skip to main content
research-article
Best Paper

Security-Aware Design Methodology and Optimization for Automotive Systems

Published:02 December 2015Publication History
Skip Abstract Section

Abstract

In this article, we address both security and safety requirements and solve security-aware design problems for the controller area network (CAN) protocol and time division multiple access (TDMA)-based protocols. To provide insights and guidelines for other similar security problems with limited resources and strict timing constraints, we propose a general security-aware design methodology to address security with other design constraints in a holistic framework and optimize design objectives. The security-aware design methodology is further applied to solve a security-aware design problem for vehicle-to-vehicle (V2V) communications with dedicated short-range communication (DSRC) technology. Experimental results demonstrate the effectiveness of our approaches in system design without violating design constraints and indicate that it is necessary to consider security together with other metrics during design stages.

References

  1. F. Ahmed-Zaid, F. Bai, S. Bai, C. Basnayake, B. Bellur, S. Brovold, G. Brown, L. Caminiti, D. Cunningham, H. Elzein, K. Hong, J. Ivan, D. Jiang, J. Kenney, H. Krishnan, J. Lovell, M. Maile, D. Masselink, E. Mcglohon, P. Mudalige, Z. Popovic, V. Rai, J. Stinnett, L. Tellis, K. Tirey, and S. Vansickle. 2011. Vehicle safety communications—Applications (VSC-A). Report No. DOT HS 811 492A (Sept. 2011). US. Department of Transportation National Highway Traffic Safety Administration.Google ScholarGoogle Scholar
  2. Bosch. 1991. CAN specification (Version 2.0). Robert Bosch GmbH.Google ScholarGoogle Scholar
  3. Bosch. 2011. CAN with flexible data-rate. White Paper (Version 1.1). Robert Bosch GmbH.Google ScholarGoogle Scholar
  4. S. Checkoway, D. Mccoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, K. Koscher, A. Czeskis, F. Roesner, and T. Kohno. 2011. Comprehensive experimental analyses of automotive attack surfaces. In Proceedings of the USENIX Conference on Security. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. R. De Cerchio and C. Riley. 2012. Aircraft systems cyber security. In Proceedings of the Integrated Communications, Navigation and Surveillance Conference (ICNS'12), 1--12.Google ScholarGoogle Scholar
  6. FlexRay. 2010. FlexRay communications system protocol specification (Version 3.0.1). FlexRay Consortium. (Oct. 2010).Google ScholarGoogle Scholar
  7. S. Gong, Z. Zhang, M. Trinkle, A. D. Dimitrovski, and H. Li. 2012. GPS spoofing based time stamp attack on real time wide area monitoring in smart grid. In Proceedings of the IEEE International Conference on Smart Grid Communications (SmartGridComm'12). 300--305.Google ScholarGoogle Scholar
  8. B. Groza, P.-S. Murvay, A. Van Herrewege, and I. Verbauwhede. 2012. LiBrA-CAN: A lightweight broadcast authentication protocol for controller area networks. In Proceedings of the International Conference on Cryptology and Network Security. 185--200.Google ScholarGoogle Scholar
  9. D. Halperin, T. S. Heydt-Benjamin, B. Ransford, S. S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W. H. Maisel. 2008. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In Proceedings of the IEEE Symposium on Security and Privacy (SP'08). 129--142. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Harding, G. Powell, R. Yoon, J. Fikentscher, C. Doyle, D. Sade, M. Lukuc, J. Simons, and J. Wang. 2014. Vehicle-to-vehicle communications: Readiness of V2V technology for application. Report No. DOT HS 812 014 (August 2014). US Department of Transportation National Highway Traffic Safety Administration.Google ScholarGoogle Scholar
  11. T. Hoppe, S. Kiltz, and J. Dittmann. 2008. Security threats to automotive CAN networks—Practical examples and selected short-term countermeasures. In Proceedings of the International Conference on Computer Safety, Reliability, and Security (SAFECOMP'08). 235--248. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. IEEE. 2013. IEEE standard for wireless access in vehicular environments security services for applications and management messages. IEEE Std 1609.2-2013 (Revision of IEEE Std 1609.2-2006) (April 2013).Google ScholarGoogle Scholar
  13. J. B. Kenney. 2007. Dedicated short-range communications (DSRC) standards in the United States. Proc. IEEE 99, 7 (July 2007), 1162--1182.Google ScholarGoogle Scholar
  14. H. Khurana, M. Hadley, N. Lu, and D. A. Frincke. 2010. Smart-grid security issues. IEEE Secur. Privacy 8, 1 (Jan. 2010), 81--85. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. P. Kleberger, T. Olovsson, and E. Jonsson. 2011. Security aspects of the in-vehicle network in the connected car. In Proceedings of the IEEE Intelligent Vehicles Symposium (IV'11). 528--533.Google ScholarGoogle Scholar
  16. K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, D. Mccoy, B. Kantor, D. Anderson, H. Shacham, and S. Savage. 2010. Experimental security analysis of a modern automobile. In Proceedings of the IEEE Symposium on Security and Privacy (SP'10). 447--462. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. F. Koushanfar, Sadeghi, A.-R. Koushanfa, and H. Seudie. 2012. EDA for secure and dependable cybercars: Challenges and opportunities. In Proceedings of the ACM/IEEE Design Automation Conference (DAC'12). 220--228. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. H. Krishnan and A. Weimerskirch. 2011. Verify-on-demand—A practical and scalable approach for broadcast authentication in vehicle-to-vehicle communication. SAE Int. J. Passenger Cars—Mechani. Syst. 4, 1 (June 2011), 536--546.Google ScholarGoogle Scholar
  19. C. Li, A. Raghunathan, and N. K. Jha. 2011. Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system. In Proceedings of the IEEE International Conference on e-Health Networking Applications and Services (Healthcom'11). 150--156.Google ScholarGoogle Scholar
  20. C.-W. Lin and A. L. Sangiovanni-Vincentelli. 2012. Cyber-security for the controller area network (CAN) communication protocol. In Proceedings of the ASE International Conference on Cyber Security (CyberSecurity'12). 344--350. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. C.-W. Lin, Q. Zhu, C. Phung, and A. L. Sangiovanni-Vincentelli. 2013. Security-aware mapping for CAN-based real-time distributed automotive systems. In Proceedings of the IEEE/ACM International Conference on Computer-Aided Design (ICCAD'13). 115--121. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. C.-W. Lin, Q. Zhu, and A. L. Sangiovanni-Vincentelli. 2014. Security-aware mapping for TDMA-based real-time distributed systems. In Proceedings of the IEEE/ACM International Conference on Computer-Aided Design (ICCAD'14). 24--31. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. P. Mcdaniel and S. Mclaughlin. 2009. Security and privacy challenges in the smart grid. IEEE Secur. Privacy 7, 3 (May 2009), 75--77. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. D. K. Nilsson, U. E. Larson, and E. Jonsson. 2008. Efficient in-vehicle delayed data authentication based on compound message authentication codes. In Proceedings of the IEEE Vehicular Technology Conference (VTC'08). 1--5.Google ScholarGoogle Scholar
  25. A. Perrig, R. Canetti, D. Song, and J. D. Tygar. 2001. Efficient and secure source authentication for multicast. In Proceedings of the Network and Distributed System Security Symposium (NDSS'01). 35--46.Google ScholarGoogle Scholar
  26. A. Perrig, R. Canetti, J. D. Tygar, and D. Song. 2000. Efficient authentication and signing of multicast streams over lossy channels. In Proceedings of the IEEE Symposium on Security and Privacy (SP'00). 56--73. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. I. Rouf, R. Miller, H. Mustafa, T. Taylor, S. Oh, W. Xu, M. Gruteser, W. Trappe, and I. Seskar. 2010. Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study. In Proceedings of the USENIX Conference on Security. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. U. Ruhrmair and M. van Dijk. 2013. PUFs in security protocols: Attack models and security evaluations. In Proceedings of the IEEE Symposium on Security and Privacy (SP'13). 286--300. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. SAE. 2015. Dedicated short range communications (DSRC) message set dictionary. SAE Standard J2735 (April 2015).Google ScholarGoogle Scholar
  30. SAE. 2011a. Time-triggered ethernet. SAE Standard AS6802 (Nov. 2011).Google ScholarGoogle Scholar
  31. SAE. 2011b. TTP communication protocol. SAE Standard AS6003 (Feb. 2011).Google ScholarGoogle Scholar
  32. K. Sampigethaya, R. Poovendran, S. Shetty, T. Davis, and C. Royalty. 2011. Future E-enabled aircraft communications and security: The next 20 years and beyond. Proc. IEEE 99, 11 (Nov. 2011), 2040--2055.Google ScholarGoogle ScholarCross RefCross Ref
  33. A. L. Sangiovanni-Vincentelli. 2007. Quo vadis, SLD? Reasoning about the trends and challenges of system level design. Proc. IEEE 95, 3 (March 2007), 467--506.Google ScholarGoogle ScholarCross RefCross Ref
  34. S. Seifert and R. Obermaisser. 2014. Secure automotive gateway—Secure communication for future cars. In Proceedings of the IEEE International Conference on Industrial Informatics (INDIN'14). 213--220.Google ScholarGoogle Scholar
  35. G. E. Suh and S. Devadas. 2007. Physical unclonable functions for device authentication and secret key generation. In Proceedings of the ACM/IEEE Design Automation Conference (DAC'07). 9--14. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. A. Van Herrewege, D. Singelee, and I. Verbauwhede. 2011. CANAuth—A simple, backward compatible broadcast authentication protocol for CAN bus. In Proceedings of the Workshop on Embedded Security in Cars.Google ScholarGoogle Scholar
  37. A. Wasicek, P. Derler, and E. A. Lee. 2014. Aspect-oriented modeling of attacks in automotive cyber-physical systems. In Proceedings of the ACM/IEEE Design Automation Conference (DAC'14). 21:1--21:6. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. A. Wasicek, C. El Salloum, and H. Kopetz. 2011. Authentication in time-triggered systems using time-delayed release of keys. In Proceedings of the IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing (ISORC'11). 31--39. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. M. Wolf and T. Gendrullis. 2011. Design, implementation, and evaluation of a vehicular hardware security module. In Proceedings of the International Conference on Information Security and Cryptology (ICISC'11). 302--318. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. M.-D. Yu and S. Devadas. 2010. Secure and robust error correction for physical unclonable functions. IEEE Design Test Comput. 27, 1 (Jan. 2010), 48--65. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Q. Zeng, H. Li, and L. Qian. 2012. GPS spoofing attack on time synchronization in wireless networks and detection scheme design. In Proceedings of the Military Communications Conference (MILCOM'12). 1--5.Google ScholarGoogle Scholar
  42. Q. Zhu, Y. Yang, M. Di Natale, E. Scholte, and A. L. Sangiovanni-Vincentelli. 2010. Optimizing the software architecture for extensibility in hard real-time distributed systems. IEEE Trans. Indust. Informa. 6, 4 (Nov. 2010), 621--636.Google ScholarGoogle Scholar

Index Terms

  1. Security-Aware Design Methodology and Optimization for Automotive Systems

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader