2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) 2013
DOI: 10.1109/iccad.2013.6691106
|View full text |Cite
|
Sign up to set email alerts
|

Security-aware mapping for CAN-based real-time distributed automotive systems

Abstract: Abstract-Cyber-security is a rising issue for automotive electronic systems, and it is critical to system safety and dependability. Current in-vehicles architectures, such as those based on the Controller Area Network (CAN), do not provide direct support for secure communications. When retrofitting these architectures with security mechanisms, a major challenge is to ensure that system safety will not be hindered, given the limited computation and communication resources. We apply Message Authentication Codes … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
35
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 60 publications
(35 citation statements)
references
References 11 publications
0
35
0
Order By: Relevance
“…However, the presence of tight resource constraints, including limited communication bandwidth and computational resources, and strict timing requirements for system safety and performance, makes it difficult or even impossible to add those security mechanisms after the initial design stages, without violating the system constraints or impeding the system performance [57], [58]. In [59], a general security-aware design methodology is proposed to address automotive security from early design stages, with the consideration of stringent timing and resource constraints.…”
Section: Cyber-physical Automotive Securitymentioning
confidence: 99%
“…However, the presence of tight resource constraints, including limited communication bandwidth and computational resources, and strict timing requirements for system safety and performance, makes it difficult or even impossible to add those security mechanisms after the initial design stages, without violating the system constraints or impeding the system performance [57], [58]. In [59], a general security-aware design methodology is proposed to address automotive security from early design stages, with the consideration of stringent timing and resource constraints.…”
Section: Cyber-physical Automotive Securitymentioning
confidence: 99%
“…Approaches to integrate security in vehicle networks have been proposed in [5] and [6], aiming to improve the security of CAN and FlexRay networks, respectively. A highly efficient approach for including authentication of messages was presented in [7].…”
Section: Related Workmentioning
confidence: 99%
“…The second is to develop formulations and algorithms to effectively explore the design space for optimizing design objectives while meeting all design constraints (which are often in conflict and require careful trade-offs). In [6], a Mixed Integer Linear Programming (MILP) approach is proposed to address security together with other metrics during the design stage for CANbased automotive systems.…”
Section: Introductionmentioning
confidence: 99%
“…It is critically important to address these protocols, as they are being increasingly adopted in various safety-critical systems such as automotive and avionics electronic systems for their more predictable timing behavior. Compared with priority-based networks such as CAN, TDMA-based systems have fundamental differences on system modeling (in particular for latency modeling), on security mechanism selection (global time is available for security reasons), on design space (network scheduling is the focus of this work but not a factor in [6]), and on algorithm design (MILP is not suitable for this work because of modeling complexity). Therefore, the approaches for priority-based systems such as [6] do not apply to TDMA-based systems.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation