This content is not included in your SAE MOBILUS subscription, or you are not logged in.

Exploiting Channel Distortion for Transmitter Identification for In-Vehicle Network Security

Journal Article
11-02-02-0005
ISSN: 2572-1046, e-ISSN: 2572-1054
Published August 18, 2020 by SAE International in United States
Exploiting Channel Distortion for Transmitter Identification for In-Vehicle Network Security
Sector:
Citation: Hafeez, A., Ponnapali, S., and Malik, H., "Exploiting Channel Distortion for Transmitter Identification for In-Vehicle Network Security," SAE Int. J. Transp. Cyber. & Privacy 3(1):5-17, 2020, https://doi.org/10.4271/11-02-02-0005.
Language: English

References

  1. Shin , K.G. and Kyusuk , H. May 10, 2018
  2. Marchetti , M. and Stabili , D. Read: Reverse Engineering of Automotive Data Frames IEEE Transactions on Information Forensics and Security 14 4 1083 1097 2018
  3. Liu , J. , Zhang , S. , Sun , W. , and Shi , Y. In-Vehicle Network Attacks and Countermeasures: Challenges and Future Directions IEEE Network 31 5 50 58 2017
  4. Fröschle , S. and Stühring , A. Analyzing the Capabilities of the Can Attacker European Symposium on Research in Computer Security Oslo, Norway Springer 2017 464 482
  5. Miller , C. and Valasek , C. A Survey of Remote Automotive Attack Surfaces Black Hat USA 2014 94
  6. Koscher , K. , Czeskis , A. , Roesner , F. , Patel , S. et al. Experimental Security Analysis of a Modern Automobile 2010 IEEE Symposium on Security and Privacy Claremont Resort, Berkeley, CA, USA IEEE 2010 447 462
  7. Checkoway , S. , McCoy , D. , Kantor , B. , Anderson , D. et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces USENIX Security Symposium San Francisco 2011 4 447 462
  8. Petit , J. and Shladover , S.E. Potential Cyberattacks on Automated Vehicles IEEE Transactions on Intelligent Transportation Systems 16 2 546 556 2014
  9. Gierlichs , B. and Poschmann , A.Y. Cryptographic Hardware and Embedded Systems-CHES 2016 Santa Barbara, CA, USA Springer 2016
  10. Hazem , A. and Fahmy , H.A. LCAP-a Lightweight Can Authentication Protocol for Securing In-Vehicle Networks 10th ESCAR Embedded Security in Cars Conference Berlin, Germany 2012 6
  11. Doan , T.P. and Ganesan , S. Can Crypto FPGA Chip to Secure Data Transmitted Through Can FD Bus Using AES-128 and SHA-1 Algorithms with a Symmetric Key SAE Technical Paper 2017-01-1612 2017 https://doi.org/10.4271/2017-01-1612
  12. Ueda , H. , Kurachi , R. , Takada , H. , Mizutani , T. et al. Security Authentication System for In-Vehicle Network SEI Technical Review 81 5 9 2015
  13. Sugashima , T. , Oka , D.K. , and Vuillaume , C. Approaches for Secure and Efficient In-Vehicle Key Management SAE Int. J. Passeng. Cars - Electron. Electr. Syst. 9 1 100 106 2016 https://doi.org/10.4271/2016-01-0070
  14. Hafeez , A. , Malik , H. , Avatefipour , O. , Rongali , P.R. et al. Comparative Study of Can-Bus and Flexray Protocols for In-Vehicle Communication SAE Technical Paper 2017-01-0017 2017 https://doi.org/10.4271/2017-01-0017
  15. Wolf , M. , Weimerskirch , A. , and Paar , C. Security in Automotive Bus Systems Workshop on Embedded Security in Cars Bochum, Germany 2004
  16. Lee , H. , Jeong , S.H. , and Kim , H.K. Otids: A Novel Intrusion Detection System for In-Vehicle Network by Using Remote Frame 2017 15th Annual Conference on Privacy, Security and Trust (PST) IEEE Calgary, Alberta, Canada 2017 57 5709
  17. Taylor , A. , Japkowicz , N. , and Leblanc , S. Frequency-Based Anomaly Detection for the Automotive Can Bus 2015 World Congress on Industrial Control Systems Security (WCICSS) United Kingdom IEEE 2015 45 49
  18. Song , H.M. , Kim , H.R. , and Kim , H.K. Intrusion Detection System Based on the Analysis of Time Intervals of Can Messages for In-Vehicle Network 2016 International Conference on Information Networking (ICOIN) Kota Kinabalu, Malaysia IEEE 2016 63 68
  19. Marchetti , M. , Stabili , D. , Guido , A. , and Colajanni , M. Evaluation of Anomaly Detection for In-Vehicle Networks through Information-Theoretic Algorithms 2016 IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a Better Tomorrow (RtSi) Bologna, Italy IEEE 2016 1 6
  20. Wu , W. , Huang , Y. , Kurachi , R. , Zeng , G. et al. Sliding Window Optimized Information Entropy Analysis Method for Intrusion Detection on In-Vehicle Networks IEEE Access 6 45233 45245 2018
  21. Stabili , D. , Marchetti , M. , and Colajanni , M. Detecting Attacks to Internal Vehicle Networks through Hamming Distance 2017 AEIT International Annual Conference Cagliari, Italy IEEE 2017 1 6
  22. Taylor , A. , Leblanc , S. , and Japkowicz , N. Anomaly Detection in Automobile Control Network Data with Long Short-Term Memory Networks 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA) Montreal, Canada IEEE 2016 130 139
  23. Kang , M.-J. and Kang , J.-W. Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security PloS One 11 6 e0155781 2016
  24. Markovitz , M. and Wool , A. Field Classification, Modeling and Anomaly Detection in Unknown Can Bus Networks Vehicular Communications 9 43 52 2017
  25. Jain , N. and Sharma , S. The Role of Decision Tree Technique for Automating Intrusion Detection System International Journal of Computational Engineering Research (ijceronline. com) 2 4 1076 1078 2012
  26. Rieke , R. , Seidemann , M. , Talla , E.K. , Zelle , D. et al. Behavior Analysis for Safety and Security in Automotive Systems 2017 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP) St. Petersburg, Russia IEEE 2017 381 385
  27. Narayanan , S.N. , Mittal , S. , and Joshi , A. : 2015
  28. Marchetti , M. and Stabili , D. Anomaly Detection of Can Bus Messages through Analysis of ID Sequences 2017 IEEE Intelligent Vehicles Symposium (IV) California, USA IEEE 2017 1577 1583
  29. Choi , W. , Joo , K. , Jo , H.J. , Park , M.C. et al. Voltageids: Low-Level Communication Characteristics for Automotive Intrusion Detection System IEEE Transactions on Information Forensics and Security 13 8 2114 2129 2018
  30. Cho , K.T. and Shin , K.G. Viden: Attacker Identification on In-Vehicle Networks Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security Dallas, Texas, USA ACM 2017 1109 1123
  31. Kneib , M. and Huth , C. Scission: Signal Characteristic-Based Sender Identification and Intrusion Detection in Automotive Networks Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security Toronto, Canada ACM 2018 787 800
  32. Choi , W. , Jo , H.J. , Woo , S. , Chun , J.Y. et al. Identifying ECUS Using Inimitable Characteristics of Signals in Controller Area Networks IEEE Transactions on Vehicular Technology 67 6 4757 4770 2018
  33. Cho , K.T. and Shin , K.G. Fingerprinting Electronic Control Units for Vehicle Intrusion Detection USENIX Security Symposium Austin, Texas 2016 911 927
  34. Avatefipour , O. , Hafeez , A. , Tayyab , M. , and Malik , H. Linking Received Packet to the Transmitter through Physical-Fingerprinting of Controller Area Network 2017 IEEE Workshop on Information Forensics and Security (WIFS) Rennes France IEEE 2017 1 6
  35. Groza , B. and Murvay , P.S. Efficient Intrusion Detection with Bloom Filtering in Controller Area Networks (CAN) IEEE Transactions on Information Forensics and Security 2018
  36. Hafeez , A. , Tayyab , M. , Zolo , C. , and Awad , S. Finger Printing of Engine Control Units by Using Frequency Response for Secure In-Vehicle Communication 2018 14th International Computer Engineering Conference (ICENCO) Cairo, Egypt IEEE 2018 79 83
  37. Wasicek , A. , Derler , P. , and Lee , E.A. Aspect-Oriented Modeling of Attacks in Automotive Cyber-Physical Systems 2014 51st ACM/EDaC/IEEE Design Automation Conference (DAC) San Francisco, USA IEEE 2014 1 6
  38. Wang , Q. and Sawhney , S. Vecure: A practical security framework to protect the can bus of vehicles 2014 International Conference on the Internet of Things (IOT) Cambridge, MA IEEE 2014 13 18
  39. Tayyab , M. , Hafeez , A. , and Malik , H. Spoofing Attack on Clock Based Intrusion Detection System in Controller Area Networks 2018 Ground Vehicle Systems Engineering and Technology Symposium, Proceedings GVSETS Novi, Michigan 2018
  40. Miller , C. and Valasek , C. Remote Exploitation of an Unaltered Passenger Vehicle Black Hat USA 2015 91
  41. Fuchsberger , A. Intrusion Detection Systems and Intrusion Prevention Systems Information Security Technical Report 10 3 134 139 2005
  42. Wu , W. , Li , R. , Xie , G. , An , J. et al. A Survey of Intrusion Detection for In-Vehicle Networks IEEE Transactions on Intelligent Transportation Systems 2019
  43. Han , M.L. , Lee , J. , Kang , A.R. , Kang , S. et al. A Statistical-Based Anomaly Detection Method for Connected Cars in Internet of Things Environment International Conference on Internet of Vehicles Chengdu, China Springer 2015 89 97
  44. Wang , E. , Xu , W. , Sastry , S. , Liu , S. et al. Hardware Module-Based Message Authentication in Intra-Vehicle Networks 2017 ACM/IEEE 8th International Conference on Cyber-Physical Systems (ICCPS) Pittsburgh, Pennsylvania IEEE 2017 207 216
  45. Müter , M. and Asaj , N. Entropy-Based Anomaly Detection for In-Vehicle Networks 2011 IEEE Intelligent Vehicles Symposium (IV) Baden-Baden, Germany IEEE 2011 1110 1115
  46. Ulaby , F.T. , Michielssen , E. , and Ravaioli , U. Fundamentals of Applied Electromagnetics 6e Boston Prentice Hall 2001
  47. Malik , H. Steganalysis of QIM Steganography Using Irregularity Measure Proceedings of the 10th ACM Workshop on Multimedia and Security New York, NY, United States 2008 149 158
  48. Møller , M.F. A Scaled Conjugate Gradient Algorithm for Fast Supervised Learning Neural Networks 6 4 525 533 1993

Cited By