| Literature DB >> 35062608 |
Bin Ma1, Shichun Yang1, Zheng Zuo1, Bosong Zou2, Yaoguang Cao1, Xiaoyu Yan1, Sida Zhou1, Jichong Li1.
Abstract
The rapid development of intelligent networked vehicles (ICVs) has brought many positive effects. Unfortunately, connecting to the outside exposes ICVs to security threats. Using secure protocols is an important approach to protect ICVs from hacker attacks and has become a hot research area for vehicle security. However, most of the previous studies were carried out on V2X networks, while those on in-vehicle networks (IVNs) did not involve Ethernet. To this end, oriented to the new IVNs based on Ethernet, we designed an efficient secure scheme, including an authentication scheme using the Scalable Service-Oriented Middleware over IP (SOME/IP) protocol and a secure communication scheme modifying the payload field of the original SOME/IP data frame. The security analysis shows that the designed authentication scheme can provide mutual identity authentication for communicating parties and ensure the confidentiality of the issued temporary session key; the designed authentication and secure communication scheme can resist the common malicious attacks conjointly. The performance experiments based on embedded devices show that the additional overhead introduced by the secure scheme is very limited. The secure scheme proposed in this article can promote the popularization of the SOME/IP protocol in IVNs and contribute to the secure communication of IVNs.Entities:
Keywords: AEAD; Ethernet; SOME/IP; authentication; in-vehicle network; key agreement; secret; security
Mesh:
Year: 2022 PMID: 35062608 PMCID: PMC8778180 DOI: 10.3390/s22020647
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Principle of the AEAD algorithm.
Figure 2SOME/IP data frame structure.
Figure 3General domain-centralized electrical/electronic architecture.
Notations.
| Notation | Description |
|---|---|
|
| |
|
| safety & security controller as the KMC |
|
| Nonce generated by |
|
| Nonce generated by safety & security controller |
|
| The time when device |
|
| The time when device |
|
| Long-term symmetric key shared between
|
|
| Temporary session key shared between
|
|
| Symmetric encryption using
|
|
| Symmetric decryption using
|
|
| Hash calculation |
|
| Latency for generating a random number |
|
| Latency for performing a symmetric encryption |
|
| Latency for performing a symmetric decryption |
|
| Latency for performing a hash calculation |
Figure 4Initialization phase and registration phase.
Figure 5Proposed authentication scheme.
Figure 6Proposed secure communication scheme.
AEAD algorithms and values of the corresponding sub-header.
| AEAD Algorithm | AES256-GCM | Chacha20-Poly1305 | No AEAD |
|---|---|---|---|
|
| 256 bits | 256 bits | - |
|
| 0 | ||
|
| 0 | 1 | 2 |
|
| 16 Bytes | 16 Bytes | 0 |
|
| variable value | ||
|
| variable value | ||
Figure 7Structure and execution process of Proverif.
Figure 8Application scenarios for the experiment evaluation. (a) Typical Ethernet-based communication structure. (b) Remote Monitoring scenario. (c) Parking Assistance scenario. (d) OTA upgrade scenario.
Figure 9Experimental environment.
Figure 10Data transmission process of the experimental program.
Message length of the authentication scheme.
| Item | Length [Byte] |
|---|---|
| 1 | |
| 8 | |
| 4 | |
|
| 32 |
| Message 1 | 14 |
| Message 2 | 24 |
| Message 3 | 94 |
| Message 4 | 63 |
| Sum | 195 |
Calculation overhead of the authentication scheme.
| Electronic Unit | Action | Overhead |
|---|---|---|
|
| Send | |
| Validate |
| |
|
| Validate |
|
| Send | ||
| Validate |
| |
| Send |
| |
|
| Validate |
|
| Send | ||
| Sum | - |
Figure 11Latency and system resource overheads of the designed authentication scheme.
Figure 12Latency of the designed secure communication scheme.