CAN bus, CAN-FD and ARINC-825 interfaces are used on commercial cars and trucks, military ground vehicles, military and commercial aircraft and a variety of industrial applications. Sital’s Technology’s CAN bus/CAN-FD/ARINC-825 Safe and Secure (SnS) IP core provides message transmission and reception for CAN bus communication. In addition, it satisfies the needs for cyber authentication, and provides capability for detecting, classifying and locating electrical faults in CAN data buses on a continuous basis. Further, Sital’s SnS includes functionality to protect against denial of service (DoS) attacks by CAN bus transmitters.
Sital’s CAN bus IP is an industry standard, Bosch CAN protocol compliant IP core for FPGA and ASIC design implementations. Sital’s SI8254-SnS Safe and Secure CAN IP core has built-in cyber resilience and network health monitoring technology to ensure the highest databus reliability and protection for commercial vehicles, military ground vehicles, UAVs, aerospace avionics and industrial applications. The Sital SnS CAN IP core is the world’s first high resilience CAN IP offered in a licensed business model supporting hardware vendor independence, cost management and CAN node optimization.
Using enhanced physical layer monitoring, Sital Technology’s Safe and Secure (SnS) technology provides continuous real time authentication, along with the capability to detect and locate intermittent and continuous open or short circuit faults in CAN bus/CAN-FD/ARINC-825 buses.
Sital’s CAN bus authentication sensor verifies that nodes on the bus are receiving messages from the transmitter associated with the respective Message ID. This is necessary to ensure the integrity of messages received by all nodes. This enables the SI8254-SnS to provide the required security against “spoofing” (impersonation) attacks that can result in devastating results for vehicle safety or, for military platforms, mission execution. With Sital’s CAN bus SnS IP core, receiving nodes can ignore messages received from non-authenticated sources.
The SI8254-SnS’s wire fault detection capability provides advance warnings of intermittent open and short circuit faults. If not detected and repaired early, such faults can become continuous fault conditions in CAN bus buses, stubs, connectors, bus terminators or equipment. Early detection and location determination allows repairs to be made sooner and reduces troubleshooting and repair times. The result is increased vehicle or aircraft availability, lower repair costs and improved mission readiness.
In approximately the first four seconds following power-up, Sital’s SnS sensor undergoes a learning” process performs continuous physical layer monitoring of received signals from all nodes on the bus. Out of this, the sensor and API software compute the “fingerprints” or “signatures” for all nodes on the data bus. Following that, the sensor monitors all received messages and looks for instances where CAN bus message’s fingerprints don’t match the expected fingerprint for the respective Message ID.
These mismatches indicate either a cyber “spoofing” (or impersonation) authentication violation or an electrical fault condition. The latter includes intermittent or continuous open or short circuits in either the bus cable, a stub cable, connector, LRU or bus termination. Further, the SnS is able to determine the specific type of open or short circuit, along with its approximate location.
Following detection of either a cyber authentication violation or an electrical fault condition, the SnS API will immediately inform the application software about the detected condition. In either case, it is then up to the system’s “security playbook” software to take the appropriate system-level action. In the case of an authentication violation, system software may choose to ignore data from the received message.
Further, for CAN bus and ARINC-825, Sital’s SI8254-SnS IP core provides denial of service (DoS) mitigation. This feature provides a low-level hardware means for preventing CAN bus nodes from transmitting continuously on a CAN bus. This guarantees that if a node on a bus is running malicious or erroneous software, it can’t “take over” all bus bandwidth. As a result, this feature allows all nodes on a bus the opportunity to transmit.