Automotive ethernet controller authentication method based on national cryptographic algorithms

With the development of intelligent and connected cars, cyber security of automotive ethernet becomes the focus of automotive industry.Authentication is one of the key technologies for automotive ethernet security.The existing authentication methods have shortcomings to meet the requirements of both...

Full description

Saved in:
Bibliographic Details
Main Authors: Hui GUO, Yong LUO, Xiaolu GUO
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2022-12-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2022079
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841529699120971776
author Hui GUO
Yong LUO
Xiaolu GUO
author_facet Hui GUO
Yong LUO
Xiaolu GUO
author_sort Hui GUO
collection DOAJ
description With the development of intelligent and connected cars, cyber security of automotive ethernet becomes the focus of automotive industry.Authentication is one of the key technologies for automotive ethernet security.The existing authentication methods have shortcomings to meet the requirements of both safety and electronic controllers’ performance.Besides, national cryptographic algorithms are becoming a trend for automotive network security, while the related research in automotive ethernet area is still in starting phase.In order to balance the limited computing performance of electronic controllers and high security requirements of automotive ethernet, a two-stage trust chain authentication method based on national cryptographic algorithms was proposed.The method can be used in different automotive ethernet topologies.A trust chain was built up based on authentication credentials, which linked the two authentication stages, namely the initial stage and the vehicle using stage.The initial stage was triggered by diagnosis instrument at end of line or controller replacement.It deployed complete authentication based on SM2 algorithm and certificates in the initial stage.The vehicle using stage was triggered by ethernet gateway at vehicle power-on or network wakeup.In this stage, the method deployed fast authentication based on SM4 algorithm and authentication credential trust chain.The authentication credentials for trust chain were generated by credential functions.In order to ensure security, each credential was generated based on last successful authentication parameters dynamically.The test results on automotive ethernet controllers show that the method has lower computing cost and higher security level, and it can guarantee both performance and security.
format Article
id doaj-art-52d4fa9658a94fbb8b01bcc887bea089
institution Kabale University
issn 2096-109X
language English
publishDate 2022-12-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-52d4fa9658a94fbb8b01bcc887bea0892025-01-15T03:15:59ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2022-12-018202859574169Automotive ethernet controller authentication method based on national cryptographic algorithmsHui GUOYong LUOXiaolu GUOWith the development of intelligent and connected cars, cyber security of automotive ethernet becomes the focus of automotive industry.Authentication is one of the key technologies for automotive ethernet security.The existing authentication methods have shortcomings to meet the requirements of both safety and electronic controllers’ performance.Besides, national cryptographic algorithms are becoming a trend for automotive network security, while the related research in automotive ethernet area is still in starting phase.In order to balance the limited computing performance of electronic controllers and high security requirements of automotive ethernet, a two-stage trust chain authentication method based on national cryptographic algorithms was proposed.The method can be used in different automotive ethernet topologies.A trust chain was built up based on authentication credentials, which linked the two authentication stages, namely the initial stage and the vehicle using stage.The initial stage was triggered by diagnosis instrument at end of line or controller replacement.It deployed complete authentication based on SM2 algorithm and certificates in the initial stage.The vehicle using stage was triggered by ethernet gateway at vehicle power-on or network wakeup.In this stage, the method deployed fast authentication based on SM4 algorithm and authentication credential trust chain.The authentication credentials for trust chain were generated by credential functions.In order to ensure security, each credential was generated based on last successful authentication parameters dynamically.The test results on automotive ethernet controllers show that the method has lower computing cost and higher security level, and it can guarantee both performance and security.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2022079automotive ethernetauthenticationtwo-stage trust chainstate cryptographic algorithms
spellingShingle Hui GUO
Yong LUO
Xiaolu GUO
Automotive ethernet controller authentication method based on national cryptographic algorithms
网络与信息安全学报
automotive ethernet
authentication
two-stage trust chain
state cryptographic algorithms
title Automotive ethernet controller authentication method based on national cryptographic algorithms
title_full Automotive ethernet controller authentication method based on national cryptographic algorithms
title_fullStr Automotive ethernet controller authentication method based on national cryptographic algorithms
title_full_unstemmed Automotive ethernet controller authentication method based on national cryptographic algorithms
title_short Automotive ethernet controller authentication method based on national cryptographic algorithms
title_sort automotive ethernet controller authentication method based on national cryptographic algorithms
topic automotive ethernet
authentication
two-stage trust chain
state cryptographic algorithms
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2022079
work_keys_str_mv AT huiguo automotiveethernetcontrollerauthenticationmethodbasedonnationalcryptographicalgorithms
AT yongluo automotiveethernetcontrollerauthenticationmethodbasedonnationalcryptographicalgorithms
AT xiaoluguo automotiveethernetcontrollerauthenticationmethodbasedonnationalcryptographicalgorithms