UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 5 | May 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 5 Issue 5
May-2018
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR1805A07


Registration ID:
536742

Page Number

24-33

Share This Article


Jetir RMS

Title

EFFICIENT MESSAGE AUTHENTICATION CODE (MAC) BASED CYBER SECURITY FOR VEHICLE NETWORK

Abstract

We are living in a world that is becoming increasingly networked on a daily basis, and we are witnessing a global transition in which all of the things that are in our immediate environment are becoming "smart" and connected to the Internet. In addition, the automotive industry is a component of this transformation. An in-vehicle network is created by the presence of more than 150 electronic control units (ECUs) in modern automobiles. This network is responsible for controlling the functions of the vehicle, similar to the fly-by-wire concept used in aviation. Each of these automobiles is equipped with many Internet connection points, allowing them to provide their passengers with a wide range of online services. Even while any item that connects to the Internet is vulnerable to a variety of online dangers, the linked automobile is also vulnerable to these dangers. As a result, it is becoming increasingly important to address the concerns regarding cyber security that are prevalent in the automobile industry. Electronic control units (ECUs) of vehicles are connected via several communication busses on the inside. Reading and sending data to other ECUs is possible for any ECU that is connected to the bus. As a consequence of this, if an adversary is successful in compromising one of the ECUs, then the adversary will be able to access and exploit the data of data stored on other significant ECUs. The primary reason for this is that there is no confidentiality about the matter. Furthermore, the communications are more susceptible to being compromised because there is a lack of either data integrity or authenticity. It has been demonstrated in the past that an enemy can take control of the vehicle by taking advantage of the inadequacies of CIA, which stands for confidentiality, integrity, and authenticity. If the integrity of an essential ECU is breached, an attacker has the ability to alter the data that is stored on the device. In order to address these issues, the purpose of this study is to propose the design of a message authentication framework that would enable the internal communication to be secured in an effective manner. Due to the fact that the calculation of the message authentication code is dependent on the Authentication Data, Secured Key, CMAC algorithm, and extra counters, the likelihood of a hacker mimicking a message to the vehicle network is significantly reduced. In addition to this, a test technique for the validation of the message authentication code is presented.

Key Words

Control Area network (CAN) In-vehicle network, data authentication, message authentication code (MAC), CMAC Algorithm, ECU, CANoe, DaVinci Developer.

Cite This Article

" EFFICIENT MESSAGE AUTHENTICATION CODE (MAC) BASED CYBER SECURITY FOR VEHICLE NETWORK", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.5, Issue 5, page no.24-33, May-2018, Available :http://www.jetir.org/papers/JETIR1805A07.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

" EFFICIENT MESSAGE AUTHENTICATION CODE (MAC) BASED CYBER SECURITY FOR VEHICLE NETWORK", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.5, Issue 5, page no. pp24-33, May-2018, Available at : http://www.jetir.org/papers/JETIR1805A07.pdf

Publication Details

Published Paper ID: JETIR1805A07
Registration ID: 536742
Published In: Volume 5 | Issue 5 | Year May-2018
DOI (Digital Object Identifier):
Page No: 24-33
Country: -, -, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

00040

Print This Page

Current Call For Paper

Jetir RMS