DSR-CAAP: A Novel Denial of Service Resilient Channel-Aware Authenticated Key Exchange Protocol Suite for SAE J1939

被引:0
|
作者
Palaniswamy, Basker [1 ]
Karati, Arijit [1 ]
机构
[1] Natl Sun Yat Sen Univ, Dept Comp Sci & Engn, Kaohsiung 80424, Taiwan
关键词
AKEP; autonomous vehicle (AV); denial-of-service (DoS) attack; formal verification; random oracle model (ROM); SAE J1939; Tamarin; SECURITY;
D O I
10.1109/TII.2024.3452758
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The SAE J1939, a higher-layer broadcast communication protocol with ISO 11898-1 specification at its lower layer, has significantly impacted the automobile industry. However, the SAE J1939 frames lack authenticity and secrecy, rendering it vulnerable to denial-of-service (DoS) attacks. While current authentications establish keys among electronic control units (ECUs), they abort ongoing sessions to re-initiate fresh sessions. We present DSR-CAAP, a robust authenticated key exchange protocol that establishes session keys among ECUs without aborting ongoing sessions during DoS and adaptive DoS. DSR-CAAP offers channel-aware key establishment using a hierarchical-challenge response mechanism. It is provably secure under the random oracle model and verified using the Tamarin. The empirical analysis reveals that DSR-CAAP supports comprehensive security attributes with enhanced 3R (robustness, reliability, and resilience) and reduces bus load, communication, computation, and energy costs. Besides, simulation in MATLAB 2023a reveals that DSR-CAAP outperforms existing protocols in communication response time. Thus, DSR-CAAP provides lightweight, secure solutions for in-vehicle heavy-duty vehicles.
引用
收藏
页码:445 / 454
页数:10
相关论文
empty
未找到相关数据