CHUNG-WEI LINSangiovanni-Vincentelli, Alberto L.Alberto L.Sangiovanni-Vincentelli2020-05-042020-05-042012https://scholars.lib.ntu.edu.tw/handle/123456789/488140https://www.scopus.com/inward/record.uri?eid=2-s2.0-84881046901&doi=10.1109%2fCyberSecurity.2012.7&partnerID=40&md5=0cab4b03dd1393089cd9c05b593f68feWe propose a security mechanism to help prevent cyber-attacks (masquerade and replay) in vehicles with architecture based on Controller Area Network (CAN). We focus on CAN as it will likely continue being used in upcoming in-vehicle architectures. The CAN protocol contains no direct support for secure communications. Retrofitting the protocol with security mechanisms poses several challenges given the very limited data rates available (e.g., 500kbps) since bus utilization may significantly increase. In this paper, we focus on a security mechanism which keeps the bus utilization as low as possible. Through our experimental results, we show that our security mechanism can achieve high security levels while keeping communication overheads (e.g., bus load and message latency) at reasonable levels. © 2012 IEEE.Buses; Control system synthesis; Controllers; Network architecture; Network protocols; Process control; Architecture-based; Bus utilizations; Communication overheads; Controller area network; High security levels; Message latency; Security mechanism; Vehicle architecture; Network securityCyber-Security for the Controller Area Network (CAN) Communication Protocol.conference paper10.1109/CyberSecurity.2012.72-s2.0-84881046901https://doi.org/10.1109/CyberSecurity.2012.7