Next Article in Journal
Multiple Preprocessing Hybrid Level Set Model for Optic Disc Segmentation in Fundus Images
Previous Article in Journal
Vision-Based Performance Analysis of an Active Microfluidic Droplet Generation System Using Droplet Images
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Design and Testing of a Computer Security Layer for the LIN Bus †

Electrical Engineering Department, Faculty of Engineering, University of Santiago of Chile (USACH), Av. Ecuador 3519, Estación Central, Santiago 9170124, Chile
*
Author to whom correspondence should be addressed.
This paper is an extended version of our paper published in 2021 IEEE CHILEAN Conference on Electrical, Electronics Engineering, Information and Communication Technologies (CHILECON), Valparaíso, Chile, 6–9 December 2021.
Sensors 2022, 22(18), 6901; https://doi.org/10.3390/s22186901
Submission received: 11 August 2022 / Revised: 6 September 2022 / Accepted: 7 September 2022 / Published: 13 September 2022
(This article belongs to the Topic Cyber Security and Critical Infrastructures)

Abstract

Most modern vehicles are connected to the internet via cellular networks for navigation, assistance, etc. via their onboard computer, which can also provide onboard Wi-Fi and Bluetooth services. The main in-vehicle communication buses (CAN, LIN, FlexRay) converge at the vehicle’s onboard computer and offer no computer security features to protect the communication between nodes, thus being highly vulnerable to local and remote cyberattacks which target the onboard computer and/or the vehicle’s electronic control units through the aforementioned buses. To date, several computer security proposals for CAN and FlexRay buses have been published; a formal computer security proposal for the LIN bus communications has not been presented. So, we researched possible security mechanisms suitable for this bus’s particularities, tested those mechanisms in microcontroller and PSoC hardware, and developed a prototype LIN network using PSoC nodes programmed with computer security features. This work presents a novel combination of encryption and a hash-based message authentication code (HMAC) scheme with replay attack rejection for the LIN communications. The obtained results are promising and show the feasibility of the implementation of an LIN network with real-time computer security protection.
Keywords: computer security; in-vehicle networking; LIN; encryption; HMAC; microcontroller; PSoC computer security; in-vehicle networking; LIN; encryption; HMAC; microcontroller; PSoC

Share and Cite

MDPI and ACS Style

Páez, F.; Kaschel, H. Design and Testing of a Computer Security Layer for the LIN Bus. Sensors 2022, 22, 6901. https://doi.org/10.3390/s22186901

AMA Style

Páez F, Kaschel H. Design and Testing of a Computer Security Layer for the LIN Bus. Sensors. 2022; 22(18):6901. https://doi.org/10.3390/s22186901

Chicago/Turabian Style

Páez, Felipe, and Héctor Kaschel. 2022. "Design and Testing of a Computer Security Layer for the LIN Bus" Sensors 22, no. 18: 6901. https://doi.org/10.3390/s22186901

APA Style

Páez, F., & Kaschel, H. (2022). Design and Testing of a Computer Security Layer for the LIN Bus. Sensors, 22(18), 6901. https://doi.org/10.3390/s22186901

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop