MixCAN: Mixed and Backward-Compatible Data Authentication Scheme for Controller Area Networks

The massive proliferation of state of the art interfaces into the automotive sector has triggered a revolution in terms of the technological ecosystem that is found in today’s modern car. Accordingly, on the one hand, we find dozens of Electronic Control Units (ECUs) running several hundred MB of code, and more and more sophisticated dashboards with integrated wireless communications. On the other hand, in the same vehicle we find the underlying communication infrastructure struggling to keep up with the pace of these radical changes. This paper presents MixCAN (MIXed data authentication for Control Area Networks), an approach for mixing different message signatures (i.e., authentication tags) in order to reduce the overhead of Controller Area Network (CAN) communications. MixCAN leverages the attributes of Bloom Filters in order to ensure that an ECU can sign messages with different CAN identifiers (i.e., mix different message signatures), and that other ECUs can verify the signature for a subset of monitored CAN identifiers. Extensive experimental results based on Vectors Informatik’s CANoe/CANalyzer simulation environment and the data set provided by Hacking and Countermeasure Research Lab (HCRL) confirm the validity and applicability of the developed approach. Subsequent experiments including a test bed consisting of Raspberry Pi 3 Model B+ systems equipped with CAN communication modules demonstrate the practical integration of MixCAN in real automotive systems.

[1]  Liangmin Wang,et al.  NOTSA: Novel OBU With Three-Level Security Architecture for Internet of Vehicles , 2018, IEEE Internet of Things Journal.

[2]  Sang Hyuk Son,et al.  An Attack-Resilient Source Authentication Protocol in Controller Area Network , 2017, 2017 ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS).

[3]  Béla Genge,et al.  Enabling authenticated data exchanges in industrial control systems , 2018, 2018 6th International Symposium on Digital Forensic and Security (ISDFS).

[4]  Michael Mitzenmacher,et al.  Compressed bloom filters , 2001, PODC '01.

[5]  Bogdan Groza,et al.  Security Solutions for the Controller Area Network: Bringing Authentication to In-Vehicle Networks , 2018, IEEE Vehicular Technology Magazine.

[6]  Bogdan Groza,et al.  Efficient Protocols for Secure Broadcast in Controller Area Networks , 2013, IEEE Transactions on Industrial Informatics.

[7]  Dong Hoon Lee,et al.  A Practical Security Architecture for In-Vehicle CAN-FD , 2016, IEEE Transactions on Intelligent Transportation Systems.

[8]  Flavio D. Garcia,et al.  LeiA: A Lightweight Authentication Protocol for CAN , 2016, ESORICS.

[9]  Quynh H. Dang,et al.  Recommendation for Applications Using Approved Hash Algorithms , 2009 .

[10]  Bill Cheswick,et al.  Privacy-Enhanced Searches Using Encrypted Bloom Filters , 2004, IACR Cryptol. ePrint Arch..

[11]  Bogdan Groza,et al.  Identity-Based Key Exchange on In-Vehicle Networks: CAN-FD & FlexRay , 2019, Sensors.

[12]  Ran Canetti,et al.  Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[13]  Ingrid Verbauwhede,et al.  CANAuth - A Simple, Backward Compatible Broadcast Authentication Protocol for CAN bus , 2011 .

[14]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.

[15]  Sherali Zeadally,et al.  Internet of Vehicles: Architecture, Protocols, and Security , 2018, IEEE Internet of Things Journal.

[16]  Yoshiyasu Takefuji Connected Vehicle Security Vulnerabilities [Commentary] , 2018, IEEE Technol. Soc. Mag..

[17]  Sherali Zeadally,et al.  Integration of VANET and 5G Security: A review of design and implementation issues , 2019, Future Gener. Comput. Syst..

[18]  Michiel H. M. Smid,et al.  On the false-positive rate of Bloom filters , 2008, Inf. Process. Lett..

[19]  Jürgen Teich,et al.  CAN+: A new backward-compatible Controller Area Network (CAN) protocol with up to 16× higher data rates. , 2009, 2009 Design, Automation & Test in Europe Conference & Exhibition.

[20]  Hyeokchan Kwon,et al.  Mitigation mechanism against in-vehicle network intrusion by reconfiguring ECU and disabling attack packet , 2018, 2018 International Conference on Information Technology (InCIT).

[21]  Huy Kang Kim,et al.  OTIDS: A Novel Intrusion Detection System for In-vehicle Network by Using Remote Frame , 2017, 2017 15th Annual Conference on Privacy, Security and Trust (PST).

[22]  Christos Tachtatzis,et al.  Cyber-Security Internals of a Skoda Octavia vRS: A Hands on Approach , 2019, IEEE Access.

[23]  Kenneth J. Christensen,et al.  A new analysis of the false positive rate of a Bloom filter , 2010, Inf. Process. Lett..

[24]  Robert Bosch,et al.  CAN with Flexible Data-Rate , 2012 .