VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System

被引:198
作者
Choi, Wonsuk [1 ]
Joo, Kyungho [1 ]
Jo, Hyo Jin [2 ]
Park, Moon Chan [1 ]
Lee, Dong Hoon [1 ]
机构
[1] Korea Univ, Grad Sch Informat Secur, Seoul 02841, South Korea
[2] Univ Penn, Dept Comp & Informat Syst, Philadelphia, PA 19096 USA
关键词
Controller area network; electronic control unit; automotive IDS; fingerprinting; FEATURE-SELECTION; IDENTIFICATION; INFORMATION; ALGORITHMS;
D O I
10.1109/TIFS.2018.2812149
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The proliferation of computerized functions aimed at enhancing drivers' safety and convenience has increased the number of vehicular attack surfaces accordingly. The fundamental vulnerability is caused by the fact that the controller area network protocol, a de facto standard for in-vehicle networks, does not support message origin authentication. Several methods to resolve this problem have been suggested. However, most of them require modification of the CAN protocol and have their own vulnerabilities. In this paper, we focus on securing in-vehicle CAN networks, proposing a novel automotive intrusion detection system (so-called VoltageIDS). The system leverages the inimitable characteristics of an electrical CAN signal as a fingerprint of the electronic control units. The noteworthy contributions are that VoltageIDS does not require any modification of the current system and has been validated on actual vehicles while driving on the road. VoltageIDS is also the first automotive intrusion detection system capable of distinguishing between errors and the bus-off attack. Our experimental results on a CAN bus prototype and on real vehicles show that VoltageIDS detects intrusions in the in-vehicle CAN network. Moreover, we evaluate VoltageIDS while a vehicle is moving.
引用
收藏
页码:2114 / 2129
页数:16
相关论文
共 50 条
  • [1] AMPG Body Electronics Systems Engineering Team, 2017, FUT ADV BOD EL
  • [2] [Anonymous], 2011, USENIX SEC S
  • [3] [Anonymous], 2016, P 14 ACM C EMBEDDED
  • [4] [Anonymous], 2015, Wired
  • [5] Cauwenberghs G., 2000, P NIPS, P1
  • [6] Cho K.-T., 2017, VIDEN ATTACKER IDENT
  • [7] Error Handling of In-vehicle Networks Makes Them Vulnerable
    Cho, Kyong-Tak
    Shin, Kang G.
    [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1044 - 1055
  • [8] Cho KT, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P911
  • [9] Chun J., 2016, IDENTIFYING ECUS USI
  • [10] Danev B, 2009, 2009 INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING IN SENSOR NETWORKS (IPSN 2009), P25