units, tire sensors as well as several controllers for
BCM, engine and chasis functionalities. The chal-
lenge in designing security solutions stems from the
fact that security must be transparent to the user, ide-
ally requiring no interaction with the user and small
(almost inexistent) delays or bus-loads. Any security
mechanisms that requires more interaction comes at
the cost of usability while performance overhead may
compromise overall system performance. This exper-
imental model may provide a more realistic setup for
validating solutions in this regard.
ACKNOWLEDGEMENTS
This work was supported by a grant of the Romanian
National Authority for Scientific Research and Inno-
vation, CNCS-UEFISCDI, project number PN-II-RU-
TE-2014-4-1501 (2015-2017).
REFERENCES
Busold, C., Taha, A., Wachsmann, C., Dmitrienko, A.,
Seudi
´
e, H., Sobhani, M., and Sadeghi, A.-R. (2013).
Smart keys for cyber-cars: Secure smartphone-based
NFC-enabled car immobilizer. In Conference on Data
and Application Security and Privacy, pages 233–242.
ACM.
Checkoway, S., McCoy, D., Kantor, B., Anderson, D.,
Shacham, H., Savage, S., Koscher, K., Czeskis, A.,
Roesner, F., Kohno, T., et al. (2011). Comprehensive
experimental analyses of automotive attack surfaces.
In USENIX Security Symposium.
Groza, B., Murvay, P.-S., Van Herrewege, A., and Ver-
bauwhede, I. (2012). LiBrA-CAN: a lightweight
broadcast authentication protocol for controller area
networks. In 11th International Conference on Cryp-
tology and Network Security, CANS 2012, Springer-
Verlag, LNCS.
Groza, B. and Murvay, S. (2013). Efficient protocols for
secure broadcast in controller area networks. IEEE
Transactions on Industrial Informatics, 9(4):2034–
2042.
Gu, Z., Han, G., Zeng, H., and Zhao, Q. (2016). Security-
aware mapping and scheduling with hardware co-
processors for flexray-based distributed embedded
systems. IEEE Transactions on Parallel and Dis-
tributed Systems, 27(10):3044–3057.
Han, G., Zeng, H., Li, Y., and Dou, W. (2014). Safe:
Security-aware flexray scheduling engine. In Design,
Automation and Test in Europe Conference and Exhi-
bition (DATE), pages 1–4. IEEE.
Hartkopp, O., Reuber, C., and Schilling, R. (2012).
MaCAN-message authenticated CAN. In 10th Int.
Conf. on Embedded Security in Cars (ESCAR 2012).
Ishtiaq Roufa, R. M., Mustafaa, H., Travis Taylora, S. O.,
Xua, W., Gruteserb, M., Trappeb, W., and Seskarb,
I. (2010). Security and privacy vulnerabilities of in-
car wireless networks: A tire pressure monitoring sys-
tem case study. In 19th USENIX Security Symposium,
pages 11–13.
Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno,
T., Checkoway, S., McCoy, D., Kantor, B., Anderson,
D., Shacham, H., et al. (2010). Experimental security
analysis of a modern automobile. In Security and Pri-
vacy (SP), 2010 IEEE Symposium on, pages 447–462.
IEEE.
Kurachi, R., Matsubara, Y., Takada, H., Adachi, N.,
Miyashita, Y., and Horihata, S. (2014). CaCAN - cen-
tralized authentication system in CAN (controller area
network). In 14th Int. Conf. on Embedded Security in
Cars (ESCAR 2014).
Lemke, K., Sadeghi, A.-R., and St
¨
uble, C. (2006). Anti-
theft protection: Electronic immobilizers. In Embed-
ded Security in Cars, pages 51–67. Springer.
Lin, C.-W., Zhu, Q., and Sangiovanni-Vincentelli, A.
(2015). Security-aware modeling and efficient map-
ping for CAN-based real-time distributed automotive
systems. IEEE Embedded Systems Letters, 7(1):11–
14.
Miller, C. and Valasek, C. (2013). Adventures in automotive
networks and control units. DEF CON, 21:260–264.
Smith, C. (2016). The Car Hacker’s Handbook. No Starch
Press.
Solomon, C. and Groza, B. (2015). LiMon - lightweight
authentication for tire pressure monitoring sensors. In
1st Workshop on the Security of Cyber-Physical Sys-
tems.
Staggs, J. (2013). How to hack your mini cooper: reverse
engineering can messages on passenger automobiles.
Institute for Information Security.
Verdult, R., Garcia, F. D., and Balasch, J. (2012). Gone in
360 seconds: Hijacking with hitag2. In Proceedings of
the 21st USENIX conference on Security symposium,
pages 37–37. USENIX Association.
Xu, M., Xu, W., Walker, J., and Moore, B. (2013).
Lightweight secure communication protocols for in-
vehicle sensor networks. In Workshop on Security,
privacy & dependability for cyber vehicles, pages 19–
30. ACM.
An Experimental Model for In-vehicle Networks and Subsystems
331