会议论文详细信息
2018 3rd International Conference on Reliability Engineering
Vulnerability verification for illegal attack on secure CAN communication
工业技术(总论)
Nishida, K.^1 ; Nozaki, Y.^1 ; Yoshikawa, M.^1
Department of Information Engineering, Meijo University, 1-501 Shiogamaguchi, Tempaku-ku, Aichi Nagoya
468-8502, Japan^1
关键词: CAN communications;    In-vehicle communication;    In-vehicle systems;    Message authentication;    Replay attack;    Safety evaluations;    Security verification;    Synchronization mechanisms;   
Others  :  https://iopscience.iop.org/article/10.1088/1757-899X/575/1/012012/pdf
DOI  :  10.1088/1757-899X/575/1/012012
学科分类:工业工程学
来源: IOP
PDF
【 摘 要 】

Message authentication using MAC has been proposed in order to prevent illegal attacks against CAN which is the standard of in-vehicle communication protocol. It also prevents replay attacks by inserting counter number in MAC. However, it is difficult to synchronize with counter number. Thus, message authentication cannot be performed correctly. Therefore, the counter synchronization mechanism is required. Regarding in-vehicle system, security verification is important as well as safety evaluation. This study proposes a new replay attack focused on the counter synchronization. This study also implements CAN communication with MAC. Experiments using implemented CAN communication show that the proposed replay attack succeeds. Experiment results indicate that the counter synchronization is a key technique to achieve secure in-vehicle system.

【 预 览 】
附件列表
Files Size Format View
Vulnerability verification for illegal attack on secure CAN communication 1153KB PDF download
  文献评价指标  
  下载次数:14次 浏览次数:10次