2018 3rd International Conference on Reliability Engineering | |
Vulnerability verification for illegal attack on secure CAN communication | |
工业技术(总论) | |
Nishida, K.^1 ; Nozaki, Y.^1 ; Yoshikawa, M.^1 | |
Department of Information Engineering, Meijo University, 1-501 Shiogamaguchi, Tempaku-ku, Aichi Nagoya | |
468-8502, Japan^1 | |
关键词: CAN communications; In-vehicle communication; In-vehicle systems; Message authentication; Replay attack; Safety evaluations; Security verification; Synchronization mechanisms; | |
Others : https://iopscience.iop.org/article/10.1088/1757-899X/575/1/012012/pdf DOI : 10.1088/1757-899X/575/1/012012 |
|
学科分类:工业工程学 | |
来源: IOP | |
【 摘 要 】
Message authentication using MAC has been proposed in order to prevent illegal attacks against CAN which is the standard of in-vehicle communication protocol. It also prevents replay attacks by inserting counter number in MAC. However, it is difficult to synchronize with counter number. Thus, message authentication cannot be performed correctly. Therefore, the counter synchronization mechanism is required. Regarding in-vehicle system, security verification is important as well as safety evaluation. This study proposes a new replay attack focused on the counter synchronization. This study also implements CAN communication with MAC. Experiments using implemented CAN communication show that the proposed replay attack succeeds. Experiment results indicate that the counter synchronization is a key technique to achieve secure in-vehicle system.
【 预 览 】
Files | Size | Format | View |
---|---|---|---|
Vulnerability verification for illegal attack on secure CAN communication | 1153KB | download |