CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals

被引:12
作者
Levy, Efrat [1 ]
Shabtai, Asaf [1 ]
Groza, Bogdan [2 ]
Murvay, Pal-Stefan [2 ]
Elovici, Yuval [1 ]
机构
[1] Ben Gurion Univ Negev, Fac Informat Syst Engn, IL-8455902 Beer Sheva, Israel
[2] Politeh Univ Timisoara, Fac Automat & Comp, Timisoara 300006, Romania
关键词
Prototypes; Voltage; Authentication; Feature extraction; Location awareness; Intrusion detection; Deep learning; CAN bus; side-channel analysis; deep learning; IDENTIFICATION; ATTACKS;
D O I
10.1109/TIFS.2023.3297444
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Controller Area Network (CAN), which is used for communication between in-vehicle devices, has been shown to be vulnerable to spoofing attacks. Voltage-based spoofing detection (VBS-D) mechanisms are considered state-of-the-art solutions, complementing cryptography-based authentication whose security is limited due to the CAN protocol's limited message size. Unfortunately, VBS-D mechanisms are vulnerable to poisoning performed by a malicious device connected to the CAN bus, specifically designed to poison the deployed VBS-D mechanism as it adapts to environmental changes that take place when the vehicle is moving. In this paper, we harden VBS-D mechanisms using a deep learning-based mechanism which runs immediately, when the vehicle starts; this mechanism utilizes physical side-channels to detect and locate physical intrusions, even when the malicious devices connected to the CAN bus are silent. We demonstrate the mechanism's effectiveness (100% intrusion detection accuracy and error rates of close to 0%) in various physical intrusion scenarios and varying temperatures on a CAN bus prototype. In addition, we present a deep learning-based VBS-D mechanism that securely adapts to environmental changes. This mechanism's robustness (99.8% device identification accuracy) is demonstrated on a real moving vehicle.
引用
收藏
页码:4800 / 4814
页数:15
相关论文
共 46 条
[1]  
[Anonymous], 1991, C SPECIFICATION VERS
[2]   Evading Voltage-Based Intrusion Detection on Automotive CAN [J].
Bhatia, Rohit ;
Kumar, Vireshwar ;
Serag, Khaled ;
Celik, Z. Berkay ;
Payer, Mathias ;
Xu, Dongyan .
28TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2021), 2021,
[3]  
Biggio Battista., 2012, arXiv
[4]  
Bogdan Groza L. P. L., 2021, P 30 USENIX SEC S
[5]  
Checkoway S., 2011, 20 USENIX SEC S USEN, V4, P447
[6]   Viden: Attacker Identification on In-Vehicle Networks [J].
Cho, Kyong-Tak ;
Shin, Kang G. .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1109-1123
[7]  
Cho KT, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P911
[8]   Identifying ECUs Using Inimitable Characteristics of Signals in Controller Area Networks [J].
Choi, Wonsuk ;
Jo, Hyo Jin ;
Woo, Samuel ;
Chun, Ji Young ;
Park, Jooyoung ;
Lee, Dong Hoon .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (06) :4757-4770
[9]   VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System [J].
Choi, Wonsuk ;
Joo, Kyungho ;
Jo, Hyo Jin ;
Park, Moon Chan ;
Lee, Dong Hoon .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (08) :2114-2129
[10]  
Das D, 2019, PROCEEDINGS OF THE 2019 56TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), DOI [10.36106/paripex/6406562, 10.1145/3316781.3317934]