The automobile industry is no longer relying on pure mechanical systems; instead, it benefits from advanced Electronic Control Units (ECUs) in order to provide new and complex functionalities in the effort to move toward fully connected cars. However, connected cars provide a dangerous playground for hackers. Vehicles are becoming increasingly vulnerable to cyber attacks as they come equipped with more connected features and control systems. This situation may expose strategic assets in the automotive value chain. In this scenario, the Controller Area Network (CAN) is the most widely used communication protocol in the automotive domain. However, this protocol lacks encryption and authentication. Consequently, any malicious/hijacked node can cause catastrophic accidents and financial loss. Starting from the analysis of the vulnerability connected to the CAN communication protocol in the automotive domain, this paper proposes EXT-TAURUM P2T a new low-cost secure CAN-FD architecture for the automotive domain implementing secure communication among ECUs, a novel key provisioning strategy, intelligent throughput management, and hardware signature mechanisms. The proposed architecture has been implemented, resorting to a commercial Multi-Protocol Vehicle Interface module, and the obtained results experimentally demonstrate the approach's feasibility.
翻译:汽车工业不再依赖纯机械系统;相反,它受益于先进的电子控制单位(ECUS),以提供新的复杂功能,努力走向完全连通的汽车;然而,连通汽车为黑客提供了一个危险的游乐场;车辆越来越容易受到网络袭击,因为它们配备了更相联的功能和控制系统;这种情况可能会暴露汽车价值链中的战略资产;在这种情况下,控制区网络(CAN)是汽车领域最广泛使用的通信协议;然而,这一协议缺乏加密和认证;因此,任何恶意/劫持节点都可能造成灾难性事故和财政损失;从分析汽车领域与CAN通信协议有关的脆弱性开始,本文建议EXTAURUM P2T为汽车领域实施安全通信的新低成本的CAN-FD架构,这是一个新型的关键提供战略,智能吞吐管理,硬件签名机制;拟议的架构已经实施,采用商业多议定书车辆界面模块,并获得结果实验性地展示了该办法的可行性。