Design and Implementation of Security Function According to Routing Method in Automotive Gateway

Jin Seo Park, Dae Hyun Kim, Il Hong Suh

Research output: Contribution to journalArticlepeer-review

1 Scopus citations

Abstract

In recent years, vehicle networks require high bandwidth due to the increasing complexity of electronic control devices for vehicles due to the demand for advanced driving aids, infotainment and V2X communication. Therefore, Ethernet protocol was introduced and vehicle gateway system was newly introduced in vehicle system. The vehicle gateway system provides an interface for continuously connecting and exchanging vehicle data in different communication environments between the Controller Area Network (CAN) protocol and the Ethernet network protocol. There are two types of data exchange in the vehicle gateway. These are direct routing and indirect routing. Vehicle gateways are connected to external networks, which can lead to security vulnerabilities. So it needs security function to ensure message integrity. Recently, vehicle manufacturers have introduced gateway systems with security features that operate to verify the integrity of messages using cipher-based message authentication codes (CMAC). But applying security functions to a gateway system introduces delays in performing security functions. Therefore, in this paper, to design stable and efficient the vehicle gateway system with security function, we have tested and evaluated the latency time that can occur according to the routing methods which are direct routing and indirect routing.

Original languageEnglish
Pages (from-to)19-25
Number of pages7
JournalInternational Journal of Automotive Technology
Volume22
Issue number1
DOIs
StatePublished - 2021 Feb

Keywords

  • Automotive
  • CANFD
  • CMAC
  • Cybersecurity
  • Ethernet
  • Gateway
  • HSM

Fingerprint

Dive into the research topics of 'Design and Implementation of Security Function According to Routing Method in Automotive Gateway'. Together they form a unique fingerprint.

Cite this