Adaptive Controller Area Network Intrusion Detection System Considering Temperature Variations

被引:13
作者
Jeong, Woojin [1 ]
Choi, Eunmin [1 ]
Song, Hoseung [2 ]
Cho, Minji [1 ]
Choi, Ji-Woong [1 ]
机构
[1] Daegu Gyeongbuk Inst Sci & Technol DGIST, Dept Elect Engn & Comp Sci, Daegu 42988, South Korea
[2] Autocrypt Co Ltd, Dept Tech Strategy, Seoul 07241, South Korea
基金
新加坡国家研究基金会;
关键词
Controller area network (CAN); intrusion detection system (IDS); transmitter identification; temperature; physical-layer security;
D O I
10.1109/TIFS.2022.3217389
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security threats increase as connectivity among vehicles increases. In particular, a lack of authentication, integrity, and confidentiality makes the controller area network (CAN) protocol, which is used in critical domains such as vehicle body and powertrain, vulnerable to threats. In this paper, we propose methods for CAN security enhancement that use a support vector machine (SVM) and the autocorrelation of the received signal to detect a malicious node. Robustness to temperature variation is also considered because autocorrelation is affected by temperature variation. There are two methods based on the degree of uniformity of the temperature distribution. If the temperature is uniformly distributed over the vehicle and the temperature sensor is embedded in the secure node, the first scheme (temperature measurement system) trains data in each segmented temperature range more precisely using multiple classifiers. If not (i.e., a nonuniform temperature distribution or an absence of a temperature sensor), the alternative scheme (all-temperature training system) trains data in all temperature ranges with a single classifier. The performances of the proposed systems are evaluated on a testbed. The proposed method can operate without modifying the CAN protocol because it is based on the characteristics of the physical layer. In addition, security can be enhanced redundantly by the system running independently without authentication protocols.
引用
收藏
页码:3925 / 3933
页数:9
相关论文
共 28 条
[1]  
[Anonymous], 2011, 20 USENIX SEC S USEN
[2]  
[Anonymous], 1991, CAN SPECIFICATION VE
[3]  
Brianp, PROP AUT C VENT TEMP
[4]   Error Handling of In-vehicle Networks Makes Them Vulnerable [J].
Cho, Kyong-Tak ;
Shin, Kang G. .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :1044-1055
[5]  
Cho KT, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P911
[6]   k-Nearest Neighbour Classifiers - A Tutorial [J].
Cunningham, Padraig ;
Delany, Sarah Jane .
ACM COMPUTING SURVEYS, 2021, 54 (06)
[7]  
Dunn P.F., 2017, MEASUREMENT DATA ANA
[8]  
Golden P., 2005, Fundamentals of DSL Technology
[9]  
Grand View Research, 2019, AUT EL CONTR UN MARK
[10]  
Groza Bogdan, 2012, CRYPTOLOGY NETWORK S