EC-SVC: Secure CAN Bus In-Vehicle Communications with Fine-grained Access Control Based on Edge Computing

10/28/2020
by   Donghyun Yu, et al.
0

In-vehicle communications are not designed for message exchange between the vehicles and outside systems originally. Thus, the security design of message protection is insufficient. Moreover, the internal devices do not have enough resources to process the additional security operations. Nonetheless, due to the characteristic of the in-vehicle network in which messages are broadcast, secure message transmission to specific receivers must be ensured. With consideration of the facts aforementioned, this work addresses resource problems by offloading secure operations to high-performance devices, and uses attribute-based access control to ensure the confidentiality of messages from attackers and unauthorized users. In addition, we reconfigure existing access control based cryptography to address new vulnerabilities arising from the use of edge computing and attribute-based access control. Thus, this paper proposes an edge computing-based security protocol with fine-grained attribute-based encryption using a hash function, symmetric-based cryptography, and reconfigured cryptographic scheme. In addition, this work formally proves the reconfigured cryptographic scheme and security protocol, and evaluates the feasibility of the proposed security protocol in various aspects using the CANoe software.

READ FULL TEXT

page 1

page 10

research
11/12/2021

A lightweight blockchain-based access control scheme for integrated edge computing in the internet of things

In view of the security issues of the Internet of Things (IoT), consider...
research
09/23/2019

LEAP: A Lightweight Encryption and Authentication Protocol for In-Vehicle Communications

The Controller Area Network (CAN) is considered as the de-facto standard...
research
01/25/2021

SEA-BREW: A Scalable Attribute-Based Encryption Scheme for Low-Bitrate IoT Wireless Networks

Attribute-Based Encryption (ABE) is an emerging cryptographic technique ...
research
02/26/2019

NAC: Automating Access Control via Named Data

In this paper we present the design of Name-based Access Control (NAC) s...
research
03/04/2020

Sporadic Ultra-Time-Critical Crowd Messaging in V2X

Life-critical warning message, abbreviated as warning message, is a spec...
research
07/20/2021

Secure Access Control for DAG-based Distributed Ledgers

Access control is a fundamental component of the design of distributed l...
research
08/31/2022

Wiggle: Physical Challenge-Response Verification of Vehicle Platooning

Autonomous vehicle platooning promises many benefits such as fuel effici...

Please sign up or login with your details

Forgot password? Click here to reset