ABSTRACT
The modern automobile relies on numerous electronic control units communicating over the de facto standard of the controller area network (CAN) bus. This communication network was not developed with cybersecurity in mind. Many methods based on constant time intervals between messages have been proposed to address this lack of security issue with the CAN bus. However, these existing methods may struggle to handle variable time intervals between messages during transitions of vehicle driving modes. This paper proposes a simple and cost-effective method to ensure the security of the CAN bus that is based on constant message frequencies across vehicle driving modes. This proposed method does not require any modifications on the existing CAN bus and it is designed with the intent for efficient execution in platforms with very limited computational resources. Test results with the proposed method against two different vehicles and a frequency domain analysis are also presented in the paper.
- Paul Carsten, Todd R Andel, Mark Yampolskiy, and Jeffrey T McDonald. 2015. In-vehicle networks: Attacks, vulnerabilities, and proposed solutions. In Proc. of the 10th Annual Cyber and Information Security Research Conference . Google ScholarDigital Library
- Robert Charette. 2009. This car runs on code. IEEE Spectrum , Vol. 46, 3 (2009).Google Scholar
- Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, and Tadayoshi Kohno. 2011. Comprehensive Experimental Analyses of Automotive Attack Surfaces.. In Proc. of USENIX Security Symposium . Google ScholarDigital Library
- Tobias Hoppe, Stefan Kiltz, and Jana Dittmann. 2008. Security Threats to Automotive CAN Networks -- Practical Examples and Selected Short-Term Countermeasures. In Proceedings of the 27th International Conference on Computer Safety, Reliability, and Security (SAFECOMP '08). Springer-Verlag, Berlin, Heidelberg, 235--248. Google ScholarDigital Library
- Min-Joo Kang and Jewon Kang. 2016. Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security. In PloS one .Google Scholar
- Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, and Hovav Shacham. 2010. Experimental security analysis of a modern automobile. In Proc. of IEEE Symposium on Security and Privacy (SP) . Google ScholarDigital Library
- Moti Markovitz and Avishai Wool. 2017. Field classification, modeling and anomaly detection in unknown CAN bus networks. Vehicular Communications , Vol. 9 (2017), 43--52.Google ScholarCross Ref
- Charlie Miller and Chris Valasek. 2015. Remote exploitation of an unaltered passenger vehicle. BlackHat USA.Google Scholar
- Michael R. Moore, Robert A. Bridges, Frank L. Combs, Michael S. Starr, and Stacy J. Prowell. 2017. Modeling Inter-signal Arrival Times for Accurate Detection of CAN Bus Signal Injection Attacks: A Data-driven Approach to In-vehicle Intrusion Detection. In Proceedings of the 12th Annual Conference on Cyber and Information Security Research (CISRC '17). ACM, New York, NY, USA, Article 11, bibinfonumpages4 pages. Google ScholarDigital Library
- Habeeb Olufowobi, Gedare Bloom, Clinton Young, and Joseph Zambreno. 2018. Work-in-Progress: Real-Time Modeling for Intrusion Detection in Automotive Controller Area Network. In Real-Time Systems Symposium (RTSS). IEEE.Google Scholar
- Eunbi Seo, Hyun Min Song, and Huy Kang Kim. 2018. GIDS: GAN based Intrusion Detection System for In-Vehicle Network. 16th Annual Conference on Privacy, Security and Trust (PST) (2018), 1--6.Google ScholarCross Ref
- Hyun Min Song, Ha Rang Kim, and Huy Kang Kim. 2016. Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network. In Proc. of International Conference on Information Networking (ICOIN) . Google ScholarDigital Library
- Bowen Zheng, W. Li, P. Deng, L. Gérardy, Q. Zhu, and N. Shankar. 2015. Design and verification for transportation system security. In Proc. of Design Automation Conference (DAC) . Google ScholarDigital Library
Index Terms
- Automotive Intrusion Detection Based on Constant CAN Message Frequencies Across Vehicle Driving Modes
Recommendations
Exploiting Temperature-Varied Voltage Fingerprints for In-vehicle CAN Intrusion Detection
ACM TURC '21: Proceedings of the ACM Turing Award Celebration Conference - ChinaThe Controller Area Network (CAN) is the most commonly used in-vehicle protocol for reliable communication between Electronic Control Units (ECUs). Due to its broadcast nature and absence of message authentication mechanisms, CAN bus is vulnerable to ...
Message scheduling with reduced matrix cycle and evenly distributed sparse allocation for time-triggered CAN
Controller Area Network (CAN) was initially developed as an in-vehicle real-time communication bus. Due to its low cost and high reliability, it has also become a widely accepted standard in industrial distributed control applications. The CAN protocol ...
Flooding attack mitigator for in-vehicle CAN using fault confinement in CAN protocol
AbstractFor driver convenience and safety, a number of electronic control units (ECUs) have been installed on modern vehicles. To support communications among ECUs, the controller area network (CAN) is commonly used as in-vehicle network for ...
Comments