Design and Analysis of Secure and Dependable Automotive CPS: A Steer-by-Wire Case Study
The next generation of automobiles (also known as cybercars) will increasingly incorporate electronic control units (ECUs) in novel automotive control applications. Recent work has demonstrated the vulnerability of modern car control systems to security attacks that directly impacts the cybercar...
Saved in:
Published in | IEEE transactions on dependable and secure computing Vol. 17; no. 4; pp. 813 - 827 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
Washington
IEEE
01.07.2020
IEEE Computer Society |
Subjects | |
Online Access | Get full text |
ISSN | 1545-5971 1941-0018 |
DOI | 10.1109/TDSC.2018.2846741 |
Cover
Abstract | The next generation of automobiles (also known as cybercars) will increasingly incorporate electronic control units (ECUs) in novel automotive control applications. Recent work has demonstrated the vulnerability of modern car control systems to security attacks that directly impacts the cybercar's physical safety and dependability. In this paper, we provide an integrated approach for the design of secure and dependable automotive cyber-physical systems (CPS) using a case study: a steer-by-wire (SBW) application over controller area network (CAN). The challenge is to embed both security and dependability over CAN while ensuring that the real-time constraints of the automotive CPS are not violated. Our approach enables early design feasibility analysis of automotive CPS by embedding essential security primitives (i.e., confidentiality, integrity, and authentication) over CAN subject to the real-time constraints imposed by the desired quality of service and behavioral reliability. Our method leverages multicore ECUs for providing fault tolerance by redundant multi-threading (RMT) and also further enhances RMT for quick error detection and correction. We quantify the error resilience of our approach and evaluate the interplay of performance, fault tolerance, security, and scalability for our SBW case study. |
---|---|
AbstractList | The next generation of automobiles (also known as cybercars) will increasingly incorporate electronic control units (ECUs) in novel automotive control applications. Recent work has demonstrated the vulnerability of modern car control systems to security attacks that directly impacts the cybercar's physical safety and dependability. In this paper, we provide an integrated approach for the design of secure and dependable automotive cyber-physical systems (CPS) using a case study: a steer-by-wire (SBW) application over controller area network (CAN). The challenge is to embed both security and dependability over CAN while ensuring that the real-time constraints of the automotive CPS are not violated. Our approach enables early design feasibility analysis of automotive CPS by embedding essential security primitives (i.e., confidentiality, integrity, and authentication) over CAN subject to the real-time constraints imposed by the desired quality of service and behavioral reliability. Our method leverages multicore ECUs for providing fault tolerance by redundant multi-threading (RMT) and also further enhances RMT for quick error detection and correction. We quantify the error resilience of our approach and evaluate the interplay of performance, fault tolerance, security, and scalability for our SBW case study. |
Author | Koushanfar, Farinaz Munir, Arslan |
Author_xml | – sequence: 1 givenname: Arslan orcidid: 0000-0002-3126-8945 surname: Munir fullname: Munir, Arslan email: amunir@ksu.edu organization: Department of Computer Science, Kansas State University, Manhattan, KS, USA – sequence: 2 givenname: Farinaz surname: Koushanfar fullname: Koushanfar, Farinaz email: fkoushanfar@ucsd.edu organization: Department of Electrical and Computer Engineering, University of California, San Diego, CA, USA |
BookMark | eNp9kF1LwzAUhoNMcJv-APGm4HVn0yRN4t3o_IKBQie7LGl7KhldM5NW6L83dcMLL7w64c3zHjjPDE1a0wJC1zhaYBzJu80qSxdxhMUiFjThFJ-hKZYUh5HPJv7NKAuZ5PgCzZzbRVFMhaRTtF2B0x9toNoqWLaqGZx2gamDDMrewk-8ggO0lSoaCJZ9Z_am018QpG_ZfbAMsg7AhsUQbrXHU-XAR301XKLzWjUOrk5zjt4fHzbpc7h-fXpJl-uwJEx2YUGBJ3WteMKSWPCKxaQSMiFCFJKAEKzALMJJycdvKTlUCSWxqoq6BAyiIHN0e9x7sOazB9flO9Nbf4jLY-oFSMq58BQ_UqU1zlmo81J3qtOm7azSTY6jfLSYjxbz0WJ-suib-E_zYPVe2eHfzs2xowHglxdEECkx-QbmTn1o |
CODEN | ITDSCM |
CitedBy_id | crossref_primary_10_1109_ACCESS_2021_3063229 crossref_primary_10_3390_technologies13010006 crossref_primary_10_1109_TR_2024_3373810 crossref_primary_10_1145_3571287 crossref_primary_10_1109_TDSC_2019_2906161 crossref_primary_10_1109_TDSC_2022_3194712 crossref_primary_10_1109_TTE_2020_3004694 crossref_primary_10_3390_mi12111309 crossref_primary_10_1049_iet_its_2019_0565 crossref_primary_10_1109_TEMC_2020_2990156 crossref_primary_10_1109_TDSC_2018_2883057 crossref_primary_10_1109_ACCESS_2024_3426668 crossref_primary_10_1002_spe_2965 crossref_primary_10_1109_TITS_2022_3160068 crossref_primary_10_1109_MITS_2019_2898973 crossref_primary_10_3390_s21206807 crossref_primary_10_1016_j_jii_2023_100465 |
Cites_doi | 10.1109/DFTVS.1999.802887 10.1007/3-540-49646-7_19 10.1109/SP.2010.34 10.1109/IVS.2009.5164434 10.1109/ETFA.2003.1247706 10.1109/VETECF.2008.259 10.1007/978-3-642-04468-7_13 10.1109/DATE.2010.5457125 10.1007/978-3-642-04101-3 10.1109/LCOMM.2018.2835484 10.1145/951710.951734 10.1109/CyberSecurity.2012.7 10.1109/MM.2002.1028473 10.1007/978-3-662-48800-3_25 10.1145/2228360.2228402 10.1109/CCNC.2016.7444938 10.1007/978-3-540-88479-8_7 10.1109/TII.2010.2050143 10.1109/DSN.2004.1311956 10.1109/TEST.2010.5699215 10.1109/ANCS.2017.25 10.1109/CONIEL.2005.13 10.1109/ICSPCC.2016.7753631 |
ContentType | Journal Article |
Copyright | Copyright IEEE Computer Society 2020 |
Copyright_xml | – notice: Copyright IEEE Computer Society 2020 |
DBID | 97E RIA RIE AAYXX CITATION JQ2 |
DOI | 10.1109/TDSC.2018.2846741 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Xplore CrossRef ProQuest Computer Science Collection |
DatabaseTitle | CrossRef ProQuest Computer Science Collection |
DatabaseTitleList | ProQuest Computer Science Collection |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 1941-0018 |
EndPage | 827 |
ExternalDocumentID | 10_1109_TDSC_2018_2846741 8383991 |
Genre | orig-research |
GrantInformation_xml | – fundername: National Science Foundation grantid: #1743490; #1649423 funderid: 10.13039/100000001 – fundername: Office of Naval Research grantid: #N00014-17-1-2500 funderid: 10.13039/100000006 |
GroupedDBID | .4S .DC 0R~ 29I 4.4 5GY 5VS 6IK 7WY 8FE 8FG 8FL 8R4 8R5 97E AAJGR AARMG AASAJ AAWTH ABAZT ABJCF ABQJQ ABUWG ABVLG ACGFO ACIWK AENEX AETIX AFKRA AGQYO AGSQL AHBIQ AIBXA AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ARAPS ARCSS ATWAV AZQEC BEFXN BENPR BEZIV BFFAM BGLVJ BGNUA BKEBE BPEOZ BPHCQ CCPQU CS3 DU5 DWQXO EBS EDO EJD FRNLG GNUQQ HCIFZ HZ~ IEDLZ IFIPE IPLJI ITG ITH JAVBF K60 K6V K6~ K7- L6V LAI M0C M43 M7S O9- OCL P2P P62 PHGZM PHGZT PQBIZ PQBZA PQGLB PQQKQ PROAC PTHSS PUEGO Q2X RIA RIE RNI RNS RZB AAYXX CITATION JQ2 |
ID | FETCH-LOGICAL-c359t-b4e76ffa7656287d523d896388b93e885b15016c75628997ed6432adbfce1e8b3 |
IEDL.DBID | RIE |
ISSN | 1545-5971 |
IngestDate | Mon Jun 30 08:51:37 EDT 2025 Tue Jul 01 02:32:18 EDT 2025 Thu Apr 24 22:57:04 EDT 2025 Wed Aug 27 02:36:40 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | true |
Issue | 4 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c359t-b4e76ffa7656287d523d896388b93e885b15016c75628997ed6432adbfce1e8b3 |
Notes | ObjectType-Case Study-2 SourceType-Scholarly Journals-1 content type line 14 ObjectType-Feature-4 ObjectType-Report-1 ObjectType-Article-3 |
ORCID | 0000-0002-3126-8945 |
PQID | 2419494778 |
PQPubID | 27603 |
PageCount | 15 |
ParticipantIDs | crossref_citationtrail_10_1109_TDSC_2018_2846741 proquest_journals_2419494778 crossref_primary_10_1109_TDSC_2018_2846741 ieee_primary_8383991 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2020-07-01 |
PublicationDateYYYYMMDD | 2020-07-01 |
PublicationDate_xml | – month: 07 year: 2020 text: 2020-07-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | Washington |
PublicationPlace_xml | – name: Washington |
PublicationTitle | IEEE transactions on dependable and secure computing |
PublicationTitleAbbrev | TDSC |
PublicationYear | 2020 |
Publisher | IEEE IEEE Computer Society |
Publisher_xml | – name: IEEE – name: IEEE Computer Society |
References | ref35 ref12 rouf (ref15) 2010 ref14 checkoway (ref13) 2011 ref11 ref32 ref10 (ref34) 2013 ref17 ref16 ref19 (ref36) 2012 (ref30) 2012 groza (ref18) 2012 wilwert (ref2) 2005 schweppe (ref24) 2011 koren (ref3) 2007 (ref1) 2013 ref23 ref26 (ref33) 2012 ref25 ref20 oppliger (ref29) 2009 ref22 ref21 (ref31) 2012 ref28 ref27 ref8 ref7 ref9 ref4 ref6 ref5 |
References_xml | – year: 2009 ident: ref29 publication-title: SSL and TLS Theory and Practice – ident: ref11 doi: 10.1109/DFTVS.1999.802887 – ident: ref25 doi: 10.1007/3-540-49646-7_19 – ident: ref5 doi: 10.1109/SP.2010.34 – ident: ref16 doi: 10.1109/IVS.2009.5164434 – ident: ref6 doi: 10.1109/ETFA.2003.1247706 – start-page: 6 year: 2011 ident: ref13 article-title: Comprehensive experimental analyses of automotive attack surfaces publication-title: Proc 20th USENIX Conf Secur – ident: ref17 doi: 10.1109/VETECF.2008.259 – year: 2012 ident: ref33 article-title: ECU development and test with CANoe – ident: ref14 doi: 10.1007/978-3-642-04468-7_13 – year: 2011 ident: ref24 article-title: Securing Car2X applications with effective hardware-software co-design for vehicular on-board networks publication-title: Proc Joint VDI/VW Automotive Secur Conf – year: 2007 ident: ref3 publication-title: Fault-Tolerant Systems – ident: ref32 doi: 10.1109/DATE.2010.5457125 – ident: ref28 doi: 10.1007/978-3-642-04101-3 – year: 2013 ident: ref1 article-title: Road vehicles-Functional safety – ident: ref4 doi: 10.1109/LCOMM.2018.2835484 – ident: ref10 doi: 10.1145/951710.951734 – ident: ref19 doi: 10.1109/CyberSecurity.2012.7 – ident: ref23 doi: 10.1109/MM.2002.1028473 – year: 2005 ident: ref2 article-title: Design of automotive X-by-wire systems publication-title: The Industrial Communication Technology Handbook – year: 2013 ident: ref34 article-title: How secure is AES against brute force attacks? – ident: ref35 doi: 10.1007/978-3-662-48800-3_25 – ident: ref27 doi: 10.1145/2228360.2228402 – year: 2012 ident: ref36 – ident: ref21 doi: 10.1109/CCNC.2016.7444938 – ident: ref9 doi: 10.1007/978-3-540-88479-8_7 – ident: ref26 doi: 10.1109/TII.2010.2050143 – year: 2012 ident: ref31 article-title: The OpenMP API specification for parallel programming – ident: ref12 doi: 10.1109/DSN.2004.1311956 – start-page: 185 year: 2012 ident: ref18 publication-title: LiBrA-CAN A Lightweight Broadcast Authentication Protocol for Controller Area Networks – ident: ref8 doi: 10.1109/TEST.2010.5699215 – ident: ref20 doi: 10.1109/ANCS.2017.25 – ident: ref7 doi: 10.1109/CONIEL.2005.13 – year: 2012 ident: ref30 – start-page: 21 year: 2010 ident: ref15 article-title: Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study publication-title: Proc 19th USENIX Conf Security – ident: ref22 doi: 10.1109/ICSPCC.2016.7753631 |
SSID | ssj0024894 |
Score | 2.3468676 |
Snippet | The next generation of automobiles (also known as cybercars) will increasingly incorporate electronic control units (ECUs) in novel automotive control... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 813 |
SubjectTerms | Automobiles Automotive Automotive engineering behavioral reliability Case studies Computer architecture Control equipment Controller area network Cyber-physical systems Design analysis Drive by wire Electronic control Error correction Error detection Fault tolerance Feasibility studies multicore Quality of service Real time Real-time systems Safety Security steer-by-wire x-by-wire |
Title | Design and Analysis of Secure and Dependable Automotive CPS: A Steer-by-Wire Case Study |
URI | https://ieeexplore.ieee.org/document/8383991 https://www.proquest.com/docview/2419494778 |
Volume | 17 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEA7akxffYrVKDp7E1N1uukm8lVYpQkWoorclj9mL0krdFeqvN5PuVnwg3pZsAiEzyXyTfDNDyEmSCq4hipjHBpxx2XFMJwBMiTiX3KQ6shjgPLpJh_f8-rH7uELOlrEwABDIZ9DGz_CW76a2xKuyc-ndKYWh6qtezRaxWp959WQoeoiIgHmQHFcvmHGkzu8G4z6SuGS7g9aWx19sUCiq8uMkDublaoOM6oktWCVP7bIwbfv-LWfjf2e-SdYrnEl7C8XYIisw2SYbdQ0HWm3pHfIwCBQOqieO1glK6DSn4R4eQvMg1MnFECvaK4vA3nsD2r8dX9AeHRcAM2bmDGm0tO9tIkVq4nyX3F9d3vWHrCq2wGzSVQUzHESa51p4gOe9KOcdVCdxd0qjEpCyazx0jFMr8LdSApzHMh3tTG4hBmmSPdKYTCewT6hR1ub-JAHuMGF9rj2ocrortZaJU6lokqhe_sxWmcixIMZzFjySSGUosQwlllUSa5LT5ZCXRRqOvzrvoASWHavFb5JWLeOs2qivmQcwiisuhDz4fdQhWeugix0Yui3SKGYlHHkcUpjjoIAfYO7XHA |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NbxMxEB1V5QAXCrSI0BR84FThdDfrXdu9RQlRgKaqlET0tvLH7KUoQWVTKf319Ti7QVCEuK28tmR5PJ439psZgA9ZIYXBJOEBGwguVN9zkyFyLdNKCVuYxFGA8_SymCzEl-v8eg8-7mJhEDGSz7BHn_Et36_cmq7KzlRwpzSFqj8Jdl_k22itX5n1VCx7SJiAB5icNm-YaaLP5qPZkGhcqtcneyvS36xQLKvy6CyOBmZ8ANN2alteyU1vXdueu_8ja-P_zv0FPG-QJhtst8ZL2MPlKzhoqziwRqkP4dsokjiYWXrWpihhq4rFm3iMzaNYKZeCrNhgXUf-3h2y4dXsnA3YrEa85XbDiUjLhsEqMiInbo5gMf40H054U26BuyzXNbcCZVFVRgaIF_woH1xUr0g_ldUZKpXbAB7Twkn6rbVEH9BM33hbOUxR2ew17C9XS3wDzGrnqnCWoPCUsr4yAVZ5kytjVOZ1ITuQtMtfuiYXOZXE-F5GnyTRJUmsJImVjcQ6cLob8mObiONfnQ9JAruOzeJ3oNvKuGxU9WcZIIwWWkip3v591Ht4OplPL8qLz5dfj-FZnxzuyNftwn59u8aTgEpq-y5uxgfQNdpp |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Design+and+Analysis+of+Secure+and+Dependable+Automotive+CPS%3A+A+Steer-by-Wire+Case+Study&rft.jtitle=IEEE+transactions+on+dependable+and+secure+computing&rft.au=Munir%2C+Arslan&rft.au=Koushanfar%2C+Farinaz&rft.date=2020-07-01&rft.pub=IEEE&rft.issn=1545-5971&rft.volume=17&rft.issue=4&rft.spage=813&rft.epage=827&rft_id=info:doi/10.1109%2FTDSC.2018.2846741&rft.externalDocID=8383991 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1545-5971&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1545-5971&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1545-5971&client=summon |