• DocumentCode
    658990
  • Title

    Security-aware mapping for CAN-based real-time distributed automotive systems

  • Author

    Chung-Wei Lin ; Qi Zhu ; Phung, Congchi ; Sangiovanni-Vincentelli, A.

  • Author_Institution
    Univ. of California, Berkeley, Berkeley, CA, USA
  • fYear
    2013
  • fDate
    18-21 Nov. 2013
  • Firstpage
    115
  • Lastpage
    121
  • Abstract
    Cyber-security is a rising issue for automotive electronic systems, and it is critical to system safety and dependability. Current in-vehicles architectures, such as those based on the Controller Area Network (CAN), do not provide direct support for secure communications. When retrofitting these architectures with security mechanisms, a major challenge is to ensure that system safety will not be hindered, given the limited computation and communication resources. We apply Message Authentication Codes (MACs) to protect against masquerade and replay attacks on CAN networks, and propose an optimal Mixed Integer Linear Programming (MILP) formulation for solving the mapping problem from a functional model to the CAN-based platform while meeting both the security and the safety requirements. We also develop an efficient heuristic for the mapping problem under security and safety constraints. To the best of our knowledge, this is the first work to address security and safety in an integrated formulation in the design automation of automotive electronic systems. Experimental results of an industrial case study show the effectiveness of our approach.
  • Keywords
    automotive electronics; controller area networks; electronic design automation; integer programming; linear programming; message authentication; real-time systems; telecommunication security; CAN networks; CAN-based platform; CAN-based real-time distributed automotive systems; MAC; MILP formulation; automotive electronic system design automation; communication resources; computation resources; controller area network; cyber-security; functional model; in-vehicle architectures; message authentication codes; optimal mixed integer linear programming formulation; safety constraints; safety requirements; secure communications; security constraints; security mechanisms; security-aware mapping; system dependability; system safety; Equations; Mathematical model; Receivers; Resource management; Safety; Security; Time factors;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer-Aided Design (ICCAD), 2013 IEEE/ACM International Conference on
  • Conference_Location
    San Jose, CA
  • ISSN
    1092-3152
  • Type

    conf

  • DOI
    10.1109/ICCAD.2013.6691106
  • Filename
    6691106