CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Implementation of Security Access Service using SHA-2 Algorithm

by Shubhashree Holla, Akhila S.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 175 - Number 26
Year of Publication: 2020
Authors: Shubhashree Holla, Akhila S.
10.5120/ijca2020920811

Shubhashree Holla, Akhila S. . Implementation of Security Access Service using SHA-2 Algorithm. International Journal of Computer Applications. 175, 26 ( Oct 2020), 31-35. DOI=10.5120/ijca2020920811

@article{ 10.5120/ijca2020920811,
author = { Shubhashree Holla, Akhila S. },
title = { Implementation of Security Access Service using SHA-2 Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2020 },
volume = { 175 },
number = { 26 },
month = { Oct },
year = { 2020 },
issn = { 0975-8887 },
pages = { 31-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume175/number26/31617-2020920811/ },
doi = { 10.5120/ijca2020920811 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:39:31.571493+05:30
%A Shubhashree Holla
%A Akhila S.
%T Implementation of Security Access Service using SHA-2 Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 175
%N 26
%P 31-35
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Advanced vehicles are not just a machine-like device; modern vehicles are continuously controlled, as well as monitored by using many digital computers, also called electronic control units (ECU). Advancement in modern automobiles mainly concentrates on the security and safety of these devices, thereby providing a safe driving environment to a driver. Radar is one of the important parts of the advanced driving assistance system, providing some important features like blind spot detection, cross traffic assistance, safe door opening etc. It is important that information coming from the Radar should be safe and it cannot be accessed by the third party. Aim of this paper is to implement the security access service to protect information coming from the Radar sensor. Application layer of the Autosar will allow the bidirectional communication between the client and the server. Implementing this service in application layer will reduce the time and it also provides increased level of security to the system. This paper comprise of implementation of this security access service using Unified diagnostic service (UDS) protocol.

References
  1. ISO 15765-3:2004, “Road vehicles- Diagnostic on controller area network (CAN)”
  2. ISO 14229-1:2013(E), “Road vehicles -Unified diagnostic services (UDS)-Part 1: Specification and requirements”.
  3. Ryo Kurachi, Hiroaki Takada, Kentaro Takei, TakaakiIinuma, Yuki Satoh, Manabu Nakano, Hideki Matsushima, Jun Anzai, Toshihisa Nakano, “Evaluation of Security Access Service in Automotive Diagnostic Communication”,  2019 IEEE 89th Vehicular Technology Conference, Kuala Lumpur, Malaysia.
  4. Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, and Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, HovavShacham, and Stefan Savage, “Experimental Security Analysis of a Modern Automobile”, 2010 IEEE Symposium on Security and Privacy.
  5. Martin Ring,TobiasRensen and Reiner Kriesten, “Evaluation of Vehicle Diagnostics Security - Implementation of a Reproducible Security Access”, SECURWARE Portugal, 2014.
  6. Parag Kharche, Meera Murali and Geetanjali Khot, “UDS Implemetation for ECU I/O Testing”, IEEE 2018 3rd International Conference on Intelligent Transportation Engineering.
  7. M.Salcianu and C.Fosalau, “A new CAN diagnostic fault simulator based on UDS protocol”, 2012 International conference and Exposition on electrical and power engineering, Iasi, pp, 820-824, 2012.
  8. Lupei and L. Stanciu, “Application for UDS automated test generation”, 2016 IEEE 11th International Symposium on Applied Computational Intelligence and Informatics (SACI), Timisoara, pp. 85-88, 2016.
  9. Secure Hash Standard (SHS), Information Technology Laboratory National Institute of Standards and Technology, August 20.
  10. ISO 15765-3:2016, “Diagnostic communication over controller area network (DoCAN) - Part 2: Transport protocol and network layer services.”
  11. AUTOSAR, “Specification of Diagnostic Communication Manager”, Document ID-18, 2017.
Index Terms

Computer Science
Information Sciences

Keywords

SHA-2 AES Automotive Security access service AUTOSAR UDS protocol