On the Security of Networked Control Systems in Smart Vehicle and Its Adaptive Cruise Control

被引:35
作者
Farivar, Faezeh [1 ,2 ]
Haghighi, Mohammad Sayad [3 ]
Jolfaei, Alireza [4 ]
Wen, Sheng [5 ]
机构
[1] Islamic Azad Univ, Dept Comp & Mechatron Engn, Sci & Res Branch, Tehran 1477893855, Iran
[2] Inst Res Fundamental Sci IPM, Sch Comp Sci, Tehran 193955746, Iran
[3] Univ Tehran, Coll Engn, Sch Elect & Comp Engn, Tehran 1439957131, Iran
[4] Macquarie Univ, Dept Comp, Sydney, NSW 2109, Australia
[5] Swinburne Univ Technol, Dept Comp Sci & Software Engn, Hawthorn, Vic 3122, Australia
关键词
Lead; Security; Cruise control; Acceleration; Intrusion detection; Automobiles; Vehicle dynamics; Internet of vehicles; cyber physical systems; software defined networks; vehicular ad hoc networks; car cruise control; intrusion detection; covert attack; AD HOC; INTRUSION DETECTION; ATTACKS; ISSUES;
D O I
10.1109/TITS.2021.3053406
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
With the benefits of Internet of Vehicles (IoV) paradigm, come along unprecedented security challenges. Among many applications of inter-connected systems, vehicular networks and smart cars are examples that are already rolled out. Smart vehicles not only have networks connecting their internal components e.g. via Controller Area Network (CAN) bus, but also are connected to the outside world through road side units and other vehicles. In some cases, the internal and external network packets pass through the same hardware and are merely isolated by software defined rules. Any misconfiguration opens a window for the hackers to intrude into vehicles' internal components e.g. central lock system, Engine Control Unit (ECU), Anti-lock Braking System (ABS) or Adaptive Cruise Control (ACC) system. Compromise of any of these can lead to disastrous outcomes. In this paper, we study the security of smart vehicles' adaptive cruise control systems in the presence of covert attacks. We define two covert/stealth attacks in the context of cruise control and propose a novel intrusion detection and compensation method to disclose and respond to such attacks. More precisely, we focus on the covert cyber attacks that compromise the integrity of cruise controller and employ a neural network identifier in the IDS engine to estimate the system output dynamically and compare it against the ACC output. If any anomaly is detected, an embedded substitute controller kicks in and takes over the control. We conducted extensive experiments in MATLAB to evaluate the effectiveness of the proposed scheme in a simulated environment.
引用
收藏
页码:3824 / 3831
页数:8
相关论文
共 36 条
[1]   An Intrusion Detection System Against Black Hole Attacks on the Communication Network of Self-Driving Cars [J].
Alheeti, Khattab M. Ali ;
Gruebler, Anna ;
McDonald-Maier, Klaus D. .
2015 SIXTH INTERNATIONAL CONFERENCE ON EMERGING SECURITY TECHNOLOGIES (EST), 2015, :86-91
[2]  
[Anonymous], BBC NEWS
[3]  
Camacho E., 2003, Model Predictive Control
[4]   Covert Attacks in Cyber-Physical Control Systems [J].
de Sa, Alan Oliveira ;
Rust da Costa Carmo, Luiz F. ;
Machado, Raphael C. S. .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (04) :1641-1651
[5]  
Dekkata S. C., 2019, J. Mech. Robot, V3, P378
[6]  
Dekkata S. C, 2018, THESIS N CAROLINA AG
[7]   False Data Injection Attacks Against State Estimation in Power Distribution Systems [J].
Deng, Ruilong ;
Zhuang, Peng ;
Liang, Hao .
IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (03) :2871-2881
[8]   A SURVEY OF SECURITY ISSUES IN MOBILE AD HOC AND SENSOR NETWORKS [J].
Djenouri, Djamel ;
Khelladi, Lyes ;
Badache, Nadjib .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2005, 7 (04) :2-28
[9]  
Falliere Nicolas., 2011, Symantec Corp., V5, P29
[10]   Detection and Compensation of Covert Service-Degrading Intrusions in Cyber Physical Systems through Intelligent Adaptive Control [J].
Farivar, Faezeh ;
Haghighi, Mohammad Sayad ;
Barchinezhad, Soheila ;
Jolfaei, Alireza .
2019 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT), 2019, :1143-1148