Rochester Institute of Technology
Adding Security to Control Area Network of Vehicles by Using SHA-3.
Degree: MS, Department of Computing Security (GCCIS), 2017, Rochester Institute of Technology
The lack of security in the vehicles on the road is real and should be taken seriously. Since the lifespan of vehicles has average of eleven years, this means if we start to implement new changes to vehicles today, it would takes eleven years to make sure most vehicles on the road support our implementation. This is important as the number of lines of codes in vehicles are ever increasing and becoming more autonomous with the ability for vehicles to drive themselves. But there is no security implemented in their low level systems such as the Control Area Network which is being used to transfer real time critical information and commands such as engine speed and the brake control. This project attempts to solve the lack of secruity by using SHA3 hashing algorithm based on the Keceak algorithm. The reason Keceak was chosen to be the SHA3 algorithm because it is hardware friendly and fast. Vehicle's manufacturers do not share information about the electrical parts used in the vehicles and their specification, this project presents the lowest hardware specification required to use SHA3 on the Control Area Network which is a process with a clock frequency of approximately 400 MHz. It is important to have a real-time communication network for the Control Area Network which also known as CAN. SHA3 is used to create a hash of the CAN message along with a node specific key and an IV to provide authentication and semantic security respectively; The digest will be transferred along with the message. To use the mechanism proposed in this project, all CAN nodes communicate with each other required to support CAN FD and also have the minimum hardware specification.
Advisors/Committee Members: Sumita Mishra, Hrishikesh Acharya.
Subjects/Keywords: Vehicles; Computing security; Control area network; CAN FD; SHA3; Keccak
to Zotero / EndNote / Reference
APA (6th Edition):
Ameri, A. (2017). Adding Security to Control Area Network of Vehicles by Using SHA-3. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/9421
Chicago Manual of Style (16th Edition):
Ameri, Aidin. “Adding Security to Control Area Network of Vehicles by Using SHA-3.” 2017. Masters Thesis, Rochester Institute of Technology. Accessed October 15, 2019.
MLA Handbook (7th Edition):
Ameri, Aidin. “Adding Security to Control Area Network of Vehicles by Using SHA-3.” 2017. Web. 15 Oct 2019.
Ameri A. Adding Security to Control Area Network of Vehicles by Using SHA-3. [Internet] [Masters thesis]. Rochester Institute of Technology; 2017. [cited 2019 Oct 15].
Available from: https://scholarworks.rit.edu/theses/9421.
Council of Science Editors:
Ameri A. Adding Security to Control Area Network of Vehicles by Using SHA-3. [Masters Thesis]. Rochester Institute of Technology; 2017. Available from: https://scholarworks.rit.edu/theses/9421