This content is not included in
your SAE MOBILUS subscription, or you are not logged in.
Exploiting Consistency Among Heterogeneous Sensors for Vehicle Anomaly Detection
Technical Paper
2017-01-1654
ISSN: 0148-7191, e-ISSN: 2688-3627
This content contains downloadable datasets
Annotation ability available
Sector:
Language:
English
Abstract
Modern vehicles house many advanced components; sensors and Electronic Control Units (ECUs) — now numbering in the 100s. These components provide various advanced safety, comfort and infotainment features, but they also introduce additional attack vectors for malicious entities. Attackers can compromise one or more of these sensors and flood the vehicle’s internal network with fake sensor values. Falsified sensor values can confuse the driver, and even cause the vehicle to misbehave. Redundancy can be used to address compromised sensors, but adding redundant sensors will increase the cost per vehicle and is therefore less attractive.
To balance the need for security and cost-efficiency, we exploit the natural redundancy found in vehicles. Natural redundancy occurs when the same physical phenomenon causes symptoms in multiple sensors. For instance, pressing the accelerator pedal will cause the engine to pump faster and increase the speed of the vehicle. Engine RPM and vehicle speed are multiple sensors which respond in a related fashion to the same cause of the accelerator pedal. The challenge is identifying the relationship between similar but different sensors under normal operation and detecting anomalous be-havior accurately.
In this paper, we develop the tools to capture the relationship between sensors. Specifically, we use the pairwise correlation between key variables, and use cluster-analysis to identify distinct behavior of drivers. Moreover, we show preliminary results of using these tools to detect attacks within a vehicular communication bus.
Recommended Content
Authors
Topic
Citation
Ganesan, A., Rao, J., and Shin, K., "Exploiting Consistency Among Heterogeneous Sensors for Vehicle Anomaly Detection," SAE Technical Paper 2017-01-1654, 2017, https://doi.org/10.4271/2017-01-1654.Data Sets - Support Documents
Title | Description | Download |
---|---|---|
Unnamed Dataset 1 | ||
Unnamed Dataset 2 | ||
Unnamed Dataset 3 |
Also In
References
- Checkoway S. , McCoy D. , Kantor B. , Anderson D. , Shacham H. , Savage S. , Koscher K. , Czeskis A. , Roesner F. , Kohno T. , Comprehensive experimental analyses of automotive attack surfaces USENIX Security Symposium San Francisco 2011
- Cho K.-T. , Shin K. G. , and Park T. Cps approach to checking norm operation of a brake-by-wire system Proceedings of the ACM/IEEE Sixth International Conference on Cyber-Physical Systems 41 50 ACM 2015
- Ester M. , Kriegel H.-P. , Sander J. , Xu X. , A density-based algorithm for discovering clusters in large spatial databases with noise Kdd 96 226 231 1996
- Green P. , Sullivan J. M. , Tsimhoni O. , Oberholtzer J. , Buonarosa M. L. , Devonshire J. , Schweitzer J. , Baragar E. , and Sayer J. Integrated vehicle-based safety systems (ivbss): Human factors and driver-vehicle interface (dvi) summary report Technical report 2008
- Hoppe T. , Kiltz S. , and Dittmann J. Security threats to automotive can networks–practical examples and selected short-term countermeasures International Conference on Computer Safety, Reliability, and Security 235 248 Springer 2008
- Koscher K. , Czeskis A. , Roesner F. , Patel S. , Kohno T. , Checkoway S. , McCoy D. , Kantor B. , Anderson D. , Shacham H. , Experimental security analysis of a modern automobile 2010 IEEE Symposium on Security and Privacy 447 462 IEEE 2010
- Liu C. , Ghosal S. , Jiang Z. , and Sarkar S. An unsupervised spa- tiotemporal graphical modeling approach to anomaly detection in distributed cps 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS) 1 10 IEEE 2016
- Miller C. and Valasek C. Adventures in automotive networks and control units DEF CON 21 260 264 2013
- Pajic M. , Weimer J. , Bezzo N. , Tabuada P. , Sokolsky O. , Lee I. , and Pappas G. J. Robustness of attack-resilient state estimators IC-CPS’14: ACM/IEEE 5th International Conference on Cyber-Physical Systems (with CPS Week 2014) 163 174 IEEE Computer Society 2014