skip to main content
10.1145/2908446.2908485acmotherconferencesArticle/Chapter ViewAbstractPublication PagesinfosConference Proceedingsconference-collections
research-article

Lightweight Authentication Protocol Deployment over FlexRay

Published: 09 May 2016 Publication History

Abstract

In-vehicle network security is becoming a major concern for the automotive industry. Although there is significant research done in this area, there is still a significant gap between research and what is actually applied in practice. Controller area network (CAN) gains the most concern of community but little attention is given to FlexRay. Many signs indicate the approaching end of CAN usage and starting with other promising technologies. FlexRay is considered one of the main players in the near future. We believe that migration era is near enough to change our mindset in order to supply industry with complete and mature security proposals with FlexRay. This changing mindset is important to fix the lagging issue appeared in CAN between research and industry. Then, we provide a complete migration of CAN authentication protocol towards FlexRay shows the availability of the protocol over different technologies.

References

[1]
Bosch R., "CAN specification version 2.0," Rober Bousch GmbH, Postfach, vol. 300240, 1991.
[2]
F. Consortium and others, "FlexRay communications system-protocol specification," Version, vol. 2, no. 1, pp. 198--207, 2005.
[3]
Koopman P., "The FlexRay Protocol," no. June 2004, 2013.
[4]
Checkoway S., Mccoy D., Kantor B., D., Anderson H. Shacham, Savage S., Koscher K., Czeskis A., Roesner F., and Kohno T., "Comprehensive Experimental Analyses of Automotive Attack Surfaces," System, pp. 6--6, 2011.
[5]
Nilsson D. K., Larson U. E., Picasso F., and Jonsson E., "A first simulation of attacks in the automotive network communications protocol flexRay," Adv. Soft Comput., vol. 53, pp. 84--91, 2009.
[6]
Hoppe T., Kiltz S., and Dittmann J., "Security threats to automotive CAN networksPractical examples and selected short-term countermeasures," Reliab. Eng. Syst. Saf., vol. 96, no. 1, pp. 11--25, 2011.
[7]
Koopman P. P., "A Case Study of Toyota Unintended Acceleration and Software Safety," 2014.
[8]
Hazem A. and Fahmy H., "LCAP - A Lightweight CAN Authentication Protocol for Securing In-Vehicle Networks," Escar 2012, 2012.
[9]
Lin C., Zhu Q., and Sangiovanni-vincentelli A., "Security-Aware Mapping for TDMA-Based Real-Time Distributed Systems," 2014 IEEE/ACM Int. Conf. Comput. Des., pp. 24--31, 2014.
[10]
Perrig A., Canetti R., Song D., Berkeley U. C., and Watson I. B. M. T. J., "Efficient Authentication and Signing of Multicast Streams over Lossy Channels," vol. 28913, 2000.
[11]
Perring A., Szewczyk R., Wen V., Culler D., Tygar J. D., Perrig A., and Szewczyk R., "SPINS: Security Protocols for Sensor Networks SPINS: Security Protocols for Sensor Networks," pp. 521--534, 2002.
[12]
Groza B. and Murvay S., "Efficient protocols for secure broadcast in controller area networks," Ind. Informatics, IEEE Trans., vol. 9, no. 4, pp. 2034--2042, 2013.
[13]
van Herrewege A., Singelee D., and Verbauwhede I., "CANAuth - A Simple, Backward Compatible Broadcast Authentication Protocol for CAN bus," Escar 2011, Embed. Secur. Cars, 2011.
[14]
Ziermann T., Wildermann S., and Teich J., "CAN+: A new backward-compatible Controller Area Network (CAN) protocol with up to 16x higher data rates.," 2009 Des. Autom. Test Eur. Conf. Exhib., no. MAY, 2009.
[15]
Hartkopp O., Reuber C., and Schilling R., "Macan-message authenticated can," in 10th Int. Conf. on Embedded Security in Cars (ESCAR 2012), 2012.
[16]
H. T. N. A. Y. M. R. Kurachi Y. Matsubara and Horihata S., "CaCAN - centralized authentication system in CAN (controller area network)," Proc. of ESCAR, 2014.
[17]
Vasile P. and Murvay S., "Performance analysis of broadcast authentication protocols on CAN-FD and FlexRay," no. 1.
[18]
Dang Q. and Gallagher P., "Recommendation for Applications Using Approved Hash Algorithms National Institute of Standards and Technology," 2012.
[19]
Manifavas C. and Hatzivasilis G., "Lightweight Cryptography for Embedded Systems--A Comparative Analysis," ... Priv. Manag. ..., pp. 1--18, 2014.
[20]
Da Silva N. B. F., Pigatto D. F., Martins P. S., and Branco K. R. L. J. C., "Case Studies of Performance Evaluation of Cryptographic Algorithms for an Embedded System and a General Purpose Computer," J. Netw. Comput. Appl., pp. 1--14, 2015.
[21]
Steiner W., Bauer G., Hall B., and Paulitsch M., "TTEthernet: Time-Triggered Ethernet," Time-Triggered Communication. CRC Press, 2011.
[22]
Hank P., Suermann T., and Müller S., "Automotive Ethernet, a holistic approach for a next generation in-vehicle networking standard," in Advanced Microsystems for Automotive Applications 2012, Springer, 2012, pp. 79--89.

Cited By

View all
  • (2024)In-Vehicle Communication Cyber Security: A Comprehensive Review of Challenges and SolutionsVehicular Communications10.1016/j.vehcom.2024.100846(100846)Online publication date: Sep-2024
  • (2023)Privacy Impact Assessment of Cyber Attacks on Connected and Autonomous VehiclesProceedings of the 18th International Conference on Availability, Reliability and Security10.1145/3600160.3605073(1-9)Online publication date: 29-Aug-2023
  • (2023)Enhanced Message Authentication Code for Controller Area Network2023 IEEE AFRICON10.1109/AFRICON55910.2023.10293213(1-6)Online publication date: 20-Sep-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
INFOS '16: Proceedings of the 10th International Conference on Informatics and Systems
May 2016
347 pages
ISBN:9781450340625
DOI:10.1145/2908446
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 09 May 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Authentication
  2. Embedded system security
  3. FlexRay security
  4. In-Vehicles security
  5. Security
  6. Time-Triggered security

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

INFOS '16

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)7
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)In-Vehicle Communication Cyber Security: A Comprehensive Review of Challenges and SolutionsVehicular Communications10.1016/j.vehcom.2024.100846(100846)Online publication date: Sep-2024
  • (2023)Privacy Impact Assessment of Cyber Attacks on Connected and Autonomous VehiclesProceedings of the 18th International Conference on Availability, Reliability and Security10.1145/3600160.3605073(1-9)Online publication date: 29-Aug-2023
  • (2023)Enhanced Message Authentication Code for Controller Area Network2023 IEEE AFRICON10.1109/AFRICON55910.2023.10293213(1-6)Online publication date: 20-Sep-2023
  • (2023)Security assessment of in-vehicle communication protocolsVehicular Communications10.1016/j.vehcom.2023.10063944(100639)Online publication date: Dec-2023
  • (2023)A lightweight-X-authentication protocol over automotive gatewayComputers and Electrical Engineering10.1016/j.compeleceng.2023.108887110(108887)Online publication date: Sep-2023
  • (2023)Machine learning and blockchain technologies for cybersecurity in connected vehiclesWIREs Data Mining and Knowledge Discovery10.1002/widm.151514:1Online publication date: 19-Sep-2023
  • (2022)In-Vehicle Communication Cyber Security: Challenges and SolutionsSensors10.3390/s2217667922:17(6679)Online publication date: 3-Sep-2022
  • (2022)Technische Security-BausteineAutomotive Cybersecurity10.1007/978-3-662-64228-3_5(81-240)Online publication date: 13-Apr-2022
  • (2021)Cyberattacks and Countermeasures for In-Vehicle NetworksACM Computing Surveys10.1145/343123354:1(1-37)Online publication date: 8-Mar-2021
  • (2021)A Survey on the Current Security Landscape of Intelligent Transportation SystemsIEEE Access10.1109/ACCESS.2021.30500389(9180-9208)Online publication date: 2021
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media