DOI QR코드

DOI QR Code

Development of CAN network intrusion detection algorithm to prevent external hacking

외부 해킹 방지를 위한 CAN 네트워크 침입 검출 알고리즘 개발

  • Kim, Hyun-Hee (Department of Control and Instrumentation Engineering, Pukyong National University) ;
  • Shin, Eun Hye (pyuteuronik CO., LTD.) ;
  • Lee, Kyung-Chang (Department of Control and Instrumentation Engineering, Pukyong National University) ;
  • Hwang, Yeong-Yeun (Department of Control and Instrumentation Engineering, Pukyong National University)
  • Received : 2017.04.05
  • Accepted : 2017.05.12
  • Published : 2017.06.30

Abstract

With the latest developments in ICT(Information Communication Technology) technology, research on Intelligent Car, Connected Car that support autonomous driving or services is actively underway. It is true that the number of inputs linked to external connections is likely to be exposed to a malicious intrusion. I studied possible security issues that may occur within the Connected Car. A variety of security issues may arise in the use of CAN, the most typical internal network of vehicles. The data can be encrypted by encrypting the entire data within the CAN network system to resolve the security issues, but can be time-consuming and time-consuming, and can cause the authentication process to be carried out in the event of a certification procedure. To resolve this problem, CAN network system can be used to authenticate nodes in the network to perform a unique authentication of nodes using nodes in the network to authenticate nodes in the nodes and By encoding the ID, identifying the identity of the data, changing the identity of the ID and decryption algorithm, and identifying the cipher and certification techniques of the external invader, the encryption and authentication techniques could be detected by detecting and verifying the external intruder. Add a monitoring node to the CAN network to resolve this. Share a unique ID that can be authenticated using the server that performs the initial certification of nodes within the network and encrypt IDs to secure data. By detecting external invaders, designing encryption and authentication techniques was designed to detect external intrusion and certification techniques, enabling them to detect external intrusions.

Keywords

References

  1. 조아람, "CAN 버스 공격에 안전한 메시지 인증 및 키 분배 메커니즘", 석사학위논문, 고려대학교 (2013).
  2. "지능형 교통시스템의 차량 통신 보안 기술 동향과 전망", 한국방송통신전파진흥원, 제59호, (2014).
  3. 이혜련, 김경진, 정기현, 최경희, 박승규, 권도근, "자동차용 ECU의 CAN 메시지를 통한 자동차 공격 방법 연구", 한국컴퓨터정보학회논문지, 18(11), pp.39-49, (2013). https://doi.org/10.9708/jksci.2013.18.11.039
  4. 명의정, 윤주범, "커넥티드카 보안 위협 동향 연구", 한국통신학회, (2015).
  5. 문보경, "[이슈분석]커넥티드카 '합종연횡'..수직계열화지고 융합⋅협력이 대세", 전자신문, (2016.05.16.).
  6. 김선영, "커넥티드 카 서비스 동향 분석", 주간기술동향, (2013).