EC-SVC: Secure CAN Bus In-Vehicle Communications With Fine-Grained Access Control Based on Edge Computing

Donghyun Yu, Ruei Hau Hsu, Jemin Lee, Sungjin Lee

Research output: Contribution to journalArticlepeer-review

17 Scopus citations

Abstract

In-vehicle communications are not designed for message exchange between the vehicles and outside systems originally. Thus, the security design of message protection is insufficient. Moreover, the internal devices do not have enough resources to process the additional security operations. Nonetheless, due to the characteristic of the in-vehicle network in which messages are broadcast, secure message transmission to specific receivers must be ensured. With consideration of the facts aforementioned, this work addresses resource problems by offloading secure operations to high-performance devices, and uses attribute-based access control to ensure the confidentiality of messages from attackers and unauthorized users. In addition, we reconfigure existing access control based cryptography to address new vulnerabilities arising from the use of edge computing and attribute-based access control. Thus, this paper proposes an edge computing-based security protocol with fine-grained attribute-based encryption using a hash function, symmetric-based cryptography, and reconfigured cryptographic scheme. In addition, this work formally proves the reconfigured cryptographic scheme and security protocol, and evaluates the feasibility of the proposed security protocol in various aspects using the CANoe software.

Original languageEnglish
Pages (from-to)1388-1403
Number of pages16
JournalIEEE Transactions on Information Forensics and Security
Volume17
DOIs
StatePublished - 2022

Bibliographical note

Publisher Copyright:
© 2005-2012 IEEE.

Keywords

  • Access control
  • Attribute-based encryption
  • Edge computing
  • In-vehicle security

Fingerprint

Dive into the research topics of 'EC-SVC: Secure CAN Bus In-Vehicle Communications With Fine-Grained Access Control Based on Edge Computing'. Together they form a unique fingerprint.

Cite this