Experimental analysis and implementation of bit level permutation instructions for embedded security

With the increasing use of electronic control units (ECU’s) in automobile or in any embedded system security becomes an area of grave concern. Information is exchanged between ECU’s over a CAN (Control Area Network) bus, vehicle to infrastructure (V2I) and vehicle to vehicle (V2V) communication. These interactions open a wide gateway for manipulating information which could lead to disastrous results. EVITA, SEVECOM, SHE are existing security models to address these concerns in automobiles but at the cost of huge footprint area and more power consumption as it uses cryptographic engines like AES-128,ECC, HMAC. We propose the use of bit level permutation GRP (group operations) in cryptographic environment which not only accelerates cryptography but also has a positive impact of providing low cost security solution that is having good encryption standards, relatively less footprint area, less cost and low power consumption. Use of GRP in cryptographic environment is a unique solution for all security applications where footprint area and power consumption are constraints .This paper shows implementation of GRP in embedded C, over a CAN bus on ARM7(LPC2129) and on FPGA. It is the first successful attempt to have universal and optimized structure of GRP and its implementation. Measures on side channel attacks on GRP like differential power analysis (DPA) are incorporated in this paper. This architecture with the use of bit permutation instruction will pave a new way in securing small scale embedded system. Key-Words: Security, Automobile, Embedded system, GRP, CAN bus, ECU

[1]  Josep Domingo-Ferrer,et al.  Trustworthy Privacy-Preserving Car-Generated Announcements in Vehicular Ad Hoc Networks , 2009, IEEE Transactions on Vehicular Technology.

[2]  Ruby B. Lee,et al.  Bit permutation instructions for accelerating software cryptography , 2000, Proceedings IEEE International Conference on Application-Specific Systems, Architectures, and Processors.

[3]  Hendrik Schweppe Securing car2X applications with effective hardware-software co-design for vehicular on-board networks , 2011 .

[4]  Ronald L. Rivest,et al.  On permutation operations in cipher design , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[5]  P Karthigaikumar,et al.  Hardware Implementation of Low Power Audio Sub word Sorter Unit for High SecurityTransmission , 2009 .

[6]  Patrick Schaumont,et al.  Domain-Specific Codesign for Embedded Security , 2003, Computer.

[7]  Stefan Kowalewski,et al.  Hardware/Software Design Considerations for Automotive Embedded Systems , 2008, IEEE Transactions on Industrial Informatics.

[8]  Matti Valovirta,et al.  Experimental Security Analysis of a Modern Automobile , 2011 .

[9]  Ruby B. Lee,et al.  Subword sorting with versatile permutation instructions , 2002, Proceedings. IEEE International Conference on Computer Design: VLSI in Computers and Processors.

[10]  Patrick Schaumont,et al.  Using Virtual Secure Circuit to Protect Embedded Software from Side-Channel Attacks , 2013, IEEE Transactions on Computers.

[11]  Patrick Schaumont,et al.  Securing embedded systems , 2006, IEEE Security & Privacy.

[12]  Ludovic Apvrille,et al.  Secure automotive on-board electronics network architecture , 2010 .