{"id":1963,"date":"2017-12-02T23:44:34","date_gmt":"2017-12-02T15:44:34","guid":{"rendered":"http:\/\/pemsic.eee.nagasaki-u.ac.jp\/?p=1963"},"modified":"2018-02-07T00:18:04","modified_gmt":"2018-02-06T16:18:04","slug":"%e8%ac%9b%e6%bc%94%e4%bc%9a%ef%bc%9ajan-9-2018-prof-jin-gyun-chung-division-of-electronic-engineering-chonbuk-national-university-south-korea-a-security-protocol-based-on-a-can-data-compressi","status":"publish","type":"post","link":"https:\/\/pemsic.eee.nagasaki-u.ac.jp\/?p=1963","title":{"rendered":"\u8b1b\u6f14\u4f1a\uff1a\u5e73\u621030\u5e741\u67089\u65e5\uff08\u706b\uff09 Prof. Jin Gyun Chung (Division of Electronic Engineering, Chonbuk National University, South Korea): &#8220;A Security Protocol Based on a CAN Data Compression Algorithm for In-Vehicle Networks&#8221;"},"content":{"rendered":"<p>\u30b3\u30cd\u30af\u30c6\u30a3\u30c3\u30c9\u30ab\u30fc\u306b\u304a\u3051\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3059\u308b\u554f\u984c\u70b9\u3068\u305d\u306e\u89e3\u6c7a\u6848\u306a\u3069\u3092\u3054\u8b1b\u7fa9\u3044\u305f\u3060\u304d\u307e\u3057\u305f\u3002<br \/>\nThank you, Prof. J. G. Chung!<\/p>\n<p>\u4eca\u5e748\u6708\u3088\u308a\u672c\u7814\u7a76\u79d1\u306b\u5ba2\u54e1\u6559\u6388\u3068\u3057\u3066\u6ede\u5728\u3055\u308c\u3066\u304a\u3089\u308c\u308b\uff0c<br \/>\n\u97d3\u56fd\u5168\u5317\u5927\u5b66\u6821\u306eJin Gyun Chung\u5148\u751f\uff08\u5143\u5de5\u5b66\u90e8\u9577\uff09\u306b\uff0c<br \/>\n\u3054\u8b1b\u6f14\u3092\u3057\u3066\u3044\u305f\u3060\u304d\u307e\u3059\u3002<br \/>\n\u5148\u751f\u306e\u3054\u5c02\u9580\u306f\uff0c\u30c7\u30a3\u30b8\u30bf\u30eb\u4fe1\u53f7\u51e6\u7406\u3067\uff0c\u73fe\u5728\u306f\u7279\u306b<br \/>\n\u9ad8\u5ea6\u60c5\u5831\u5316\u304c\u9032\u3080\u81ea\u52d5\u8eca\u5185\u90e8\u306e\u901a\u4fe1\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5411\u4e0a\u306b<br \/>\n\u3064\u3044\u3066\u3054\u7814\u7a76\u3055\u308c\u3066\u304a\u3089\u308c\u307e\u3059\u3002<\/p>\n<p>\u662f\u975e\uff0c\u3054\u8074\u8b1b\u304f\u3060\u3055\u3044\u3002\uff08\u8074\u8b1b\u6599\u7121\u6599\uff09<\/p>\n<p>[\u65e5 \u6642]\u5e73\u621030\u5e741\u67089\u65e5\uff08\u706b\uff0916\u664210\u5206\uff5e 17\u664240\u5206<br \/>\n[\u5834 \u6240]\u9577\u5d0e\u5927\u5b66\u5de5\u5b66\u90e82\u53f7\u68df 22\u756a\u8b1b\u7fa9\u5ba4(\u9577\u5d0e\u770c\u9577\u5d0e\u5e02\u6587\u6559\u753a1-14 \u9577\u5d0e\u5927\u5b66\u6587\u6559\u30ad\u30e3\u30f3\u30d1\u30b9\uff09<br \/>\n[\u6f14 \u984c] A Security Protocol Based on a CAN Data Compression Algorithm for In-Vehicle Networks<br \/>\n(CAN Data Compression Algorithm\u3092\u57fa\u306b\u3057\u305f\u8eca\u8f09\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30d7\u30ed\u30c8\u30b3\u30eb\u306b\u95a2\u3059\u308b\u7814\u7a76)<br \/>\n\uff08\u82f1\u8a9e\u3067\u306e\u3054\u8b1b\u6f14\u306b\u306a\u308a\u307e\u3059\u3002\uff09<br \/>\n[\u8b1b \u5e2b] Prof. Jin Gyun Chung, Division of Electronic Engineering, Chonbuk National University, South Korea<br \/>\nhttps:\/\/www.researchgate.net\/profile\/Jin_Gyun_Chung<br \/>\n\uff08\u5e73\u621029\u5e748\u6708\uff5e\u5e73\u621030\u5e741\u6708\uff08\u4e88\u5b9a\uff09 \u9577\u5d0e\u5927\u5b66\u5927\u5b66\u9662\u5de5\u5b66\u7814\u7a76\u79d1\u5ba2\u54e1\u6559\u6388\uff09<br \/>\n[\u8b1b\u6f14\u6982\u8981]<br \/>\nDistributed embedded network protocols, such as the controller area network (CAN), FlexRay, MOST, and time-triggered protocol, are used in a wide variety of safety-critical applications. The CAN bus system has been successful in many application fields due to its high reliability and cost-efficiency.<br \/>\nThe CAN system has gained popularity in embedded machine control applications, such as home appliances, industrial machines, and medical equipment, which require serial communication between micro-controllers.<br \/>\nToday, most cars contain dozens of electric control units (ECUs). State-of-the-art vehicular on-board architectures consist of more than 70 ECUs that are interconnected via in-vehicle networks.<br \/>\nUnfortunately, there is no built-in way to enforce security in CAN, and this leads to many possible attacks. For example, when data are broadcast using the CAN bus network, CAN does not ensure the confidentiality and authentication of the data frames. This provides a way to easily eavesdrop on the CAN data or to launch a replay attack by a malicious adversary. Therefore, for the last 10 years, security protocols for in-vehicle networks have been studied and reported in several articles.<br \/>\nAs the number of encryption and authentication bits generated by the security algorithm increases, the bus load also increases. When a CAN bus is overloaded, it is not easy to transmit low-priority CAN messages due to the increased wait time.<br \/>\nFortunately, the bus overload can be efficiently reduced by applying data reduction techniques to the CAN data. The development of data compression techniques is based on the observation that there is only a small difference between the successive CAN frames with the same message identifiers.<br \/>\nIn this presentation, a security protocol for the CAN system is presented based on a CAN data compression algorithm. Due to the CAN data compression, in most cases, the encryption and authentication data can be transferred within the data field of the CAN protocol, which eliminates the change of the CAN protocol from the original definition. The proposed method can also be applied to the CAN FD protocol with appropriate modifications.<br \/>\nExperimental results with a Kia Sorento indicate that the average message delay with 20 ECUs is within<br \/>\n0.112 ms, and the bus load can be reduced up to 20.49% using the proposed method compared to conventional methods. Our results show that the proposed security protocol is suitable for use in real-time in-vehicle systems.<br \/>\n\u73fe\u5728\u3001\u307b\u3068\u3093\u3069\u306e\u81ea\u52d5\u8eca\u306b\u306f\u6570\u5341\u306e\u5236\u5fa1\u30e6\u30cb\u30c3\u30c8\uff08ECU\uff09\u304c\u642d\u8f09\u3055\u308c\u3066\u304a\u308a\uff0c\u8eca\u8f09\u5411\u3051\u306e\u30b3\u30f3\u30c8\u30ed\u30fc\u30e9\u30a8\u30ea\u30a2<br \/>\n\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\uff08CAN\uff09\u3092\u4ecb\u3057\u3066\u76f8\u4e92\u63a5\u7d9a\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u3057\u304b\u3057\u3001CAN\u306b\u306f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u5f37\u5316\u3059\u308b\u305f\u3081\u306e\u7d44\u307f\u8fbc\u307f\u306e<br \/>\n\u65b9\u6cd5\u304c\u306a\u304f\u3001\u30cf\u30c3\u30ad\u30f3\u30b0\u7b49\u306e\u53ef\u80fd\u6027\u304c\u61f8\u5ff5\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u3057\u305f\u304c\u3063\u3066\u3001\u904e\u53bb10\u5e74\u9593\u3001\u8eca\u8f09\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u306e\u30bb\u30ad\u30e5\u30ea<br \/>\n\u30c6\u30a3\u30d7\u30ed\u30c8\u30b3\u30eb\u306b\u95a2\u3059\u308b\u7814\u7a76\u304c\u6d3b\u767a\u5316\u3057\u3066\u3044\u307e\u3059\u3002<br \/>\n\u4e00\u65b9\u3067\uff0c\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30eb\u30b4\u30ea\u30ba\u30e0\u306b\u3088\u3063\u3066\u751f\u6210\u3055\u308c\u308b\u6697\u53f7\u5316\u304a\u3088\u3073\u8a8d\u8a3c\u30d3\u30c3\u30c8\u306e\u6570\u304c\u5897\u52a0\u3059\u308b\u3068\u3001\u30d0\u30b9\u8ca0\u8377\u3082<br \/>\n\u5897\u52a0\u3057\u307e\u3059\u3002<br \/>\n\u3053\u306e\u8b1b\u6f14\u3067\u306f\u3001\u958b\u767a\u3057\u305fCAN\u30c7\u30fc\u30bf\u5727\u7e2e\u30a2\u30eb\u30b4\u30ea\u30ba\u30e0\u306b\u57fa\u3065\u3044\u305fCAN\u30b7\u30b9\u30c6\u30e0\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30d7\u30ed\u30c8\u30b3\u30eb\u6280\u8853\u306b\u3064<br \/>\n\u3044\u3066\u7d39\u4ecb\u3057\u307e\u3059\u3002\u63d0\u6848\u624b\u6cd5\u306e\u9069\u7528\u4f8b\u3067\u306f\uff0c\u5f93\u6765\u624b\u6cd5\u3068\u6bd4\u8f03\u3057\u3066\u30d0\u30b9\u8ca0\u8377\u309220.49\uff05\u307e\u3067\u524a\u6e1b\u53ef\u80fd\u3067\u3042\u308a\u3001\u63d0\u6848\u624b\u6cd5<br \/>\n\u304c\u30ea\u30a2\u30eb\u30bf\u30a4\u30e0\u8eca\u8f09\u30b7\u30b9\u30c6\u30e0\u3067\u306e\u4f7f\u7528\u306b\u9069\u3057\u3066\u3044\u308b\u3053\u3068\u3092\u793a\u3057\u3066\u3044\u307e\u3059\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u30b3\u30cd\u30af\u30c6\u30a3\u30c3\u30c9\u30ab\u30fc\u306b\u304a\u3051\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3059\u308b\u554f\u984c\u70b9\u3068\u305d\u306e\u89e3\u6c7a\u6848\u306a\u3069\u3092\u3054\u8b1b\u7fa9\u3044\u305f&#8230; <a class=\"more-link\" href=\"https:\/\/pemsic.eee.nagasaki-u.ac.jp\/?p=1963\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":1,"featured_media":1999,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[6],"tags":[],"class_list":["post-1963","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-6"],"aioseo_notices":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/pemsic.eee.nagasaki-u.ac.jp\/wp-content\/uploads\/2017\/12\/DSC02625.jpg?fit=1280%2C853&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p6WRmG-vF","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/pemsic.eee.nagasaki-u.ac.jp\/index.php?rest_route=\/wp\/v2\/posts\/1963","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pemsic.eee.nagasaki-u.ac.jp\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pemsic.eee.nagasaki-u.ac.jp\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pemsic.eee.nagasaki-u.ac.jp\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pemsic.eee.nagasaki-u.ac.jp\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1963"}],"version-history":[{"count":5,"href":"https:\/\/pemsic.eee.nagasaki-u.ac.jp\/index.php?rest_route=\/wp\/v2\/posts\/1963\/revisions"}],"predecessor-version":[{"id":1976,"href":"https:\/\/pemsic.eee.nagasaki-u.ac.jp\/index.php?rest_route=\/wp\/v2\/posts\/1963\/revisions\/1976"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pemsic.eee.nagasaki-u.ac.jp\/index.php?rest_route=\/wp\/v2\/media\/1999"}],"wp:attachment":[{"href":"https:\/\/pemsic.eee.nagasaki-u.ac.jp\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1963"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pemsic.eee.nagasaki-u.ac.jp\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1963"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pemsic.eee.nagasaki-u.ac.jp\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1963"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}