This content is not included in
your SAE MOBILUS subscription, or you are not logged in.
State of the Art Survey on Comparison of Physical Fingerprinting-Based Intrusion Detection Techniques for In-Vehicle Security
Technical Paper
2020-01-0721
ISSN: 0148-7191, e-ISSN: 2688-3627
This content contains downloadable datasets
Annotation ability available
Sector:
Language:
English
Abstract
Controller area network (CAN) is used as a legacy protocol for in-vehicle communication. However, it lacks basic security features such as message authentication, integrity, confidentiality, etc., because the sender information in the message is missing. Hence, it is prone to different attacks like spoofing attacks, denial of service attacks, man in the middle and masquerade attacks. Researchers have proposed various techniques to detect and prevent these attacks, which can be split into two classes: (a) MAC-based techniques and (b) intrusion detection-based techniques. Further, intrusion detection systems can be divided into four categories: (i) message parameter- based, (ii) entropy-based, (iii) machine Learning-based and (iv) fingerprinting-based. This paper details state-of- the-art survey of fingerprinting-based intrusion detection techniques. In addition, the advantages and limitations of different fingerprinting-based intrusion detection techniques methods will be discussed.
Recommended Content
Technical Paper | Applying Blockchain to Vehicle Cybersecurity: Nuance to the Standard Application |
Ground Vehicle Standard | Pass-Thru Extended Feature - SAE J1939 |
Ground Vehicle Standard | Pass-Thru Extended Feature - Fault-Tolerant CAN |
Authors
Citation
Hafeez, A., Rehman, K., and Malik, H., "State of the Art Survey on Comparison of Physical Fingerprinting-Based Intrusion Detection Techniques for In-Vehicle Security," SAE Technical Paper 2020-01-0721, 2020, https://doi.org/10.4271/2020-01-0721.Data Sets - Support Documents
Title | Description | Download |
---|---|---|
Unnamed Dataset 1 | ||
Unnamed Dataset 2 | ||
Unnamed Dataset 3 | ||
Unnamed Dataset 4 |
Also In
References
- Choi , W. , Joo , K. , Jo , H.J. , Park , M.C. , and Lee , D.H. Voltageids: Low-Level Communication Characteristics for Automotive Intrusion Detection System IEEE Transactions on Information Forensics and Security 13 8 2114 2129 2018
- Woo , S. , Jo , H.J. , and Lee , D.H. A Practical Wireless Attack on the Connected Car and Security Protocol for In-Vehicle Can IEEE Transactions on intelligent transportation systems 16 2 993 1006 2015
- Miller , C. and Valasek , C. Remote Exploitation of an Unaltered Passenger Vehicle Black Hat USA 91 2015
- Kneib , M. and Huth , C. Scission: Signal Characteristic-Based Sender Identification and Intrusion Detection in Automotive Networks Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security 2018 787 800
- Woo , S. , Jo , H.J. , Kim , I.S. , and Lee , D.H. A Practical Security Architecture for In-Vehicle Can-Fd IEEE Transactions on Intelligent Transportation Systems 17 8 2248 2261 2016
- Gierlichs , B. and Poschmann , A.Y. Cryptographic Hardware and Embedded Systems-CHES 2016 Springer 2016
- Hazem , A. and Fahmy , H. Lcap-A Lightweight Can Authentication Protocol for Securing In-Vehicle Networks 10th ESCAR Embedded Security in Cars Conference Berlin, Germany 2012 6
- Doan , T.P. and Ganesan , S. Can Crypto Fpga Chip to Secure Data Transmitted through Can Fd Bus Using Aes-128 and Sha-1 Algorithms with a Symmetric Key SAE Technical Paper 2017-01-1612 2017 https://doi.org/10.4271/2017-01-1612
- Ueda , H. , Kurachi , R. , Takada , H. , Mizutani , T. et al. Security Authentication System for In-Vehicle Network SEI Technical Review 81 5 9 2015
- Sugashima , T. , Oka , D.K. , and Vuillaume , C. Approaches for Secure and Efficient in-Vehicle Key Management SAE International Journal of Passenger Cars-Electronic and Electrical Systems 9 100 106 2016 https://doi.org/10.4271/2016-01-0070
- Hafeez , A. , Malik , H. , Avatefipour , O. , Rongali , P.R. , and Zehra , S. Comparative Study of Can-Bus and Flexray Protocols for In-Vehicle Communication SAE Technical Paper 2017-01-0017 2017 https://doi.org/10.4271/2017-01-0017
- Wolf , M. , Weimerskirch , A. , and Paar , C. Security in Automotive Bus Systems Workshop on Embedded Security in Cars 2004
- Murvay , P.-S. and Groza , B. Source Identification Using Signal Characteristics in Controller Area Networks IEEE Signal Processing Letters 21 4 395 399 2014
- Gerdes , R.M. , Mina , M. , Russell , S.F. , and Daniels , T.E. Physical-Layer Identification of Wired Ethernet Devices IEEE Transactions on Information Forensics and Security 7 4 1339 1353 2012
- Avatefipour , O. 2017
- Wang , Q. and Sawhney , S. Vecure: A Practical Security Framework to Protect the Can Bus of Vehicles Internet of Things (IOT), 2014 International Conference on the, IEEE 2014 13 18
- Cho , K.-T. and Shin , K.G. Viden: Attacker Identification on In-Vehicle Networks Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, ACM 2017 1109 1123
- Cho , K.-T. and Shin , K.G. Fingerprinting Electronic Control Units for Vehicle Intrusion Detection USENIX Security Symposium 2016 911 927
- Groza , B. and Murvay , P.-S. Efficient Intrusion Detection with Bloom Filtering in Controller Area Networks (Can) IEEE Transactions on Information Forensics and Security 2018
- Sagong , S.U. , Ying , X. , Clark , A. , Bushnell , L. , and Poovendran , R. Cloaking the Clock: Emulating Clock Skew in Controller Area Networks Proceedings of the 9th ACM/IEEE International Conference on Cyber-Physical Systems 2018 32 42
- Lee , H. , Jeong , S.H. , and Kim , H.K. Otids: A Novel Intrusion Detection System for In-Vehicle Network by Using Remote Frame 2017 15th Annual Conference on Privacy, Security and Trust (PST) 2017 57 5709
- Taylor , A. , Japkowicz , N. , and Leblanc , S. Frequencybased Anomaly Detection for the Automotive Can Bus 2015 World Congress on Industrial Control Systems Security (WCICSS) 2015 45 49
- Song , H.M. , Kim , H.R. , and Kim , H.K. Intrusion Detection System Based on the Analysis of Time Intervals of Can Messages for In-Vehicle Network 2016 International Conference on Information Networking (ICOIN) 2016 63 68
- Marchetti , M. , Stabili , D. , Guido , A. , and Colajanni , M. Evaluation of Anomaly Detection for In-Vehicle Networks through Information-Theoretic Algorithms 2016 IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a Better Tomorrow (RTSI) 2016 1 6
- Wu , W. , Huang , Y. , Kurachi , R. , Zeng , G. et al. Sliding Window Optimized Information Entropy Analysis Method for Intrusion Detection on Invehicle Networks IEEE Access 6 45 233 45 245 2018
- Stabili , D. , Marchetti , M. , and Colajanni , M. Detecting Attacks to Internal Vehicle Networks through Hamming Distance 2017 AEIT International Annual Conference 2017 1 6
- Taylor , A. , Leblanc , S. , and Japkowicz , N. Anomaly Detection in Automobile Control Network Data with Long Short-Term Memory Networks 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA) 2016 130 139
- Kang , M.-J. and Kang , J.-W. Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security PLoS One 11 6 e0155781 2016
- Markovitz , M. and Wool , A. Field Classification, Modeling and Anomaly Detection in Unknown Can Bus Networks Vehicular Communications 9 43 52 2017
- Jain , N. and Sharma , S. The Role of Decision Tree Technique for Automating Intrusion Detection System International Journal of Computational Engineering Research 2 4 2012
- Rieke , R. , Seidemann , M. , Talla , E.K. , Zelle , D. , and Seeger , B. Behavior Analysis for Safety and Security in Automotive Systems 2017 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP) 2017 381 385
- Narayanan , S.N. , Mittal , S. , and Joshi , A. 2015
- Marchetti , M. and Stabili , D. Anomaly Detection of Can Bus Messages through Analysis of Id Sequences 2017 IEEE Intelligent Vehicles Symposium (IV) 2017 1577 1583
- Hafeez , A. , Tayyab , M. , Zolo , C. , and Awad , S. Finger Printing of Engine Control Units by Using Frequency Response for Secure In-Vehicle Communication 2018 14th International Computer Engineering Conference (ICENCO) 2018 79 83
- Gerdes , R.M. , Mina , M. , Russell , S.F. , and Daniels , T.E. Physical-Layer Identification of Wired Ethernet Devices IEEE Transactions on Information Forensics and Security 7 4 1339 1353 2012
- Choi , W. , Jo , H.J. , Woo , S. , Chun , J.Y. et al. Identifying Ecus Using Inimitable Characteristics of Signals in Controller Area Networks IEEE Transactions on Vehicular Technology 67 6 4757 4770 2018
- Avatefipour , O. , Hafeez , A. , Tayyab , M. , and Malik , H. Linking Received Packet to the Transmitter through Physical-Fingerprinting of Controller Area Network Information Forensics and Security (WIFS), 2017 IEEE Workshop on 2017 1 6
- Hall , J. , Barbeau , M. , and Kranakis , E. Radio Frequency Fingerprinting for Intrusion Detection in Wireless Networks IEEE Transactions on Defendable and Secure Computing 12 1 35 2005
- Hafeez , A. , Topolovec , K. , and Awad , S. Ecu Fingerprinting through Parametric Signal Modeling and Artificial Neural Networks for In-Vehicle Security against Spoofing Attacks 2019 15th International Computer Engineering Conference (ICENCO) 2019
- Wu , W. , Li , R. , Xie , G. , An , J. et al. A Survey of Intrusion Detection for In-Vehicle Networks IEEE Transactions on Intelligent Transportation Systems 2019
- Han , M.L. , Lee , J. , Kang , A.R. , Kang , S. , Park , J.K. , and Kim , H.K. A Statistical-Based Anomaly Detection Method for Connected Cars in Internet of Things Environment International Conference on Internet of Vehicles 2015 89 97
- Hafeez , A. , Malik , H. , and Mahmood , K. Performance of Blind Microphone Recognition Algorithms in the Presence of Anti-Forensic Attacks Audio Engineering Society Conference: 2017 AES International Conference on Audio Forensics 2017
- Hafeez , A. , Malik , K.M. , and Malik , H. Exploiting Frequency Response for the Identification of Microphone Using Artificial Neural Networks Audio Engineering Society Conference: 2019 AES International Conference on Audio Forensics 2019
- Tayyab , M. , Hafeez , A. , and Malik , H. Spoofing Attack on Clock Based Intrusion Detection System in Controller Area Networks 2018 Ground Vehicle Systems Engineering and Technology Symposium, GVSETS Proceedings Novi, MI 2018
- Jana , S. and Kasera , S.K. On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews IEEE Transactions on Mobile Computing 9 3 449 462 2010
- Zander , S. and Murdoch , S.J. An Improved Clockskew Measurement Technique for Revealing Hidden Services USENIX Security Symposium 2008 211 226
- Kohno , T. , Broido , A. , and Claffy , K.C. Remote Physical Device Fingerprinting IEEE Transactions on Dependable and Secure Computing 2 2 93 108 2005