Design and Implementation of Security Function According to Routing Method in Automotive Gateway
In recent years, vehicle networks require high bandwidth due to the increasing complexity of electronic control devices for vehicles due to the demand for advanced driving aids, infotainment and V2X communication. Therefore, Ethernet protocol was introduced and vehicle gateway system was newly intro...
Saved in:
Published in | International journal of automotive technology Vol. 22; no. 1; pp. 19 - 25 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Seoul
The Korean Society of Automotive Engineers
01.02.2021
Springer Nature B.V 한국자동차공학회 |
Subjects | |
Online Access | Get full text |
ISSN | 1229-9138 1976-3832 |
DOI | 10.1007/s12239-021-0003-9 |
Cover
Summary: | In recent years, vehicle networks require high bandwidth due to the increasing complexity of electronic control devices for vehicles due to the demand for advanced driving aids, infotainment and V2X communication. Therefore, Ethernet protocol was introduced and vehicle gateway system was newly introduced in vehicle system. The vehicle gateway system provides an interface for continuously connecting and exchanging vehicle data in different communication environments between the Controller Area Network (CAN) protocol and the Ethernet network protocol. There are two types of data exchange in the vehicle gateway. These are direct routing and indirect routing. Vehicle gateways are connected to external networks, which can lead to security vulnerabilities. So it needs security function to ensure message integrity. Recently, vehicle manufacturers have introduced gateway systems with security features that operate to verify the integrity of messages using cipher-based message authentication codes (CMAC). But applying security functions to a gateway system introduces delays in performing security functions. Therefore, in this paper, to design stable and efficient the vehicle gateway system with security function, we have tested and evaluated the latency time that can occur according to the routing methods which are direct routing and indirect routing. |
---|---|
Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ISSN: | 1229-9138 1976-3832 |
DOI: | 10.1007/s12239-021-0003-9 |