A journal of IEEE and CAA , publishes high-quality papers in English on original theoretical/experimental research and development in all areas of automation
Volume 2 Issue 4
Oct.  2015

IEEE/CAA Journal of Automatica Sinica

  • JCR Impact Factor: 7.847, Top 10% (SCI Q1)
    CiteScore: 13.0, Top 5% (Q1)
    Google Scholar h5-index: 64, TOP 7
Turn off MathJax
Article Contents
Yong Xie, Liangjiao Liu, Renfa Li, Jianqiang Hu, Yong Han and Xin Peng, "Security-aware Signal Packing Algorithm for CAN-based Automotive Cyber-physical Systems," IEEE/CAA J. of Autom. Sinica, vol. 2, no. 4, pp. 422-430, 2015.
Citation: Yong Xie, Liangjiao Liu, Renfa Li, Jianqiang Hu, Yong Han and Xin Peng, "Security-aware Signal Packing Algorithm for CAN-based Automotive Cyber-physical Systems," IEEE/CAA J. of Autom. Sinica, vol. 2, no. 4, pp. 422-430, 2015.

Security-aware Signal Packing Algorithm for CAN-based Automotive Cyber-physical Systems

Funds:

This work was supported by National Natural Science Foundation of China (61502405, 61300039), Provincial Science Foundation of Hunan Province (14JJ3130), Fujian Educational Bureau (JA15368), and Xiamen University of Technology (YKJ13024R, XYK201437).

  • Network and software integration pose severe challenges in cyber-security for controller area network (CAN)-based automotive cyber-physical system (ACPS), therefore we employ message authentication code (MAC) to defend CAN against masquerade attack, but the consequent bandwidth overhead makes it a necessity to find the tradeoff among security, real-time and bandwidth utilization for signal packing problem (SPP) of CAN. A mixed-security signal model is firstly proposed to formally describe the properties and requirements on security and real-time for signals, and then a mixed-integer linear programming (MILP) formulation of SPP security-aware signal packing (SASP) is implemented to solve the tradeoff problem, where the bandwidth utilization is improved and the requirements in both security and real-time are met. Experiments based on both society of automotive engineers (SAE) standard signal set and simulated signal set showed the effectiveness of SASP by comparing with the state-of-the-art algorithm.

     

  • loading
  • [1]
    Furst S. Challenges in the design of automotive software. In: Proceedings of the 2010 Design, Automation and Test in Europe Conference and Exhibition (DATE). Dresden: IEEE, 2010. 256-258
    [2]
    Li R F, Xie Y, and etc. Survery of cyber-physical systems. Journal of Research and Development, 2012, 49(6): 1149-1161 (in Chinese)
    [3]
    Sagstetter F, Lukasiewycz M, Steinhorst S, Wolf M, Bouard A, Harris W R, Jha S, Peyrin T, Poschmann A, Chakraborty S. Security challenges in automotive hardware/software architecture design. In: Proceedings of the 2013 Design, Automation, and Test in Europe Conference and Exhibition (DATE). Grenoble, France: IEEE, 2013. 458-463
    [4]
    Checkoway S, McCoy D, Kantor B, Anderson D, Shacham H, Savage S. Comprehensive experimental analyses of automotive attack surfaces. In: Proceedings of the 20th USENIX Conference on Security [Online], available: https://www.usenix.org/legacy/events/sec11/tech/full papers/Checkoway.pdf, August 8, 2011.
    [5]
    Koscher K, Czeskis A, Roesner F, Patel S, Kohno T, Checkoway S, McCoy D, Kantor B, Anderson D, Shacham H, Savage S. Experimental security analysis of a modern automobile. In: Proceedings of the 2010 IEEE Symposium on Security and Privacy (SP). Oakland, CA: IEEE, 2010. 447-462
    [6]
    Tuohy S, Glavin M, Hughes C, Jones E, Trivedi M, Kilmartin L. Intravehicle networks: a review. IEEE Transactions on Intelligent Transportation Systems, 2015, 16(2): 534-545
    [7]
    Hoppe T, Kiltz S, Dittmann J. Security threats to automotive CAN networks-practical examples and selected short-term countermeasures. Reliability Engineering and System Safety, 2011, 96(1): 11-25
    [8]
    Nilsson D K, Larson U E, Jonsson E. Efficient in-vehicle delayed data authentication based on compound message authentication codes. In: Proceedings of the 68th IEEE Vehicular Technology Conference. Calgary, BC: IEEE, 2008. 1-5
    [9]
    Groza B, Murvay S, van Herrewege A, Verbauwhede I. LiBrA-CAN: a lightweight broadcast authentication protocol for controller area networks. In: Proceedings of the 11th International Conference on Cryptology and Network Security (CANS). Darmstadt: Springer, 2012. 185-200
    [10]
    Han K, Weimerskirch A, Shin K G. Automotive cybersecurity for invehicle communication. IQT Quarterly, 2014, 6(1): 22-25
    [11]
    Sandstrom K, Norstom C, Ahlmark M. Frame packing in real-time communication. In: Proceedings of the 7th International Conference on Real-Time Computing Systems and Applications (RTCSA). Cheju Island: IEEE, 2000. 399-403
    [12]
    Polzlbauer F, Bate I, Brenner E. On extensible networks for embedded systems. In: Proceedings of the 20th IEEE International Conference and Workshops on the Engineering of Computer Based Systems (ECBS). Scottsdale, AZ: IEEE, 2013. 69-77
    [13]
    Polzlbauer F, Bate I, Brenner E. Optimized frame packing for embedded systems. IEEE Embedded Systems Letters, 2012, 4(3): 65-68
    [14]
    Saket R, Navet N. Frame packing algorithms for automotive applications. Journal of Embedded Computing, 2006, 2: 93-102
    [15]
    Pop P, Eles P, Peng Z B. Schedulability-driven frame packing for multicluster distributed embedded systems. ACM Transactions on Embedded Computing Systems, 2005, 4(1): 112-140
    [16]
    Zheng W, Zhu Q, Di Natale M, Vincentelli A S. Definition of task allocation and priority assignment in hard real-time distributed systems. In: Proceedings of 28th IEEE International Real-Time Systems Symposium. Tucson, AZ: IEEE, 2007. 161-170
    [17]
    Zhu Q, Yang Y, Scholte E, Di Natale M, Sangiovanni-Vincentelli A. Optimizing extensibility in hard real-time distributed systems. In: Proceedings of the 15th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS). San Francisco, CA: IEEE, 2009. 275-284
    [18]
    Lin C W, Zhu Q, Phung C, Sangiovanni-Vincentelli A. Securityaware mapping for CAN-based real-time distributed automotive systems. In: Proceedings of the 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD). San Jose, CA: IEEE, 2013. 115-121
    [19]
    Lin C W, Sangiovanni-Vincentelli A. Cyber-security for the controller area network (CAN) communication protocol. In: Proceedings of the 2012 International Conference on Cyber Security. Washington, DC: IEEE, 2012. 1-7
    [20]
    Davis R I, Burns A, Bril R J, Lukkien J J. Controller area network (CAN) schedulability analysis: refuted, revisited and revised. Real-Time Systems, 2007, 35(3): 239-272

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1098) PDF downloads(4) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return