Abstract

The rapid development of intelligent networked vehicles (ICVs) has brought many positive effects. Unfortunately, connecting to the outside exposes ICVs to security threats. Using secure protocols is an important approach to protect ICVs from hacker attacks and has become a hot research area for vehicle security. However, most of the previous studies were carried out on V2X networks, while those on in-vehicle networks (IVNs) did not involve Ethernet. To this end, oriented to the new IVNs based on Ethernet, we designed an efficient secure scheme, including an authentication scheme using the Scalable Service-Oriented Middleware over IP (SOME/IP) protocol and a secure communication scheme modifying the payload field of the original SOME/IP data frame. The security analysis shows that the designed authentication scheme can provide mutual identity authentication for communicating parties and ensure the confidentiality of the issued temporary session key; the designed authentication and secure communication scheme can resist the common malicious attacks conjointly. The performance experiments based on embedded devices show that the additional overhead introduced by the secure scheme is very limited. The secure scheme proposed in this article can promote the popularization of the SOME/IP protocol in IVNs and contribute to the secure communication of IVNs.

Highlights

  • Automotive products, automotive industry, and even the transportation mode of urban areas will significantly engage in technological innovation due to the rapid development of ICVs

  • An efficient authentication scheme for in-vehicle domain-centralized electronic architecture (EEA) was designed in this study based on the Service-Oriented Middleware over IP (SOME/IP) protocol and symmetric cryptography

  • A safety and security controller is used as a key management center (KMC) for in-vehicle communication networks in this scheme

Read more

Summary

Introduction

Automotive products, automotive industry, and even the transportation mode of urban areas will significantly engage in technological innovation due to the rapid development of ICVs. Charlie Miller and Chris Valasek sent illegal commands to control the steering and brake systems by remote attack, which led to the costly recall of 1.4 million vehicles [9,10]. This incident started a new era in automotive cybersecurity. This article orientates the new in-vehicle network with Ethernet as the core backbone, and studies security protection measures based on applied cryptography technology. Informal and formal security analysis is carried out to evaluate the security of the proposed scheme based on common automotive cyber attacks.

Related Work
Authenticated Encryption and Associated Data Algorithm
Scalable Service-Oriented Middleware over IP Protocol
Network Models
Attack Models
Security Goals and Assumptions
Initialization Phase
Registration Phase
Authentication and Key Agreement Phase
Secure Communication Scheme
Security Analysis
Security Verification Based on Proverif
Resist Eavesdropping Attacks
Resist Man-in-the-Middle and Camouflage Attacks
Provide Mutual Authentication
Experiment Settings
Calculation Overhead
Latency and System Resource Overheads
Performance Evaluation of the Secure Communication Scheme
Findings
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call