2019
DOI: 10.1109/access.2019.2950373
|View full text |Cite
|
Sign up to set email alerts
|

Catch ID if You CAN: Dynamic ID Virtualization Mechanism for the Controller Area Network

Abstract: The controller area network (CAN) is the most widely used in-vehicle network to communicate among electronic control units. However, the CAN does not provide security functionalities, such as encryption or message authentication. Attackers can analyze CAN logs and inject valid messages based on the analysis to cause malfunctions. Thus, security functions appropriate to the CAN environment are required to prevent attacks. In this paper, we propose a dynamic identifier (ID) virtualization method that prevents CA… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 13 publications
(24 reference statements)
0
3
0
Order By: Relevance
“…For IA‐CAN, message ID are encrypted and refreshed for each message during the communication process, thus only ECU with shared keys can receive the message successfully, and masquerade attack and starvation attack can be prevented. Sun et al 81 give a dynamic ID virtualization method that keeps the relative priority order of messages, this can prevents CAN logs from being analyzed and makes it difficult for attackers to generate valid messages. Xia et al 82 extends IA‐CAN with a robust recovery mechanism, and a central monitor node is employed to realize the synchronization and anonymized ID generation.…”
Section: The State‐of‐the‐art Work About Security Protection Of In‐vehicle Networkmentioning
confidence: 99%
“…For IA‐CAN, message ID are encrypted and refreshed for each message during the communication process, thus only ECU with shared keys can receive the message successfully, and masquerade attack and starvation attack can be prevented. Sun et al 81 give a dynamic ID virtualization method that keeps the relative priority order of messages, this can prevents CAN logs from being analyzed and makes it difficult for attackers to generate valid messages. Xia et al 82 extends IA‐CAN with a robust recovery mechanism, and a central monitor node is employed to realize the synchronization and anonymized ID generation.…”
Section: The State‐of‐the‐art Work About Security Protection Of In‐vehicle Networkmentioning
confidence: 99%
“…However, there are maximum chances of content retrieval delay because of encryption and decryption of keys at each node. Security credential management system (SCMS) is presented in [16]. This system is in the transition phase and develops a dynamic identifier (ID) virtualization method.…”
Section: Wireless Communications and Mobile Computingmentioning
confidence: 99%
“…CAN is a suitable protocol for communicating a large number of short messages with high reliability between a controller and other devices without a host computer. However, CAN has also several weaknesses like the absence of security functions [3,4]. Additionally, it can induce some problems in control systems because of its time-varying delay (like stimulating torsional oscillations in the integrated motor-transmission system) [5][6][7].…”
Section: Introductionmentioning
confidence: 99%