Abstract
Recently, driving support technologies have been practically used. However, a problem has been pointed out that when a vehicle is connected with an external network, the safety of the vehicle is threatened. Ensuring the security of in-vehicle systems becomes an important priority. The present study proposes a CAN communications method that uses a lightweight block cipher to realize secure in-vehicle systems. Experiments using both FPGA and a radio-controlled car verify the proposed method.
Article PDF
Avoid common mistakes on your manuscript.
References
ISO, ISO 11898-1:2003 – Road vehicles – Controller area network (CAN), International Organization for Standardization, (2003)
PRESERVE, http://www.preserve-project.eu/
IPA, http://www.ipa.go.jp/security/fy24/reports/emb_car/documents/car_guide_24.pdf (2013)
JASPER, https://www.jaspar.jp/index.html
K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham and S. Savage, Experimental Security Analysis of a Modern Automobile, IEEE Symposium on Security and Privacy (SP 2010), (2010), pp. 447–462
S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, K. Koscher, A. Czeskis, F. Roesner and T. Kohno, Comprehensive Experimental Analysis of Automotive Attack Surfaces, Proc. of the 20th USENIX conference of Security, (2011)
T. Hoppe, S. Kiltz and J. Dittmann, Security Threats to Automotive CAN Networks — Practical Examples and Selected Short-Term Countermeasures, Proc. of the 27th international conference of Computer Safety, Reliability, and Security (SAFECOMP ‘08), (Springer-Verlag, 2008), LNCS vol.5219, pp.235–248
A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann, M. J. B. Robshaw, Y. Seurin and C. Vikkelsoe, PRESENT: An Ultra-Lightweight Block Ciph, Proc. of Cryptographic Hardware and Embedded Systems (CHES 2007), (Springer-Verlag, 2007), LNCS vol. 4727, pp. 450–466
C. D. Cannière, O. Dunkelman and M. Knežević, KATAN and KTANTAN — A Family of Small and Effcient Hardware-Oriented Block Ciphers, Proc. of Cryptographic Hardware and Embedded Systems (CHES 2009), LNCS vol. 5747, (2009), pp. 272–288
W. Wu, L. Zhang, LBlock: A Lightweight Block Ciph, Proc. of the 9th international conference of Applied Cryptography and Network Security (ACNS 2011), (2011), LNCS vol. 6715, pp. 327–344
J. Borghoff, A. Canteaut, T. Güneysu, E. B. Kavum, M. Knežević, L. R. Knudsen, G. Leander, V. Nikov, C. Paar, C. Rechberger, P. Rombouts, S. S. Thomsen and T. Yalçin, PRINCE - A Low-latency Block Cipher for Pervasive Computing Application, Proc. of ASIACRYPT 2012, (Springer-Verlag, 2012), LNCS vol. 7658, pp. 208–225
T. Suzaki, K. Minematsu, S. Morioka and E. Kobayashi, TWINE: A Lightweight, Versatile Blockcipher, Proc. of ECRYPT Workshop on Lightweight Cryptography (LC11), (2011), pp. 146–149
K. Shibutani, T. Isobe, H. Hiwatari, A. Mitsuda, T. Akishita and T. Shirai, Piccolo: An Ultra-Lightweight Blockciph, Proc. of Cryptographic Hardware and Embedded Systems (CHES 2011), (Springer-Verlag, 2011), LNCS vol. 6917, pp. 342–357
J. Guo, T. Peyrin, A. Poschmann and M. Robshaw, The LED Block Ciphe, Proc. of Cryptographic Hardware and Embedded Systems (CHES 2011), (2011), LNCS, vol. 6917, pp. 326–341
R. Beaulieu, D. Shors, J. Smith, S. Treatman-Clark, B. Weeks and L. Wingers, The SIMON and SPECK Families of Lightweight Block Ciphers, Cryptography ePrint Archive, Report 2013/404, (2013), http://eprint.iacr.org/
National Institute of Standards and Technology (NIST), Announcing the ADVANCED ENCRYPTIOHN STANDARD (AES), Federal Information Processing Standards Publication 197 (2001), http://csrc.nist.gov/publications/fips/index.html/
National Institute of Standards and Technology (NIST), DATA ENCRYPTIOHN STANDARD (DES), Federal Information Processing Standards Publication 46–3 (1999)
Author information
Authors and Affiliations
Rights and permissions
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
About this article
Cite this article
Yoshikawa, M., Sugioka, K., Nozaki, Y. et al. Secure in-vehicle Systems using Authentication. Int J Netw Distrib Comput 3, 159–166 (2015). https://doi.org/10.2991/ijndc.2015.3.3.3
Published:
Issue Date:
DOI: https://doi.org/10.2991/ijndc.2015.3.3.3