Skip to main content

An Efficient and Secure Authentication Scheme for In-vehicle Networks in Connected Vehicle

  • Conference paper
  • First Online:
Mobile Ad-hoc and Sensor Networks (MSN 2017)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 747))

Included in the following conference series:

  • 1086 Accesses

Abstract

In-vehicle networks which were originally designed to operate in a closed environment without secure concerns are now being connected to external nodes/networks and providing useful services. However, communications with the external world introduce severe security threats to the vehicle. For connected vehicle, many attacks, which were only feasible with physical access to a vehicle, can now be carried out remotely over wireless networks. To overcome this problem, we propose a security protocol to protect in-vehicle networks based on current Controller Area Network specifications. First, we generate the secure in-vehicle networks by using a group key. Then, we make the gateway join the secure in-vehicle networks after authenticating it. Finally, we generate the pair-ware key to ensure the secure communication between the external node and the gateway. The security analysis and performance evaluation show that the proposed scheme is secure and practical.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. http://openxcplatform.com/

  2. http://cache.freescale.com/files/microcontrollers/doc/brochure/BRINVEHICLENET.pdf

  3. http://www.evita-project.org/

  4. Bariah, L., Shehada, D., Salahat, E., Yeun, C.Y.: Recent advances in vanet security: a survey. In: Vehicular Technology Conference, pp. 1–7 (2016)

    Google Scholar 

  5. Biswas, S., Tatchikou, R., Dion, F.: Vehicle-to-vehicle wireless communication protocols for enhancing highway traffic safety. IEEE Commun. Mag. 44(1), 74–82 (2006)

    Article  Google Scholar 

  6. Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F., Kohno, T.: Comprehensive experimental analyses of automotive attack surfaces. In: USENIX Security Symposium, San Francisco (2011)

    Google Scholar 

  7. Dutta, R., Mukhopadhyay, S., Collier, M.: Computationally secure self-healing key distribution with revocation in wireless ad hoc networks. Ad Hoc Netw. 8(6), 597–613 (2010)

    Article  Google Scholar 

  8. Groza, B., Murvay, S.: Efficient protocols for secure broadcast in controller area networks. IEEE Trans. Industr. Inf. 9(4), 2034–2042 (2013)

    Article  Google Scholar 

  9. Han, K., Potluri, S.D., Shin, K.G.: On authentication in a connected vehicle: secure integration of mobile devices with vehicular networks. In: ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS), pp. 160–169. IEEE (2013)

    Google Scholar 

  10. Hoppe, T., Kiltz, S., Dittmann, J.: Security threats to automotive CAN networks – practical examples and selected short-term countermeasures. In: Harrison, M.D., Sujan, M.-A. (eds.) SAFECOMP 2008. LNCS, vol. 5219, pp. 235–248. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-87698-4_21

    Chapter  Google Scholar 

  11. Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H.: Experimental security analysis of a modern automobile. In: IEEE Symposium on Security and Privacy, pp. 447–462. IEEE (2010)

    Google Scholar 

  12. Lin, C., Sangiovanni-Vincentelli, A.: Cyber-security for the controller area network (CAN) communication protocol. In: 2012 International Conference on Cyber Security (CyberSecurity), pp. 1–7. IEEE (2012)

    Google Scholar 

  13. Nilsson, D.K., Larson, U.E., Jonsson, E.: Creating a secure infrastructure for wireless diagnostics and software updates in vehicles. In: Harrison, M.D., Sujan, M.-A. (eds.) SAFECOMP 2008. LNCS, vol. 5219, pp. 207–220. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-87698-4_19

    Chapter  Google Scholar 

  14. Woo, S., Jin, J.H., Choi, W., Chun, J.Y., Park, J., Lee, D.H.: Identifying ecus using inimitable characteristics of signals in controller area networks. arXiv preprint arXiv:1607.00497 (2016)

  15. Schweppe, H., Roudier, Y., Weyl, B., Apvrille, L., Scheuermann, D.: Car2x communication: securing the last meter-a cost-effective approach for ensuring trust in car2x applications using in-vehicle symmetric cryptography. In: IEEE Vehicular Technology Conference, pp. 1–5. IEEE (2011)

    Google Scholar 

  16. Shavit, M., Gryc, A., Miucic, R.: Firmware update over the air (fota) for automotive industry. Technical report, SAE Technical Paper (2007)

    Google Scholar 

  17. Toor, Y., Muhlethaler, P., Laouiti, A.: Vehicle ad hoc networks: applications and related technical issues. IEEE Commun. Surv. Tutorials 10(3), 74–88 (2008)

    Article  Google Scholar 

  18. Vandenbrink, R.: Dude, your car is pwned. SANSFIRE 2012, Washington, DC (2012)

    Google Scholar 

  19. Woo, S., Jin, J.H., Kim, I.S., Lee, D.H.: A practical security architecture for in-vehicle CAN-FD. IEEE Trans. Intell. Transp. Syst. 16, 2248–2261 (2016)

    Article  Google Scholar 

  20. Woo, S., Jin, J.H., Lee, D.H.: A practical wireless attack on the connected car and security protocol for in-vehicle can. IEEE Trans. Intell. Transp. Syst. 16, 993–1006 (2014)

    Google Scholar 

  21. Zhang, T., Antunes, H., Aggarwal, S.: Defending connected vehicles against malware: challenges and a solution framework. IEEE Internet Things J. 1(1), 10–21 (2014)

    Article  Google Scholar 

Download references

Acknowledgements

This research is supported by the National Natural Science Foundation of China Grants (No. 61702231), Natural Science Foundation of Jiangsu Province (BK2017 0556), Jiangsu Provincial Research Scheme of Natural Science for Higher Education institutions (No. 17KJB520005), and Key Laboratory for New Technology Application of Road Conveyance of Jiangsu Province (No. BM20082061707).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Mengjie Duan or Liangmin Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Duan, M., Jiang, S., Wang, L. (2018). An Efficient and Secure Authentication Scheme for In-vehicle Networks in Connected Vehicle. In: Zhu, L., Zhong, S. (eds) Mobile Ad-hoc and Sensor Networks. MSN 2017. Communications in Computer and Information Science, vol 747. Springer, Singapore. https://doi.org/10.1007/978-981-10-8890-2_15

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8890-2_15

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8889-6

  • Online ISBN: 978-981-10-8890-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics