Viden: Attacker Identification on In-Vehicle Networks

被引:149
|
作者
Cho, Kyong-Tak [1 ]
Shin, Kang G. [1 ]
机构
[1] Univ Michigan, Ann Arbor, MI 48109 USA
关键词
Automotive Security; CAN bus; Attacker Identification;
D O I
10.1145/3133956.3134001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Various defense schemes-which determine the presence of an attack on the in-vehicle network-have recently been proposed. However, they fail to identify which Electronic Control Unit (ECU) actually mounted the attack. Clearly, pinpointing the attacker ECU is essential for fast/efficient forensic, isolation, security patch, etc. To meet this need, we propose a novel scheme, called Viden (Voltage-based attacker identification), which can identify the attacker ECU by measuring and utilizing voltages on the in-vehicle network. The first phase of Viden, called ACK learning, determines whether or not the measured voltage signals really originate from the genuine message transmitter. Viden then exploits the voltage measurements to construct and update the transmitter ECUs' voltage profiles as their fingerprints. It finally uses the voltage profiles to identify the attacker ECU. Since Viden adapts its profiles to changes inside/outside of the vehicle, it can pinpoint the attacker ECU under various conditions. Moreover, its efficiency and design-compliance with modern in-vehicle network implementations make Viden practical and easily deployable. Our extensive experimental evaluations on both a CAN bus prototype and two real vehicles have shown that Viden can accurately fingerprint ECUs based solely on voltage measurements and thus identify the attacker ECU with a low false identification rate of 0.2%.
引用
收藏
页码:1109 / 1123
页数:15
相关论文
共 50 条
  • [1] Attacker Identification and Intrusion Detection for In-Vehicle Networks
    Ning, Jing
    Wang, Jiadai
    Liu, Jiajia
    Kato, Nei
    IEEE COMMUNICATIONS LETTERS, 2019, 23 (11) : 1927 - 1930
  • [2] An Architecture for In-Vehicle Networks
    Walrand, Jean
    Turner, Max
    Myers, Roy
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (07) : 6335 - 6342
  • [3] A Configurable Gateway for In-Vehicle Networks
    Tien-Hai Nguyen
    Kim, Jin Ho
    Jeon, Jae Wook
    18TH IEEE INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS (ISCE 2014), 2014,
  • [4] Cyberattacks and Countermeasures for In-Vehicle Networks
    Aliwa, Emad
    Rana, Omer
    Perera, Charith
    Burnap, Peter
    ACM COMPUTING SURVEYS, 2021, 54 (01)
  • [5] Methods of identification of data transmitted in the in-vehicle CAN-BUS networks
    Rokicki, Krzysztof
    Szczurowski, Krzysztof
    2015 20TH INTERNATIONAL CONFERENCE ON METHODS AND MODELS IN AUTOMATION AND ROBOTICS (MMAR), 2015, : 946 - 949
  • [6] Real-Time Security Warning and ECU Identification for In-Vehicle Networks
    Wei, Hongqian
    Ai, Qiang
    Zhao, Wenqiang
    Zhang, Youtong
    IEEE SENSORS JOURNAL, 2023, 23 (17) : 20258 - 20266
  • [7] Coloring networks for attacker identification and response
    Sairam, Ashok Singh
    Roy, Sangita
    Sahay, Rishikesh
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (05) : 751 - 768
  • [8] DESIGN OF AN AUTOMOTIVE GATEWAY FOR IN-VEHICLE NETWORKS
    Seo, Suk-Hyun
    Kim, Jin-Ho
    Hwang, SungHo
    Kwon, Key Ho
    Jeon, Jae Wook
    PROCEEDINGS OF THE ASME INTERNATIONAL DESIGN ENGINEERING TECHNICAL CONFERENCES AND COMPUTERS AND INFORMATION IN ENGINEERING CONFERENCE, VOL 3, 2010, : 165 - 174
  • [9] LIN simplifies and standardizes in-vehicle networks
    Marsh, D
    EDN, 2005, 50 (09) : 29 - +
  • [10] A Survey of Intrusion Detection for In-Vehicle Networks
    Wu, Wufei
    Li, Renfa
    Xie, Guoqi
    An, Jiyao
    Bai, Yang
    Zhou, Jia
    Li, Keqin
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2020, 21 (03) : 919 - 933