ID Hopping CAN Controller Design with Obfuscated Priority Assignment.

Shan Ding,Tong Zhao,Ryo Kurachi,Gang Zeng
DOI: https://doi.org/10.1109/dasc/picom/datacom/cyberscitec.2018.00029
2018-01-01
Abstract:Controller Area Network (CAN) is the most widely employed real-time communication protocol for safety-critical applications. Recently, an issue of security countermeasure for CAN is the limited bandwidth of CAN. For this reason, the ID hopping technology has been proposed to improve the security with limited resource by varying the ID of a message when transmitting it on the CAN bus. However, the existing ID hopping method is not effective in terms of ID variation. In this paper, we propose a real-time and security mechanism to improve the security effect of ID hopping. Firstly, we obfuscate the priority of messages with two MILP models and a greedy algorithm called "Priority Bound Decision Algorithm", making priority different on the application layer. Secondly, combining the ID-hopping, our method can enhance the diversity of IDs on the data link layer. Thirdly, the results of security analysis indicate that our proposal can hinder the targeted DoS, replay attack and reverse engineering better than some existing methods.
What problem does this paper attempt to address?