Affiliation:
1. Department of Computer Science and Technology, Ocean University of China, Qingdao, China
2. College of Computer Science and Technology, Qingdao University, Qingdao, China
Abstract
External wireless interfaces and the lack of security design of controller area network (CAN) standards make it vulnerable to CAN-targeting attacks. Unfortunately, various defense solutions have been proposed merely to detect CAN intrusion attacks, while only a few works are devoted to intrusion source identification. Demonstrated by our experimental studies, the most advanced IDS with intrusion source identification, which is based on the physical feature fingerprints of the in-vehicle Electronic Control Units (ECUs), will fail when the temperature changes. In this paper, we innovatively propose temperature-varied fingerprinting, called TVF, for CAN intrusion detection and intrusion source identification. Motivated by the remarkable observation that the physical feature of an ECU, i.e., its clock offset, changes linearly with the temperature of ECUs, the concept of temperature-varied fingerprints is proposed. Then, for a severe intrusion case, we provide an advanced TVF for further supplemented and expanded. The proposed advanced temperature-varied fingerprinting is implemented, and extensive performance evaluation experiments are conducted in both CAN bus prototype and real vehicles. The experimental results illustrate the effectiveness and performance of advanced TVF.
Funder
China Postdoctoral Science Foundation
Subject
Computer Networks and Communications,Information Systems
Reference40 articles.
1. Adventures in automotive networks and control units;C. Miller
2. Free-fall: hacking tesla from wireless to can CAN bus;S. Nie
3. Hackers remotely kill a jeep on the highway-with me in it;A. Greenberg;Wired,2015
4. Librecan: automated can message translator;M. D. Pese
5. Entropy-based anomaly detection for in-vehicle networks;M. Muter
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献