A performance evaluation of CAN encryption

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

Recent research on vehicular cybersecurity has highlighted the known vulnerabilities and exploits that plague in-vehicular networks; in particular, the communication protocol governing the in-vehicular network, the Control Area Network (CAN), has been a frequent and often fruitful target of related attacks. Accordingly, the focus of this project is to investigate the application of encryption algorithms to the in-vehicular network and evaluate the performance characteristics of said algorithms when used in this context. This current paper includes examination of a) the maximum acceptable latency based on the vehicular requirements as well as b) the latency in communication when employing various encryption algorithms. In Hardware-In-the-Loop (HIL) simulations, our work suggests that in-vehicular networks can absorb the latencies introduced by select encryption approaches and still satisfy the real-time requirements needed by the intra-vehicular communication system to avoid collisions and the like.

Original languageEnglish
Title of host publicationProceedings - 1st IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages140-149
Number of pages10
ISBN (Electronic)9781728167411
DOIs
StatePublished - Dec 2019
Externally publishedYes
Event1st IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2019 - Los Angeles, United States
Duration: Dec 12 2019Dec 14 2019

Publication series

NameProceedings - 1st IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2019

Conference

Conference1st IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2019
Country/TerritoryUnited States
CityLos Angeles
Period12/12/1912/14/19

Keywords

  • CAN Network
  • Cybersecurity
  • Encryption
  • In vehicle Network

Fingerprint

Dive into the research topics of 'A performance evaluation of CAN encryption'. Together they form a unique fingerprint.

Cite this