Cyberattacks and Countermeasures for In-Vehicle Networks

被引:106
作者
Aliwa, Emad [1 ]
Rana, Omer [1 ]
Perera, Charith [1 ]
Burnap, Peter [1 ]
机构
[1] Cardiff Univ, 5 Parade, Cardiff CF24 3AA, Wales
基金
英国工程与自然科学研究理事会;
关键词
CAN bus; cybersecurity; intrusion detection systems; INTRUSION DETECTION; DETECTION SYSTEM; ARCHITECTURE; POWER;
D O I
10.1145/3431233
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As connectivity between and within vehicles increases, so does concern about safety and security. Various automotive serial protocols are used inside vehicles such as Controller Area Network (CAN), Local Interconnect Network (LIN), and FlexRay. CAN Bus is the most used in-vehicle network protocol to support exchange of vehicle parameters between Electronic Control Units (ECUs). This protocol lacks security mechanisms by design and is therefore vulnerable to various attacks. Furthermore, connectivity of vehicles has made the CAN Bus vulnerable not only from within the vehicle but also from outside. With the rise of connected cars, more entry points and interfaces have been introduced on board vehicles, thereby also leading to a wider potential attack surface. Existing security mechanisms focus on the use of encryption, authentication, and vehicle Intrusion Detection Systems (IDS), which operate under various constraints such as low bandwidth, small frame size (e.g., in the CAN protocol), limited availability of computational resources, and real-time sensitivity. We survey and classify current cryptographic and IDS approaches and compare these approaches based on criteria such as real-time constraints, types of hardware used, changes in CAN Bus behaviour, types of attack mitigation, and software/ hardware used to validate these approaches. We conclude with mitigation strategies limitations and research challenges for the future.
引用
收藏
页数:37
相关论文
共 157 条
[1]  
Agrawal M, 2019, ADV SCI TECH SEC APP, P71, DOI 10.1007/978-3-030-12330-7_4
[2]   Proactive Threat Detection for Connected Cars Using Recursive Bayesian Estimation [J].
al-Khateeb, Haider ;
Epiphaniou, Gregory ;
Reviczky, Adam ;
Karadimas, Petros ;
Heidari, Hadi .
IEEE SENSORS JOURNAL, 2018, 18 (12) :4822-4831
[3]  
[Anonymous], 2011, USENIX SECURITY
[4]  
[Anonymous], 2010, 1068112010 ISO
[5]  
Avatefipour O., 2017, 2017 IEEE Workshop on Information Forensics and Security (WIFS), P1
[6]   An Intelligent Secured Framework for Cyberattack Detection in Electric Vehicles' CAN Bus Using Machine Learning [J].
Avatefipour, Omid ;
Al-Sumaiti, Ameena Saad ;
El-Sherbeeny, Ahmed M. ;
Awwad, Emad Mahrous ;
Elmeligy, Mohammed A. ;
Mohamed, Mohamed A. ;
Malik, Hafiz .
IEEE ACCESS, 2019, 7 :127580-127592
[7]  
Avatefipour Omid, 2018, STATE ART SURVEY VEH
[8]   TOUCAN A proTocol tO secUre Controller Area Network [J].
Bella, Giampaolo ;
Biondi, Pietro ;
Costantino, Gianpiero ;
Matteucci, Ilaria .
PROCEEDINGS OF THE ACM WORKSHOP ON AUTOMOTIVE CYBERSECURITY (AUTOSEC '19), 2019, :3-8
[9]   Detecting cyber-physical threats in an autonomous robotic vehicle using Bayesian Networks [J].
Bezemskij, Anatolij ;
Loukas, George ;
Gan, Diane ;
Anthony, Richard J. .
2017 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2017, :98-103
[10]  
Bittl S, 2014, LECT NOTES COMPUT SC, V8435, P113, DOI 10.1007/978-3-319-06644-8_11