Figure 2 - available via license: Creative Commons Attribution 4.0 International
Content may be subject to copyright.
CAN and CAN-FD high-speed, standard data frame structure. (a) CAN frames consist of 111 bits to transmit. (b) CAN-FD frames consist of 572 total bits to transmit.
Source publication
The Controller Area Network (CAN) is a bus protocol widely used in Electronic control Units (ECUs) to communicate between various subsystems in vehicles. Insecure CAN networks can allow attackers to control information between vital vehicular subsystems. As vehicles can have lifespans of multiple decades, post-quantum cryptosystems are essential fo...
Context in source publication
Context 1
... integrity features exist within the CAN frame, such as CRC and arbitration data, that provide frame length overhead that nearly doubles the transmission size of a CAN frame compared to the original data. This overhead can be observed in Figure 2. CAN is also popular in various robotics and physical systems. ...
Citations
... Chen's protocol [26] exhibits effectiveness against intercept-and entangle-measure attacks. The protocol proposed by Cultice and Thapliyal [27] provides safeguards against entangle-measure and intercept-resend attacks. This protocol involves transmitting digital signature, hash message authentication code, and trust value to k vehicles to ensure authentication and maintain message integrity. ...
... This section conducts an in-depth analysis of the performance metrics embedded in our quantum communication protocol designed for secure vehicular communication. Additionally, it conducts a rigorous comparative assessment against other existing protocols: He [27]. The protocol proposed by Lin et al.'s [29] demonstrates effectiveness in preventing man-in-the-middle and collision attacks. ...
... The associated computational complexity of this protocol is expressed as O(k log k). Cultice et al.'s [27] protocol is designed to prevent intercept-resend and intercept-measure attacks, and the associated computational complexity of the protocol is expressed as O(k log k). ...
Vehicular ad hoc networks (VANETs) involve the interconnection of numerous vehicles, enabling them to communicate vital information through a network designed for efficient vehicle-to-vehicle communication. This dynamic connectivity in VANETs allows for spontaneous communication among random vehicles, fostering real-time exchange of critical data such as traffic conditions, road hazards, and other relevant information. This cooperative network improves road safety and traffic efficiency by allowing vehicles to exchange information and respond to the ever-changing conditions in their proximity, leading to an overall enhancement in the transportation system. In this paper, we propose an authentication protocol that remains unconditionally secure against quantum attacks. This paper explores the integration of quantum authentication with blockchain technology to establish a secure framework for VANETs. We introduce a quantum blockchain framework aimed at augmenting the security of VANETs. The paper presents a comprehensive analysis of the quantum blockchain’s potential to mitigate common security threats in VANETs, including data tampering, eavesdropping, and unauthorized access.
... Most researchers are interested in securing vehicular communication systems, IoT applications, and energy systems with new algorithms for PQC. For example, Cultice and Thapliyal [15] propose a framework for security enhancement in vehicular networks using Physically Unclonable Functions with the CAN-FD protocol. Their work is based on the fact that the automotive systems need to be protected against potential quantum attacks through the development of a strong and secure communication layer. ...
With the emergence of quantum computing, it will soon break the time-tested cryptography systems, meaning the post-quantum cryptography will be needed to secure next-generation communication networks. This dissertation seeks to explore the implementation and realization of PQC algorithms across different sectors such as vehicular network, IoT devices, as well as large-scale networks of quantum computing. A detailed analysis of the algorithms, including CRYSTALS-Kyber, NTRU, and BB84 Quantum Key Distribution, was conducted to evaluate efficacy, computational efficiency, and quantum-enabled attacks. Key findings reveal that CRYSTALS-Kyber outperforms other algorithms in terms of encryption speed, reducing latency by 40% over NTRU in constrained environments. Furthermore, BB84 QKD protocols were demonstrated successfully with 98% data integrity compared with the noise network conditions. Optimized implementation of the NTRU using parallel computing achieved a 35% gain in processing efficiency and is thus considered worthy for resource-constrained IoT applications. This study confirms that PQC algorithms can be adapted to meet the unique demands of various fields, laying a strong foundation for their integration as quantum-resistant standards in secure communication systems.
... ECU authentication methods usually focus on statically defining and storing cryptography or identification material that can provide authenticity, such as digital certificates [11], PUFs [12], firmware digests [21], and co-channel RF watermarking [22]. Furthermore, some work has been done on Post-Quantum Cryptography for CAN encryption in vehicles [11,23]. An in depth survey on intrusion detection using machine learning was previously proposed that studied detection methods for DoS attacks, fuzzing attacks (injection), impersonation attacks, and more [24]; while these methods are powerful detection schemes for vehicles, preventing intrusion and malicious attacks before they can happen would be preferable, especially for alternative CAN bus applications like 3D printing. ...
... 21: end for 22: Router signals to all Clients that authentication is complete. 23: Return Session Keys, Valid Nodes ...
As the popularity of 3D printing or additive manufacturing (AM) continues to increase for use in commercial and defense supply chains, the requirement for reliable, robust protection from adversaries has become more important than ever. Three-dimensional printing security focuses on protecting both the individual Industrial Internet of Things (I-IoT) AM devices and the networks that connect hundreds of these machines together. Additionally, rapid improvements in quantum computing demonstrate a vital need for robust security in a post-quantum future for critical AM manufacturing, especially for applications in, for example, the medical and defense industries. In this paper, we discuss the attack surface of adversarial data manipulation on the physical inter-device communication bus, Controller Area Network (CAN). We propose a novel, hierarchical tree solution for a secure, post-quantum-supported security framework for CAN-based AM devices. Through using subnet hopping between isolated CAN buses, our framework maintains the ability to use legacy or third-party devices in a plug-and-play fashion while securing and minimizing the attack surface of hardware Trojans or other adversaries. The results of the physical implementation of our framework demonstrate 25% and 90% improvement in message costs for authentication compared to existing lightweight and post-quantum CAN security solutions, respectively. Additionally, we performed timing benchmarks on the normal communication (hopping) and authentication schemes of our framework.
... As a single response is used every time, there might be a key break issue in the quantum computing era. Cultice et al. [20] proposed an AV security based on the CAN-FD framework for V2S communication. The ECUs used PUF response as a shared key. ...
p>Comfort has become a requirement in our modern world. This level of comfort, particularly in automobiles, can only be accomplished by outfitting the vehicle with additional electrical equipment. Some electronic equipment must communicate with one another, which necessitates the use of a data transmission. Nowadays, it is challenging to sell a new automobile that includes traditional keys. Now, a sophisticated remote locking system is used to lock and unlock autonomous vehicles (AV). A remote unlocking system consists of a transponder that wirelessly connects with the automobile transmitter to lock/unlock the automobile. Unfortunately, wireless communication methods of the internet of vehicle (IoV) face a number of threats. This study provides a safe solution for the automobile unlocking system that uses dynamically generated temporary keys to meet the future demands of smart cars driven by the Internet of Things. To maintain security, machine learning (ML) and physical unclonable function (PUF) are used to permit auto locking and unlocking capability in this work. The technique has exhibited 99.91\% accuracy, which proves the reliability of securing the automobile unlocking system. Moreover, the computation cost is 3.8 ms and communication overhead is 176 bytes for unlocking by the owner and 144 bytes when the car will be unlocked by other than the owner. Furthermore, both formal (Burrows–Abadi–Needham (BAN) logic) and informal security analysis of the proposed method are provided.</p
... As a single response is used every time, there might be a key break issue in the quantum computing era. Cultice et al. [20] proposed an AV security based on the CAN-FD framework for V2S communication. The ECUs used PUF response as a shared key. ...
p>Comfort has become a requirement in our modern world. This level of comfort, particularly in automobiles, can only be accomplished by outfitting the vehicle with additional electrical equipment. Some electronic equipment must communicate with one another, which necessitates the use of a data transmission. Nowadays, it is challenging to sell a new automobile that includes traditional keys. Now, a sophisticated remote locking system is used to lock and unlock autonomous vehicles (AV). A remote unlocking system consists of a transponder that wirelessly connects with the automobile transmitter to lock/unlock the automobile. Unfortunately, wireless communication methods of the internet of vehicle (IoV) face a number of threats. This study provides a safe solution for the automobile unlocking system that uses dynamically generated temporary keys to meet the future demands of smart cars driven by the Internet of Things. To maintain security, machine learning (ML) and physical unclonable function (PUF) are used to permit auto locking and unlocking capability in this work. The technique has exhibited 99.91\% accuracy, which proves the reliability of securing the automobile unlocking system. Moreover, the computation cost is 3.8 ms and communication overhead is 176 bytes for unlocking by the owner and 144 bytes when the car will be unlocked by other than the owner. Furthermore, both formal (Burrows–Abadi–Needham (BAN) logic) and informal security analysis of the proposed method are provided.</p
... As a single response is used every time, there might be a key break issue in the quantum computing era. Cultice et al. [20] proposed an AV security based on the CAN-FD framework for V2S communication. The ECUs used PUF response as a shared key. ...
p>Comfort has become a requirement in our modern world. This level of comfort, particularly in automobiles, can only be accomplished by outfitting the vehicle with additional electrical equipment. Some electronic equipment must communicate with one another, which necessitates the use of a data transmission. Nowadays, it is challenging to sell a new automobile that includes traditional keys. Now, a sophisticated remote locking system is used to lock and unlock autonomous vehicles (AV). A remote unlocking system consists of a transponder that wirelessly connects with the automobile transmitter to lock/unlock the automobile. Unfortunately, wireless communication methods of the internet of vehicle (IoV) face a number of threats. This study provides a safe solution for the automobile unlocking system that uses dynamically generated temporary keys to meet the future demands of smart cars driven by the Internet of Things. To maintain security, machine learning (ML) and physical unclonable function (PUF) are used to permit auto locking and unlocking capability in this work. The technique has exhibited 99.91\% accuracy, which proves the reliability of securing the automobile unlocking system. Moreover, the computation cost is 3.8 ms and communication overhead is 176 bytes for unlocking by the owner and 144 bytes when the car will be unlocked by other than the owner. Furthermore, both formal (Burrows–Abadi–Needham (BAN) logic) and informal security analysis of the proposed method are provided.</p
... Therefore, the hardware-based solution could be one of the possible solutions due to the risk factor of existing software-based security [23]. This is accompanied by the prediction that the majority of current asymmetric cryptography will be broken by the advent of quantum technology employing Shor's Algorithm [200]. Winternitz One Time Signature (WOTS) Scheme [201], Supersingular Isogeny Diffie-Hellman Key Exchange (SIDH) [200], etc., are post-quantum resistance. ...
... This is accompanied by the prediction that the majority of current asymmetric cryptography will be broken by the advent of quantum technology employing Shor's Algorithm [200]. Winternitz One Time Signature (WOTS) Scheme [201], Supersingular Isogeny Diffie-Hellman Key Exchange (SIDH) [200], etc., are post-quantum resistance. It is required to standardize a model to preserve integrity. ...
The overwhelming acceptance and growing need for Internet of Things (IoT) products in each aspect of everyday living is creating a promising prospect for the involvement of humans, data, and procedures. The vast areas create opportunities from home to industry to make an automated lifecycle. Human life is involved in enormous applications such as intelligent transportation, intelligent healthcare, smart grid, smart city, etc. A thriving surface is created that can affect society, the economy, the environment, politics, and health through diverse security threats. Generally, IoT devices are susceptible to security breaches, and the development of industrial systems could pose devastating security vulnerabilities. To build a reliable security shield, the challenges encountered must be embraced. Therefore, this survey paper is primarily aimed to assist researchers by classifying attacks/vulnerabilities based on objects. The method of attacks and relevant countermeasures are provided for each kind of attack in this work. Case studies of the most important applications of the IoT are highlighted concerning security solutions. The survey of security solutions is not limited to traditional secret key-based cryptographic solutions, moreover physical unclonable functions (PUF)-based solutions and blockchain are illustrated. The pros and cons of each security solution are also discussed here. Furthermore, challenges and recommendations are presented in this work.
As promising industrial embedded networks, Controller Area Networks with Flexible Data-rate (CAN-FD) are widely used in time-sensitive domains, such as automotive networks. However, the absence of built-in security mechanisms in CAN-FD necessitates the development of security protection mechanisms. The existing Lightweight Authentication for Secure Automotive Networks (LASAN) framework focuses on enhancing the security of CAN/CAN-FD communication but neglects the conflict between security and delay. In this study, we conduct a thorough analysis of the causal mechanism related to the security and delay of LASAN and propose a static message scheduling method called Cooperative Swapping Approach (CSA) to achieve secure and low-delay CAN-FD communication. CSA is to minimize the end-to-end delay of precedence-constrained CAN-FD applications by swapping message positions in a valid message sequence. Nevertheless, exchanging message positions may impact the precedence dependencies between messages; therefore, we propose a novel Cooperative Transform Approach (CTA) within the CSA to efficiently preserve these precedence constraints. Valid message sequences with minimal end-to-end delays of a motivation example and an Adaptive Cruise Control (ACC) application are obtained in LASAN by CSA. These sequences are implemented on the embedded microcontroller platform of STM32H743IITs for evaluation. Experimental results show that our proposed CSA can effectively reduce the end-to-end delay of LASAN and outperform the state-of-the-art static message scheduling method in terms of low delay.
In foggy highways, the secure vehicular communication system can be very important in preventing traffic chaos, congestion, and accident; however, potential attackers may hack this system that can create many problems in controlling or managing the traffic. In this paper, we propose a quantum cryptographic protocol for secure vehicular communication for foggy highways, which is unconditionally secure against outside and participant attacks. The outside attacks include intercept, intercept-resend, entangle-measure, man-in-the-middle, collective, Trojan horse, and coherent attacks; whereas, the participant attacks include the collusion, forgery, and collision attacks. In this protocol, the traffic control system broadcasts the information regularly so that the vehicles can take appropriate action and avoid traffic chaos, congestion, and accidents. This protocol can be used on busy and foggy highways such as the interstate-75 highway in the United States, M4 motorway in England, Tohoku Expressway in Japan, and Yamuna Expressway in India to prevent vehicle collisions. Quantum cryptographic protocol for secure vehicular communication is important because they provide a highly secure method of communication that is immune to eavesdropping and interception. The motivation for developing the quantum cryptographic protocol for secure vehicular communication comes from the growing need for secure communication in the digital age.