Redirigiendo al acceso original de articulo en 18 segundos...
Inicio  /  Information  /  Vol: 15 Par: 3 (2024)  /  Artículo
ARTÍCULO
TITULO

Single-Frame-Based Data Compression for CAN Security

Shi-Yi Jin    
Dong-Hyun Seo    
Yeon-Jin Kim    
Yong-Eun Kim    
Samuel Woo and Jin-Gyun Chung    

Resumen

To authenticate a controller area network (CAN) data frame, a message authentication code (MAC) must be sent along with the CAN frame, but there is no space reserved for the MAC in the CAN frame. Recently, difference-based compression (DBC) algorithms have been used to create a space inside the frame. DBC has the advantage of being very efficient, but its drawback is that, if an error occurs in one frame, the effects of that error propagate to subsequent frames. In this paper, a CAN data compression algorithm is proposed that compresses the current frame without relying on previous frames. Therefore, an error generated in one frame cannot be propagated to subsequent frames. In addition, a CAN signal grouping technique is proposed based on entropy analysis. To efficiently authenticate CAN frames, the length of the compressed data must be 4 bytes or less (4BL). Simulation shows that the 4BL-compression ratio of a Kia Sorento vehicle is 99.36% in the DBC method, but 100% in the proposed method. In an LS Mtron tractor, the 4BL-compression ratio is 98.58% in the DBC method, but 100% in the proposed method. In addition, the execution time of the proposed compression algorithm is only 27.39% of that of the DBC algorithm. The results show that the proposed algorithm has better compression characteristics for CAN security than the DBC algorithms.

Palabras claves

 Artículos similares

       
 
Sultan Ahmed Almalki, Ahmed Abdel-Rahim and Frederick T. Sheldon    
The adoption of cooperative intelligent transportation systems (cITSs) improves road safety and traffic efficiency. Vehicles connected to cITS form vehicular ad hoc networks (VANET) to exchange messages. Like other networks and systems, cITSs are targete... ver más
Revista: Algorithms

 
Seongmin Park, Byungsun Cho, Dowon Kim and Ilsun You    
Research to deal with distributed denial of service (DDoS) attacks was kicked off from long ago and has seen technological advancement along with an extensive 5G footprint. Prior studies, and still newer ones, in the realm of DDoS attacks in the 5G envir... ver más
Revista: Applied Sciences

 
Hossein Hassani, Stephan Unger and Mohammad Reza Entezarian    
We conducted a singular and sectoral vulnerability assessment of ESG factors of Dow-30-listed companies by applying the entropy weight method and analyzing each ESG factor?s information contribution to the overall ESG disclosure score. By reducing inform... ver más
Revista: Information

 
Ioannis Tsantilis, Thomas K. Dasaklis, Christos Douligeris and Constantinos Patsakis    
Cybersecurity is a never-ending battle against attackers, who try to identify and exploit misconfigurations and software vulnerabilities before being patched. In this ongoing conflict, it is important to analyse the properties of the vulnerability time s... ver más
Revista: Informatics

 
Mohammad Nasim Imtiaz Khan, Chak Yuen Cheng, Sung Hao Lin, Abdullah Ash-Saki and Swaroop Ghosh    
We use commercial magnetic memory to realize morphable security primitives, a Physically Unclonable Function (PUF) and a True Random Number Generator (TRNG). The PUF realized by manipulating the write time and the TRNG is realized by tweaking the number ... ver más