Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3309171.3309175acmconferencesArticle/Chapter ViewAbstractPublication PagescodaspyConference Proceedingsconference-collections
research-article

TOUCAN: A proTocol tO secUre Controller Area Network

Published: 13 March 2019 Publication History

Abstract

Modern cars are no longer purely mechanical devices but shelter so much digital technology that they resemble a network of computers. Electronic Control Units (ECUs) need to exchange a large amount of data for the various functions of the car to work, and such data must be made secure if we want those functions to work as intended despite malicious activity by attackers. TOUCAN is a new security protocol designed to be secure and at the same time both CAN and AUTOSAR compliant. It achieves security in terms of authenticity, integrity and confidentiality, yet without the need to upgrade (the hardware of) existing ECUs or enrich the network with novel components. The overhead is tiny, namely a reduction of the size of the Data field of a frame. A prototype implementation exhibits promising performance on a STM32F407Discovery board.

References

[1]
{n. d.}. Birthday Attack. https://en.wikipedia.org/wiki/Birthday_attack
[2]
{n. d.}. eCall in all new cars from April 2018. https://ec.europa.eu/ digital-single-market/en/news/ecall-all-new-cars-april-2018
[3]
ISO 15765--2:2016. {n. d.}. Road vehicles -- Diagnostic communication over Controller Area Network (DoCAN) -- Part 2: Transport protocol and network layer services. https://www.iso.org/standard/66574.html
[4]
AUTOSAR. {n. d.}. "Specification of Module Secure Onboard Communication - AUTOSAR Release 4.2.2.". https://www.autosar.org/fileadmin/user_upload/ standards/classic/4--2/AUTOSAR_SWS_SecureOnboardCommunication.pdf
[5]
AUTOSAR. {n. d.}. "Specification of Secure Onboard Communication - AUTOSAR CP Release 4.3.1". https://www.autosar.org/standards/classic-platform/ classic-platform-431/
[6]
Alessandro Bruni, Michal Sojka, Flemming Nielson, and Hanne Riis Nielson. 2014. Formal Security Analysis of the MaCAN Protocol. In Integrated Formal Methods, Elvira Albert and Emil Sekerinski (Eds.). Springer International Publishing, Cham, 241--255.
[7]
Charlie Miller Chris Valasek. 2014. Adventures in Automotive Networks and Control Units. http://illmatics.com/car_hacking.pdf.
[8]
Luca Dariz, Gianpiero Costantino, Massimiliano Ruggeri, and Fabio Martinelli. 2018. A Joint Safety and Security Analysis of message protection for CAN bus protocol. Advances in Science, Technology and Engineering Systems Journal 3, 1 (2018), 384--393.
[9]
Luca Dariz, Michele Selvatici, Massimiliano Ruggeri, Gianpiero Costantino, and Fabio Martinelli. 2017. Trade-Off Analysis of Safety and Security in CAN bus communication. In The 5th IEEE International Conference on Models and Technologies for Intelligent Transportation Systems (MT-ITS 2017).
[10]
M. Dworkin. 2005. Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication. NIST Special Publication 800--38B.
[11]
Eric Evenchick. 2015. Hopping On the CAN Bus - Automotive Security and the CANard Toolkit. In Black Hat Asia (Last Access: 27/12/2018). https://www.blackhat.com/docs/asia-15/materials/ asia-15-Evenchick-Hopping-On-The-Can-Bus.pdf
[12]
B. Groza and P. Murvay. 2018. Security Solutions for the Controller Area Network: Bringing Authentication to In-Vehicle Networks. IEEE Vehicular Technology Magazine 13, 1 (March 2018), 40--47.
[13]
Bogdan Groza, Stefan Murvay, Anthony Van Herrewege, and Ingrid Verbauwhede. 2012. Libra-can: a lightweight broadcast authentication protocol for controller area networks. In International Conference on Cryptology and Network Security. Springer, 185--200.
[14]
Ahmed Hazem and HA Fahmy. 2012. Lcap-a lightweight can authentication protocol for securing in-vehicle networks. In 10th escar Embedded Security in Cars Conference, Berlin, Germany, Vol. 6.
[15]
International Organization for Standardization. 2015. Road vehicles - Controller area network (CAN) - Part 1: Data link layer and physical signalling. https: //www.iso.org/standard/63648.html.
[16]
Ryo Kurachi, Yutaka Matsubara, Hiroaki Takada, Naoki Adachi, Yukihiro Miyashita, and Satoshi Horihata. 2014. CaCAN-centralized authentication system in CAN (controller area network). In 14th Int. Conf. on Embedded Security in Cars (ESCAR 2014).
[17]
Chung-Wei Lin and Alberto Sangiovanni-Vincentelli. 2012. Cyber-security for the Controller Area Network (CAN) communication protocol. In Cyber Security (CyberSecurity), 2012 International Conference on. IEEE, 1--7.
[18]
Nicky Mouha, Bart Mennink, Anthony Van Herrewege, Dai Watanabe, Bart Preneel, and Ingrid Verbauwhede. 2014. Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers. In Selected Areas in Cryptography -- SAC 2014, Antoine Joux and Amr Youssef (Eds.). Springer International Publishing, Cham, 306--323.
[19]
Andreas Mueller, Timo Lothspeich, and Robert Bosch. 2015. Plug-and-Secure Communication for CAN. In CAN Newsletter.
[20]
Odzhan. 2018. Chaskey Cripto Lib. https://github.com/odzhan/tinycrypt/tree/ master/mac/chaskey.
[21]
C. Reuber O.Hartkopp and R.Schilling. {n. d.}. "MaCAN-message authenticated CAN", Proc. 10th Int. Conf. Embedded Security in Cars (ESCAR) (Ed.).
[22]
Andreea-Ina Radu and Flavio D. Garcia. 2016. LeiA: A Lightweight Authentication Protocol for CAN. In Computer Security - ESORICS 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26--30, 2016, Proceedings, Part II. 283--300.
[23]
D. Stabili, L. Ferretti, and M. Marchetti. 2018. Analyses of Secure Automotive Communication Protocols and Their Impact on Vehicles Life-Cycle. In 2018 IEEE International Conference on Smart Computing (SMARTCOMP). 452--457.
[24]
STMicroelectronics. {n. d.}. X-CUBE-CRYPTOLIB. https://www.st.com/en/ embedded-software/x-cube-cryptolib.html
[25]
STMicroelectronics. 2018. STM32CubeMX. https://www.st.com/en/ development-tools/stm32cubemx.html.
[26]
Pedro Umbelino. {n. d.}. OBD-II DONGLE ATTACK: STOPPING A MOVING CAR VIA BLUETOOTH. https://hackaday.com/2017/04/14/ obd-ii-dongle-attack-stopping-a-moving-car-via-bluetooth/
[27]
Anthony Van Herrewege, Dave Singelee, and Ingrid Verbauwhede. 2011. CANAuth-a simple, backward compatible broadcast authentication protocol for CAN bus. In ECRYPT Workshop on Lightweight Cryptography. Vol. 2011.
[28]
Tobias Ziermann, Stefan Wildermann, and Jürgen Teich. 2009. CAN+: A new backward-compatible Controller Area Network (CAN) protocol with up to 16x higher data rates. In Proceedings of the Conference on Design, Automation and Test in Europe. European Design and Automation Association, 1088--1093.

Cited By

View all
  • (2024)CEAMP: A Cross-Domain Entity Authentication and Message Protection Framework for Intra-Vehicle NetworkIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2023.333982125:7(6780-6795)Online publication date: Jul-2024
  • (2024)Automotive Security: Threat Forewarning and ECU Source Mapping Derived From Physical Features of Network SignalsIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2023.332189625:3(2479-2491)Online publication date: Mar-2024
  • (2024)TrinitySec: Trinity-Enabled and Lightweight Security Framework for CAN-FD CommunicationIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.331490821:4(2704-2719)Online publication date: Jul-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
AutoSec '19: Proceedings of the ACM Workshop on Automotive Cybersecurity
March 2019
55 pages
ISBN:9781450361804
DOI:10.1145/3309171
  • Program Chairs:
  • Ziming Zhao,
  • Qi Alfred Chen,
  • Gail-Joon Ahn
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 March 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. automotive
  2. can bus
  3. cybersecurity
  4. frame

Qualifiers

  • Research-article

Conference

CODASPY '19
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)65
  • Downloads (Last 6 weeks)4
Reflects downloads up to 16 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)CEAMP: A Cross-Domain Entity Authentication and Message Protection Framework for Intra-Vehicle NetworkIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2023.333982125:7(6780-6795)Online publication date: Jul-2024
  • (2024)Automotive Security: Threat Forewarning and ECU Source Mapping Derived From Physical Features of Network SignalsIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2023.332189625:3(2479-2491)Online publication date: Mar-2024
  • (2024)TrinitySec: Trinity-Enabled and Lightweight Security Framework for CAN-FD CommunicationIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.331490821:4(2704-2719)Online publication date: Jul-2024
  • (2024)A Lightweight and Confidential Communication Scheme for On-Vehicle ECUsIEEE Network: The Magazine of Global Internetworking10.1109/MNET.2024.336594638:3(34-40)Online publication date: 20-Feb-2024
  • (2023)ZBCANProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620623(6893-6910)Online publication date: 9-Aug-2023
  • (2023)A Survey of Security and Privacy Issues in V2X Communication SystemsACM Computing Surveys10.1145/355805255:9(1-36)Online publication date: 16-Jan-2023
  • (2023)ECQV-GDH-Based Group Key Exchange Protocol for CAN BusIEEE Transactions on Vehicular Technology10.1109/TVT.2023.327787572:10(12857-12872)Online publication date: Oct-2023
  • (2023)A Digital Watermark Method for In-Vehicle Network Security EnhancementIEEE Transactions on Vehicular Technology10.1109/TVT.2023.324718072:7(8398-8408)Online publication date: Jul-2023
  • (2023)Impact of Wiring Characteristics on Voltage-based Fingerprinting in Controller Area Networks2023 IEEE 17th International Symposium on Applied Computational Intelligence and Informatics (SACI)10.1109/SACI58269.2023.10158572(000231-000236)Online publication date: 23-May-2023
  • (2023)A PUF-based Authentication and Key Distribution Scheme for In-Vehicle NetworkICC 2023 - IEEE International Conference on Communications10.1109/ICC45041.2023.10279633(1591-1596)Online publication date: 28-May-2023
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media