Security Authentication System for In-Vehicle Network



Similar documents
Comparison of FlexRay and CAN-bus for Real-Time Communication

Development of Scalable CAN Protocol

LOCAL INTERCONNECT NETWORK (LIN)

Key Hopping A Security Enhancement Scheme for IEEE WEP Standards

In-Vehicle Networking

How to Hack Your Mini Cooper: Reverse Engineering CAN Messages on Passenger Automobiles

Introduction to. LIN (Local Interconnect Network)

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

Fixity Checks: Checksums, Message Digests and Digital Signatures Audrey Novak, ILTS Digital Preservation Committee November 2006

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

OSI Layers in Automotive Networks

Software Development for Multiple OEMs Using Tool Configured Middleware for CAN Communication

LIN (Local Interconnect Network):

Vehicular Networks Security, Vulnerabilities and Countermeasures. Master of Science Thesis in the program Networks and Distributed Systems

In-Vehicular Communication Networking Protocol

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

The Secure Sockets Layer (SSL)

Local Interconnect Network Training. Local Interconnect Network Training. Overview

Vehicular On-board Security: EVITA Project

AUTOMOTIVE FIELDBUS TECHNOLOGY: DEVELOPMENT TOOLS AND ELECTRONIC EQUIPMENT FOR LABORATORY PRACTICES

Fighting product clones through digital signatures

OCTANE: Open Car Testbed And Network Experiments Bringing Cyber-Physical Security Research to Researchers and Students

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, Developed by: Smart Card Alliance Identity Council

CS 336/536 Computer Network Security. Summer Term Wi-Fi Protected Access (WPA) compiled by Anthony Barnard

Authentication Application

Vorlesung Kommunikationsnetze Fieldbus Systems

Fieldbus Protocol For Secured Wireless Sensor Network Communication in Process Automation

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security

Bus Data Acquisition and Remote Monitoring System Using Gsm & Can

Making model-based development a reality: The development of NEC Electronics' automotive system development environment in conjunction with MATLAB

Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

GSM and UMTS security

Denial of Service Prevention in Satellite Networks

Security vulnerabilities in the Internet and possible solutions

Secure Key Management A Key Feature for Modern Vehicle Electronics

Performance Oriented Management System for Reconfigurable Network Appliances

Chapter 9 Key Management 9.1 Distribution of Public Keys Public Announcement of Public Keys Publicly Available Directory

ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

An Automated Data Structure Migration Concept - From CAN to Ethernet/IP in Automotive Embedded Systems (CANoverIP)

SPINS: Security Protocols for Sensor Networks

Embedding Trust into Cars Secure Software Delivery and Installation

Wireless Networks. Welcome to Wireless

Standardized software components will help in mastering the. software should be developed for FlexRay were presented at

UPPER LAYER SWITCHING

User Authentication Job Tracking Fax Transmission via RightFax Server Secure Printing Functions HDD/Memory Security Fax to Ethernet Connection Data

User Authentication Job Tracking Fax Transmission via RightFax Server Secure Printing Functions HDD/Memory Security Fax to Ethernet Connection

Lecture II : Communication Security Services

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

An Automated Model Based Design Flow for the Design of Robust FlexRay Networks

Securing VoIP Networks using graded Protection Levels

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Biometric Authentication Platform for a Safe, Secure, and Convenient Society

Side Channel Analysis and Embedded Systems Impact and Countermeasures

Wireless Sensor Networks Chapter 14: Security in WSNs

Books and Beyond. Erhan J Kartaltepe, Paul Parker, and Shouhuai Xu Department of Computer Science University of Texas at San Antonio

Patterns for Secure Boot and Secure Storage in Computer Systems

Client Server Registration Protocol

SHE Secure Hardware Extension

ISO11783 a Standardized Tractor Implement Interface

CUNSHENG DING HKUST, Hong Kong. Computer Security. Computer Security. Cunsheng DING, HKUST COMP4631

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Security in Wireless Local Area Network

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

CS 356 Lecture 29 Wireless Security. Spring 2013

Performance Analysis of Time-Triggered Ether-Networks Using Off-The-Shelf-Components

Bluetooth in Automotive Applications Lars-Berno Fredriksson, KVASER AB

Analysis of Performing Secure Remote Vehicle Diagnostics

Packet Level Authentication Overview

SCADA System Security, Complexity, and Security Proof

10 Secure Electronic Transactions: Overview, Capabilities, and Current Status

Secure Authentication and Session. State Management for Web Services

CRYPTOGRAPHY IN NETWORK SECURITY

Automotive Communication Network Trends

Industrial Networks & Databases

Keeping SCADA Networks Open and Secure DNP3 Security

UVOIP: CROSS-LAYER OPTIMIZATION OF BUFFER OPERATIONS FOR PROVIDING SECURE VOIP SERVICES ON CONSTRAINED EMBEDDED DEVICES

ontroller LSI with Built-in High- Performance Graphic Functions for Automotive Applications

chap18.wireless Network Security

Problems of Security in Ad Hoc Sensor Network

An Overview of ZigBee Networks

Authentication and Security in IP based Multi Hop Networks

Lecture 17 - Network Security

How To Secure Wireless Networks

Securing IP Networks with Implementation of IPv6

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

FPGA Implementation of IP Packet Segmentation and Reassembly in Internet Router*

Threat Modeling. Frank Piessens ) KATHOLIEKE UNIVERSITEIT LEUVEN

EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications

USB Portable Storage Device: Security Problem Definition Summary

Authentication requirement Authentication function MAC Hash function Security of

Transcription:

UTOMOTIVE Security uthentication System for In-Vehicle Network Hiroshi UED*, Ryo URCHI*, Hiroaki TD, Tomohiro MIZUTNI, Masayuki INOUE and Satoshi HORIHT ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- One of the main concerns for the security of in-vehicle data is spoofing messages on the in-vehicle network. Controller rea Network (CN) is the most extensively embedded network protocol in vehicles. In the last decade, security attacks in vehicles have been increasing and have been reported in several papers. Therefore, security measures are expected that meet the requirements of real time and cost constraint for in-vehicle control network. In this paper, we propose centralized authentication system in CN with improved CN controller. Our experimental results demonstrate that our proposal method is effective on real in-vehicle network environments. ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- eywords: embedded security, in-vehicle control network, Controller rea Network (CN) 1. Introduction n automobile produced today may be equipped with more than 70 electronic control units (ECUs) (1) that are controlled via a controller area network (CN), (2) local interconnect network (LIN), (3) FlexRay, (4) or other suitable network. While CN is the most popular protocol among in-vehicle control networks and is used in most of the vehicles on the market, the vulnerability of this protocol to security threats has been pointed out. Falsification of meter readings, disablement of brake function, and other unauthorized control by a spoofed message injected into the network have been demonstrated as case examples of attacks on CN. (5) In addition, the maximum data transfer rate of CN is 1 Mbps and the maximum payload of a message is 8 bytes. Due to these properties, it is difficult for CN to directly use the security measures that have been developed for consumer products. In this paper, the authors propose a centralized CN security monitoring system comprising an improved CN controller.* 1 In a timing verification test of a prototype substrate comprising a field-programmable gate array (FPG), we demonstrated that the system proposed here is practicable. message on a CN bus as needed, it is easy to add CN messages and nodes. (3) rbitration of transmission right When two or more nodes transmit messages on a CN bus at the same time, the transmission right is arbitrated based on CN-ID. fter the arbitration, the CN message containing the message with the highest priority is transmitted first. s a result, transmission of lower-priority messages is delayed until higher priority messages are sent out. 2-2 Security risk of CN From the attack cases (5) experienced in the past, the following two use cases can be supposed as possible spoofing attacks on CN. Use case 1: Unauthorized alteration of ECU software Figure 1 shows an example of spoofed message transmission by an ECU after its authorized program is replaced by a malicious program. Program is replaced by a malicious program 2. Security Risk of CN ECU 1 ECU 2 ECU 3 ECU4 2-1 Features of CN CN is a communication protocol widely used for in-vehicle control systems. This protocol was standardized by ISO 11898 and ISO 11519 with a focus on the first and second layers of the OSI reference model. The following are the principal features of CN: (1 ) Bus topology CN is widely used in a bus topology that two or more ECUs are connected to a communication line. (2) Multi-master Since each node can immediately transmit a CN CN message Fig. 1. Replacement of authorized ECU program by malicious program Use case 2: Connection of unauthorized device Figure 2 shows an example of spoofed message transmission by an unauthorized device connected on a CN bus. SEI TECHNICL REVIEW NUMBER 81 OCTOBER 2015 5

CN ECU 1 ECU 2 ECU 3 3. Security Measure for CN Unauthorized device CN message Fig. 2. Connection of unauthorized device on CN bus 3-1 Conventional research In the recent situation in which many case examples of attacks on in-vehicle control systems are reported, a lot of research has been conducted on developing effective measures for protecting the control systems from attacks. (6)-(10) However, these measures have the same problem that all nodes on the network must implement the measures. 3-2 The method proposed in this paper: security monitoring system The security monitoring that we propose in this paper is schematically illustrated in Figure 3. The CN protocol is vulnerable to spoofing attacks since it has no authentication system as described before. The monitoring system proposed here uses message authentication code (MC)* 2 that is the generally effective against spoofing. The objective of the proposed security monitoring system is to prepare against spoofing attacks. In particular, a monitoring node authenticates each ECU and verifies the message authentication codes assigned to the CN messages. It is essential to install a special purpose CN controller in the monitoring node. the calculated MC to the payload and transmits the data frame. The monitoring node refers to the CRC, * 3 and then verifies the MC using the same encryption key as that used for each transmission node. If the new CN controller detects a spoofed message, the controller overwrites the message using an error frame. The security monitoring system proposed here consists of the following two phases: ( 1 ) Phase of node authentication and key delivery (2) Phase of monitoring spoofed message and overwriting the message with error frame on a real time basis In the systems that have conventionally been researched, the key delivery mechanisms are very complicated and impose a large communication load onto the CN buses. Therefore, these systems are unacceptable for in-vehicle control systems that require realtime data processing. For vehicle applications, simple authentication and key delivery protocol are essential to reduce calculation time. 3-3 Mutual authentication of node and key exchange Since our security monitoring system does not encrypt the payload of the data frame, it is unnecessary for all nodes to have an identical encryption key. Therefore, we determined to use a challenge response system for authentication between the monitoring node and each transmission node (ECU). To describe it more concretely, we use the following mutual authentication sequence (Figure 4). Monitoring node Transmission node (1)Transmission of random seed to generate digest (2) Generation of digest (2) Generation of digest Monitoring node ey information of each ECU Improved ey i CN ey controller j ey k ECU3 ECU2 ECU1 ey being generated during authentication ey i Data MC CRC Start of message transmission processing Calculation of MC i ssignment of MC i Malicious device CN message (3) Request of authentication (Transmission of a part of digest) Coincidence of digests? (4) Response from transmission node (Transmission of the remaining part of digest) NO uthentication error CN message Unauthorized message NO Coincidence of digests? Monitoring node detects unauthorized message and destroy it uthentication error Success in mutual authentication and key exchange Fig. 3. Proposed security monitoring system Fig. 4. Protocol for mutual authentication and key exchange The special purpose CN controller uses an error frame to overwrite spoofed messages on a real time basis. The advantage of the proposed security monitoring system is that the only new hardware required is the monitoring node on the CN bus. For other ECUs, only the software for node authentication and key exchange needs to be modified. transmission node (authorized ECU) calculates the MC using an encryption key and gives a part of ( 1 ) The monitoring node transmits a random seed to the transmission node. (2) fter the transmission node receives the random seed from the monitoring node, both nodes calculate the digest. hash function* 4 is usually used for the digest calculation. (3) The monitoring node transmits a part of the digest to the transmission node. 6 Security uthentication System for In-Vehicle Network

(4) The transmission node calculates the digest and compares it with the part of the digest transmitted from the monitoring node. When the two digests are equal to each other, the transmission node transmits the subsequent digests to the monitoring node. (5) The monitoring node conducts authentication by calculating the digest and comparing it with the part of the digest received from the transmission node. 3-4 Pre-shared information and encryption key The security monitoring system we propose here assumes that no tamper-resistant* 5 memory is installed in the transmission node. Under the above assumption, we use a program code and ROM information containing a unique ID as a pre-shared key. This means that the monitoring node is required to have all transmission node programs. However, in practice, the monitoring node can reduce memory usage by having several kinds of preliminarily calculated authentication codes. We used the SH-256 hash function to demonstrate our security monitoring system. However, many other methods can be used for our system. The details of the encryption key are described below. ( 1 ) Pre-shared information We used a program code as pre-shared information to simplify the demonstration. In this case, authentication code generation time depended on program size. Since the leakage of program code is a shortcoming of our system, the effects of leakage must be minimized. In an actual use environment, it is preferable for all ECUs to individually have a key as shared information. Generation of an authentication code is expressed by the following formula: UTHEYI = SH256 (MSG NONCE) UTHEYI represents the authentication code of transmission nodei and the SH256 function represents a function for SH-256 hash calculation. MSG represents the program code of the transmission node and NONCE represents a random seed. (2) MC generation/verification key In the security monitoring system proposed in this paper, the remaining part of the above-described UTHEYI is used as the MC generation/verification key. In consequence, a 128 bit MC generation key was mounted. 3-5 uthentication message The security monitoring system proposed here separates the message transmission frame from the authentication information transmission frame. The difference between the CN message used for our system and a generally used CN message is shown in Figure 5. For the CN message in our system, a part of the MC is given to a part of the payload. However, the payload is not encrypted. In the mutual authentication shown in Fig. 4, a part of the generated digest is given to the whole payload. 3-6 Operation of monitoring node In a generally used CN protocol, all reception nodes use a CN controller to perform CRC check and thus to detect transmission errors. In our system, the MC is given to a part of the payload to assure the Generally used CN (message) Proposed system (message) Proposed system (authentication) Payloads CN Header Payloads CRC C EOF CN Header Payloads MC CRC C EOF CN Header uthentication CRC C EOF Fig. 5. CN protocol of proposed security monitoring system CN Header Payloads MC CRC C EOF HMC keys (512 bits) HMC results (256 bits) Fig. 6. HMC calculation timing integrity of the CN message, as shown in Figure 6. The role of the MC is to protect data from spoofing on the in-vehicle network. For the purpose of maintaining interchangeability with existing CN controllers, our system does not replace CRC with the MC. When the monitoring node receives a message, the node checks the CN-ID to judge whether or not the MC has been given to the message. When the MC has been given to the message, the monitoring node immediately calculates the HMC to verify the MC. t this point of time, no node has transmitted an C signal to the CN bus. However, if the monitoring node detects the MC error, the node overwrites the spoofed message with the error frame up to the end of frame (EOF). Thus, substitutional verification of the MC by the monitoring node makes it possible for our system to obstruct the transmission of spoofed messages without verifying the MC by all reception nodes. Our system is also able to prevent replay attacks by giving a part of monotonic counter* 6 to the payload. 3-7 HMC algorithm The security monitoring system we propose here uses the following HMC function: CalcMCi = HMC (IDi, Di, FCi, eyi) The HMC function is a hash function resembling HMC-SH256. IDi represents a CN-ID. Di represents a part of a payload after MCi and LCi are removed. FCi represents a complete monotonic counter for message i. eyi represents the encryption key (UTHEYI) for the transmission nodei. Monitoring node checks MC in this time period SEI TECHNICL REVIEW NUMBER 81 OCTOBER 2015 7

4. Security and Performance nalysis 4-1 Integrity of message The security strength of a HMC increases as the length of the MC increases. For the protocols of PCs and other devices that use SH-256, the length of the MC is 32 bytes. However, since the maximum payload of the CN is 8 bytes, it is impossible to accommodate all MCs in a single frame. We determined to set the length of the MC at 1 byte. For a MC of 1 byte in length, the total number of necessary attacks on a particular message is 2 8. Therefore, the probability of successful spoofing by random attack is 1/2 8, which means that 2 8 messages must be transmitted until the attack succeeds. Though this figure is not enough to perfectly guarantee the security of the CN, rotating the keys after transmission of several messages and other additional preventive measures will make it more difficult to attack the CN by spoofing. 4-2 Real-time limitation Real-time limitation has no direct relationship with security but is important for in-vehicle control systems. (1) Number of messages necessary for authentication and key exchange s the number of nodes increases by one, the number of messages necessary for authentication and key exchange increases by two. One is the message transmitted from the monitoring node (request for authentication in Fig. 4), and the other is the message transmitted from the added node (authentication response in Fig. 4). s described above, the number of messages differs depending on the number of nodes to be authenticated. The number of messages can be calculated from 2 n (n: the number of nodes to be authenticated). (2) Overhead by MC The system design engineer in charge can determine the length of MC. We conducted calculations on the assumption that the length of MC would be 1 byte. Since the length of the counter for preventing replay attacks is 4 bits, an overhead with a total of 12 bits is created. This overhead accounts for 19% of the total payloads and falls within the range of the extension identifier (18 bits) of the frame. Therefore, this overhead is considered to be fully acceptable for actual vehicles. 5. Mounting Evaluation Results for Proposed Security Monitoring System To demonstrate the above-described protocol and system, we used an ltera FPG development board and CN transceiver board. The CN controller with built-in HMC, which is the most outstanding feature of our system, was mounted on an FPG. The FPG development board used for the evaluation (DE2-115 development and education board) comprised a 512-kbyte FLSH memory and 20-kbyte RM. The actual evaluation environment is shown in Photo 1. In this evaluation environment, the time necessary to inspect a MC with a single reception frame was measured to be approximately 2.12 µs. When the transfer rate of the CN is assumed to be 1 Mbps, the inspection time falls within 3 bit time. In other words, an error frame can be transmitted within 9 bit time (the sum of C (2 bit time) and EOF (7 bit time)), which is the time necessary to calculate the CRC of the CN message, inspect the MC, and overwrite the MC with the error frame. s described above, it was confirmed from the mounting evaluation that the security monitoring system proposed here has a sufficiently feasible performance. 6. Conclusions ttacks on in-vehicle control units via in-vehicle control networks have been reported recently and various measures for protecting the networks from attacks have been proposed. However, most of these measures must be implemented for every node. In this paper, we proposed a centralized security monitoring system and discussed its demonstration results. In future, we will demonstrate the effectiveness of key exchange to verify that our system works even in environments closer to actual in-vehicle environments. FlexRay is a trade mark or registered trade mark of Daimler G, a German company, in Germany and other countries. * 1 * 2 Photo 1. Evaluation environment Technical Terms CN controller: controller that realizes the function of a CN protocol. Message uthentication Code (MC): n authentication technique for confirming that the messages from a communication partner have not been tampered. This technique is used to verify and authenticate the integrity of messages. 8 Security uthentication System for In-Vehicle Network

* 3 CRC: Standing for cyclic redundancy check, CRC is a technique used mainly to detect data transfer errors. Since there is always the possibility that the same numerical values are output from different data, it is inappropriate to use output as a substitute for a hash value. * 4 Hash function: function for compressing a string of characters to certain length of data. The values calculated from this function are called hash values or simply hash. SH-1 and SH-256 are typical hash functions. Since both of the functions are one-way functions, it is impossible to determine the original sentences from the generated data. * 5 Tamper resistance: Difficulty of analyzing internal structures and stored data. The capability to prevent reading of confidential data by unauthorized means is called tamper resistance. * 6 Monotonic counter: counter that monotonically increases the reading. References (1) J. Leohold, Communication Requirements for utomotive Systems, 5th IEEE Workshop Factory Communication Systems (2004) (2) International Organization for Standardization, Road vehicles - Controller area network (CN) - Part 1: Data link layer and physical signaling, ISO11898-1 (2003) (3) International Organization for Standardization, Road vehicles - Local Interconnect Network (LIN) - Part 1: General information and use case definition, ISO/DIS 17987-1 (4) International Organization for Standardization, Road vehicles - Communication on FlexRay - Part 1: General information and use case definition, ISO10681-1 (2010) (5). oscher,. Czeskis, F. Roesner, S. Patel, T. ohno, S. Checkoway, D. McCoy, B. antor, D. nderson, H. Shacham, S. Savage, Experimental Security nalysis of a Modern utomobile, IEEE Symposium on Security and Privacy (2010) (6). V.Herrewege, D. Singelee, I. Verbauwhede, CNuth - Simple, Backward Compatible Broadcast uthentication Protocol for CN bus, Embedded Security in Cars 9th, Dresden, Germany (Nov. 2011) (7). Hazem, Hossam.. H. Fahm, LCP - Lightweight CN uthentication Protocol for Security In-Vehicle-Networks, Embedded Security in Cars 10th, Berlin, Germany (Nov. 2012) (8) O. Hartkopp, C. Reuber, R. Schilling, MaCN - Message uthenticated CN, Embedded Security in Cars 10th, Berlin, Germany (Nov. 2012) (9) T. Hoppe, S. iltz, J. Dittmann, Security threats to automotive CN networks - Practical examples and selected short-term countermeasures, Proceedings of the 27th international conference on Computer Safety, Reliability, and Security, SFECOMP 08, pp. 235-248 (2009) (10) T. Matsumoto, M. Hata, M. Tanabe,. Yoshioka, Method of Preventing Unauthorized Data Transmission in Controller rea Network, Vehicular Technology Conference (VTC Spring), 2012 IEEE 75th (2012) Contributors (The lead author is indicated by an asterisk (*).) H. UED* Manager, Information Network R&D Division, utonetworks Technologies, Ltd. R. URCHI* Ph.D. Designated ssistant Professor, Center for Embedded Computing Systems,Graduate School of Information Science, Nagoya University H. TD Ph.D. Executive Director, Center for Embedded Computing Systems, Graduate School of Information Science, Nagoya University T. MIZUTNI Information Network R&D Division, utonetworks Technologies, Ltd. M. INOUE ssistant Senior Manager, Information Network R&D Division, utonetworks Technologies, Ltd. S. HORIHT Senior Manager, Information Network R&D Division, utonetworks Technologies, Ltd. SEI TECHNICL REVIEW NUMBER 81 OCTOBER 2015 9