首页> 外文会议>IEEE/ACM International Conference on Cyber-Physical Systems >Hardware Module-Based Message Authentication in Intra-vehicle Networks
【24h】

Hardware Module-Based Message Authentication in Intra-vehicle Networks

机译:车载网络中基于硬件模块的消息身份验证

获取原文

摘要

The Controller Area Network (CAN) is a widely used industry-standard intra-vehicle broadcast network that connects the Electronic Control Units (ECUs) which control most car systems. The CAN contains substantial vulnerabilities that can be exploited by attackers to gain control of the vehicle, due to its lack of security measures. To prevent an attacker from sending malicious messages through the CAN bus to take over a vehicle, we propose the addition of a secure hardware-based module, or Security ECU (SECU), onto the CAN bus. The SECU can perform key distribution and message verification, as well as corrupting malicious messages before they are fully received by an ECU. Only software modification is needed for existing ECUs, without changing the CAN protocol. This provides backward compatibility with existing CAN systems. Furthermore, we collect 6.673 million CAN bus messages from various cars, and find that the CAN messages collectively have low entropy, with an average of 11.915 bits. This finding motivates our proposal for CAN bus message compression, which allows us to significantly reduce message size to fit the message and its message authentication code (MAC) within one CAN frame, enabling fast authentication. Since ECUs only need to generate the MACs (and not verify them), the delay and computation overhead are also reduced compared to traditional authentication mechanisms. Our authentication mechanism is implemented on a realistic testbed using industry standard MCP2551 CAN transceivers and Raspberry Pi embedded systems. Experimental results demonstrate that our mechanism can achieve real-time message authentication on the CAN bus with minimal latency.
机译:控制器局域网(CAN)是一种广泛使用的行业标准车内广播网络,它连接控制大多数汽车系统的电子控制单元(ECU)。 CAN包含大量漏洞,由于缺乏安全措施,攻击者可以利用它们来控制车辆。为了防止攻击者通过CAN总线发送恶意消息来接管车辆,我们建议在CAN总线上增加一个基于硬件的安全模块或安全性ECU(SECU)。 SECU可以执行密钥分发和消息验证,以及在恶意消息被ECU完全接收之前将其破坏。现有ECU仅需要软件修改,而无需更改CAN协议。这提供了与现有CAN系统的向后兼容性。此外,我们从各种汽车中收集了677.3万条CAN总线消息,发现CAN消息总体上具有较低的熵,平均为11.915位。这一发现激发了我们对CAN总线消息压缩的建议,该提议使我们能够显着减小消息大小,以在一个CAN帧内适应消息及其消息身份验证代码(MAC),从而实现快速身份验证。由于ECU仅需要生成MAC(而不验证它们),因此与传统的身份验证机制相比,延迟和计算开销也得到了减少。我们的认证机制是在使用工业标准MCP2551 CAN收发器和Raspberry Pi嵌入式系统的真实测试台上实现的。实验结果表明,我们的机制可以在CAN总线上以最小的延迟实现实时消息身份验证。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号