Security-aware mapping for CAN-based real-time distributed automotive systems

ICCAD(2013)

引用 90|浏览21
暂无评分
摘要
Cyber-security is a rising issue for automotive electronic systems, and it is critical to system safety and dependability. Current in-vehicles architectures, such as those based on the Controller Area Network (CAN), do not provide direct support for secure communications. When retrofitting these architectures with security mechanisms, a major challenge is to ensure that system safety will not be hindered, given the limited computation and communication resources. We apply Message Authentication Codes (MACs) to protect against masquerade and replay attacks on CAN networks, and propose an optimal Mixed Integer Linear Programming (MILP) formulation for solving the mapping problem from a functional model to the CAN-based platform while meeting both the security and the safety requirements. We also develop an efficient heuristic for the mapping problem under security and safety constraints. To the best of our knowledge, this is the first work to address security and safety in an integrated formulation in the design automation of automotive electronic systems. Experimental results of an industrial case study show the effectiveness of our approach.
更多
查看译文
关键词
mac,integrated formulation,security mechanisms,controller area network,controller area networks,security constraints,safety constraint,system dependability,in-vehicle architectures,automotive system,integer programming,can-based real-time distributed automotive systems,mapping problem,linear programming,integer linear programming,safety requirements,can-based platform,optimal mixed integer linear programming formulation,security mechanism,system safety,cyber-security,milp formulation,automotive electronic system design automation,computation resources,automotive electronics,secure communications,communication resources,telecommunication security,safety constraints,safety requirement,message authentication,electronic design automation,automotive electronic system,security-aware mapping,real-time systems,message authentication codes,functional model,can networks,real time systems
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要