{"title":"适应FlexRay需求的时间触发认证","authors":"Pal-Stefan Murvay, L. Popa, B. Groza","doi":"10.1145/3360664.3360666","DOIUrl":null,"url":null,"abstract":"Research efforts related to in-vehicle communication security were largely focused on the Controller Area Network (CAN) protocol. While CAN is still the most widely used protocol for building in-vehicle networks, many safety critical functionalities are based on other communication protocols such as FlexRay or Ethernet which constantly expand their use inside vehicles. In this paper we address the problem of authenticating transmissions in FlexRay networks. We approach this task by adapting an authentication protocol to the time-triggered nature of FlexRay communication while also accounting for non-deterministic transmissions that may occur in the FlexRay dynamic segment. We illustrate the effects of introducing authentication on keeping strict message deadlines by evaluating our proposal based on a real-life scenario from a major vehicle manufacturer.","PeriodicalId":409365,"journal":{"name":"Proceedings of the Third Central European Cybersecurity Conference","volume":"72 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Accommodating Time-Triggered Authentication to FlexRay Demands\",\"authors\":\"Pal-Stefan Murvay, L. Popa, B. Groza\",\"doi\":\"10.1145/3360664.3360666\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Research efforts related to in-vehicle communication security were largely focused on the Controller Area Network (CAN) protocol. While CAN is still the most widely used protocol for building in-vehicle networks, many safety critical functionalities are based on other communication protocols such as FlexRay or Ethernet which constantly expand their use inside vehicles. In this paper we address the problem of authenticating transmissions in FlexRay networks. We approach this task by adapting an authentication protocol to the time-triggered nature of FlexRay communication while also accounting for non-deterministic transmissions that may occur in the FlexRay dynamic segment. We illustrate the effects of introducing authentication on keeping strict message deadlines by evaluating our proposal based on a real-life scenario from a major vehicle manufacturer.\",\"PeriodicalId\":409365,\"journal\":{\"name\":\"Proceedings of the Third Central European Cybersecurity Conference\",\"volume\":\"72 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-11-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the Third Central European Cybersecurity Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3360664.3360666\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the Third Central European Cybersecurity Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3360664.3360666","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Accommodating Time-Triggered Authentication to FlexRay Demands
Research efforts related to in-vehicle communication security were largely focused on the Controller Area Network (CAN) protocol. While CAN is still the most widely used protocol for building in-vehicle networks, many safety critical functionalities are based on other communication protocols such as FlexRay or Ethernet which constantly expand their use inside vehicles. In this paper we address the problem of authenticating transmissions in FlexRay networks. We approach this task by adapting an authentication protocol to the time-triggered nature of FlexRay communication while also accounting for non-deterministic transmissions that may occur in the FlexRay dynamic segment. We illustrate the effects of introducing authentication on keeping strict message deadlines by evaluating our proposal based on a real-life scenario from a major vehicle manufacturer.