Abstract
In-vehicle networks which were originally designed to operate in a closed environment without secure concerns are now being connected to external nodes/networks and providing useful services. However, communications with the external world introduce severe security threats to the vehicle. For connected vehicle, many attacks, which were only feasible with physical access to a vehicle, can now be carried out remotely over wireless networks. To overcome this problem, we propose a security protocol to protect in-vehicle networks based on current Controller Area Network specifications. First, we generate the secure in-vehicle networks by using a group key. Then, we make the gateway join the secure in-vehicle networks after authenticating it. Finally, we generate the pair-ware key to ensure the secure communication between the external node and the gateway. The security analysis and performance evaluation show that the proposed scheme is secure and practical.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
http://cache.freescale.com/files/microcontrollers/doc/brochure/BRINVEHICLENET.pdf
Bariah, L., Shehada, D., Salahat, E., Yeun, C.Y.: Recent advances in vanet security: a survey. In: Vehicular Technology Conference, pp. 1–7 (2016)
Biswas, S., Tatchikou, R., Dion, F.: Vehicle-to-vehicle wireless communication protocols for enhancing highway traffic safety. IEEE Commun. Mag. 44(1), 74–82 (2006)
Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F., Kohno, T.: Comprehensive experimental analyses of automotive attack surfaces. In: USENIX Security Symposium, San Francisco (2011)
Dutta, R., Mukhopadhyay, S., Collier, M.: Computationally secure self-healing key distribution with revocation in wireless ad hoc networks. Ad Hoc Netw. 8(6), 597–613 (2010)
Groza, B., Murvay, S.: Efficient protocols for secure broadcast in controller area networks. IEEE Trans. Industr. Inf. 9(4), 2034–2042 (2013)
Han, K., Potluri, S.D., Shin, K.G.: On authentication in a connected vehicle: secure integration of mobile devices with vehicular networks. In: ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS), pp. 160–169. IEEE (2013)
Hoppe, T., Kiltz, S., Dittmann, J.: Security threats to automotive CAN networks – practical examples and selected short-term countermeasures. In: Harrison, M.D., Sujan, M.-A. (eds.) SAFECOMP 2008. LNCS, vol. 5219, pp. 235–248. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-87698-4_21
Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H.: Experimental security analysis of a modern automobile. In: IEEE Symposium on Security and Privacy, pp. 447–462. IEEE (2010)
Lin, C., Sangiovanni-Vincentelli, A.: Cyber-security for the controller area network (CAN) communication protocol. In: 2012 International Conference on Cyber Security (CyberSecurity), pp. 1–7. IEEE (2012)
Nilsson, D.K., Larson, U.E., Jonsson, E.: Creating a secure infrastructure for wireless diagnostics and software updates in vehicles. In: Harrison, M.D., Sujan, M.-A. (eds.) SAFECOMP 2008. LNCS, vol. 5219, pp. 207–220. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-87698-4_19
Woo, S., Jin, J.H., Choi, W., Chun, J.Y., Park, J., Lee, D.H.: Identifying ecus using inimitable characteristics of signals in controller area networks. arXiv preprint arXiv:1607.00497 (2016)
Schweppe, H., Roudier, Y., Weyl, B., Apvrille, L., Scheuermann, D.: Car2x communication: securing the last meter-a cost-effective approach for ensuring trust in car2x applications using in-vehicle symmetric cryptography. In: IEEE Vehicular Technology Conference, pp. 1–5. IEEE (2011)
Shavit, M., Gryc, A., Miucic, R.: Firmware update over the air (fota) for automotive industry. Technical report, SAE Technical Paper (2007)
Toor, Y., Muhlethaler, P., Laouiti, A.: Vehicle ad hoc networks: applications and related technical issues. IEEE Commun. Surv. Tutorials 10(3), 74–88 (2008)
Vandenbrink, R.: Dude, your car is pwned. SANSFIRE 2012, Washington, DC (2012)
Woo, S., Jin, J.H., Kim, I.S., Lee, D.H.: A practical security architecture for in-vehicle CAN-FD. IEEE Trans. Intell. Transp. Syst. 16, 2248–2261 (2016)
Woo, S., Jin, J.H., Lee, D.H.: A practical wireless attack on the connected car and security protocol for in-vehicle can. IEEE Trans. Intell. Transp. Syst. 16, 993–1006 (2014)
Zhang, T., Antunes, H., Aggarwal, S.: Defending connected vehicles against malware: challenges and a solution framework. IEEE Internet Things J. 1(1), 10–21 (2014)
Acknowledgements
This research is supported by the National Natural Science Foundation of China Grants (No. 61702231), Natural Science Foundation of Jiangsu Province (BK2017 0556), Jiangsu Provincial Research Scheme of Natural Science for Higher Education institutions (No. 17KJB520005), and Key Laboratory for New Technology Application of Road Conveyance of Jiangsu Province (No. BM20082061707).
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Duan, M., Jiang, S., Wang, L. (2018). An Efficient and Secure Authentication Scheme for In-vehicle Networks in Connected Vehicle. In: Zhu, L., Zhong, S. (eds) Mobile Ad-hoc and Sensor Networks. MSN 2017. Communications in Computer and Information Science, vol 747. Springer, Singapore. https://doi.org/10.1007/978-981-10-8890-2_15
Download citation
DOI: https://doi.org/10.1007/978-981-10-8890-2_15
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8889-6
Online ISBN: 978-981-10-8890-2
eBook Packages: Computer ScienceComputer Science (R0)