This content is not included in
your SAE MOBILUS subscription, or you are not logged in.
Onboard Cybersecurity Diagnostic System for Connected Vehicles
Technical Paper
2021-01-1249
ISSN: 0148-7191, e-ISSN: 2688-3627
This content contains downloadable datasets
Annotation ability available
Sector:
Language:
English
Abstract
Today’s advanced vehicles have high degree of interaction due to numerous sensors, actuators and also with complex communication within the control units. In order to hack a vehicle, it has to be within a certain range of communication. Here, we discuss the On-Board Diagnostic (OBD) regulations for next generation BEV/HEV, its vulnerabilities and cybersecurity threats that come with hacking. We propose three cybersecurity attack detection and defense methods: Cyber-Attack detection algorithm, Time-Based CAN Intrusion Detection Method and, Feistel Cipher Block Method. These control methods autonomously diagnose a cybersecurity problem in a vehicle’s onboard system using an OBD interface, such as OBD-II when a fault caused by a cyberattack is detected, All of this is achieved in an internal communication network structure. The results discussed here focus on the first detection method that is Cyber-Attack detection algorithm.
Recommended Content
Ground Vehicle Standard | Bluetooth™ Wireless Protocol for Automotive Applications |
Technical Paper | Modeling and Analysis of Electromagnetic Coupling Between Electric Propulsion System Components |
Journal Article | Functional Safety Compliant ECU Design for Electro-Mechanical Brake (EMB) System |
Authors
Topic
Citation
Dadam, S., Zhu, D., Kumar, V., Ravi, V. et al., "Onboard Cybersecurity Diagnostic System for Connected Vehicles," SAE Technical Paper 2021-01-1249, 2021, https://doi.org/10.4271/2021-01-1249.Data Sets - Support Documents
Title | Description | Download |
---|---|---|
Unnamed Dataset 1 |
Also In
References
- NHTSA Nhtsa and Vehicle Cybersecurity Washington, DC, USA National Highway Traffic Safety Administration 2018
- CARB California Air Resource Board OBD regulations www.arb.ca.gov
- Baek , S. and Jang , J. Implementation of Integrated OBD-II Connector with External Network Science Direct Journal 2014
- Khorsravinia , K. et al. Integrated OBD-II and Mobile Application for Electric Vehicle (EV) Monitoring System IEEE end International Conference on Automatic Control and Intelligent Systems 2017
- Heineman , L. and Zettel , A. ZERO EMISSIONS VEHICLES (ZEV’S) AND OBD SAE On-board Diagnostics Symposium Americas Garden Grove, CA, USA 2019
- Zettel , A. EV Roundtable Discussions 2020
- Nilsson , D.K. and Larson , U.E. Simulated Attacks on Can Buses: Vehicle Virus Proc. Int. Conf. on Communication Systems and Networks Langkawi, Malaysia 2008 66 72
- Checkoway , S. , McCoy , D. , Kantor , B. , Anderson , D. et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces Proc. 20th USENIX Security San Francisco, CA 2011
- Yan , W. A Two-year Survey on Security Challenges in Automotive Threat Landscape Proc. IEEE ICCVE Shenzhen Oct. 2015 185 189
- Zhang , T. , Antunes , H. , and Aggarwal , S. Defending Connected Vehicles Against Malware: Challenges and a Solution Framework IEEE Internet of Things 1 1 Feb 2014 10 21
- Shoukry , Y. , Martin , P. , Yona , Y. , Diggavi , S. , and Srivastava , M. PyCRA: Physical Challenge-Response Authentication for Active Sensors Under Spoofing Attacks Proc. 22nd ACM SIGSAC Conf. Comput. Commun. Secur. CCS 2015 1004 1015 10.1145/2810103.2813679
- Ljung , L. System Identification: Theory for the User Pearson Education 1998
- Zhou , Yong Bin , Feng , Deng Guo Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing International Association for Cryptologic Research 2005 https://eprint.iacr.org/2005/388
- van Roermund , T. and Bening , A. https://www.nxp.com/docs/en/white-paper/Cybersecurity-ECUs-WP.pdf
- Farhadi , M. and Abapour , M. Three-Switch Three-Phase Inverter with Improved DC Voltage Utilization IEEE Transactions on Industrial Electronics 66 1 2018 14 24
- Elektrotechnik-und , Z.-Z.
- Nathan , S. Sept. 24, 2015 https://www.theengineer.co.uk/hackers-after-your-car-tackling-automotive-cyber-security/
- Khandelwal , S. 2016 http://thehackernews.com/2016/05/car-hacker-prison.html
- Greenberg , A. July 21, 2015 https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/
- Lodge , D. 2016 https://www.pentestpartners.com/blog/hacking-the-mitsubishi-outlander-phev-hybrid-suv/
- Garcia , F.D. , Oswald , D. , Kasper , T. , and Pavlidès , P. Lock It and Still Lose It —on the (In)Security of Automotive Remote Keyless Entry Systems Proc. 25th USENIX Security Austin, TX 2016
- Hull , R. 2016 http://www.thisismoney.co.uk/money/cars/article
- Link , R. 2015 http://blog.trendmicro.com/trendlabs-security-intelligence/is
- Curtis , S. 2015 http://www.telegraph.co.uk/technology/news/11850373/Self
- TU-Automotive Ltd 2016 http://www.tu-auto.com/cyber-security-europe/
- Studnia , I. , Nicomette , V. , Alata , E. , Deswarte , Y. , Kaâniche , M. and Laarouchi , Y. Survey on Security Threats and Protection Mechanisms in Embedded Automotive Networks Proc. IEEE DSN-W Budapest June 2013 1 12
- Nilsson , D.K. and Larson , U.E. Simulated Attacks on Can Buses: Vehicle Virus Proc. Int. Conf. on Communication Systems and Networks Langkawi, Malaysia 2008 66 72
- Checkoway , S. , McCoy , D. , Kantor , B. , Anderson , D. et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces Proc. 20th USENIX Security San Francisco, CA 2011
- Yan , W. A Two-year Survey on Security Challenges in Automotive Threat Landscape Proc. IEEE ICCVE Shenzhen Oct. 2015 185 189
- Lyamin , N. , Vinel , A. , Jonsson , M. , and Loo , J. Real-Time Detection of Denial-of-Service Attacks in IEEE 802.11p Vehicular Networks IEEE Commu. Letters 18 1 Jan. 2014 110 113
- Ericsson 2015 http://archive.ericsson.net/service/internet/picov/get?DocNo=287
- National Highway Traffic Safety Administration 2016 www.nhtsa.gov/staticfiles/nvs/pdf/812333_CybersecurityF
- Dadam , S. , Sharma , S. , and Jentz , R.
- Dadam , S. , Jentz , R. , lenzen , T. , and Meissner , H. Diagnostic Evaluation of Exhaust Gas Recirculation (EGR) System on Gasoline Electric Hybrid Vehicle SAE Technical Paper 2020-01-0902 2020 https://doi.org/10.4271/2020-01-0902
- ZHU , D. , PRITCHARD , E. , DADAM , S.R. et al. Optimization of Rule-Based Energy Management Strategies for Hybrid Vehicles Using Dynamic Programming Combustion Engines 2021 https://doi.org/10.19206/CE-131967
- Van Nieuwstadt , M.J. , Lehmen , A. , Martin , D.R. , Rollinger , J.E. et al.
- Jentz , R. , Lenzen , T. , Dadam , S. , Meissner , H. et al.
- Jentz , R.R. , Sharma , S. , Dadam , S.
- Dadam , S.
- Snyder , K. and Ku , J. Plug-in Hybrid Electric Vehicle Reengineering of a Conventional Sedan for EcoCAR2 SAE Technical Paper 2015-01-1235 2015 https://doi.org/10.4271/2015-01-1235
- Snyder , K. and Ku , J. Advancement and Validation of a Plug-In Hybrid Electric Vehicle Plant Model SAE Technical Paper 2016-01-1247 2016 https://doi.org/10.4271/2016-01-1247
- Rehman , A. , Ur Rehman , S. , Khan , M. , Alazab , M. et al. CANintelliIDS: Detecting In-Vehicle Intrusion Attacks on a Controller Area Network using CNN and Attention-based GRU IEEE Transactions on Network Science and Engineering 10.1109/TNSE.2021.3059881
- Blevins , D. , Moriano , P. , Bridges , R. , Verma , M. et al. 2021