Abstract
The Controller Area Network with flexible data-rate (CAN-FD) is thought to be a good replacement for the CAN. The CAN-FD has a faster transmission rate and more data capacity than the CAN. Network security is critical for car safety, but CAN-FD has inherent network security flaws, making vehicles equipped with the protocol extremely vulnerable to malicious attacks. As a result, in order to protect against those attacks, CAN-FD requires a robust and efficient security model. In addition, as a distributed real-time network, the end-to-end timing requirement of CAN-FD should be satisfied. Otherwise, the vehicle cannot run consistently and safely. Therefore, we proposed a network security model suitable for CAN-FD. Based on the model, we further proposed an end-to-end delay optimization algorithm. Experimental results show that our proposed algorithm can effectively reduce end-to-end delay compared with the baseline algorithm.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
McCue, T.J.: 108 MPG with 2013 Ford Fusion Energi Plus 25 Gigabytes of Data. http://www.forbes.com/sites/tjmccue/2013/01/01/108-mpg-with-ford-fusion-energi-plus-25-gigabytes-of-data/#45211c3c46a5. Accessed 23 June 2021
Overview of recommended practice-SAE-J3061-16. https://www.sae.org/standards/content/j3061/. Accessed 23 June 2021
Xie, Y., Zhou, Y., Xu, J., Zhou, J., Chen, X., Xiao, F.: Cybersecurity protection on in-vehicle networks for distributed automotive cyber-physical systems: state of the art and future challenges. Software Pract. Exper. 51(11), 2108–2127 (2021)
Woo, S., Jo, H.J., Kim, I.S., Lee, D.H.: A practical security architecture for in-vehicle CAN-FD. IEEE Trans. Intell. Transp. Syst. 17(8), 2248–2261 (2016)
Miller, C., Valasek, C.: Remote exploitation of an unaltered passenger vehicle. In: Black Hat USA 2015.S 91(2015)
Currie, R.: Information security reading room developments in car hacking. https://www.sans.org/reading-room/whitepapers/ICS/developments-car-hacking-36607. Accessed 13 Jan 2021
Bordoloi, U.D., Samii, S.: The frame packing problem for CAN-FD. In: 2014 IEEE Real-Time Systems Symposium, pp. 284–293. IEEE (2014)
Natale, M.D., da Silva, C.L.M., Santos, M.M.D: On the applicability of an MILP solution for signal packing in CAN-FD. In: 2016 IEEE 14th International Conference on Industrial Informatics (INDIN), pp. 1202–1205. IEEE (2016)
Xie, Y., Zeng, G., Kurachi, R., Takada, H., Xie, G.: Security/timing-aware design space exploration of CAN FD for automotive cyber-physical systems. IEEE Trans. Industr. Inf. 15(2), 1094–1104 (2019)
Lin, J., Wei, Y., Li, W., Long, J.: Intrusion detection system based on deep neural network and incremental learning for in-vehicle CAN networks. In: Wang, G., Choo, KK.R., Ko, R.K.L., Xu, Y., Crispo, B. (eds.) Ubiquitous Security. UbiSec 2021. CCIS, vol. 1557, pp. 255–267. Springer, Singapore (2022). https://doi.org/10.1007/978-981-19-0468-4_19
Mun, H., Han, K., Lee, D.H.: Ensuring safety and security in CAN-based automotive embedded systems: a combination of design optimization and secure communication. IEEE Trans. Veh. Technol. 69(7), 7078–7091 (2020)
Munir, A., Koushanfar, F.: Design and analysis of secure and dependable automotive CPS: a steer-by-wire case study. IEEE Trans. Dependable Secure Comput. 17(4), 813–827 (2018)
Wu, Z., Zhao, J., Zhu, Y., Li, Q.: Research on vehicle Cybersecurity-based on dedicated security hardware and ECDH algorithm. In: SAE 2017 Intelligent and Connected Vehicles Symposium, No. 2017-01-2005. SAE International (2017)
Aminifar, A., Eles, P., Peng, Z.: Optimization of message encryption for Real-time applications in embedded systems. IEEE Trans. Comput. 67(5), 748–754 (2017)
Lin, C., Zhu, Q., Phung, C., Sangiovanni-Vincentelli, A.: Security-aware mapping for CAN-based real-time distributed automotive systems. In: 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp. 115–121. IEEE (2013)
Koay, A.M.Y., Xie, M., Ko, R.K.L., Sterner, C., Choi, T., Dong, N.: SDGen: a scalable, reproducible and flexible approach to generate real world cyber security datasets. In: Wang, G., Choo, KK.R., Ko, R.K.L., Xu, Y., Crispo, B. (eds.) Ubiquitous Security. UbiSec 2021. CCIS, vol. 1557, pp 102–115. Springer, Singapore (2022). https://doi.org/10.1007/978-981-19-0468-4_8
Kramer, S., Ziegenbein, D., Hamann, A.: Real world automotive benchmark for free. In: 6th International Workshop on Analysis Tools and Methodologies for Embedded and Real-time Systems (WATERS) (2015)
BMW X1 (E84) CAN-bus Codes. http://www.loopybunny.co.uk/CarPC/kcan.html. Accessed 24 Feb 2020
Acknowledgments
This work was supported by Natural Science Foundation of China(61872436), and partially supported by Natural Science Foundation of Jiangsu Province(BK20211272), the Research Foundation of NJUPT for “1311 Talents Training Project” and the NUPTSF (Grant No.NY220133).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Zheng, B., Xie, Y. (2023). A New Signal Packing Algorithm for CAN-FD with Security Consideration. In: Wang, G., Choo, KK.R., Wu, J., Damiani, E. (eds) Ubiquitous Security. UbiSec 2022. Communications in Computer and Information Science, vol 1768. Springer, Singapore. https://doi.org/10.1007/978-981-99-0272-9_20
Download citation
DOI: https://doi.org/10.1007/978-981-99-0272-9_20
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-0271-2
Online ISBN: 978-981-99-0272-9
eBook Packages: Computer ScienceComputer Science (R0)