This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
1. Introduction
In recent years the number of electronics-based and software-based functionalities is constantly increasing in modern vehicles. X-by-wire systems are replacing the typical hydraulic and mechanic systems to improve the control efficient and handling stability of vehicles. Active safety systems such as lane departure warning, adaptive cruise control, collision prevention assist, electronic stability program, or blind spot detection make vehicles safer and more comfortable. These new function applications are often implemented on a distributed architecture with high demands on the in-vehicle network in terms of bandwidth and deterministic behavior [1]. To overcome the deficiencies of the predominant event-triggered control area network (CAN) [2] for in-vehicle communication, the time-triggered (TT) architecture based on FlexRay [3] is becoming increasingly more common for implementation of such safety-critical automotive systems [4–6].
FlexRay is a hybrid in-vehicle communication standard with fully deterministic and high bandwidth (10 Mbps). In FlexRay, time is divided into communication cycles, and each cycle contains both a Static Segment (ST) with time-triggered (TDMA) communication and a Dynamic (DYN) Segment with event-triggered communication. The ST segment enables the transmission of time-critical frames in a predefined position of the cycle. The DYN segment is used to transfer less critical frames such as diagnosis and maintenance data. FlexRay includes a dual channel bus specification and strong error-detection mechanisms for increased reliability. These capabilities make it a powerful network solution in automotive domain.
With the development of intelligence and networking of vehicles, automotive systems are becoming increasingly connected to the physical environment, mobile devices, surrounding infrastructures, and other systems. A wide range of communication interfaces increases the risks of systems being compromised by attackers. In [7–11], the researchers demonstrated that modern automotive systems are vulnerable to attacks through various interfaces such as OBD-II, Bluetooth, Wi-Fi, DSRC, GPS, and 3G/4G. Once one Electronic Control Unit (ECU) of the system is compromised by malicious attackers through any interface, they can gain access to other safety-critical ECUs via internal network and inject malicious messages, thereby inducing system failures. It is therefore important to guarantee the authenticity of the communication data of automotive systems. However, despite the various advantages of FlexRay-based architecture, it does not directly provide multicast source authentication to protect data authenticity.
Integrating authentication mechanisms into FlexRay-based real-time automotive systems is not an easy task. Such systems usually have tight resource constraints, such as limited computing and bandwidth resources, strict timing constraints, and high-performance requirements with respect to latency and extensibility. This makes it virtually impossible to add authentication mechanism after the scheduling design stage without violating the system constraints or degrading the system performances. Therefore it is essential to address security together with other constraints and objectives from the beginning of scheduling design process. This involves two issues: The first is to deploy an appropriate multicast authentication mechanism considering the resource constraints and timing constraints of the systems; the second is to develop an optimal security-aware design of system scheduling subject to both authentication mechanism constraints and all other traditional design constraints, which are often in conflict and require careful trade-offs.
A number of studies on multicast authentication mechanisms have been reported in literature [12–22]. Digital signatures based on public key cryptography provide an elegant method for signing multicast data, but they are not the solution in our context because of the high computational overhead. Although the computational overhead could be alleviated by dedicated circuits, such as FPGAs or ASICs, this will add component costs, an issue that is typically avoided by manufacturers. Schemes using one-time signatures [12, 14, 15] are much more computationally efficient than traditional public key signatures. However, one-time signatures can incur kilobytes of authentication data per message, which makes them impractical for automotive systems with the requirement of real-time and efficient data transmission.
In contrast, symmetric cryptography is more suitable for the constrained environments. Simply applying the point-to-point authentication mechanisms, such as appending a message authentication code (MAC) to each message or every other message computed by a secret key shared across all nodes, cannot provide adequate multicast authentication. The problem is that any node which holds the secret key can forge message and impersonate the sender. Several schemes [16, 17] have been based on the concept that a sender shares a unique symmetric key with each receiver to prevent this attack. For each message, the sender generates and sends one MAC for each distinct receiver. However, even for a small number of receivers, the computational and bandwidth overhead makes this approach infeasible for automotive systems with tight resource constraints and strict timing constraints. TESLA [18] provides multicast authentication based on delayed disclosure of keys by using only symmetric cryptography. The core idea of TESLA is that the sender appends to each message a MAC computed by using a key known only to itself and discloses this key after a short time interval. Each receiver buffers the received frame and then verifies the authenticity after it receives the correct key. TESLA was extended and applied in resource constrained wireless sensor networks by several authors [13, 19–22], because it provides an appropriate trade-off between security level and resource overheads. In this work, we choose the TESLA mechanism to perform multicast authentication on FlexRay bus and make a modification to the original TESLA so that it is more appropriate for our application setting.
Moreover, the design synthesis of the FlexRay static communication schedule has also been well studied in the past [1, 23–29]. Schmidt et al. [23] addressed the scheduling problem of periodic signals in the FlexRay ST segment. In their study, signals are first packed into message frames while maximizing the utilization; the obtained messages are then scheduled in the FlexRay ST segment while using a minimum number of slots. Kang et al. [24] proposed a frame-packing algorithm that allows the packing of signals with different periods into a frame. Schmidt et al. [25] proposed an ILP-based method to assign ST slots for the signals. Grenier et al. [26] proposed a heuristic to construct the schedule on the ST segment of FlexRay systems. Some studies have further considered using the slot multiplexing mechanism on signal scheduling of FlexRay, which is specifically dedicated for scalable efficient bandwidth exploitation. Lukasiewycz et al. [27] applied single slot multiplexing to the scheduling of the ST segment with the objective of increasing the utilization of the FlexRay bus. Zhao et al. [28] proposed a fast heuristic as well as an efficient integer linear programming (MILP) approach to optimize the scheduling of the FlexRay ST segment. They [29] also proposed a rectangle bin packing optimization approach to schedule communication signals with timing constraints into the FlexRay static segment at minimum bandwidth cost. Sagstetter et al. [1] proposed single-stage and multistage ILP approaches to schedule the FlexRay ST segment. All of the above works only focus on the communication schedule and did not attempt to schedule at the system-level. The isolated signal scheduling may seriously limit the feasibility and performance of automotive applications, which consist of both signals and tasks.
A handful of studies have studied the scheduling on both signals and tasks for FlexRay-based real-time automotive systems. Zeng et al. [30] applied MILP optimization framework to solve the scheduling problem for time-triggered systems communicating over the FlexRay ST segment. Hu et al. [31] proposed a holistic scheduling algorithm for FlexRay-based time-triggered systems. Lukasiewycz et al. [32] presented a modular framework based on ILP to perform schedule synthesis for FlexRay-based time-triggered automotive systems. Roy et al. [33] proposed a multiobjective cooptimization approach that synthesizes both the controllers and the task and communication schedules of FlexRay ST segment. However, none of the above-mentioned works considered the pressing concerns of security for automotive systems, i.e., the interference of security operations on system applications.
Furthermore, several approaches have been proposed for the codesign of security and other traditional functions of embedded systems. Jiang et al. [34] presented a constraint logic programming-based approach to efficiently implement cryptographic algorithms on the distributed real-time embedded systems. The objective of their approach is to determine the minimal hardware overhead and the mapping for encryption and decryption tasks of the system such that the confidentiality requirements for messages were fulfilled and the time constraints were satisfied. For authenticity, Wasicek et al. [35] presented an implementation of the TESLA mechanism in a Time-Triggered system but did not consider system-level design issues. Lin et al. [36] applied MACs generated by a group session key to protect against masquerade and replay attacks on CANs, and they proposed an integrated MILP formulation to explore the mapping from the functional model to the CAN-based architecture platform. They [37] later proposed optimization algorithms for mapping from a functional model to a TDMA-based architecture platform, while both works focused on network scheduling issues but did not consider the CPU overheads of authentication operations as well as their interference on application tasks scheduling. Gu et al. [38] proposed a security-aware optimization approach of FlexRay-based distributed systems, interested in minimizing the total used number of hardware units subject to schedulability. However their approach ignored the key authentication operations of the applied TESLA mechanism and therefore cannot provide adequate security. In this work, we analyze and model all the additional operations induced by TESLA authentication mechanism and then provide an MILP formulation for solving the scheduling optimization problem of FlexRay-based real-time automotive systems while meeting the requirements of both information security and functional safety.
To this end, our major contributions are as follows.
(i)
First, we apply the TESLA authentication mechanism to protect against forgery and replay attacks on FlexRay bus. It provides an appropriate trade-off between security level and resource overhead, compared with other multicast authentication approaches. Moreover, we make a slight modification to the original TESLA in order to improve on the authentication delay.
(ii)
Furthermore, we propose an MILP formulation that efficiently solves the optimal scheduling problem of FlexRay-based real-time automotive systems with authentication mechanism constraints. The proposed approach considers end-to-end delays and the precedence constraints induced by information passing between all automotive control and authentication mechanism-related tasks and signals. The scheduling design includes (a) the packing of automotive control and authentication mechanism-related signals to FlexRay frames, (b) the scheduling of frames on FlexRay bus (i.e., slot assignment), and (c) the scheduling of automotive control and authentication mechanism-related tasks on respective ECU. The optimization objective is to maximize the laxity (difference between deadlines and response times) on time-sensitive function paths, therefore improving timing performance, or to minimize the number of used slots, therefore improving extensibility.
The remainder of the paper is organized as follows. Section 2 introduces the system model and application model. Section 3 presents the security mechanism and security model. Section 4 describes the security-aware optimization scheduling problem whose solution is tackled using MILP-based method. Section 5 shows experimental results, and Section 6 concludes the paper.
2. System Model and Application Model
2.1. System Model
The target platform is a typical distributed time-triggered automotive system: a cluster of ECUs that are connected via the FlexRay bus, as presented in Figure 1(a). The ECU
[figures omitted; refer to PDF]
In FlexRay, the communication takes place in a recurring cycle, as depicted in Figure 2. Each communication cycle involves the ST segment, DYN segment, symbol window, and network idle time. The static segment applies the TDMA scheme and is composed of several equally sized slots. During any slot in any communication cycle, the sole ECU
To support the efficient use of the ST, FlexRay provides a proprietary slot multiplexing mechanism that allows the alteration of frame contents being sent to this slot from cycle to cycle. The repetition
2.2. Application Model
We model an application
A task
For example, in the application
A function path
3. Security Mechanism and Security Model
3.1. Security Mechanism
3.1.1. Attack Model
We assume that an attacker can gain access to such system through a gateway linked with an external network, physical access to FlexRay channel, malicious insider code, or tampering with ECUs. We consider an active attacker model where an attacker can masquerade as other ECUs to inject forged messages and can also replay messages [17]. We assume that the attacker knows about the network schedule (e.g., by applying technical skill to reverse engineer the appropriate systems and protocols or purchasing such information from a third-party) and consequently has the ability to insert well-formed frames into FlexRay bus.
3.1.2. Overview of the TESLA Mechanism
We apply TESLA authentication mechanism to protect the authenticity of messages on FlexRay bus. The main idea behind TESLA is to use time with the one-way key chain for asymmetry to enjoy the benefit of computational efficiency while having the asymmetric security property. TESLA requires loose time synchronization between the sender and the receivers. In this work, TESLA is initiated after the clock synchronization process of FlexRay is completed, so that it uses the synchronized time provided by FlexRay.
In TESLA, time is divided into several intervals with uniform duration
When a sender sends a message in
When a receiver receives a message in
3.1.3. Modification to the TESLA Mechanism
There are two following major barriers when using TESLA in FlexRay-based real-time automotive systems:
(i) To ensure the key to be disclosed in an interval can arrive at its receivers on time, TESLA protocol specifies that the key must be appended to each message frame in that interval. This thus causes the waste of bandwidth and computing resources, as well as the increase of the authentication delay which is the most critical part in real-time automotive systems in general.
(ii) In addition, the full-size MAC in TESLA makes FlexRay network communication inefficient; i.e., TESLA has an overhead of 32 bytes per packet.
In this section, we make some modifications to the original TESLA, so that it provides better trade-off between security level and resource overhead.
Modification 1: We specify that each key
Modification 2: We truncate the MAC size within the application frame, as long as the desired level of security is ensured, e.g., ISO 26262 standard. The standard constrains the permissible probability
This constraint ensures that the global security probability of all instances of the signal during the time unit
3.2. Security Model
After applying the modified TESLA authentication mechanism to the system, extra information, i.e., keys, needs to be sent and extra operations (including MAC generation, MAC verification, key generation, and key verification tasks) need to be executed.
The MAC generation and verification tasks of each message frame
[figures omitted; refer to PDF]
For simplicity, the key authentication-related tasks or signals are also identified and denoted by a single index, as in
3.3. Choice of Interval Duration of Key Release
Following the authentication mechanism, the smaller the interval duration is, the more frequently the key authentication applications execute and thus the more processing and communication resources are consumed. But the larger the interval duration is, the longer the response times of the signals take, and thus the greater the likelihood that the signals and function paths will miss their deadlines. Therefore, to efficiently apply the authentication mechanism to the automotive systems, we choose the largest interval duration under the premise of satisfying the timing constraints of the systems.
For a function path
Relations (2a) and (2b) provide the time limits; i.e., the product of interval duration
4. Security-Aware Scheduling
4.1. Problem Statement
The security-aware scheduling problem we are addressing in this paper can be formulated as follows. Given the system model, application model, and the security model generated by the authentication mechanism, we decide on the (a) packing of automotive control and authentication mechanism-related signals to messages, (b) scheduling of messages on FlexRay ST segment, and (c) scheduling of automotive control and authentication mechanism-related tasks on respective ECU, such that
(i)
the deadline constraints and the precedence constraints caused by information passing between all tasks and signals are satisfied
(ii)
the constraints related to FlexRay Protocol are satisfied
(iii)
the objective function with respect to timing performance or extensibility is optimized
4.2. Motivational Examples
Let us illustrate the integrated scheduling problem using the setup from Figure 1, where two automotive control applications are executed on the system consisting of four ECUs. The corresponding security applications are depicted in Figure 4. For simplicity, in this example we assume that the execution times of the hash function on all ECUs are 0.2 ms. The lengths of the communication cycle, ST segment, ST slot, and frame payload are 5 ms, 3.264 ms, 0.032 ms, and 16 bytes, respectively. There are 120 slots in the FlexRay ST segment. We assume that there are two time-sensitive paths, one from
A straightforward solution to the security-aware scheduling problem is to (a) pack the signals generated by the same task into a frame and (b) schedule the key authentication-related tasks and frames first and then other tasks and frames using As-Soon-As-Possible (ASAP) scheduling (that is because an automotive control-related frame can be verified by its receiver only after the verification task for its MAC key is completed). For the example in Figure 1, this solution is depicted by the Gantt chart in Figure 5(a). For simplicity, key signals
Figure 5(b) illustrates an optimal solution with respect to timing performance. This solution increases the laxity of paths to 3.936 ms and satisfies the deadline constraints of both paths. On the other hand, Figure 5(c) illustrates an optimal solution with respect to extensibility, which reduces the number of the used slot identifiers and slots to 4 and 8, respectively, by packing signals to frames while satisfying the deadline constraints.
4.3. MILP-Based Optimization Scheduling Approach
We use an MILP formulation to find an optimal solution to the security-aware scheduling problem with respect to timing performance- or extensibility-related cost functions. In an MILP framework, the system is represented with constant parameters, decision variables, and constraints based on the parameters and variables. The objective function, defined over the same sets of parameters and variables, characterizes the optimal solution. MILPs can be solved very efficiently by various solvers. In this work, we employ the LINGO solver.
4.3.1. Definitions
The notations of the elements and constant parameters were described in the previous definition of system model and security model. We assume these parameters are given as design inputs. The notations of the decision variables in the MILP formulation are listed in Table 1.
Table 1
The notations of binary variables and real variables.
Symbol | Variable Type | Implication |
---|---|---|
| binary variable | signal |
| binary variable | signal |
| binary variable | frame |
| binary variable | the |
| binary variable | the |
| binary variable | ECU |
| binary variable | ECU |
| binary variable | frame |
| binary variable | frame |
| binary variable | the |
| binary variable | the |
| binary variable | the |
| real variable | the start time of task |
| real variable | the start time of signal |
| real variable | the finish time of signal |
| real variable | the start time of frame |
| real variable | the start time of frame |
| real variable | the length of frame |
| real variable | the time interval in which the MAC key of frame |
4.3.2. Constraints
In this section, we present the various constraints on frame packing, frame scheduling, task scheduling, data dependency, and end-to-end latency.
(a) Frame Packing
Equations (3a) and (3b) guarantee that the signal
Constraints (4a)-(4c) guarantee that an ECU
Equation (5a) calculates the total length of the frame, including the data payload and the MAC length (that is only contained in the automotive control frame). Constraint (5b) ensures that the frame length does not exceed the limit
(b) Frame Scheduling
(i) Slot Assignment
Constraints (6a)-(6c) ensure that each nonempty frame is scheduled in exactly one slot at a specific base cycle. Constraint (6d) ensures that each frame
(ii) Slot Ownership (FlexRay 2.1)
FlexRay 2.1 has its requirement for the slot ownership. If a slot is owned by one ECU, then the ownership applies to every cycle. Constraint (7a) states that if a frame is mapped to a specific cycle and slot, then its source ECU must own the slot. Constraint (7b) ensures that every slot can be assigned to a most one ECU, and (7c) sets the slot ownership to null.
(iii) Slot Ownership (FlexRay 3.0)
In comparison to version 2.1 of the FlexRay protocol, FlexRay 3.0 standard introduces several changes on slot ownership, and it allows a slot to be shared among different ECUs in the form of cycle multiplexing for improving the utilization of the bus. Constraint (8a) ensures that if a frame is mapped to a specific cycle and slot, then the slot is assigned to its source ECU at this cycle. Constraint (8b) ensures that a slot at a specific cycle can be assigned to a most one ECU, and (8c) states that if there are no frames to be assigned to one slot of one cycle, then the ownership of the slot at this cycle is null.
(iv) Timing-Related
Constraints (9a) and (9b) ensure that if a nonfull frame
Constraints (10a) and (10b) guarantee that the start time
In the final of this part, constraints (12a) and (12b) ensure that the authentication-related operations of two frames do not overlap on any ECU. The variable
(c) Task Scheduling
Constraint (13a) determines that the finish time of a task
(d) Data Dependency
Constraints (15a) and (15b) guarantee that the predecessor must complete its execution before all its successors start in an automotive control or key authentication application.
According to the authentication mechanism, an automotive control frame is accepted and stored awaiting to be authenticated by its receiver only when the key used to generate its MAC remains secret; i.e., the sender has not reached the time interval for releasing this key. Since the key is defined to be released in its corresponding next time interval, the transmission of each frame must be completed before the start of the next interval. Therefore, for a frame
Besides, an automotive control frame will be available to its receiver after the verification task for its MAC key is completed. Therefore, (16c) guarantees that the start time of an automotive control frame on its receiver must be later than the finish time of the verification task for its MAC key, where
Constraints (18a) and (18b) ensure that the authentication-related operations of the frames and the other tasks do not overlap on any ECU resource, where the variable
(e) End-to-End Latency
Constraint (19) ensures that the end-to-end delay must be less than the deadline for each function path, where
4.3.3. Objective Functions
Subject to the above constraints, we can seek optimality with respect to different cost functions. A quite important objective, related to timing performance, is to maximize the laxity (difference between deadlines and response times) among all latency-sensitive function paths:
We can alternatively minimize the consumption of network bandwidth, therefore improving extensibility. For FlexRay 2.1, an important objective related to extensibility is to minimize the number of the used slot identifiers:
For FlexRay 3.0, the objective is to minimize the number of the used slots:
5. Experimental Results and Discussion
In order to assess the effectiveness and efficiency of the proposed MILP-based security-aware scheduling approach (hereafter referred to as MILP-S), we conducted extensive experiments by scheduling a number of real-time automotive applications on the FlexRay-based system architecture. The MILP is solved using LINGO 11.0 on a machine with a 2.8 GHz processor and 8 GB memory. The MACs are computed using hash function HMAC-MD5. We measure the execution times of HMAC-MD5 on Infineon TriCore, a representative automotive 32-bit microcontroller. A MAC generation/verification operation takes 11 μs.
In all experiments, the cost functions with respect to latency or extensibility are used as the criterions of performance evaluation. To assess the impact of the additional authentication mechanism on the system performances after using the proposed MILP-S, we compare the results of MILP-S and two non-security-aware scheduling optimization approaches, MILP-NS and ASAP-NS. The MILP-NS is based on the same MILP formulation, but it does not consider the authentication mechanism-related operations. The ASAP-NS is to (a) pack the signals generated by the same task into a frame and (b) schedule the tasks and frames using As-Soon-As-Possible (ASAP) scheduling. Such a solution would be chosen by a good designer without the help of the dedicated optimization tool. It should be noted that, since ASAP-based security-aware scheduling approach cannot obtain the feasible scheduling solutions (i.e., satisfying all the design constraints) in all experiments, this section does not present the results of this approach.
5.1. Case Study: An Automotive X-by-Wire System
The system consists of 8 ECUs interconnected by the FlexRay bus. There are 25 tasks and 55 signals in the X-by-Wire applications. Tables 2 and 3 show the periods, the worst-case execution time of tasks (in microseconds), and the sizes of signals (in bits). The lengths of the communication cycle, ST slot, and frame payload are 1 ms, 0.035 ms, and 16 bytes, respectively. There are 22 slots in the FlexRay ST segment. The maximum security goal of all signals is 1-10−8 per hour, which corresponds to the most stringent safety level of ISO 26262, i.e., Automotive Safety Integrity Level D. The MAC size is truncated to 48 bits according to constraint (1).
Table 2
Tasks of the x-by-wire system.
Task | ECU | Period | Execution time | Task | ECU | Period | Execution time |
---|---|---|---|---|---|---|---|
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
Table 3
Signals of the x-by-wire system.
Signal | Send | Receive | Size | Signal | Send | Receive | Size |
---|---|---|---|---|---|---|---|
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
Table 4 depicts the comparison results of MILP-S, MILP-NS, and ASAP-NS with respect to latency and extensibility laxity metric functions. It is shown that MILP-S can guarantee the schedulability of system with authentication mechanism overheads and constraints whether the slot multiplexing mechanism of FlexRay 2.1 or FlexRay 3.0 is applied. Specifically, when the extensibility is taken as optimization objective and FlexRay 3.0 is applied, the number of slots used by MILP-S is greater than that of the non-security-aware scheduling optimization approaches MILP-NS and ASAP-NS. This is because each sender needs to transmit the released key in each time interval after using the TESLA authentication mechanism and consumes more slots. Even so, for safety-critical automotive systems, a small portion of their bandwidth resources is still worth achieving security. When the extensibility is taken as optimization objective and FlexRay 2.1 is applied, the number of the slot identifiers used by MILP-S is the same as that of MILP-NS and even less than that of ASAP-NS. These demonstrate that, although the introduction of authentication function requires more slots to transmit the keys, these slots share the slot identifiers as far as possible by using the proposed MILP-S, thereby not degrading the extensibility of systems in this scenario.
Table 4
Experimental results of the x-by-wire system.
Approach | Extensibility | Time performance | ||
---|---|---|---|---|
FlexRay 2.1 | FlexRay 3.0 | FlexRay 2.1 | FlexRay 3.0 | |
MILP-S | 8 | 64 | 73.65 | 74.28 |
ASAP-NS | 18 | 21 | 85.63 | 85.63 |
MILP-NS | 8 | 15 | 99.02 | 99.02 |
On the other hand, when the timing performance is taken as optimization objective, the laxity of all time-sensitive function paths obtained by MILP-S is slightly lower than that of the non-security-aware scheduling optimization approaches MILP-NS and especially ASAP-NS, whether the slot multiplexing mechanism of FlexRay 2.1 or FlexRay 3.0 is applied. These demonstrate that the introduction of authentication function hardly affects the timing performance of systems after using the proposed MILP-S.
5.2. Scalability Analysis
To assess the scalability of the proposed approach, we evaluate the performance of the proposed scheduling approach on systems with different numbers of time-sensitive function paths. We generated a set of synthetic applications based on realistic automotive system cases. Specifically, the periods of tasks and signals are varied among the range [
In the figures of results, the horizontal axis marks the number of paths, which denotes the scale of the experiments, as the numbers of tasks and signals simultaneously grow. The number of time-sensitive function paths is varied among the range
Figure 6(a) depicts the comparison results of MILP-S, MILP-NS, and ASAP-NS with respect to extensibility metric function on systems applying FlexRay 2.1. It is shown that the number of the slot identifiers obtained by MILP-S is average 15% more than that of MILP-NS and 35% less than that of ASAP-NS. These demonstrate that the introduction of authentication function has not led to huge increases in slot identifiers consumption by using the proposed MILP-S.
[figures omitted; refer to PDF]
Similarly, Figure 6(b) depicts the comparison results of MILP-S, MILP-NS, and ASAP-NS with respect to extensibility metric function on systems applying FlexRay 3.0. It is shown that MILP-S used the largest number of slots. In addition, as the number of paths increases, the differences in slot consumption between the security-aware MILP-S and non-security-aware MILP-NS and ASAP-NS decrease slightly. This is because, when the number of function paths grows and the number of ECUs remains constant, each ECU produces more signals, thus providing more possibility of optimization of frame packing and scheduling.
On the other hand, Figure 6(c) depicts the comparison results of MILP-S, MILP-NS, and ASAP-NS with respect to latency metric function on systems with different numbers of time-sensitive function paths. Since the MILP-NS and ASAP-NS returned the same laxities when FlexRay 2.1 and FlexRay 3.0 are applied in the systems, and for the MILP-S, the laxity differences between applying FlexRay 2.1 and FlexRay 3.0 were all slight (within 1 ms), and both results are represented as a graph. First, it is shown that MILP-S can still guarantee the schedulability of systems with authentication mechanism overheads and constraints in all cases. Second, the laxity of all function paths obtained by MILP-S is average 22% lower than that of MILP-NS and only 16% lower than that of ASAP-NS. These demonstrate that authentication function hardly affects the timing performance of systems by using the proposed MILP-S.
At the end of this part, Figure 7 shows the runtime of the MILP solver for each experiment. It is shown that, for both optimization metrics and both versions of FlexRay protocols, the solver is able to find the optimal solution within the time limit when the number of paths is less than 25 and returns a feasible solution when the number of paths is 25. A straightforward application of the proposed MILP approach to systems with hundreds of signals could provide only a feasible solution or not feasible, instead of the optimum. In this case, it is still possible to use the approach incrementally, by dividing the applications into several subsets, as in [34]. The application subsets could be scheduled iteratively starting from the most critical components and moving to less critical ones. This would require solving several consecutive MILP problems. Although this method cannot guarantee optimality, it should provide a good tradeoff between optimality and runtime.
[figures omitted; refer to PDF]
6. Conclusions
In this paper, we have proposed an approach to address both the information security and functional safety in the scheduling design of FlexRay-based automotive systems. An authentication mechanism based on delayed exposure of one-way key chains is applied on TTEthernet to protect against forgery and replay attacks. The authentication mechanism provides an appropriate trade-off between security level and resource overhead. Furthermore, an MILP formulation is proposed for solving the scheduling optimization problem of FlexRay-based real-time automotive systems subject to both authentication mechanism constraints and other traditional design constraints. The objective of MILP approach is to maximize the laxity on function paths (therefore improving timing performance) or to minimize the number of used slots or slot identifiers (therefore improving extensibility). The experiment results show that the proposed MILP approach can still guarantee the schedulability of systems with authentication mechanism overheads and constraints and achieve good performance with timing and extensibility.
Conflicts of Interest
The authors declare that there are no conflicts of interest regarding the publication of this paper.
Acknowledgments
This work was supported by the Jilin Science and Technology Key Project Grant [grant number 20150204034GX].
Glossary
Symbols
[1] F. Sagstetter, M. Lukasiewycz, S. Chakraborty, "Generalized asynchronous time-triggered scheduling for FlexRay," IEEE Transactions on Computer-aided Design of Integrated Circuits and Systems, vol. 36 no. 2, pp. 214-226, DOI: 10.1109/TCAD.2016.2570421, 2017.
[2] CAN in Automation, DOI: 10.1002/9780470511770, .
[3] FlexRay Consortium, FlexRay Communications System Protocol Specification Version 3.0.1, 2010.
[4] J. Broy, K. D. Muller-Glaser, "The impact of time-triggered communication in automotive embedded systems," pp. 353-356, DOI: 10.1109/SIES.2007.4297360, .
[5] K. C. Lee, M. H. Kim, S. Lee, H. H. Lee, "IEEE-1451-based smart module for in-vehicle networking systems of intelligent vehicles," IEEE Transactions on Industrial Electronics, vol. 51 no. 6, pp. 1150-1158, DOI: 10.1109/TIE.2004.837879, 2004.
[6] N. Navet, Y. Song, F. Simonot-Lion, C. Wilwert, "Trends in automotive communication systems," Proceedings of the IEEE, vol. 93 no. 6, pp. 1204-1222, DOI: 10.1109/JPROC.2005.849725, 2005.
[7] I. Studnia, V. Nicomette, E. Alata, Y. Deswarte, M. Kaaniche, Y. Laarouchi, "Survey on security threats and protection mechanisms in embedded automotive networks," Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W),DOI: 10.1109/DSNW.2013.6615528, .
[8] P. Kleberger, T. Olovsson, E. Jonsson, "Security aspects of the in-vehicle network in the connected car," pp. 528-533, .
[9] T. Hoppe, S. Kiltz, J. Dittmann, "Security threats to automotive CAN networksPractical examples and selected short-term countermeasures," Reliability Engineering & System Safety, vol. 96 no. 1, pp. 11-25, DOI: 10.1016/j.ress.2010.06.026, 2011.
[10] K. Koscher, A. Czeskis, F. Roesner, "Experimental security analysis of a modern automobile," Proceedings of the 31st IEEE Symposium on Security and Privacy, vol. 41, pp. 447-462, .
[11] S. Woo, H. J. Jo, D. H. Lee, "A practical wireless attack on the connected car and security protocol for in-vehicle CAN," IEEE Transactions on Intelligent Transportation Systems, vol. 16 no. 2, pp. 993-1006, DOI: 10.1109/TITS.2014.2351612, 2015.
[12] D. Bleichenbacher, U. M. Maurer, "Directed acyclic graphs, one-way functions and digital signatures," CRYPTO’94, pp. 75-82, 1994.
[13] A. Perrig, R. Canetti, J. D. Tygar, D. X. Song, "Efficient authentication and signing of multicast streams over lossy channels," Proceedings of the IEEE Symposium on Security and Privacy, pp. 56-73, .
[14] A. Perrig, "The BiBa one-time signature and broadcast authentication protocol," Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS), pp. 28-37, .
[15] Q. Wang, H. Khurana, Y. Huang, K. Nahrstedt, "Time valid one-time signature for time-critical multicast data authentication," Proceedings of the 28th IEEE International Conference on Computer Communications (INFOCOM), pp. 1233-1241, DOI: 10.1109/INFCOM.2009.5062037, .
[16] C. Szilagyi, P. Koopman, "Flexible multicast authentication for time-triggered embedded control network applications," pp. 165-174, DOI: 10.1109/DSN.2009.5270342, .
[17] C. Szilagyi, P. Koopman, "Low cost multicast authentication via validity voting in time-triggered embedded control networks," Proceedings of the 5th Workshop on Embedded Systems Security (WESS),DOI: 10.1145/1873548.1873558, .
[18] A. Perrig, R. Canetti, D. Song, J. D. Tygar, "Efficient and secure source authentication for multicast," Proceedings of the Network and Distributed System Security Symposium (NDSS), pp. 35-46, .
[19] D. Liu, P. Ning, "Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks," Proceedings of the 10th Network and Distributed System Security Symposium (NDSS), pp. 263-276, DOI: 10.1145/948117.948119, .
[20] D. Liu, P. Ning, "Multilevel TESLA: Broadcast authentication for distributed sensor networks," ACM Transactions on Embedded Computing Systems, vol. 3 no. 4, pp. 800-836, DOI: 10.1145/1027794.1027800, 2004.
[21] A. Perrig, R. Canetti, D. Song, J. D. Tygar, "Efficient and secure source authentication for multicast," Proceedings of the Network and Distributed System Security Symposium (NDSS), pp. 35-46, .
[22] A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, D. E. Culler, "Spins: Security protocols for sensor networks," Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, pp. 189-199, DOI: 10.1145/381677.381696, .
[23] K. Schmidt, E. G. Schmidt, "Message scheduling for the FlexRay protocol: the static segment," IEEE Transactions on Vehicular Technology, vol. 58 no. 5, pp. 2170-2179, DOI: 10.1109/TVT.2008.2008654, 2009.
[24] M. Kang, K. Park, M.-K. Jeong, "Frame packing for minimizing the bandwidth consumption of the flex Ray static segment," IEEE Transactions on Industrial Electronics, vol. 60 no. 9, pp. 4001-4008, DOI: 10.1109/TIE.2012.2208433, 2013.
[25] K. Schmidt, E. G. Schmidt, "Optimal message scheduling for the static segment of flexray," vol. 44,DOI: 10.1109/VETECF.2010.5594407, .
[26] M. Grenier, L. Havet, N. Navet, "Configuring the communication on FlexRay: the case of the static segment," Proceedings of the 4th European Congress on Embedded Real Time Software (ERTS), .
[27] M. Lukasiewycz, M. Glaß, J. Teich, P. Milbredt, "FlexRay schedule optimization of the static segment," Proceedings of the 7th IEEE/ACM International Conference on Hardware/Software Codesign and System Synthesis, pp. 363-372, DOI: 10.1145/1629435.1629485, .
[28] R. Zhao, G. H. Qin, J. Q. Liu, "Optimal scheduling of the flexray static segment based on two-dimensional bin-packing algorithm," International Journal of Automotive Technology, vol. 17 no. 4, pp. 703-715, DOI: 10.1007/s12239-016-0070-5, 2016.
[29] R. Zhao, G.-H. Qin, J.-Q. Liu, "A rectangle bin packing optimization approach to the signal scheduling problem in the FlexRay static segment," Frontiers of Information Technology and Electronic Engineering, vol. 17 no. 4, pp. 375-388, DOI: 10.1631/FITEE.1500232, 2016.
[30] H. Zeng, M. Di Natale, A. Ghosal, A. Sangiovanni-Vincentelli, "Schedule optimization of time-triggered systems communicating over the flexray static segment," IEEE Transactions on Industrial Informatics, vol. 7 no. 1,DOI: 10.1109/TII.2010.2089465, 2011.
[31] M. Hu, J. Luo, Y. Wang, M. Lukasiewycz, Z. Zeng, "Holistic scheduling of real-time applications in time-triggered in-vehicle networks," IEEE Transactions on Industrial Informatics, vol. 10 no. 3, pp. 1817-1828, DOI: 10.1109/TII.2014.2327389, 2014.
[32] M. Lukasiewycz, R. Schneider, D. Goswami, S. Chakraborty, "Modular scheduling of distributed heterogeneous time-triggered automotive systems," Proceedings of the 17th Asia and South Pacific Design Automation Conference (ASP-DAC), pp. 665-670, DOI: 10.1109/ASPDAC.2012.6165039, .
[33] D. Roy, L. Zhang, W. Chang, D. Goswami, S. Chakraborty, "Multi-objective co-optimization of flexray-based distributed control systems," ,DOI: 10.1109/RTAS.2016.7461344, .
[34] K. Jiang, P. Eles, Z. Peng, "Co-design techniques for distributed real-time embedded systems with communication security constraints," pp. 947-952, .
[35] A. Wasicek, C. El-Salloum, H. Kopetz, "Authentication in time-triggered systems using time-delayed release of keys," Proceedings of the IEEE 14th International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing (ISORC), pp. 31-39, DOI: 10.1109/ISORC.2011.14, .
[36] C. Lin, Q. Zhu, C. Phung, A. Sangiovanni-Vincentelli, "Security-aware mapping for CAN-based real-time distributed automotive systems," Proceedings of the IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp. 24-31, DOI: 10.1109/ICCAD.2013.6691106, .
[37] C. Lin, Q. Zhu, A. Sangiovanni-Vincentelli, "Security-aware mapping for TDMA-based real-time distributed systems," ,DOI: 10.1109/ICCAD.2014.7001325, .
[38] Z. Gu, G. Han, H. Zeng, Q. Zhao, "Security-aware mapping and scheduling with hardware co-processors for flexray-based distributed embedded systems," IEEE Transactions on Parallel and Distributed Systems, vol. 27 no. 10, pp. 3044-3057, DOI: 10.1109/TPDS.2016.2520949, 2016.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Copyright © 2019 R. Zhao et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0/
Abstract
FlexRay is a hybrid communication protocol tailored to the requirements of safety-critical distributed real-time automotive systems, providing support for the transmission of time-critical periodic frames in a static segment and event-triggered frames in a dynamic segment. With the development of intelligence and networking of vehicles, such systems are becoming increasingly connected to external environments; thus, security has become a pressing issue in system design. However, FlexRay-based architecture does not have direct support for secure communication. When deploying the security mechanisms on these architectures, a primary challenge is to guarantee the schedulability of systems, given the tight resource constraints and strict timing constraints. In this paper, we apply an authentication mechanism based on the delayed exposure of one-way key chains to protect the authenticity of messages on FlexRay and make a slight modification to reduce the authentication delay. On that basis, we propose a mixed integer linear programming formulation for solving the scheduling problem of FlexRay-based real-time automotive systems subject to both authentication mechanism constraints and other traditional design constraints. Experimental results demonstrate the effectiveness and efficiency of the proposed method in system design and indicate the necessity of collaborative design between security and other functionalities.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer