Skip to main content

A New Signal Packing Algorithm for CAN-FD with Security Consideration

  • Conference paper
  • First Online:
  • 637 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1768))

Abstract

The Controller Area Network with flexible data-rate (CAN-FD) is thought to be a good replacement for the CAN. The CAN-FD has a faster transmission rate and more data capacity than the CAN. Network security is critical for car safety, but CAN-FD has inherent network security flaws, making vehicles equipped with the protocol extremely vulnerable to malicious attacks. As a result, in order to protect against those attacks, CAN-FD requires a robust and efficient security model. In addition, as a distributed real-time network, the end-to-end timing requirement of CAN-FD should be satisfied. Otherwise, the vehicle cannot run consistently and safely. Therefore, we proposed a network security model suitable for CAN-FD. Based on the model, we further proposed an end-to-end delay optimization algorithm. Experimental results show that our proposed algorithm can effectively reduce end-to-end delay compared with the baseline algorithm.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. McCue, T.J.: 108 MPG with 2013 Ford Fusion Energi Plus 25 Gigabytes of Data. http://www.forbes.com/sites/tjmccue/2013/01/01/108-mpg-with-ford-fusion-energi-plus-25-gigabytes-of-data/#45211c3c46a5. Accessed 23 June 2021

  2. Overview of recommended practice-SAE-J3061-16. https://www.sae.org/standards/content/j3061/. Accessed 23 June 2021

  3. Xie, Y., Zhou, Y., Xu, J., Zhou, J., Chen, X., Xiao, F.: Cybersecurity protection on in-vehicle networks for distributed automotive cyber-physical systems: state of the art and future challenges. Software Pract. Exper. 51(11), 2108–2127 (2021)

    Google Scholar 

  4. Woo, S., Jo, H.J., Kim, I.S., Lee, D.H.: A practical security architecture for in-vehicle CAN-FD. IEEE Trans. Intell. Transp. Syst. 17(8), 2248–2261 (2016)

    Article  Google Scholar 

  5. Miller, C., Valasek, C.: Remote exploitation of an unaltered passenger vehicle. In: Black Hat USA 2015.S 91(2015)

    Google Scholar 

  6. Currie, R.: Information security reading room developments in car hacking. https://www.sans.org/reading-room/whitepapers/ICS/developments-car-hacking-36607. Accessed 13 Jan 2021

  7. Bordoloi, U.D., Samii, S.: The frame packing problem for CAN-FD. In: 2014 IEEE Real-Time Systems Symposium, pp. 284–293. IEEE (2014)

    Google Scholar 

  8. Natale, M.D., da Silva, C.L.M., Santos, M.M.D: On the applicability of an MILP solution for signal packing in CAN-FD. In: 2016 IEEE 14th International Conference on Industrial Informatics (INDIN), pp. 1202–1205. IEEE (2016)

    Google Scholar 

  9. Xie, Y., Zeng, G., Kurachi, R., Takada, H., Xie, G.: Security/timing-aware design space exploration of CAN FD for automotive cyber-physical systems. IEEE Trans. Industr. Inf. 15(2), 1094–1104 (2019)

    Article  Google Scholar 

  10. Lin, J., Wei, Y., Li, W., Long, J.: Intrusion detection system based on deep neural network and incremental learning for in-vehicle CAN networks. In: Wang, G., Choo, KK.R., Ko, R.K.L., Xu, Y., Crispo, B. (eds.) Ubiquitous Security. UbiSec 2021. CCIS, vol. 1557, pp. 255–267. Springer, Singapore (2022). https://doi.org/10.1007/978-981-19-0468-4_19

  11. Mun, H., Han, K., Lee, D.H.: Ensuring safety and security in CAN-based automotive embedded systems: a combination of design optimization and secure communication. IEEE Trans. Veh. Technol. 69(7), 7078–7091 (2020)

    Article  Google Scholar 

  12. Munir, A., Koushanfar, F.: Design and analysis of secure and dependable automotive CPS: a steer-by-wire case study. IEEE Trans. Dependable Secure Comput. 17(4), 813–827 (2018)

    Article  Google Scholar 

  13. Wu, Z., Zhao, J., Zhu, Y., Li, Q.: Research on vehicle Cybersecurity-based on dedicated security hardware and ECDH algorithm. In: SAE 2017 Intelligent and Connected Vehicles Symposium, No. 2017-01-2005. SAE International (2017)

    Google Scholar 

  14. Aminifar, A., Eles, P., Peng, Z.: Optimization of message encryption for Real-time applications in embedded systems. IEEE Trans. Comput. 67(5), 748–754 (2017)

    Article  MathSciNet  MATH  Google Scholar 

  15. Lin, C., Zhu, Q., Phung, C., Sangiovanni-Vincentelli, A.: Security-aware mapping for CAN-based real-time distributed automotive systems. In: 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp. 115–121. IEEE (2013)

    Google Scholar 

  16. Koay, A.M.Y., Xie, M., Ko, R.K.L., Sterner, C., Choi, T., Dong, N.: SDGen: a scalable, reproducible and flexible approach to generate real world cyber security datasets. In: Wang, G., Choo, KK.R., Ko, R.K.L., Xu, Y., Crispo, B. (eds.) Ubiquitous Security. UbiSec 2021. CCIS, vol. 1557, pp 102–115. Springer, Singapore (2022). https://doi.org/10.1007/978-981-19-0468-4_8

  17. Kramer, S., Ziegenbein, D., Hamann, A.: Real world automotive benchmark for free. In: 6th International Workshop on Analysis Tools and Methodologies for Embedded and Real-time Systems (WATERS) (2015)

    Google Scholar 

  18. BMW X1 (E84) CAN-bus Codes. http://www.loopybunny.co.uk/CarPC/kcan.html. Accessed 24 Feb 2020

Download references

Acknowledgments

This work was supported by Natural Science Foundation of China(61872436), and partially supported by Natural Science Foundation of Jiangsu Province(BK20211272), the Research Foundation of NJUPT for “1311 Talents Training Project” and the NUPTSF (Grant No.NY220133).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yong Xie .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zheng, B., Xie, Y. (2023). A New Signal Packing Algorithm for CAN-FD with Security Consideration. In: Wang, G., Choo, KK.R., Wu, J., Damiani, E. (eds) Ubiquitous Security. UbiSec 2022. Communications in Computer and Information Science, vol 1768. Springer, Singapore. https://doi.org/10.1007/978-981-99-0272-9_20

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-0272-9_20

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-0271-2

  • Online ISBN: 978-981-99-0272-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics