Abstract

Connectivity of modern cars has led to security issues. A number of contributions have proposed the use of cryptographic algorithms in order to provide automotive Controller Area Network (CAN) security. However, due to CAN protocol characteristics, real time requirements within cryptographic schemes are not guaranteed. In this work, effects of implementing cryptographic approaches have been investigated by proposing a performance analysis methodology of cryptographic algorithm. Until get implanting the proposed method in a real vehicle, a platform based on STMicroelectronics’32F407 (STM32F407) microcontroller board has been deployed to test the proposed methodology. The experiments show that the implementation of a cryptographic algorithm has an impact on clock cycles number and therefore, on real-time performances.

Highlights

  • New vehicles are becoming more and more connected machines

  • Controller Area Network (CAN) networks are vulnerable to cyber-attacks, which threats in-vehicle subsystems even lives of passengers [4]

  • The system proposed in this paper, aims at analyze the security requirements on CAN bus network after implementing a cryptographic mechanism

Read more

Summary

Introduction

New vehicles are becoming more and more connected machines. a modern car is able to communicate with the outside via various interfaces like USB, MP3, Bluetooth, etc. CAN protocol is today the most used in automotive networks [1]. CAN bus cannot guarantee security because of a lack of authenticity [2] [3]. Security problem is added to the automotive issues [5] [6]. It is crucial to find solutions that guarantee automotive security. McCoy, et al, Comprehensive experimental analyses of automotive attack surfaces, Proc.20th USENIX Security, San Francisco, CA, 2011. Adventures in automotive networks and control units. An attacker can connect to the network traffic and read data frame . An attacker connected to the bus could use the identifier (ID) of any node to send a fake message

Objectives
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call