An Efficient Key Management Scheme For In-Vehicle Network

05/24/2023
by   Hsinlin Tan, et al.
0

Vehicle technology has developed rapidly these years, however, the security measures for in-vehicle network does not keep up with the trend. Controller area network(CAN) is the most used protocol in the in-vehicle network. With the characteristic of CAN, there exists many vulnerabilities including lacks of integrity and confidentiality, and hence CAN is vulnerable to various attacks such as impersonation attack, replay attack, etc. In order to implement the authentication and encryption, secret key derivation is necessary. In this work, we proposed an efficient key management scheme for in-vehicle network. In particular, the scheme has five phases. In the first and second phase, we utilize elliptic curve cryptography-based key encapsulation mechanism(KEM) to derive a pairwise secret between each ECU and a central secure ECU in the same group. Then in the third phase, we design secure communication to derive group shared secret among all ECU in a group. In the last two phases, SECU is not needed, regular ECU can derive session key on their own. We presented a possible attack analysis(chosen-ciphertext attack as the main threat) and a security property analysis for our scheme. Our scheme is evaluated based on a hardware-based experiment of three different microcontrollers and a software-based simulation of IVNS. We argue that based on our estimation and the experiment result, our scheme performs better in communication and computation overhead than similar works.

READ FULL TEXT

page 10

page 11

research
09/19/2020

An insecure noninteractive group key establishment scheme

A serious weakness in the recently proposed Chen-Hsu-Harn group authenti...
research
02/04/2020

Encryption Algorithm for TCP Session Hijacking

Distributed network of the computer and the design defects of the TCP pr...
research
12/28/2017

A Secure and Authenticated Key Management Protocol (SA-KMP) for Vehicular Networks

Public key infrastructure (PKI) is the most widely used security mechani...
research
12/04/2020

Dragonblood is Still Leaking: Practical Cache-based Side-Channel in the Wild

Recently, the Dragonblood attacks have attracted new interests on the se...
research
08/02/2018

Efficient and Secure Group Key Management in IoT using Multistage Interconnected PUF

Secure group-oriented communication is crucial to a wide range of applic...
research
08/27/2019

Authenticated Hand-Over Algorithm for Group Communication

Shamir or Blakley secret sharing schemes are used for the authentication...
research
11/03/2020

A novel group based cryptosystem based on electromagnetic rotor machine

In this paper, an algorithm is aimed to make a cryptosystem for gray lev...

Please sign up or login with your details

Forgot password? Click here to reset