Secure in-vehicle systems against Trojan attacks

被引:0
|
作者
Yoshikawa, Masaya [1 ]
Sugioka, Kyota [1 ]
Nozaki, Yusuke [1 ]
Asahi, Kensaku [1 ]
机构
[1] Meijo Univ, Dept Informat Engn, Nagoya, Aichi, Japan
关键词
Security; Embedded system; Lightweight block cipher; CAN communication; Authentication;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recently, driving support technologies, such as inter-vehicle and road-to-vehicle communication technologies, have been practically used. However, a problem has been pointed out that when a vehicle is connected with an external network, the safety of the vehicle is threatened. As a result, the security of vehicle control systems, which greatly affects vehicle safety, has become more important than ever. Ensuring the security of invehicle systems becomes an important priority, similar to ensuring conventional safety. The present study proposes a controller area network (CAN) communications method that uses a lightweight cipher to realize secure in-vehicle systems. The present study also constructs an evaluation system using a field-programmable gate array (FPGA) board and a radio-controlled car. This is used to verify the proposed method.
引用
收藏
页码:29 / 33
页数:5
相关论文
共 50 条
  • [31] Februus: Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems
    Doan, Bao Gia
    Abbasnejad, Ehsan
    Ranasinghe, Damith C.
    36TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2020), 2020, : 897 - 912
  • [32] Secure Learning Algorithm for Multimodal Biometric Systems against Spoof Attacks
    Akhtar, Zahid
    Alfarid, Nasir
    INFORMATION AND NETWORK TECHNOLOGY, 2011, 4 : 52 - 57
  • [33] Secure Control of Multiagent Systems Against Malicious Attacks: A Brief Survey
    He, Wangli
    Xu, Wenying
    Ge, Xiaohua
    Han, Qing-Long
    Du, Wenli
    Qian, Feng
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (06) : 3595 - 3608
  • [34] How Secure are Multicarrier Communication Systems Against Signal Exploitation Attacks?
    Nooraiepour, Alireza
    Hamidouche, Kenza
    Bajwa, Waheed U.
    Mandayam, Narayan
    2018 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2018), 2018, : 201 - 206
  • [35] Quantum key distribution against Trojan horse attacks
    Cai Qing-Yu
    Lv Hua
    CHINESE PHYSICS LETTERS, 2007, 24 (05) : 1154 - 1157
  • [36] Research Progress on Attacks and Defenses Technologies for In-vehicle Network of Intelligent Connected Vehicle
    Chen, Bo-Yan
    Shen, Qing-Ni
    Zhang, Xiao-Lei
    Zhang, Xin
    Li, Cong
    Wu, Zhong-Hai
    Ruan Jian Xue Bao/Journal of Software, 2025, 36 (01): : 341 - 370
  • [37] Defense Against Multi-target Trojan Attacks
    Harikumar, Haripriya
    Rana, Santu
    Do, Kien
    Gupta, Sunil
    Zong, Wei
    Susilo, Willy
    Venkastesh, Svetha
    arXiv, 2022,
  • [38] Band-S: Secure Band to Evade Cram Attacks to Queuing Disciplines for Ethernet-based In-Vehicle Networks
    Kang, Ho
    Cho, Changjo
    Ahn, Sol
    Shin, Jangho
    Jeon, Sanghoon
    Kim, Jong-Chan
    2024 35TH IEEE INTELLIGENT VEHICLES SYMPOSIUM, IEEE IV 2024, 2024, : 1786 - 1791
  • [39] Integrating in-vehicle, vehicle-To-vehicle, and intelligent roadway systems
    Axelrod C.W.
    Axelrod, C. Warren, 2018, WITPress (13): : 23 - 38
  • [40] Countering Attacks in IN-Vehicle Network: An Evaluation of Machine Learning Algorithms
    Anyanwu, Goodness Oluchi
    Nwakanma, Cosmas Ifeanyi
    Lee, Jae Min
    Kim, Dong-Seong
    12TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC 2021): BEYOND THE PANDEMIC ERA WITH ICT CONVERGENCE INNOVATION, 2021, : 657 - 660