Embedded Machine Learning-Based Voltage Fingerprinting for Automotive Cybersecurity

被引:0
作者
Dini, Pierpaolo [1 ]
Zappavigna, Michele [2 ]
Soldaini, Ettore [1 ,3 ]
Saponara, Sergio [1 ]
机构
[1] Univ Pisa, Dept Informat Engn, I-56122 Pisa, Italy
[2] Capgemini, I-19125 La Spezia, Italy
[3] Vrije Univ Brussel, B-1050 Brussels, Belgium
来源
IEEE ACCESS | 2025年 / 13卷
关键词
Controller area network; cybersecurity; embedded; real-time; machine learning; CONTROLLER AREA NETWORK; ATTACKS;
D O I
10.1109/ACCESS.2025.3545245
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This research presents the development and validation of an embedded system for real-time intrusion detection in automotive environments, leveraging voltage-based ECU fingerprinting. The proposed system integrates advanced machine learning algorithms, including SVM, ANN, and DT, optimized for anomaly detection, with linear SVM achieving the highest accuracy. To demonstrate feasibility, the system was implemented on automotive-grade microcontrollers, AURIX Tricore platform TC375. A robust test environment replicating real CAN traffic was employed to validate the approach, based on low-cost embedded devices (Arduino R3/R4 and MCP2515 module). To address synchronization challenges between the CAN transceiver and ADC channels, a circular buffer strategy was introduced, significantly reducing false positives and enhancing system stability. Performance evaluations under nominal and attack scenarios confirm the effectiveness of the solution, offering a practical and reliable method to enhance in-vehicle cybersecurity and mitigate risks for drivers and passengers.
引用
收藏
页码:38342 / 38367
页数:26
相关论文
共 71 条
  • [1] Automatic cross-validation in structured models: Is it time to leave out leave-one-out?
    Adin, Aritz
    Krainski, Elias Teixeira
    Lenzi, Amanda
    Liu, Zhedong
    Martinez-Minaya, Joaquin
    Rue, Havard
    [J]. SPATIAL STATISTICS, 2024, 62
  • [2] From Artificial Intelligence to Explainable Artificial Intelligence in Industry 4.0: A Survey on What, How, and Where
    Ahmed, Imran
    Jeon, Gwanggil
    Piccialli, Francesco
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (08) : 5031 - 5042
  • [3] MGA-IDS: Optimal feature subset selection for anomaly detection framework on in-vehicle networks-CAN bus based on genetic algorithm and intrusion detection approach
    Aksu, Dogukan
    Aydin, Muhammed Ali
    [J]. COMPUTERS & SECURITY, 2022, 118
  • [4] Machine Learning for Network Intrusion Detection-A Comparative Study
    Al Lail, Mustafa
    Garcia, Alejandro
    Olivo, Saul
    [J]. FUTURE INTERNET, 2023, 15 (07):
  • [5] Using discriminant analysis to detect intrusions in external communication for self-driving vehicles
    Alheeti, Khattab M. Ali
    Gruebler, Anna
    McDonald-Maier, Klaus
    [J]. DIGITAL COMMUNICATIONS AND NETWORKS, 2017, 3 (03) : 180 - 187
  • [6] Hyperparameter Search for Machine Learning Algorithms for Optimizing the Computational Complexity
    Ali, Yasser A.
    Awwad, Emad Mahrous
    Al-Razgan, Muna
    Maarouf, Ali
    [J]. PROCESSES, 2023, 11 (02)
  • [7] Cross-Validation Visualized: A Narrative Guide to Advanced Methods
    Allgaier, Johannes
    Pryss, Ruediger
    [J]. MACHINE LEARNING AND KNOWLEDGE EXTRACTION, 2024, 6 (02): : 1378 - 1388
  • [8] [Anonymous], 2024, Standard ISO 11898-1:2024
  • [9] [Anonymous], [21] U.S. Energy Information Administration (EIA) - Data. [Online]. Available: https://www.eia.gov/electricity/data.php#generation. [Accessed: 17-May-2018].
  • [10] [Anonymous], [43] 14:00-17:00, "ISO 10993-1:2018," ISO. Accessed: Apr. 18, 2024. [Online]. Available: https://www.iso.org/standard/68936.html