TCAN: Authentication Without Cryptography
- n a CAN Bus Based on Nodes
Location on the Bus
Eli Biham, Sara Bitan, Eli Gavril Computer Science Dept., Technion
* Patent Pending
1
TCAN: Authentication Without Cryptography on a CAN Bus Based on - - PowerPoint PPT Presentation
TCAN: Authentication Without Cryptography on a CAN Bus Based on Nodes Location on the Bus Eli Biham, Sara Bitan, Eli Gavril Computer Science Dept., Technion 1 * Patent Pending Introduction Cars have become extremely sophisticated in recent
Location on the Bus
Eli Biham, Sara Bitan, Eli Gavril Computer Science Dept., Technion
* Patent Pending
1
Introduction
2
The CAN Bus
Control Units (ECUs):
messages:
Engine Locking System Transmission Anti-lock Breaking System
CAN bus
ECU ECU ECU ECU Lights ECU
Infotainment System
ECU Steering ECU
3
Cancellation of Messages
transmitting an error frame over it.
bus error.
consecutive dominant bits occur in a CAN message.
field.
4
CAN Data Transmission
CAN-L.
the bus is recessive (i.e., 1).
certain threshold, the signal on the bus is dominant (i.e., 0).
5
1 2 3 4
CAN-H CAN-L
Recessive (1) Dominant (0)
Voltage Level Signal Value Time Time
The Problem
6
The Problem
Cherokee.
7
Attack Model
compromise ECUs on the CAN bus.
access to the vehicle.
8
CAN Bus Authentication
be authenticated.
detection in the CAN bus.
cryptography.
9
10
CAN+ and CANAuth
data to each message.
possible without causing errors.
11
CAN+ and CANAuth
message signatures.
the corresponding types.
12
CaCAN
messages.
authentication.
13
CMI-ECU
detection algorithms
by transmitting an error frame.
14
Other Protocols
15
16
Correlation Between Location and Arrival Time
the arrival time difference.
17
ECU2 ECU1
Time CAN bus
tb2 tb1 ta2 ta1
Correlation Between Location and Arrival Time
immediately echoed back.
the location of the ECU and the arrival time difference between the signal and its echo to the left end
ECU2 ECU1
Time
∆t1 ∆t2
CAN bus ∆d1 ∆d2
1 1
= /2 d t c
2 2
= /2 d t c
18
ta1 ta2 tb1 ta2+ ∆tbus tb2 ta1+ ∆tbus
The Repeater and Monitor
and its echo. 19
ECU2 ECU1
Time
∆t1 ∆t2
CAN bus
Repeater Monitor
Authenticating the Message
an error frame.
20
The Measurement Procedure
transmits an echo signal.
transparent to standard ECUs.
Repeater, and measures their time difference .
is returned.
= /2
s s
d t c
s
t
21
s
d
The Complete TCAN Protocol
phase.
authentication table.
22
Echo Signal Implementation
sends an echo signal when such edge occurs.
regular dominant signal.
23
Dominant
Signal Value Time
Recessive Higher-than-Dominant
Echo-Forgery Attacks
deceive the Monitor.
deduce a legal origin of the signal,
24
Echo-Forgery Attacks
A S
Time
∆tS ∆tA
CAN bus
Repeater Monitor
25
Echo-Forgery Attacks
26
S A
Time
∆tA ∆tS
CAN bus
Repeater Monitor
Unified Monitor and Repeater
into a single device
27 Monitor CAN bus ECU ECU ECU
Authentication Table Init
the Monitor.
creation of the authentication table
with the Monitor.
28
Measurement Accuracy
difference using the following equation:
nanoseconds.
29
= /2
s s
d t c / 2[ ] 0.3/ 2[ ] 0.15 [ ] N c m N m N m
s
d N
Summary
paper.
30
31