Design and Analysis of Secure and Dependable Automotive CPS: A Steer-by-Wire Case Study

The next generation of automobiles (also known as cybercars) will increasingly incorporate electronic control units (ECUs) in novel automotive control applications. Recent work has demonstrated the vulnerability of modern car control systems to security attacks that directly impacts the cybercar...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on dependable and secure computing Vol. 17; no. 4; pp. 813 - 827
Main Authors Munir, Arslan, Koushanfar, Farinaz
Format Journal Article
LanguageEnglish
Published Washington IEEE 01.07.2020
IEEE Computer Society
Subjects
Online AccessGet full text
ISSN1545-5971
1941-0018
DOI10.1109/TDSC.2018.2846741

Cover

Abstract The next generation of automobiles (also known as cybercars) will increasingly incorporate electronic control units (ECUs) in novel automotive control applications. Recent work has demonstrated the vulnerability of modern car control systems to security attacks that directly impacts the cybercar's physical safety and dependability. In this paper, we provide an integrated approach for the design of secure and dependable automotive cyber-physical systems (CPS) using a case study: a steer-by-wire (SBW) application over controller area network (CAN). The challenge is to embed both security and dependability over CAN while ensuring that the real-time constraints of the automotive CPS are not violated. Our approach enables early design feasibility analysis of automotive CPS by embedding essential security primitives (i.e., confidentiality, integrity, and authentication) over CAN subject to the real-time constraints imposed by the desired quality of service and behavioral reliability. Our method leverages multicore ECUs for providing fault tolerance by redundant multi-threading (RMT) and also further enhances RMT for quick error detection and correction. We quantify the error resilience of our approach and evaluate the interplay of performance, fault tolerance, security, and scalability for our SBW case study.
AbstractList The next generation of automobiles (also known as cybercars) will increasingly incorporate electronic control units (ECUs) in novel automotive control applications. Recent work has demonstrated the vulnerability of modern car control systems to security attacks that directly impacts the cybercar's physical safety and dependability. In this paper, we provide an integrated approach for the design of secure and dependable automotive cyber-physical systems (CPS) using a case study: a steer-by-wire (SBW) application over controller area network (CAN). The challenge is to embed both security and dependability over CAN while ensuring that the real-time constraints of the automotive CPS are not violated. Our approach enables early design feasibility analysis of automotive CPS by embedding essential security primitives (i.e., confidentiality, integrity, and authentication) over CAN subject to the real-time constraints imposed by the desired quality of service and behavioral reliability. Our method leverages multicore ECUs for providing fault tolerance by redundant multi-threading (RMT) and also further enhances RMT for quick error detection and correction. We quantify the error resilience of our approach and evaluate the interplay of performance, fault tolerance, security, and scalability for our SBW case study.
Author Koushanfar, Farinaz
Munir, Arslan
Author_xml – sequence: 1
  givenname: Arslan
  orcidid: 0000-0002-3126-8945
  surname: Munir
  fullname: Munir, Arslan
  email: amunir@ksu.edu
  organization: Department of Computer Science, Kansas State University, Manhattan, KS, USA
– sequence: 2
  givenname: Farinaz
  surname: Koushanfar
  fullname: Koushanfar, Farinaz
  email: fkoushanfar@ucsd.edu
  organization: Department of Electrical and Computer Engineering, University of California, San Diego, CA, USA
BookMark eNp9kF1LwzAUhoNMcJv-APGm4HVn0yRN4t3o_IKBQie7LGl7KhldM5NW6L83dcMLL7w64c3zHjjPDE1a0wJC1zhaYBzJu80qSxdxhMUiFjThFJ-hKZYUh5HPJv7NKAuZ5PgCzZzbRVFMhaRTtF2B0x9toNoqWLaqGZx2gamDDMrewk-8ggO0lSoaCJZ9Z_am018QpG_ZfbAMsg7AhsUQbrXHU-XAR301XKLzWjUOrk5zjt4fHzbpc7h-fXpJl-uwJEx2YUGBJ3WteMKSWPCKxaQSMiFCFJKAEKzALMJJycdvKTlUCSWxqoq6BAyiIHN0e9x7sOazB9flO9Nbf4jLY-oFSMq58BQ_UqU1zlmo81J3qtOm7azSTY6jfLSYjxbz0WJ-suib-E_zYPVe2eHfzs2xowHglxdEECkx-QbmTn1o
CODEN ITDSCM
CitedBy_id crossref_primary_10_1109_ACCESS_2021_3063229
crossref_primary_10_3390_technologies13010006
crossref_primary_10_1109_TR_2024_3373810
crossref_primary_10_1145_3571287
crossref_primary_10_1109_TDSC_2019_2906161
crossref_primary_10_1109_TDSC_2022_3194712
crossref_primary_10_1109_TTE_2020_3004694
crossref_primary_10_3390_mi12111309
crossref_primary_10_1049_iet_its_2019_0565
crossref_primary_10_1109_TEMC_2020_2990156
crossref_primary_10_1109_TDSC_2018_2883057
crossref_primary_10_1109_ACCESS_2024_3426668
crossref_primary_10_1002_spe_2965
crossref_primary_10_1109_TITS_2022_3160068
crossref_primary_10_1109_MITS_2019_2898973
crossref_primary_10_3390_s21206807
crossref_primary_10_1016_j_jii_2023_100465
Cites_doi 10.1109/DFTVS.1999.802887
10.1007/3-540-49646-7_19
10.1109/SP.2010.34
10.1109/IVS.2009.5164434
10.1109/ETFA.2003.1247706
10.1109/VETECF.2008.259
10.1007/978-3-642-04468-7_13
10.1109/DATE.2010.5457125
10.1007/978-3-642-04101-3
10.1109/LCOMM.2018.2835484
10.1145/951710.951734
10.1109/CyberSecurity.2012.7
10.1109/MM.2002.1028473
10.1007/978-3-662-48800-3_25
10.1145/2228360.2228402
10.1109/CCNC.2016.7444938
10.1007/978-3-540-88479-8_7
10.1109/TII.2010.2050143
10.1109/DSN.2004.1311956
10.1109/TEST.2010.5699215
10.1109/ANCS.2017.25
10.1109/CONIEL.2005.13
10.1109/ICSPCC.2016.7753631
ContentType Journal Article
Copyright Copyright IEEE Computer Society 2020
Copyright_xml – notice: Copyright IEEE Computer Society 2020
DBID 97E
RIA
RIE
AAYXX
CITATION
JQ2
DOI 10.1109/TDSC.2018.2846741
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Xplore
CrossRef
ProQuest Computer Science Collection
DatabaseTitle CrossRef
ProQuest Computer Science Collection
DatabaseTitleList ProQuest Computer Science Collection

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1941-0018
EndPage 827
ExternalDocumentID 10_1109_TDSC_2018_2846741
8383991
Genre orig-research
GrantInformation_xml – fundername: National Science Foundation
  grantid: #1743490; #1649423
  funderid: 10.13039/100000001
– fundername: Office of Naval Research
  grantid: #N00014-17-1-2500
  funderid: 10.13039/100000006
GroupedDBID .4S
.DC
0R~
29I
4.4
5GY
5VS
6IK
7WY
8FE
8FG
8FL
8R4
8R5
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABJCF
ABQJQ
ABUWG
ABVLG
ACGFO
ACIWK
AENEX
AETIX
AFKRA
AGQYO
AGSQL
AHBIQ
AIBXA
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ARAPS
ARCSS
ATWAV
AZQEC
BEFXN
BENPR
BEZIV
BFFAM
BGLVJ
BGNUA
BKEBE
BPEOZ
BPHCQ
CCPQU
CS3
DU5
DWQXO
EBS
EDO
EJD
FRNLG
GNUQQ
HCIFZ
HZ~
IEDLZ
IFIPE
IPLJI
ITG
ITH
JAVBF
K60
K6V
K6~
K7-
L6V
LAI
M0C
M43
M7S
O9-
OCL
P2P
P62
PHGZM
PHGZT
PQBIZ
PQBZA
PQGLB
PQQKQ
PROAC
PTHSS
PUEGO
Q2X
RIA
RIE
RNI
RNS
RZB
AAYXX
CITATION
JQ2
ID FETCH-LOGICAL-c359t-b4e76ffa7656287d523d896388b93e885b15016c75628997ed6432adbfce1e8b3
IEDL.DBID RIE
ISSN 1545-5971
IngestDate Mon Jun 30 08:51:37 EDT 2025
Tue Jul 01 02:32:18 EDT 2025
Thu Apr 24 22:57:04 EDT 2025
Wed Aug 27 02:36:40 EDT 2025
IsPeerReviewed false
IsScholarly true
Issue 4
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c359t-b4e76ffa7656287d523d896388b93e885b15016c75628997ed6432adbfce1e8b3
Notes ObjectType-Case Study-2
SourceType-Scholarly Journals-1
content type line 14
ObjectType-Feature-4
ObjectType-Report-1
ObjectType-Article-3
ORCID 0000-0002-3126-8945
PQID 2419494778
PQPubID 27603
PageCount 15
ParticipantIDs crossref_citationtrail_10_1109_TDSC_2018_2846741
proquest_journals_2419494778
crossref_primary_10_1109_TDSC_2018_2846741
ieee_primary_8383991
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2020-07-01
PublicationDateYYYYMMDD 2020-07-01
PublicationDate_xml – month: 07
  year: 2020
  text: 2020-07-01
  day: 01
PublicationDecade 2020
PublicationPlace Washington
PublicationPlace_xml – name: Washington
PublicationTitle IEEE transactions on dependable and secure computing
PublicationTitleAbbrev TDSC
PublicationYear 2020
Publisher IEEE
IEEE Computer Society
Publisher_xml – name: IEEE
– name: IEEE Computer Society
References ref35
ref12
rouf (ref15) 2010
ref14
checkoway (ref13) 2011
ref11
ref32
ref10
(ref34) 2013
ref17
ref16
ref19
(ref36) 2012
(ref30) 2012
groza (ref18) 2012
wilwert (ref2) 2005
schweppe (ref24) 2011
koren (ref3) 2007
(ref1) 2013
ref23
ref26
(ref33) 2012
ref25
ref20
oppliger (ref29) 2009
ref22
ref21
(ref31) 2012
ref28
ref27
ref8
ref7
ref9
ref4
ref6
ref5
References_xml – year: 2009
  ident: ref29
  publication-title: SSL and TLS Theory and Practice
– ident: ref11
  doi: 10.1109/DFTVS.1999.802887
– ident: ref25
  doi: 10.1007/3-540-49646-7_19
– ident: ref5
  doi: 10.1109/SP.2010.34
– ident: ref16
  doi: 10.1109/IVS.2009.5164434
– ident: ref6
  doi: 10.1109/ETFA.2003.1247706
– start-page: 6
  year: 2011
  ident: ref13
  article-title: Comprehensive experimental analyses of automotive attack surfaces
  publication-title: Proc 20th USENIX Conf Secur
– ident: ref17
  doi: 10.1109/VETECF.2008.259
– year: 2012
  ident: ref33
  article-title: ECU development and test with CANoe
– ident: ref14
  doi: 10.1007/978-3-642-04468-7_13
– year: 2011
  ident: ref24
  article-title: Securing Car2X applications with effective hardware-software co-design for vehicular on-board networks
  publication-title: Proc Joint VDI/VW Automotive Secur Conf
– year: 2007
  ident: ref3
  publication-title: Fault-Tolerant Systems
– ident: ref32
  doi: 10.1109/DATE.2010.5457125
– ident: ref28
  doi: 10.1007/978-3-642-04101-3
– year: 2013
  ident: ref1
  article-title: Road vehicles-Functional safety
– ident: ref4
  doi: 10.1109/LCOMM.2018.2835484
– ident: ref10
  doi: 10.1145/951710.951734
– ident: ref19
  doi: 10.1109/CyberSecurity.2012.7
– ident: ref23
  doi: 10.1109/MM.2002.1028473
– year: 2005
  ident: ref2
  article-title: Design of automotive X-by-wire systems
  publication-title: The Industrial Communication Technology Handbook
– year: 2013
  ident: ref34
  article-title: How secure is AES against brute force attacks?
– ident: ref35
  doi: 10.1007/978-3-662-48800-3_25
– ident: ref27
  doi: 10.1145/2228360.2228402
– year: 2012
  ident: ref36
– ident: ref21
  doi: 10.1109/CCNC.2016.7444938
– ident: ref9
  doi: 10.1007/978-3-540-88479-8_7
– ident: ref26
  doi: 10.1109/TII.2010.2050143
– year: 2012
  ident: ref31
  article-title: The OpenMP API specification for parallel programming
– ident: ref12
  doi: 10.1109/DSN.2004.1311956
– start-page: 185
  year: 2012
  ident: ref18
  publication-title: LiBrA-CAN A Lightweight Broadcast Authentication Protocol for Controller Area Networks
– ident: ref8
  doi: 10.1109/TEST.2010.5699215
– ident: ref20
  doi: 10.1109/ANCS.2017.25
– ident: ref7
  doi: 10.1109/CONIEL.2005.13
– year: 2012
  ident: ref30
– start-page: 21
  year: 2010
  ident: ref15
  article-title: Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study
  publication-title: Proc 19th USENIX Conf Security
– ident: ref22
  doi: 10.1109/ICSPCC.2016.7753631
SSID ssj0024894
Score 2.3468676
Snippet The next generation of automobiles (also known as cybercars) will increasingly incorporate electronic control units (ECUs) in novel automotive control...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 813
SubjectTerms Automobiles
Automotive
Automotive engineering
behavioral reliability
Case studies
Computer architecture
Control equipment
Controller area network
Cyber-physical systems
Design analysis
Drive by wire
Electronic control
Error correction
Error detection
Fault tolerance
Feasibility studies
multicore
Quality of service
Real time
Real-time systems
Safety
Security
steer-by-wire
x-by-wire
Title Design and Analysis of Secure and Dependable Automotive CPS: A Steer-by-Wire Case Study
URI https://ieeexplore.ieee.org/document/8383991
https://www.proquest.com/docview/2419494778
Volume 17
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEA7akxffYrVKDp7E1N1uukm8lVYpQkWoorclj9mL0krdFeqvN5PuVnwg3pZsAiEzyXyTfDNDyEmSCq4hipjHBpxx2XFMJwBMiTiX3KQ6shjgPLpJh_f8-rH7uELOlrEwABDIZ9DGz_CW76a2xKuyc-ndKYWh6qtezRaxWp959WQoeoiIgHmQHFcvmHGkzu8G4z6SuGS7g9aWx19sUCiq8uMkDublaoOM6oktWCVP7bIwbfv-LWfjf2e-SdYrnEl7C8XYIisw2SYbdQ0HWm3pHfIwCBQOqieO1glK6DSn4R4eQvMg1MnFECvaK4vA3nsD2r8dX9AeHRcAM2bmDGm0tO9tIkVq4nyX3F9d3vWHrCq2wGzSVQUzHESa51p4gOe9KOcdVCdxd0qjEpCyazx0jFMr8LdSApzHMh3tTG4hBmmSPdKYTCewT6hR1ub-JAHuMGF9rj2ocrortZaJU6lokqhe_sxWmcixIMZzFjySSGUosQwlllUSa5LT5ZCXRRqOvzrvoASWHavFb5JWLeOs2qivmQcwiisuhDz4fdQhWeugix0Yui3SKGYlHHkcUpjjoIAfYO7XHA
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NbxMxEB1V5QAXCrSI0BR84FThdDfrXdu9RQlRgKaqlET0tvLH7KUoQWVTKf319Ti7QVCEuK28tmR5PJ439psZgA9ZIYXBJOEBGwguVN9zkyFyLdNKCVuYxFGA8_SymCzEl-v8eg8-7mJhEDGSz7BHn_Et36_cmq7KzlRwpzSFqj8Jdl_k22itX5n1VCx7SJiAB5icNm-YaaLP5qPZkGhcqtcneyvS36xQLKvy6CyOBmZ8ANN2alteyU1vXdueu_8ja-P_zv0FPG-QJhtst8ZL2MPlKzhoqziwRqkP4dsokjiYWXrWpihhq4rFm3iMzaNYKZeCrNhgXUf-3h2y4dXsnA3YrEa85XbDiUjLhsEqMiInbo5gMf40H054U26BuyzXNbcCZVFVRgaIF_woH1xUr0g_ldUZKpXbAB7Twkn6rbVEH9BM33hbOUxR2ew17C9XS3wDzGrnqnCWoPCUsr4yAVZ5kytjVOZ1ITuQtMtfuiYXOZXE-F5GnyTRJUmsJImVjcQ6cLob8mObiONfnQ9JAruOzeJ3oNvKuGxU9WcZIIwWWkip3v591Ht4OplPL8qLz5dfj-FZnxzuyNftwn59u8aTgEpq-y5uxgfQNdpp
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Design+and+Analysis+of+Secure+and+Dependable+Automotive+CPS%3A+A+Steer-by-Wire+Case+Study&rft.jtitle=IEEE+transactions+on+dependable+and+secure+computing&rft.au=Munir%2C+Arslan&rft.au=Koushanfar%2C+Farinaz&rft.date=2020-07-01&rft.pub=IEEE&rft.issn=1545-5971&rft.volume=17&rft.issue=4&rft.spage=813&rft.epage=827&rft_id=info:doi/10.1109%2FTDSC.2018.2846741&rft.externalDocID=8383991
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1545-5971&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1545-5971&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1545-5971&client=summon