This content is not included in your SAE MOBILUS subscription, or you are not logged in.
Exploiting Channel Distortion for Transmitter Identification for In-Vehicle Network Security
ISSN: 2572-1046, e-ISSN: 2572-1054
Published August 18, 2020 by SAE International in United States
Citation: Hafeez, A., Ponnapali, S., and Malik, H., "Exploiting Channel Distortion for Transmitter Identification for In-Vehicle Network Security," SAE Int. J. Transp. Cyber. & Privacy 3(1):5-17, 2020, https://doi.org/10.4271/11-02-02-0005.
Cyberattacks on financial and government institutions, critical infrastructure, voting systems, businesses, modern vehicles, and so on are on the rise. Fully connected autonomous vehicles are more vulnerable than ever to hacking and data theft. This is due to the fact that the industry still relies on controller area network (CAN) protocol for in-vehicle control networks. The CAN protocol lacks basic security features such as message authentication, which makes it vulnerable to a wide range of attacks including spoofing attacks. This article presents a novel method to protect CAN protocol against packet spoofing, replay, and denial of service (DoS) attacks. The proposed method exploits physical unclonable attributes in the physical channel between transmitting and destination nodes and uses them for linking the received packet to the source. Impurities in the physical channel and imperfections in design, material, and length of the channel are contributing factors behind physically unclonable artifacts. The lumped element model is used to characterize channel-specific distortions. Nonparametric modeling is used to estimate distortion distribution, which is used for transmitting node identification. Performance of the proposed method is evaluated on a dataset collected from a CAN network with channel lengths of 1 to 10 meters. Detection results show that the proposed method achieves average accuracy of 99.8% with a false positive rate of 0.2%.