CANTO – Covert AutheNtication with Timing channels over Optimized traffic flows for CAN

11/25/2019
by   Bogdan Groza, et al.
0

Previous research works have endorsed the use of delays and clock skews for detecting intrusions or fingerprinting ECUs on the CAN bus. Similar techniques have been also proposed for establishing a time-covert cryptographic authentication channel, in this way cleverly removing the need for cryptographic material inside the limited payload of CAN frames. The main shortcoming of such works is the limited security level that can be achieved under normal CAN-bus traffic. In this work we endeavour to test the limits of the achievable security level by relying on optimization algorithms for scheduling CAN frames. Under practical bus allocations that are based on real-world scenarios, we are able to extract around 4–5 bits of authentication data from each frame which leads to an efficient intrusion detection and authentication mechanism. By accumulating covert channel data over several consecutive frames, we can achieve higher security levels that are in line with current security demands. To prove the correctness of our approach, we present experiments on state-of-the-art automotive-grade controllers (Infineon Aurix) and bus measurements with the use of industry standard tools, i.e., CANoe.

READ FULL TEXT

page 4

page 5

page 10

research
07/06/2023

A Multi-Factor Homomorphic Encryption based Method for Authenticated Access to IoT Devices

Authentication is the first defence mechanism in many electronic systems...
research
03/14/2019

Authentication by Witness Functions

Witness functions have recently been introduced in cryptographic protoco...
research
03/19/2019

Trends on Computer Security: Cryptography, User Authentication, Denial of Service and Intrusion Detection

The new generation of security threats has been promoted by digital curr...
research
10/05/2009

Statistical Decision Making for Authentication and Intrusion Detection

User authentication and intrusion detection differ from standard classif...
research
12/15/2017

Side-channel based intrusion detection for industrial control systems

Industrial Control Systems are under increased scrutiny. Their security ...
research
03/12/2019

TACAN: Transmitter Authentication through Covert Channels in Controller Area Networks

Nowadays, the interconnection of automotive systems with modern digital ...
research
02/02/2019

Data Exfiltration via Multipurpose RFID Cards and Countermeasures

Radio-frequency identification(RFID) technology is widely applied in dai...

Please sign up or login with your details

Forgot password? Click here to reset