Please log in

Paper / Information search system

日本語

ENGLISH

Help

Please log in

  • Summary & Details

Functional Verification and Validation of Secure Controller Area Network (CAN) Communication

Detailed Information

Author(E)1) Gourab Khatik, 2) Praveen Katragadda, 3) Chetan Labade
Affiliation(E)1) John Deere India Pvt, Ltd., 2) John Deere India Pvt, Ltd., 3) John Deere India Pvt, Ltd.
Abstract(E)In agriculture industry, increasing use of Vehicle Internet of Things (IoT), telematics and emerging technologies are resulting in smarter machines with connected solutions. Inter and Intra Communication with vehicle to vehicle and inside vehicle - Electronic Control Unit (ECU) to ECU or ECU (Electronic Control Unit) to sensor, requirement for flow of data increased in-turn resulting in increased need for secure communication.
In this paper, we focus on functional verification and validation of secure Controller Area Network (CAN) for intra vehicular communication to establish confidentiality, integrity, authenticity, and freshness of data, supporting safety, advanced automation, protection of sensitive data and IP (Intellectual Property) protection. Network security algorithms and software security processes are the layers supporting to achieve our cause. Test environment setup with secured hardware and simulated models, test scenarios and test data are created to achieve the defined objective. For validation, we relied upon simulated models equipped with network security algorithms. Sharing of test results with stakeholders is the decisive step to get aligned with the test delivery agreed upon during test planning phase. Identification of threat sources, associated vulnerabilities, and its degree of impact analysis are critical aspects of our performed testing. Continuous and quality integration is also one of the aspects of test execution.
This paper also presents methodology used in software functional testing on security requirements. These ensure proper working of all the security functionalities as well-supports achieved software behaviors to ensure safety and security of a quality product. Also focuses on the best practices recommended by International Software Testing Qualifications Board Advanced Security (ISTQB) for risk assessment techniques, strategies, and security testing processes.

About search

close

How to use the search box

You can enter up to 5 search conditions. The number of search boxes can be increased or decreased with the "+" and "-" buttons on the right.
If you enter multiple words separated by spaces in one search box, the data that "contains all" of the entered words will be searched (AND search).
Example) X (space) Y → "X and Y (including)"

How to use "AND" and "OR" pull-down

If "AND" is specified, the "contains both" data of the phrase entered in the previous and next search boxes will be searched. If you specify "OR", the data that "contains" any of the words entered in the search boxes before and after is searched.
Example) X AND Y → "X and Y (including)"  X OR Z → "X or Z (including)"
If AND and OR searches are mixed, OR search has priority.
Example) X AND Y OR Z → X AND (Y OR Z)
If AND search and multiple OR search are mixed, OR search has priority.
Example) W AND X OR Y OR Z → W AND (X OR Y OR Z)

How to use the search filters

Use the "search filters" when you want to narrow down the search results, such as when there are too many search results. If you check each item, the search results will be narrowed down to only the data that includes that item.
The number in "()" after each item is the number of data that includes that item.

Search tips

When searching by author name, enter the first and last name separated by a space, such as "Taro Jidosha".