2014 International Conference on the Internet of Things (IOT) 2014
DOI: 10.1109/iot.2014.7030108
|View full text |Cite
|
Sign up to set email alerts
|

VeCure: A practical security framework to protect the CAN bus of vehicles

Abstract: Vehicles are being revolutionized by integrating modern computing and communication technologies in order to improve both user experience and driving safety. As a result, vehicular systems that used to be closed systems are opening up various interfaces, such as Bluetooth, 3G/4G, GPS, etc., to the outside world, thus introducing new opportunities for cyber attacks. It has been recently demonstrated that modern vehicles are vulnerable to several remote attacks launched through Bluetooth and cellular interfaces,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
62
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 118 publications
(62 citation statements)
references
References 12 publications
0
62
0
Order By: Relevance
“…Malicious device records these identifiers and can launch attacks against other nodes. In [7], an authentication and encryption mechanism is described, but it requires about three times more CPU cycles than the cycles required for normal operation of a CAN node.…”
Section: Stealing Identifiersmentioning
confidence: 99%
“…Malicious device records these identifiers and can launch attacks against other nodes. In [7], an authentication and encryption mechanism is described, but it requires about three times more CPU cycles than the cycles required for normal operation of a CAN node.…”
Section: Stealing Identifiersmentioning
confidence: 99%
“…VeCure [48] authentication, which has an acceptable 50 us processing delay, is based on trust groups where high-trust groups share a symmetric secret key. The method has a major advantage with fewer key numbers, which corresponds in size to the number of trust groups rather than the ECU number.…”
Section: Authenticationmentioning
confidence: 99%
“…Regarding authentication protocols, the general idea relies on using part of the CAN packet to transmit a hash of the message, encrypted through a secret key, alongside a counter (to defend from replay attacks). Although some state-of-the-art proposals like LeiA [24], VatiCAN [3] and VeCure [33] CAN, their downsides are still relevant: the decreases in response times and data bandwidth, generated respectively by the calculation and the transmission of the hash, make the usage of authentication protocols an unfeasible solution in most cases. In fact, their implementation is hardly feasible on less powerful ECUs, such as sensors, due to the computation requirements, while busy networks with many ECUs would suffer from the bandwidth overheads.…”
Section: Related Workmentioning
confidence: 99%