0
1

Delete article

Deleted articles cannot be recovered.

Draft of this article would be also deleted.

Are you sure you want to delete this article?

Cyber-Security for the Controller Area Network (CAN) Communication Protocol

Posted at

Cyber-Security for the Controller Area Network (CAN) Communication Protocol
Chung-Wei Lin and Alberto Sangiovanni-Vincentelli Department of Electrical Engineering and Computer Sciences University of California, Berkeley
https://www.csie.ntu.edu.tw/~cwlin/document/40108.pdf

References

[1] K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, and S. Savage, “Experimental security analysis of a modern automobile,” in IEEE Symposium on Security and Privacy, pp. 447–462, 2010.
[2] M. Wolf, A. Weimerskirch, and C. Paar, “Security in automotive bus systems,” in Workshop on Embedded Security in Cars, 2004.
[3] A. Perrig, R. Canetti, D. Song, and D. Tygar, “Efficient authentication and signing of multicast streams over lossy channels,” in IEEE Symposium on Security and Privacy, pp. 56–73, 2000.
[4] A. Perrig, R. Canetti, D. Song, and D. Tygar, “Efficient and secure source authentication for multicast,” in Network and Distributed System Security Symposium, pp. 35–46, 2001.
[5] A. Perrig, R. Canetti, D. Song, and D. Tygar, “The tesla broadcast authentication protocol,” in RSA Cryptobytes, pp. 2–13, 2002.
[6] C. Szilagyi and P. Koopman, “A flexible approach to embedded network multicast authentication,” in Workshop on Embedded Systems Security, 2008.
[7] C. Szilagyi and P. Koopman, “Flexible multicast authentication for time-triggered embedded control network applications,” in IEEE/IFIP International Conference on Dependable Systems and Networks, pp. 165–174, 2009.
[8] C. Szilagyi and P. Koopman, “Low cost multicast authentication via validity voting in time-triggered embedded control networks,” in Workshop on Embedded Systems Security, 2010.
[9] S. Shenker and I. Stoica, “Security,” in Slides of Lectures 13 and 14, CS 194: Distributed Systems, University of California, Berkeley, 2005.
[10] Bosch, Controller Area Network, Specification 2.0, 1991.
[11] M. D. Natale, H. Zeng, P. Giusto, and A. Ghosal, “Worst-case time analysis of can messages,” in Understanding and Using the Controller Area Network Communication Protocol. Springer, pp. 43–65, 2012.

Related Article on Qiita

CAN FD and CAN XL on arXiv
https://qiita.com/kaizen_nagoya/items/d8efb0da53cd3456f735

CAN FD & CAN XL on arXiv references
https://qiita.com/kaizen_nagoya/items/7df86c66084372a96f1d

CAN FD & CAN XL on arXiv references name order
https://qiita.com/kaizen_nagoya/items/ec5e4e4491228db534c0

0
1
0

Register as a new user and use Qiita more conveniently

  1. You get articles that match your needs
  2. You can efficiently read back useful information
  3. You can use dark theme
What you can do with signing up
0
1

Delete article

Deleted articles cannot be recovered.

Draft of this article would be also deleted.

Are you sure you want to delete this article?