2019 IEEE Intelligent Transportation Systems Conference (ITSC) 2019
DOI: 10.1109/itsc.2019.8917500
|View full text |Cite
|
Sign up to set email alerts
|

LEAP: A Lightweight Encryption and Authentication Protocol for In-Vehicle Communications

Abstract: The Controller Area Network (CAN) is considered as the de-facto standard for the in-vehicle communications due to its real-time performance and high reliability. Unfortunately, the lack of security protection on the CAN bus gives attackers the opportunity to remotely compromise a vehicle. In this paper, we propose a Lightweight Encryption and Authentication Protocol (LEAP) with low cost and high efficiency to address the security issue of the CAN bus. LEAP exploits the securityenhanced stream cipher primitive … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 33 publications
(17 citation statements)
references
References 14 publications
0
17
0
Order By: Relevance
“…Also, they provide precise information to prevent damage from malicious adversaries. Some papers (Lu et al , 2019; Lakshmanan and Natarajan, 2019; Wang and Sawhney, 2014; Mundhenk et al , 2017) focus on cryptography method to ensure the network security. This method is one the popular solution which guarantees that the CAN data frame transmitted from one node to another is authorized.…”
Section: Discussionmentioning
confidence: 99%
“…Also, they provide precise information to prevent damage from malicious adversaries. Some papers (Lu et al , 2019; Lakshmanan and Natarajan, 2019; Wang and Sawhney, 2014; Mundhenk et al , 2017) focus on cryptography method to ensure the network security. This method is one the popular solution which guarantees that the CAN data frame transmitted from one node to another is authorized.…”
Section: Discussionmentioning
confidence: 99%
“…There are no additional advantages beyond those analyzed in the game above. Thus, by equations ( 14), ( 17), (19), and (21) we can claim that the advantages of A to the proposed EC-SVC are as given by…”
Section: The Advantage Adv Ec-svcmentioning
confidence: 98%
“…Some studies tried to construct their protocols by considering the real-time constraint of in-vehicle communications. However, they ended up meeting only low-level basic security requirements using symmetric-based cryptographic schemes [9], [11], [16], [17], [19]. Therefore, for secure in-vehicle communications, it is desirable to develop new techniques that give lower computation burden to ECUs, while providing a higher level of security, which is the main objective of this paper.…”
Section: B Motivation and Contributionmentioning
confidence: 99%
“…LEAP [58] attempts to overcome the computational costs of the MAC-based authentication by using a stream cipher, RC4, to encrypt and authenticate CAN messages. It uses a dedicated ECU to store the long-term symmetric keys used for generating the session keys.…”
Section: A Security Based On Authenticationmentioning
confidence: 99%