Probing Attacks on Physical Layer Key Agreement for Automotive Controller Area Networks (Extended Version)

10/16/2018
by   Shalabh Jain, et al.
0

Efficient key management for automotive networks (CAN) is a critical element, governing the adoption of security in the next generation of vehicles. A recent promising approach for dynamic key agreement between groups of nodes, Plug-and-Secure for CAN, has been demonstrated to be information theoretically secure based on the physical properties of the CAN bus. In this paper, we illustrate side-channel attacks, leading to nearly-complete leakage of the secret key bits, by an adversary that is capable of probing the CAN bus. We identify the fundamental characteristics that lead to such attacks and propose techniques to minimize the information leakage at the hardware, controller and system levels.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/26/2020

Secure and Reliable Key Agreement with Physical Unclonable Functions

Different transforms used in binding a secret key to correlated physical...
research
12/11/2019

Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers

Since their introduction over two decades ago, physical side-channel att...
research
12/01/2021

Wiretap Secret Key Agreement Via Secure Omniscience

In this paper, we explore the connection between secret key agreement an...
research
02/02/2021

Secret Key Agreement and Secure Omniscience of Tree-PIN Source with Linear Wiretapper

While the wiretap secret key capacity remains unknown for general source...
research
03/08/2023

An Observer-Based Key Agreement Scheme for Remotely Controlled Mobile Robots

Remotely controlled mobile robots are important examples of Cyber-Physic...
research
09/18/2023

Modulation to the Rescue: Identifying Sub-Circuitry in the Transistor Morass for Targeted Analysis

Physical attacks form one of the most severe threats against secure comp...
research
03/11/2021

ComPass: Proximity Aware Common Passphrase Agreement Protocol for Wi-Fi devices Using Physical Layer Security

Secure and scalable device provisioning is a notorious challenge in Wi-F...

Please sign up or login with your details

Forgot password? Click here to reset