Skip to main content

Advertisement

Springer Nature Link
Account
Menu
Find a journal Publish with us Track your research
Search
Cart
  1. Home
  2. International Journal of Networked and Distributed Computing
  3. Article

Secure in-vehicle Systems using Authentication

  • Research Article
  • Open access
  • Published: 01 August 2015
  • Volume 3, pages 159–166, (2015)
  • Cite this article
Download PDF

You have full access to this open access article

International Journal of Networked and Distributed Computing Aims and scope Submit manuscript
Secure in-vehicle Systems using Authentication
Download PDF
  • Masaya Yoshikawa1,
  • Kyota Sugioka1,
  • Yusuke Nozaki1 &
  • …
  • Kensaku Asahi1 
  • 51 Accesses

  • 1 Citation

  • 3 Altmetric

  • Explore all metrics

Abstract

Recently, driving support technologies have been practically used. However, a problem has been pointed out that when a vehicle is connected with an external network, the safety of the vehicle is threatened. Ensuring the security of in-vehicle systems becomes an important priority. The present study proposes a CAN communications method that uses a lightweight block cipher to realize secure in-vehicle systems. Experiments using both FPGA and a radio-controlled car verify the proposed method.

Article PDF

Download to read the full article text

Explore related subjects

Discover the latest articles and news from researchers in related subjects, suggested using machine learning.
  • Cryptology
  • DNA computing and cryptography
  • Mobile and Network Security
  • Principles and Models of Security
  • Quantum Communications and Cryptography
  • Security Science and Technology
Use our pre-submission checklist

Avoid common mistakes on your manuscript.

References

  1. ISO, ISO 11898-1:2003 – Road vehicles – Controller area network (CAN), International Organization for Standardization, (2003)

  2. EVITA, http://www.evita-project.org/

  3. PRESERVE, http://www.preserve-project.eu/

  4. IPA, http://www.ipa.go.jp/security/fy24/reports/emb_car/documents/car_guide_24.pdf (2013)

  5. JASPER, https://www.jaspar.jp/index.html

  6. K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham and S. Savage, Experimental Security Analysis of a Modern Automobile, IEEE Symposium on Security and Privacy (SP 2010), (2010), pp. 447–462

    Google Scholar 

  7. S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, K. Koscher, A. Czeskis, F. Roesner and T. Kohno, Comprehensive Experimental Analysis of Automotive Attack Surfaces, Proc. of the 20th USENIX conference of Security, (2011)

  8. T. Hoppe, S. Kiltz and J. Dittmann, Security Threats to Automotive CAN Networks — Practical Examples and Selected Short-Term Countermeasures, Proc. of the 27th international conference of Computer Safety, Reliability, and Security (SAFECOMP ‘08), (Springer-Verlag, 2008), LNCS vol.5219, pp.235–248

  9. A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann, M. J. B. Robshaw, Y. Seurin and C. Vikkelsoe, PRESENT: An Ultra-Lightweight Block Ciph, Proc. of Cryptographic Hardware and Embedded Systems (CHES 2007), (Springer-Verlag, 2007), LNCS vol. 4727, pp. 450–466

    Google Scholar 

  10. C. D. Cannière, O. Dunkelman and M. Knežević, KATAN and KTANTAN — A Family of Small and Effcient Hardware-Oriented Block Ciphers, Proc. of Cryptographic Hardware and Embedded Systems (CHES 2009), LNCS vol. 5747, (2009), pp. 272–288

    Google Scholar 

  11. W. Wu, L. Zhang, LBlock: A Lightweight Block Ciph, Proc. of the 9th international conference of Applied Cryptography and Network Security (ACNS 2011), (2011), LNCS vol. 6715, pp. 327–344

    Google Scholar 

  12. J. Borghoff, A. Canteaut, T. Güneysu, E. B. Kavum, M. Knežević, L. R. Knudsen, G. Leander, V. Nikov, C. Paar, C. Rechberger, P. Rombouts, S. S. Thomsen and T. Yalçin, PRINCE - A Low-latency Block Cipher for Pervasive Computing Application, Proc. of ASIACRYPT 2012, (Springer-Verlag, 2012), LNCS vol. 7658, pp. 208–225

    Google Scholar 

  13. T. Suzaki, K. Minematsu, S. Morioka and E. Kobayashi, TWINE: A Lightweight, Versatile Blockcipher, Proc. of ECRYPT Workshop on Lightweight Cryptography (LC11), (2011), pp. 146–149

    Google Scholar 

  14. K. Shibutani, T. Isobe, H. Hiwatari, A. Mitsuda, T. Akishita and T. Shirai, Piccolo: An Ultra-Lightweight Blockciph, Proc. of Cryptographic Hardware and Embedded Systems (CHES 2011), (Springer-Verlag, 2011), LNCS vol. 6917, pp. 342–357

    Google Scholar 

  15. J. Guo, T. Peyrin, A. Poschmann and M. Robshaw, The LED Block Ciphe, Proc. of Cryptographic Hardware and Embedded Systems (CHES 2011), (2011), LNCS, vol. 6917, pp. 326–341

    Google Scholar 

  16. R. Beaulieu, D. Shors, J. Smith, S. Treatman-Clark, B. Weeks and L. Wingers, The SIMON and SPECK Families of Lightweight Block Ciphers, Cryptography ePrint Archive, Report 2013/404, (2013), http://eprint.iacr.org/

  17. National Institute of Standards and Technology (NIST), Announcing the ADVANCED ENCRYPTIOHN STANDARD (AES), Federal Information Processing Standards Publication 197 (2001), http://csrc.nist.gov/publications/fips/index.html/

  18. National Institute of Standards and Technology (NIST), DATA ENCRYPTIOHN STANDARD (DES), Federal Information Processing Standards Publication 46–3 (1999)

Download references

Author information

Authors and Affiliations

  1. Department of Information Engineering, Meijo University, Nagoya, Aichi, Japan

    Masaya Yoshikawa, Kyota Sugioka, Yusuke Nozaki & Kensaku Asahi

Authors
  1. Masaya Yoshikawa
    View author publications

    Search author on:PubMed Google Scholar

  2. Kyota Sugioka
    View author publications

    Search author on:PubMed Google Scholar

  3. Yusuke Nozaki
    View author publications

    Search author on:PubMed Google Scholar

  4. Kensaku Asahi
    View author publications

    Search author on:PubMed Google Scholar

Rights and permissions

This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yoshikawa, M., Sugioka, K., Nozaki, Y. et al. Secure in-vehicle Systems using Authentication. Int J Netw Distrib Comput 3, 159–166 (2015). https://doi.org/10.2991/ijndc.2015.3.3.3

Download citation

  • Published: 01 August 2015

  • Issue Date: August 2015

  • DOI: https://doi.org/10.2991/ijndc.2015.3.3.3

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Keywords

  • Security
  • Embedded system
  • Lightweight block cipher
  • CAN communication
  • Authentication
Use our pre-submission checklist

Avoid common mistakes on your manuscript.

Advertisement

Search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Journal finder
  • Publish your research
  • Language editing
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our brands

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Discover
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Legal notice
  • Cancel contracts here

Not affiliated

Springer Nature

© 2025 Springer Nature