Academia.eduAcademia.edu

Outline

CINNAMON: A Module for AUTOSAR Secure Onboard Communication

2020, 2020 16th European Dependable Computing Conference (EDCC)

https://doi.org/10.1109/EDCC51268.2020.00026

Abstract

This paper introduces CINNAMON, a software module that extends and seamlessly integrates with the AU-TOSAR "Secure Onboard Communication" (SecOC) module [3], [5] to also account for confidentiality of data in transit. It stands for Confidential, INtegral aNd Authentic on board coMunicatiON (CINNAMON). It takes a resource-efficient and practical approach to ensure, at the same time, confidentiality, integrity and authenticity of frames. The main new requirement that CINNAMON puts forward is the use of encryption and thus, as a result, CINNAMON exceeds SecOC against information gathering attacks. This paper sets forth the essential requirements and specification of the new module by detailing where and how to position it within AUTOSAR and by emphasizing the relevant upgrades with respect to SecOC. The presentation continues with the definition of a Security Profile and a summary of a prototype implementation of ours [8], [9]. While CINNAMON is easily extensible, for example through the definition of additional profiles, the current performances obtained on inexpensive boards support the claim that the approach is feasible.

FAQs

sparkles

AI

What are the key features of the CINNAMON module compared to SecOC?add

CINNAMON enhances SecOC by introducing symmetric-key encryption, ensuring confidentiality alongside integrity and authenticity. This novel approach effectively counters information gathering attacks on the CAN bus.

How does CINNAMON handle encryption without significant computational overhead?add

Using the Chaskey MAC function and SPECK 64/128 encryption, CINNAMON manages a negligible overhead of under 6µs on inexpensive hardware. This efficient design maintains communication speed while securing data.

What specific vulnerabilities does CINNAMON address in automotive security?add

CINNAMON addresses vulnerabilities associated with information gathering attacks that exploit the lack of confidentiality in CAN bus communications. Notably, it mitigates risks such as unauthorized interpretation of CAN frame payloads.

What is the impact of CINNAMON on existing CAN bus security protocols?add

CINNAMON integrates with AUTOSAR, enhancing existing security protocols by adding encryption capabilities that existing models lack. This compatibility ensures a seamless transition while improving overall vehicular communication security.

How does the threat model for CINNAMON inform its design?add

CINNAMON's threat model anticipates active attackers with limited control over ECUs, prompting the design to prioritize confidentiality and secure frame transmission. This consideration directly shapes its cryptographic strategies and security requirements.

References (35)

  1. Embedded Systems Academy. CANcrypt. https://www.cancrypt.eu/, 2018.
  2. ARM. Arm TrustZone Technology, 2020.
  3. AUTOSAR. Requirements on Secure Onboard Communication, 2019.
  4. AUTOSAR. Specification of Key Manager, 2019.
  5. AUTOSAR. Specification of Secure Onboard Communication AU- TOSAR CP R19-11, 2019.
  6. BBC. Hack attacks mounted on car control systems. https://www.bbc. com/news/10119492, 2010.
  7. Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, and Louis Wingers. The simon and speck families of lightweight block ciphers. Cryptology ePrint Archive, Report 2013/404, 2013. https://eprint.iacr.org/2013/404.
  8. Giampaolo Bella, Pietro Biondi, Gianpiero Costantino, and Ilaria Mat- teucci. Are you secure in your car?: poster. In Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019, pages 308-309. ACM, 2019.
  9. Giampaolo Bella, Pietro Biondi, Gianpiero Costantino, and Ilaria Mat- teucci. TOUCAN: A protocol to secure controller area network. In Proceedings of the ACM Workshop on Automotive Cybersecurity, AutoSec@CODASPY 2019, Richardson, TX, USA, March 27, 2019, pages 3-8, 2019.
  10. Cinzia Bernardeschi, Marco Di Natale, Gianluca Dini, and Dario Varano. Modeling and generation of secure component communications in AUTOSAR. In Proceedings of the Symposium on Applied Computing, SAC '17, page 1473-1480, New York, NY, USA, 2017. Association for Computing Machinery.
  11. Mario Luca Bernardi, Marta Cimitile, Fabio Martinelli, and Francesco Mercaldo. Driver and Path Detection through Time-Series Classification. Journal of Advanced Transportation, 2018:1-20, 2018.
  12. Charlie Miller Chris Valasek. Adventures in Automotive Networks and Control Units, 2020.
  13. Lucian Constantin. Researchers hack Tesla Model S with remote attack. https://www.pcworld.com/article/3121999/ researchers-demonstrate-remote-attack-against-tesla-model-s.html, 2016.
  14. National Instruments Corporation. FlexRay Automotive Communication Bus Overview, 2020.
  15. Gianpiero Costantino and Ilaria Matteucci. CANDY CREAM -hacking infotainment android systems to command instrument cluster via can data frame. In Meikang Qiu, editor, 2019 IEEE International Conference on Computational Science and Engineering, CSE 2019, and IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2019, New York, NY, USA, August 1-3, 2019, pages 476-481. IEEE, 2019.
  16. Luca Dariz, Michele Selvatici, Massimiliano Ruggeri, Gianpiero Costantino, and Fabio Martinelli. Trade-off analysis of safety and security in CAN bus communication. In 5th IEEE International Conference on Models and Technologies for Intelligent Transportation Systems, MT-ITS 2017, Naples, Italy, June 26-28, 2017, pages 226-231. IEEE, 2017.
  17. European Data Protection Board. Guidelines 1/2020 on processing personal data in the context of connected vehicles and mobility related applications. https://edpb.europa.eu/sites/edpb/files/consultation/edpb guidelines 202001 connectedvehicles.pdf, 2020.
  18. Bogdan Groza, Stefan Murvay, Anthony Van Herrewege, and Ingrid Verbauwhede. Libra-can: a lightweight broadcast authentication protocol for controller area networks. In International Conference on Cryptology and Network Security, pages 185-200, Cham, 2012. Springer.
  19. Ahmed Hazem and HA Fahmy. Lcap-a lightweight can authentication protocol for securing in-vehicle networks. In 10th escar Embedded Security in Cars Conference, Berlin, Germany, volume 6, 2012.
  20. International Organization for Standardization. ISO/IEC 11889-1:2015 -Trusted Platform Module library. https://www.iso.org/standard/66510. html, 2015.
  21. International Organization for Standardization. Road vehicles -Con- troller area network (CAN) -Part 1: Data link layer and physical signalling. https://www.iso.org/standard/63648.html, 2015.
  22. Jeff Crume. OwnStar: Yet another car hack. https://insideinternetsecurity.wordpress.com/2015/08/05/ ownstar-yet-another-car-hack/, 2015.
  23. Ryo Kurachi, Yutaka Matsubara, Hiroaki Takada, Naoki Adachi, Yuki- hiro Miyashita, and Satoshi Horihata. Cacan-centralized authentication system in can (controller area network). In 14th Int. Conf. on Embedded Security in Cars (ESCAR 2014), 2014.
  24. Miro Enev, Alex Takakuwa, Karl Koscher, and Tadayoshi Kohno. Automobile Driver Fingerprinting. https://petsymposium.org/2016/files/ papers/Automobile Driver Fingerprinting.pdf, 2016.
  25. Nicky Mouha, Bart Mennink, Anthony Van Herrewege, Dai Watanabe, Bart Preneel, and Ingrid Verbauwhede. Chaskey: An efficient mac algorithm for 32-bit microcontrollers. In Antoine Joux and Amr Youssef, editors, Selected Areas in Cryptography -SAC 2014, pages 306-323, Cham, 2014. Springer International Publishing.
  26. O.Hartkopp, C. Reuber, and R.Schilling. Macan message authenticated can. 2012.
  27. Andreea-Ina Radu and Flavio D. Garcia. Leia: A lightweight authen- tication protocol for can. In Ioannis Askoxylakis, Sotiris Ioannidis, Sokratis Katsikas, and Catherine Meadows, editors, Computer Security -ESORICS 2016, pages 283-300, Cham, 2016. Springer International Publishing.
  28. European Union. General Data Protection Regulation(EU Regulation 2016/679). https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri= OJ:L:2016:119:FULL, 2016.
  29. Chris Valasek and Charlie Miller. Remote Exploitation of an Unaltered Passenger Vehicle. http://illmatics.com/Remote%20Car%20Hacking. pdf, 2015.
  30. Anthony Van Herrewege, Dave Singelee, and Ingrid Verbauwhede. Canauth-a simple, backward compatible broadcast authentication pro- tocol for can bus. In ECRYPT Workshop on Lightweight Cryptography. Vol. 2011., 2011.
  31. Serge Vaudenay. Security flaws induced by cbc padding -applications to ssl, ipsec, wtls... In Lars R. Knudsen, editor, Advances in Cryptol- ogy -EUROCRYPT 2002, pages 534-545, Berlin, Heidelberg, 2002. Springer Berlin Heidelberg.
  32. Vector. Solutions for Automotive Ethernet. https://www.vector.com/int/ en/know-how/technologies/networks/automotive-ethernet/, 2020.
  33. Xuhang Ying, Giuseppe Bernieri, Mauro Conti, and Radha Poovendran. TACAN: transmitter authentication through covert channels in controller area networks. CoRR, abs/1903.05231, 2019.
  34. Artem Yushev, Mohammed Barghash, Minh Phuong Nguyen, Andreas Walz, and Axel Sikora. Tls-over-can: An experimental study of internet- grade end-to-end communication security for can networks. IFAC- PapersOnLine, 51(6):96 -101, 2018. 15th IFAC Conference on Programmable Devices and Embedded Systems PDeS 2018.
  35. Tobias Ziermann, Stefan Wildermann, and Jürgen Teich. Can+: A new backward-compatible controller area network (can) protocol with up to 16x higher data rates. In Proceedings of the Conference on Design, Automation and Test in Europe, pages 1088-1093. European Design and Automation Association, 2009.