International Journal of Computer Theory and Engineering

Editor-In-Chief: Prof. Mehmet Sahinoglu
Frequency: Quarterly
ISSN: 1793-8201 (Print), 2972-4511 (Online)
Publisher:IACSIT Press
OPEN ACCESS
4.1
CiteScore

⚠️ Important Security Notice: Beware of Fraudulent Emails Impersonating IJCTE Officials
IJCTE 2019 Vol.11(1): 1-5 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2019.V11.1230

Research of Automotive Ethernet Security Based on Encryption and Authentication Method

Hua Yang, Meng-Zhuo Liu, Yi-Hu Xu, Yu-Jing Wu, and Yi-Nan Xu

Abstract—With the continuous maturity of automotive electronics and automation technologies, cars have provided drivers more driving entertainment by getting connected to smart phones, Bluetooth and the Internet, but it also brings hacker attacks, security vulnerability and other secure issues which cannot be ignored, these issues will seriously affect vehicle drives safety, personal privacy, and even endanger public safety. Automotive Ethernet have feature of high rate, so it can be applied to multimedia systems in cars. However, car bus system and the multimedia system are connected to each other through the Gateway system make the CAN (Controller Area Network), FlexRay and other vehicle bus network systems no longer independent and secure, so the security of the Automotive Ethernet must be guaranteed. In this paper ,we present a vehicle Ethernet network model, and introduces the AES-128 encryption algorithm and HMAC-SHA1 security authentication method and technology into the vehicle Ethernet system, that effectively preventing external intrusion, data hopping, and other possibility, further improved network security performance of automotive Ethernet and car bus networks.

Index Terms—Automotive Ethernet, data encryption, cyber security, video transmission, bus network.

The authors are with the College of Engineering of Yanbian University, Yanji, 133002, China (e-mail: ynxu@ybu.edu.cn).

[PDF]

Cite:Hua Yang, Meng-Zhuo Liu, Yi-Hu Xu, Yu-Jing Wu, and Yi-Nan Xu, "Research of Automotive Ethernet Security Based on Encryption and Authentication Method," International Journal of Computer Theory and Engineering vol. 11, no. 1, pp. 1-5, 2019.

Article Metrics in Dimensions

Menu