Abstract
The controller area network (CAN) is the most widely used in-vehicle network to communicate among electronic control units. However, the CAN does not provide security functionalities, such as encryption or message authentication. Attackers can analyze CAN logs and inject valid messages based on the analysis to cause malfunctions. Thus, security functions appropriate to the CAN environment are required to prevent attacks. In this paper, we propose a dynamic identifier (ID) virtualization method that prevents CAN logs from being analyzed and makes it difficult for attackers to generate valid messages. We implement a virtualization module to perform dynamic ID virtualization and measure the delay and computational overhead caused by the proposed method. Additionally, we demonstrate the security of the proposed method.
Original language | English |
---|---|
Article number | 8886494 |
Pages (from-to) | 158237-158249 |
Number of pages | 13 |
Journal | IEEE Access |
Volume | 7 |
DOIs | |
Publication status | Published - 2019 |
Bibliographical note
Funding Information:This work was supported by the Samsung Research Funding & Incubation Center for Future Technology under Project SRFC-TB1403-51.
Publisher Copyright:
© 2019 IEEE.
Keywords
- Controller area network
- in-vehicle network
- network security
- vehicular security
ASJC Scopus subject areas
- Computer Science(all)
- Materials Science(all)
- Engineering(all)