Skip to main content

ORIGINAL RESEARCH article

Front. Mech. Eng.
Sec. Mechatronics
Volume 10 - 2024 | doi: 10.3389/fmech.2024.1407665

Application of Optimizing Advanced Encryption Standard Encryption Algorithm in Secure Communication of Vehicle Controller Area Network Bus

Provisionally accepted
  • Jiangxi Technical College of Manufacturing, Nanchang, China

The final, formatted version of the article will be published soon.

    As the main means of information exchange within vehicles, the safety of the controller area network bus directly affects the safe operation of the vehicle and the safety of passengers' lives and property. To enhance its secure communication function, this study utilizes advanced encryption standard algorithms and improves the S-box of the algorithm to solve problems such as extended processing time. Then, a secure communication system for the local area network bus of the vehicle controller is designed based on optimized advanced encryption standard algorithms. The results showed that when the file size was 200MB, the encryption and decryption time spent by the research method was 469.8s and 528.5s, respectively, which are significantly lower than traditional methods. In the simulation results, under both non-encrypted and encrypted transmission, the information remained intact throughout the entire transmission process. This indicated that the optimization algorithm effectively reduced encryption processing time and system resource consumption while ensuring data confidentiality and integrity, making it suitable for the security requirements of the local area network bus of vehicle mounted controllers. This study not only enhances the security of in vehicle networks, but also promotes the application and development of related encryption technologies in the field of vehicle networking, providing strong technical support for the further development of vehicle networking and the safe operation of intelligent vehicles.

    Keywords: AES encryption algorithm, CAN bus, S-box, Encryption and decryption, Secure Communication

    Received: 27 Mar 2024; Accepted: 10 Jul 2024.

    Copyright: © 2024 Mu. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

    * Correspondence: Chenzhe Mu, Jiangxi Technical College of Manufacturing, Nanchang, China

    Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.