ABSTRACT
Controller Area Network (CAN) has been demonstrated to have excellent applications in 3D printer communication. However, single-bus CAN network designs are plagued with vulnerabilities, such as hijacking, denial-of-service, and eavesdropping. Exploitation of these issues can result in every node in the network being compromised. In response, we propose a hierarchical tree-based design focused on protecting the CAN bus and isolating critical systems in a novel approach against these threats. By organizing ASCON-encrypted network routing into smaller, authenticated CAN sub-nets, modular 3D printers can maintain integrity, confidentiality, and authenticity of all traffic. Our preliminary results demonstrate an 88-99% hardware efficiency between pre-existing client nodes and the total nodes after conversion to our framework.
- Jun-Cheng Chin, Himanshu Thapliyal, and Tyler Cultice. 2022. CAN Bus: The Future of Additive Manufacturing (3D Printing). IEEE Consumer Electronics Magazine (2022), 1--6. https://doi.org/10.1109/MCE.2022.3216944Google Scholar
- Tyler Cultice and Himanshu Thapliyal. 2023. Vulnerabilities and Attacks on CAN-Based 3D Printing/Additive Manufacturing. IEEE Consumer Electronics Magazine (2023), 1--7. https://doi.org/10.1109/MCE.2023.3240849Google ScholarCross Ref
- Christoph Dobraunig, Maria Eichlseder, Florian Mendel, and Martin Schläffer. 2019. Ascon v1.2. NIST Lightweight Cryptography Project. https://csrc.nist.gov/CSRC/media/Projects/Lightweight-Cryptography/documents/round-1/spec-doc/ascon-spec.pdfGoogle Scholar
Index Terms
- Lightweight Hierarchical Root-of-Trust Framework for CAN-based 3D Printing Security
Recommendations
A Lightweight Vulnerability Mitigation Framework for IoT Devices
IoTS&P '17: Proceedings of the 2017 Workshop on Internet of Things Security and PrivacyMany of today's Internet of Things (IoT) devices are vulnerable due to the large amount of overhead incurred when their operating systems are patched against emerging vulnerabilities. In addition, legacy IoT devices are no longer supported by their ...
Flooding attack mitigator for in-vehicle CAN using fault confinement in CAN protocol
AbstractFor driver convenience and safety, a number of electronic control units (ECUs) have been installed on modern vehicles. To support communications among ECUs, the controller area network (CAN) is commonly used as in-vehicle network for ...
Prevention of DoS Attacks Based on Light Weight Dynamic Key Mechanism in Hierarchical Wireless Sensor Networks
FGCN '08: Proceedings of the 2008 Second International Conference on Future Generation Communication and Networking - Volume 01Denial of service (DoS) attack is an impelling inside attack in the form of interference or collision at the receiver side, which can causes serious damage to the functions of wireless sensor networks (WSNs). In this paper, we propose a solution using ...
Comments