MAC-Based Compression Ratio Improvement for CAN Security

نویسندگان

چکیده

Information security in a controller area network (CAN) is becoming more important as the connections between vehicle’s internal and external networks increase. Encryption authentication techniques can be applied to CAN data frames enhance security. To authenticate frame, message code (MAC) needs transmitted with frame. Therefore, space for transmitting MAC required within Recently, Triple ID algorithm has been proposed create additional field of The ensures every frame authenticated by at least 4 bytes without changing original protocol. However, since uses six header bits, there problem associated low compression efficiency. In this paper, we propose an that remove up 15 bits from compressed algorithm. Through simulation using signals Kia Sorento vehicle LS Mtron tractor, show generation containing messages or reduced 99.57% compared method.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

application of upfc based on svpwm for power quality improvement

در سالهای اخیر،اختلالات کیفیت توان مهمترین موضوع می باشد که محققان زیادی را برای پیدا کردن راه حلی برای حل آن علاقه مند ساخته است.امروزه کیفیت توان در سیستم قدرت برای مراکز صنعتی،تجاری وکاربردهای بیمارستانی مسئله مهمی می باشد.مشکل ولتاژمثل شرایط افت ولتاژواضافه جریان ناشی از اتصال کوتاه مدار یا وقوع خطا در سیستم بیشتر مورد توجه می باشد. برای مطالعه افت ولتاژ واضافه جریان،محققان زیادی کار کرده ...

15 صفحه اول

One-Key Compression Function Based MAC with BBB Security

Gaži et al. [CRYPTO 2014] analyzed the NI-MAC construction proposed by An and Bellare [CRYPTO 1999] and gave a tight birthday-bound ofO(lq/2), as an improvement over the previous bound of O(lq/2). In this paper, we design a simple extension of NI-MAC, called NI-MAC, and prove that it has O(ql/2) security bound. Our construction not only lifts the security of NI-MAC beyond birthday, it also redu...

متن کامل

One-Key Compression Function Based MAC with Security Beyond Birthday Bound

Gaži et al. [CRYPTO 2014] analyzed the NI-MAC construction proposed by An and Bellare [CRYPTO 1999] and gave a tight birthday-bound ofO(`q/2), as an improvement over the previous bound of O(`q/2). In this paper, we design a simple extension of NI-MAC, called NI-MAC, and prove that it has security bound beyond birthday (BBB) of order O(q`/2) provided ` ≤ 2. Our construction not only lifts the se...

متن کامل

Rbac/mac Security for Uml

In software construction, analysis investigates system requirements and design captures system functionality. To facilitate analysis and design, one popular technique is the unified modeling language, UML. In UML, there are use-case diagrams for the interaction of users with system components, class diagrams for the static classes and relations among them, and sequence diagrams for the dynamic ...

متن کامل

Mac Protocol Improvement Technique

Wireless networking is the mostly used networking technique in this era of telecommunication.when the term wireless„comes, it reminds the importance of 802.11 mac protocol. For the rural areas like villages, 802.11 mac protocol plays a important role for networking because of its cost, which is very low as compared to the other networking. Moreover the mac protocol provides higher rate of data ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Applied sciences

سال: 2023

ISSN: ['2076-3417']

DOI: https://doi.org/10.3390/app13042654