development of Time Triggered CAN (ISO, 2004).
Still, to best of our knowledge there is no implemen-
tation available to assure authenticity in CAN net-
works. Thus, the main intention of this paper is to
develop a higher layer implementation and to study
several trade-offs to increase its efficiency. We an-
alyze this both at a theoretical level by introducing
the corresponding formalism and by designing an ef-
ficient protocol and at a practical level by following
an efficient implementation. This is done on S12X
microcontrollers from Freescale, a family of micro-
controllers frequently found in the automotive indus-
try, with the use of the XGATE co-processor available
on S12X derivatives to speed up cryptographic func-
tions.
As for the cryptographic mechanism that can be
employed for this purpose, public-key cryptography
is not the solution because of both the computational
and communication overhead. As messages are short
in CAN networks, usually fitting in the 64 bits of
data carried by one CAN frame, using a public-key
primitive such as the RSA will require thousands of
bits and causes a significant overhead. Elliptic curves
will significantly reduce the size of the messages, but
still the computational overhead is too much to assure
small authentication delays. While the computational
overhead can be alleviated by dedicated circuits, such
as ASICs and FPGAs, this will largely increase the
cost of components, an issue that is largely avoided
by manufacturers.
In contrast, symmetric primitives were efficiently
employed for authentication in constrained environ-
ments such as sensor networks (Perrig et al., 2001b),
(Liu and Ning, 2003), (Liu and Ning, 2004). Due
to the broadcast nature of CAN, protocols similar to
the well known TESLA protocol (Perrig et al., 2000),
(Perrig et al., 2001a) can be used in this context as
well. There is an extensive bibliography related to
the TESLA protocol. Its history can be traced back
to Lamport’s scheme which uses one-way chains to
authenticate users over an insecure network (Lam-
port, 1981). The work of Bergadano et al. (Bergadano
et al., 2002) proposes several variants of one-way
chain based protocols, with or without time synchro-
nization. Previous work which inspired this family of
protocols is the Guy Fawkes protocol from (Anderson
et al., 1998). The context which is more related to our
setting here is that of the application of such protocols
in sensor networks. In particular, several trade-offs
for sensor networks were studied in (Liu and Ning,
2003), (Liu and Ning, 2004) and several variants of
the protocols are presented by Perrig as well in (Per-
rig et al., 2000), (Perrig et al., 2001a) .
In the case of the industrial controllers, some of
the constraints are similar. For example, computa-
tional power is also low and, although high speed mi-
crocontrollers are also available on the market, low
speed microcontrollers are preferred to reduce costs.
But while low computational power gives some sim-
ilarities, other constraints are different. For exam-
ple, energy consumption is a relevant issue in sen-
sor networks, but usually for control units inside a car
this is not a main concern since they do not strongly
rely on small batteries. On the other side, a differ-
ent constraint here, that is not so prevalent in sensor
networks, is the size of the message which is limited
to 64 bits on a CAN frame. Indeed, larger messages
can be split in smaller messages but the overhead in-
flicted by the structure of the CAN frame is around
50%. This becomes prevalent in the case of one-way
chain based protocols, where hash-functions are used
to compute the chain elements and thus to send an el-
ement of the chain will require at least two exchanged
messages (assuming the simplest hash function out-
puts 128 bits). To this, one will need to add the mes-
sage authentication code as well, which again requires
at least two exchanged messages, etc. Thus, at least
four CAN frames are needed to transmit just the se-
curity elements of one frame with useful information.
Still, the most critical part, in automotivecommunica-
tion and control systems in general, where this proto-
col is mostly used, are the authentication delays, i.e.,
how fast a packet can be deemed as authentic. For
this purpose, the most relevant constraint to which we
want to give a positive answer is the authentication
delay. In particular we must assure that a node, if the
bus is not taken by a higher priority message, is able to
transmit the message and the message can be checked
for authenticity as soon as possible. This condition
is initially limited by the computational power, but as
checking for authenticity can happen only as soon as
the disclosure delay expires and the next element of
the chain is committed, this also depends on the struc-
ture of the chain which is determined by the amount
of memory, and also on the bandwidth. Using too
large chains means too much time in the initialization
stage and large amounts of memory, while too short
chains means either high authentication delays or too
frequent re-initializations, etc. Depicting an optimum
in this context is not straight forward and we study
this in detail in what follows. In particular, we used in
our scheme several levels of one way chains. While
three levels of one-way chains were reported to be
close to optimal in sensor networks, due to memory
constraints and to reduce initialization in some situ-
ations we used more levels. This is because of both
the time horizon of the protocol and of the duration of
the disclosure interval. In sensor networks the disclo-
HIGHER LAYER AUTHENTICATION FOR BROADCAST IN CONTROLLER AREA NETWORKS
189