Aiden: Association-Learning-Based Attack Identification on the Edge of V2X Communication Networks

被引:9
作者
Chen, Yuanfang [1 ]
Alam, Muhammad [2 ]
Mumtaz, Shahid [3 ]
机构
[1] Hangzhou Dianzi Univ, Sch Cyberspace, Hangzhou 310005, Peoples R China
[2] London South Bank Univ, Sch Engn, London, England
[3] Univ Aveiro, Inst Telecomunicacoes, P-3810193 Aveiro, Portugal
来源
IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING | 2022年 / 6卷 / 03期
基金
中国国家自然科学基金;
关键词
Clocks; Voltage measurement; Vehicle-to-everything; Wheels; Security; Timing; Wireless sensor networks; Association learning; attack identification; automotive security; edge intelligence; V2X communication networks; AUTHENTICATION; VEHICLES;
D O I
10.1109/TGCN.2022.3188674
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In vehicle security, attack identification has been proposed to identify the compromised electronic control units (ECUs) of a vehicle. Fingerprinting methods using a variety of features have been widely applied to identify attacks. However, these methods only consider the features of an individual ECU, and ignore the logical association among different ECUs. This condition leads to high requirements in terms of feature measurements, and a great deal of useful information is lost to achieve identification. In this paper, an association-learning-based model, designated Aiden, is proposed to identify the compromised ECUs on the edge of V2X communication networks and without feature measurements. Experiments on a real vehicle show the effectiveness of the proposed model.
引用
收藏
页码:1377 / 1385
页数:9
相关论文
共 24 条
[1]   A Lightweight Authentication and Attestation Scheme for In-Transit Vehicles in IoV Scenario [J].
Alladi, Tejasvi ;
Chakravarty, Sombuddha ;
Chamola, Vinay ;
Guizani, Mohsen .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (12) :14188-14197
[2]  
[Anonymous], Wikipedia
[3]  
Checkoway S., 2011, P 20 USENIX SEC S AU, P6
[4]   Viden: Attacker Identification on In-Vehicle Networks [J].
Cho, Kyong-Tak ;
Shin, Kang G. .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1109-1123
[5]  
Cho KT, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P911
[6]   Identifying ECUs Using Inimitable Characteristics of Signals in Controller Area Networks [J].
Choi, Wonsuk ;
Jo, Hyo Jin ;
Woo, Samuel ;
Chun, Ji Young ;
Park, Jooyoung ;
Lee, Dong Hoon .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (06) :4757-4770
[7]   RetroWrite: Statically Instrumenting COTS Binaries for Fuzzing and Sanitization [J].
Dinesh, Sushant ;
Burow, Nathan ;
Xu, Dongyan ;
Payer, Mathias .
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, :1497-1511
[8]   A Blockchain-SDN-Enabled Internet of Vehicles Environment for Fog Computing and 5G Networks [J].
Gao, Jianbin ;
Agyekum, Kwame Opuni-Boachie Obour ;
Sifah, Emmanuel Boateng ;
Acheampong, Kingsley Nketia ;
Xia, Qi ;
Du, Xiaojiang ;
Guizani, Mohsen ;
Xia, Hu .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (05) :4278-4291
[9]   Advanced Persistent Threats in Autonomous Driving [J].
Kant K. .
Performance Evaluation Review, 2020, 47 (04) :25-28
[10]   Scission: Signal Characteristic-Based Sender Identification and Intrusion Detection in Automotive Networks [J].
Kneib, Marcel ;
Huth, Christopher .
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, :787-800