Design and Implementation of Security Function According to Routing Method in Automotive Gateway

In recent years, vehicle networks require high bandwidth due to the increasing complexity of electronic control devices for vehicles due to the demand for advanced driving aids, infotainment and V2X communication. Therefore, Ethernet protocol was introduced and vehicle gateway system was newly intro...

Full description

Saved in:
Bibliographic Details
Published inInternational journal of automotive technology Vol. 22; no. 1; pp. 19 - 25
Main Authors Park, Jin Seo, Kim, Dae Hyun, Suh, Il Hong
Format Journal Article
LanguageEnglish
Published Seoul The Korean Society of Automotive Engineers 01.02.2021
Springer Nature B.V
한국자동차공학회
Subjects
Online AccessGet full text
ISSN1229-9138
1976-3832
DOI10.1007/s12239-021-0003-9

Cover

More Information
Summary:In recent years, vehicle networks require high bandwidth due to the increasing complexity of electronic control devices for vehicles due to the demand for advanced driving aids, infotainment and V2X communication. Therefore, Ethernet protocol was introduced and vehicle gateway system was newly introduced in vehicle system. The vehicle gateway system provides an interface for continuously connecting and exchanging vehicle data in different communication environments between the Controller Area Network (CAN) protocol and the Ethernet network protocol. There are two types of data exchange in the vehicle gateway. These are direct routing and indirect routing. Vehicle gateways are connected to external networks, which can lead to security vulnerabilities. So it needs security function to ensure message integrity. Recently, vehicle manufacturers have introduced gateway systems with security features that operate to verify the integrity of messages using cipher-based message authentication codes (CMAC). But applying security functions to a gateway system introduces delays in performing security functions. Therefore, in this paper, to design stable and efficient the vehicle gateway system with security function, we have tested and evaluated the latency time that can occur according to the routing methods which are direct routing and indirect routing.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:1229-9138
1976-3832
DOI:10.1007/s12239-021-0003-9