383.html. Accessed 7 June 2019

  7. Klobedanz, K., Kuznik, C., Thuy, A., Mueller, W.: Timing modeling and analysis for autosar-based software development: a case study. In: Proceedings of the Conference on Design, Automation and Test in Europe, pp. 642–645. European Design and Automation Association (2010)

    Google Scholar 

  8. Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., et al.: Experimental security analysis of a modern automobile. In: 2010 IEEE Symposium on Security and Privacy (SP), pp. 447–462. IEEE (2010)

    Google Scholar 

  9. Lin, C.W., Sangiovanni-Vincentelli, A.: Cyber-security for the controller area network (CAN) communication protocol. In: 2012 International Conference on Cyber Security (CyberSecurity), pp. 1–7. IEEE (2012)

    Google Scholar 

  10. Menezes, A., Hankerson, D., Vanstone, S.A.: Guide to Elliptic Curve Cryptography. Springer, Berlin (2004)

    MATH  Google Scholar 

  11. Miller, C., Valasek, C.: Remote exploitation of an unaltered passenger vehicle. Black Hat USA 2015, 91 (2015)

    Google Scholar 

  12. Munir, A., Koushanfar, F.: Design and analysis of secure and dependable automotive CPS: a steer-by-wire case study. IEEE Trans. Dependable Secur. Comput. (TDSC) (2018). https://doi.org/10.1109/TDSC.2018.2846741

  13. NVIDIA: NVIDIA Self-Driving Cars. https://www.nvidia.com/en-us/self-driving-cars/. Accessed 5 Sep 2019

  14. Poudel, B., Munir, A.: Design and evaluation of a reconfigurable ECU architecture for secure and dependable automotive CPS. IEEE Trans. Dependable Secur. Comput. (TDSC) (2018). https://doi.org/10.1109/TDSC.2018.2883057

  15. Vector: ECU Development and Test with CANoe. https://www.vector.com/us/en-us/products/products-a-z/software/canoe/. Accessed 3 June 2019

  16. Wilwert, C., Navet, N., Song, Y.Q., Simonot-Lion, F.: Design of Automotive X-by-Wire Systems. The Industrial Communication Technology Handbook. CRC Press, Boca Raton (2005)

    Google Scholar 

  17. Wolf, M., Gendrullis, T.: Design, implementation, and evaluation of a vehicular hardware security module. In: International Conference on Information Security and Cryptology, pp. 302–318. Springer (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arslan Munir .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Giri, N.K., Munir, A., Kong, J. (2020). An Integrated Safe and Secure Approach for Authentication and Secret Key Establishment in Automotive Cyber-Physical Systems. In: Arai, K., Kapoor, S., Bhatia, R. (eds) Intelligent Computing. SAI 2020. Advances in Intelligent Systems and Computing, vol 1230. Springer, Cham. https://doi.org/10.1007/978-3-030-52243-8_39

Download citation

Publish with us

Policies and ethics