Implementation of Node Authentication Algorithm of In-Vehicle Network in Connected Car

Hyun-Hee Kim,Kimin Jeong,Eunhye Shin,K. Lee
DOI: https://doi.org/10.1109/ICIT.2019.8755211
2019-02-01
Abstract:Responding to the latest developments in information communication technology, the connected car that support autonomous driving or services is actively underway. A connected car is a vehicle connected to an external network through wireless communication. It improves user convenience and stability of vehicle through various external connections. However, there is a problem of security against intrusion from the outside. This security issues are resolved by encrypting the entire data within the controller area network (CAN) network system, but that can be time-consuming and cause the authentication process to be carried out in the event of a certification procedure. To solve this problem, this paper proposes an intrusion detection algorithm for the in-vehicle network of the connected car. The proposed algorithm can detect encryption and authentication techniques by detecting and identifying external intruders when identifying external intruder's password and authentication techniques. Additionally, we develop an intrusion detection algorithm to minimize the burden of the vehicle’s electronic control unit (ECU) a system using node authentication algorithm.
Computer Science,Engineering
What problem does this paper attempt to address?