Design of a message authentication protocol for CAN FD based on chaskey lightweight MAC

Guillaume Carel, Ryunosuke Isshiki, Takuya Kusaka, Yasuyuki Nogami, Shunsuke Araki

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

The development of the autonomous driving and the connected services severely increase security threats on old automotive technologies that are still present on-board vehicles since the long incremental process were employed. For example, the Controller Area Network (CAN) bus, which was standardized in 1991, can be connected to modern Linux embedded computer nodes where evil attacker might be able to exploit a vulnerability on the nodes. However, it is not easy to implement countermeasures on the CAN bus, since the strict requirements and limited performances of CAN specification. That is one of the major reason for the new standard CAN Flexible Data-rate (CAN FD) has been released in 2012 by Bosch to fill the gap between these challenges and the CAN protocol. In this research, a new simple authentication protocol for CAN FD is proposed, and the protocol is evaluated by experiments. The results show that the proposed protocol prevents infected nodes from usurping identity of a critical node and forge messages, with practical computational complexity on modern low-power embedding boards.

Original languageEnglish
Title of host publicationProceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages267-271
Number of pages5
ISBN (Electronic)9781538691847
DOIs
Publication statusPublished - Dec 26 2018
Event6th International Symposium on Computing and Networking Workshops, CANDARW 2018 - Takayama, Japan
Duration: Nov 27 2018Nov 30 2018

Publication series

NameProceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018

Conference

Conference6th International Symposium on Computing and Networking Workshops, CANDARW 2018
CountryJapan
CityTakayama
Period11/27/1811/30/18

Fingerprint

Message Authentication
Authentication Protocol
Authentication
Controller
Network protocols
Controllers
Vertex of a graph
Network Protocols
Linux
Countermeasures
Vulnerability
Design
Message authentication
Computational complexity
Computational Complexity
Specification
Specifications
Node
Requirements
Experiment

Keywords

  • CAN FD
  • Chaskey
  • Lightweight MAC
  • Message authentication

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Statistics, Probability and Uncertainty
  • Computer Science Applications

Cite this

Carel, G., Isshiki, R., Kusaka, T., Nogami, Y., & Araki, S. (2018). Design of a message authentication protocol for CAN FD based on chaskey lightweight MAC. In Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018 (pp. 267-271). [8590911] (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/CANDARW.2018.00057

Design of a message authentication protocol for CAN FD based on chaskey lightweight MAC. / Carel, Guillaume; Isshiki, Ryunosuke; Kusaka, Takuya; Nogami, Yasuyuki; Araki, Shunsuke.

Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., 2018. p. 267-271 8590911 (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Carel, G, Isshiki, R, Kusaka, T, Nogami, Y & Araki, S 2018, Design of a message authentication protocol for CAN FD based on chaskey lightweight MAC. in Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018., 8590911, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018, Institute of Electrical and Electronics Engineers Inc., pp. 267-271, 6th International Symposium on Computing and Networking Workshops, CANDARW 2018, Takayama, Japan, 11/27/18. https://doi.org/10.1109/CANDARW.2018.00057
Carel G, Isshiki R, Kusaka T, Nogami Y, Araki S. Design of a message authentication protocol for CAN FD based on chaskey lightweight MAC. In Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc. 2018. p. 267-271. 8590911. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018). https://doi.org/10.1109/CANDARW.2018.00057
Carel, Guillaume ; Isshiki, Ryunosuke ; Kusaka, Takuya ; Nogami, Yasuyuki ; Araki, Shunsuke. / Design of a message authentication protocol for CAN FD based on chaskey lightweight MAC. Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., 2018. pp. 267-271 (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).
@inproceedings{50f772136e6443ccbf7c1571fa1cc950,
title = "Design of a message authentication protocol for CAN FD based on chaskey lightweight MAC",
abstract = "The development of the autonomous driving and the connected services severely increase security threats on old automotive technologies that are still present on-board vehicles since the long incremental process were employed. For example, the Controller Area Network (CAN) bus, which was standardized in 1991, can be connected to modern Linux embedded computer nodes where evil attacker might be able to exploit a vulnerability on the nodes. However, it is not easy to implement countermeasures on the CAN bus, since the strict requirements and limited performances of CAN specification. That is one of the major reason for the new standard CAN Flexible Data-rate (CAN FD) has been released in 2012 by Bosch to fill the gap between these challenges and the CAN protocol. In this research, a new simple authentication protocol for CAN FD is proposed, and the protocol is evaluated by experiments. The results show that the proposed protocol prevents infected nodes from usurping identity of a critical node and forge messages, with practical computational complexity on modern low-power embedding boards.",
keywords = "CAN FD, Chaskey, Lightweight MAC, Message authentication",
author = "Guillaume Carel and Ryunosuke Isshiki and Takuya Kusaka and Yasuyuki Nogami and Shunsuke Araki",
year = "2018",
month = "12",
day = "26",
doi = "10.1109/CANDARW.2018.00057",
language = "English",
series = "Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "267--271",
booktitle = "Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018",

}

TY - GEN

T1 - Design of a message authentication protocol for CAN FD based on chaskey lightweight MAC

AU - Carel, Guillaume

AU - Isshiki, Ryunosuke

AU - Kusaka, Takuya

AU - Nogami, Yasuyuki

AU - Araki, Shunsuke

PY - 2018/12/26

Y1 - 2018/12/26

N2 - The development of the autonomous driving and the connected services severely increase security threats on old automotive technologies that are still present on-board vehicles since the long incremental process were employed. For example, the Controller Area Network (CAN) bus, which was standardized in 1991, can be connected to modern Linux embedded computer nodes where evil attacker might be able to exploit a vulnerability on the nodes. However, it is not easy to implement countermeasures on the CAN bus, since the strict requirements and limited performances of CAN specification. That is one of the major reason for the new standard CAN Flexible Data-rate (CAN FD) has been released in 2012 by Bosch to fill the gap between these challenges and the CAN protocol. In this research, a new simple authentication protocol for CAN FD is proposed, and the protocol is evaluated by experiments. The results show that the proposed protocol prevents infected nodes from usurping identity of a critical node and forge messages, with practical computational complexity on modern low-power embedding boards.

AB - The development of the autonomous driving and the connected services severely increase security threats on old automotive technologies that are still present on-board vehicles since the long incremental process were employed. For example, the Controller Area Network (CAN) bus, which was standardized in 1991, can be connected to modern Linux embedded computer nodes where evil attacker might be able to exploit a vulnerability on the nodes. However, it is not easy to implement countermeasures on the CAN bus, since the strict requirements and limited performances of CAN specification. That is one of the major reason for the new standard CAN Flexible Data-rate (CAN FD) has been released in 2012 by Bosch to fill the gap between these challenges and the CAN protocol. In this research, a new simple authentication protocol for CAN FD is proposed, and the protocol is evaluated by experiments. The results show that the proposed protocol prevents infected nodes from usurping identity of a critical node and forge messages, with practical computational complexity on modern low-power embedding boards.

KW - CAN FD

KW - Chaskey

KW - Lightweight MAC

KW - Message authentication

UR - http://www.scopus.com/inward/record.url?scp=85061429617&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85061429617&partnerID=8YFLogxK

U2 - 10.1109/CANDARW.2018.00057

DO - 10.1109/CANDARW.2018.00057

M3 - Conference contribution

T3 - Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018

SP - 267

EP - 271

BT - Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018

PB - Institute of Electrical and Electronics Engineers Inc.

ER -