Visible to the public Avoidance of Replay attack in CAN protocol using Authenticated Encryption

TitleAvoidance of Replay attack in CAN protocol using Authenticated Encryption
Publication TypeConference Paper
Year of Publication2020
AuthorsChandrasekaran, Selvamani, Ramachandran, K.I., Adarsh, S., Puranik, Ashish Kumar
Conference Name2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)
Date PublishedJuly 2020
PublisherIEEE
ISBN Number978-1-7281-6851-7
Keywordsadvanced encryption standard (AES), authenticated encryption, authentication, CAN protocol, composability, confinement, Counter, cryptography, Encryption, message authentication, Message Authentication Algorithm (MAC), privacy, Protocols, pubcrawl, replay attacks, resilience, Resiliency, Secure Hash Algorithm (SHA), Sensors, spoofing attacks, Standards, timestamp, Tiny Encryption Algorithm (TEA), vulnerabilities
AbstractController Area Network is the prominent communication protocol in automotive systems. Its salient features of arbitration, message filtering, error detection, data consistency and fault confinement provide robust and reliable architecture. Despite of this, it lacks security features and is vulnerable to many attacks. One of the common attacks over the CAN communication is the replay attack. It can happen even after the implementation of encryption or authentication. This paper proposes a methodology of supressing the replay attacks by implementing authenticated encryption embedded with timestamp and pre-shared initialisation vector as a primary key. The major advantage of this system is its flexibility and configurability nature where in each layer can be chosen with the help of cryptographic algorithms to up to the entire size of the keys.
URLhttps://ieeexplore.ieee.org/document/9225529
DOI10.1109/ICCCNT49239.2020.9225529
Citation Keychandrasekaran_avoidance_2020